Search results for: content moderation policies and limited access to information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 22720

Search results for: content moderation policies and limited access to information

21760 Analyzing Log File of Community Question Answering for Online Learning

Authors: Long Chen

Abstract:

With the proliferation of E-Learning, collaborative learning becomes more and more popular in various teaching and learning occasions. Studies over the years have proved that actively participating in classroom discussion can enhance student's learning experience, consolidating their knowledge and understanding of the class content. Collaborative learning can also allow students to share their resources and knowledge by exchanging, absorbing, and observing one another's opinions and ideas. Community Question Answering (CQA) services are particularly suitable paradigms for collaborative learning, since it is essentially an online collaborative learning platform where one can get information from multiple sources for he/her to choose from. However, current CQA services have only achieved limited success in collaborative learning due to the uncertainty of answers' quality. In this paper, we predict the quality of answers in a CQA service, i.e. Yahoo! Answers, for the use of online education and distance learning, which would enable a student to find relevant answers and potential answerers more effectively and efficiently, and thus greatly increase students' user experience in CQA services. Our experiment reveals that the quality of answers is influenced by a series of factors such as asking time, relations between users, and his/her experience in the past. We also show that by modelling user's profile with our proposed personalized features, student's satisfaction towards the provided answers could be accurately estimated.

Keywords: Community Question Answering, Collaborative Learning, Log File, Co-Training

Procedia PDF Downloads 438
21759 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 86
21758 Choice Analysis of Ground Access to São Paulo/Guarulhos International Airport Using Adaptive Choice-Based Conjoint Analysis (ACBC)

Authors: Carolina Silva Ansélmo

Abstract:

Airports are demand-generating poles that affect the flow of traffic around them. The airport access system must be fast, convenient, and adequately planned, considering its potential users. An airport with good ground access conditions can provide the user with a more satisfactory access experience. When several transport options are available, service providers must understand users' preferences and the expected quality of service. The present study focuses on airport access in a comparative scenario between bus, private vehicle, subway, taxi and urban mobility transport applications to São Paulo/Guarulhos International Airport. The objectives are (i) to identify the factors that influence the choice, (ii) to measure Willingness to Pay (WTP), and (iii) to estimate the market share for each modal. The applied method was Adaptive Choice-based Conjoint Analysis (ACBC) technique using Sawtooth Software. Conjoint analysis, rooted in Utility Theory, is a survey technique that quantifies the customer's perceived utility when choosing alternatives. Assessing user preferences provides insights into their priorities for product or service attributes. An additional advantage of conjoint analysis is its requirement for a smaller sample size compared to other methods. Furthermore, ACBC provides valuable insights into consumers' preferences, willingness to pay, and market dynamics, aiding strategic decision-making to provide a better customer experience, pricing, and market segmentation. In the present research, the ACBC questionnaire had the following variables: (i) access time to the boarding point, (ii) comfort in the vehicle, (iii) number of travelers together, (iv) price, (v) supply power, and (vi) type of vehicle. The case study questionnaire reached 213 valid responses considering the scenario of access from the São Paulo city center to São Paulo/Guarulhos International Airport. As a result, the price and the number of travelers are the most relevant attributes for the sample when choosing airport access. The market share of the selection is mainly urban mobility transport applications, followed by buses, private vehicles, taxis and subways.

Keywords: adaptive choice-based conjoint analysis, ground access to airport, market share, willingness to pay

Procedia PDF Downloads 74
21757 Nigeria Energy Security: The Role of Solar Batteries

Authors: Ihugba Okezie A., Oguzie Emeka E.

Abstract:

Nigeria's renewable energy market is expanding due to increased environmental awareness, supportive government policies, and the need for energy diversification. This paper examines the role of solar batteries in enhancing Nigeria's energy security. With growing energy demands and frequent power outages, integrating solar batteries presents a viable solution to stabilize the energy supply. The study investigates the current state of solar battery technology in Nigeria, its economic and environmental benefits, and the challenges to implementation. Through a literature review, case studies, and stakeholder interviews, the paper provides a comprehensive analysis of solar batteries' contribution to a resilient energy future. Key players include Engie SA, TotalEnergies SE, Starsight Energy, Enel SpA, and North-South Power Co. Ltd. Challenges include high upfront costs, inadequate policies, weak infrastructure, and security risks. The paper recommends that the government should strengthen policies and incentives to encourage investments through tax breaks, subsidies, and financial incentives.

Keywords: renewable energy, solar batteries, energy security, Nigeria’s electricity generation, job creation

Procedia PDF Downloads 27
21756 SPARK: An Open-Source Knowledge Discovery Platform That Leverages Non-Relational Databases and Massively Parallel Computational Power for Heterogeneous Genomic Datasets

Authors: Thilina Ranaweera, Enes Makalic, John L. Hopper, Adrian Bickerstaffe

Abstract:

Data are the primary asset of biomedical researchers, and the engine for both discovery and research translation. As the volume and complexity of research datasets increase, especially with new technologies such as large single nucleotide polymorphism (SNP) chips, so too does the requirement for software to manage, process and analyze the data. Researchers often need to execute complicated queries and conduct complex analyzes of large-scale datasets. Existing tools to analyze such data, and other types of high-dimensional data, unfortunately suffer from one or more major problems. They typically require a high level of computing expertise, are too simplistic (i.e., do not fit realistic models that allow for complex interactions), are limited by computing power, do not exploit the computing power of large-scale parallel architectures (e.g. supercomputers, GPU clusters etc.), or are limited in the types of analysis available, compounded by the fact that integrating new analysis methods is not straightforward. Solutions to these problems, such as those developed and implemented on parallel architectures, are currently available to only a relatively small portion of medical researchers with access and know-how. The past decade has seen a rapid expansion of data management systems for the medical domain. Much attention has been given to systems that manage phenotype datasets generated by medical studies. The introduction of heterogeneous genomic data for research subjects that reside in these systems has highlighted the need for substantial improvements in software architecture. To address this problem, we have developed SPARK, an enabling and translational system for medical research, leveraging existing high performance computing resources, and analysis techniques currently available or being developed. It builds these into The Ark, an open-source web-based system designed to manage medical data. SPARK provides a next-generation biomedical data management solution that is based upon a novel Micro-Service architecture and Big Data technologies. The system serves to demonstrate the applicability of Micro-Service architectures for the development of high performance computing applications. When applied to high-dimensional medical datasets such as genomic data, relational data management approaches with normalized data structures suffer from unfeasibly high execution times for basic operations such as insert (i.e. importing a GWAS dataset) and the queries that are typical of the genomics research domain. SPARK resolves these problems by incorporating non-relational NoSQL databases that have been driven by the emergence of Big Data. SPARK provides researchers across the world with user-friendly access to state-of-the-art data management and analysis tools while eliminating the need for high-level informatics and programming skills. The system will benefit health and medical research by eliminating the burden of large-scale data management, querying, cleaning, and analysis. SPARK represents a major advancement in genome research technologies, vastly reducing the burden of working with genomic datasets, and enabling cutting edge analysis approaches that have previously been out of reach for many medical researchers.

Keywords: biomedical research, genomics, information systems, software

Procedia PDF Downloads 264
21755 Advancing Agriculture through Technology: An Abstract of Research Findings

Authors: Eugene Aninagyei-Bonsu

Abstract:

Introduction: Agriculture has been a cornerstone of human civilization, ensuring food security and livelihoods for billions of people worldwide. In recent decades, rapid advancements in technology have revolutionized the agricultural sector, offering innovative solutions to enhance productivity, sustainability, and efficiency. This abstract summarizes key findings from a research study that explores the impacts of technology in modern agriculture and its implications for future food production systems. Methodologies: The research study employed a mixed-methods approach, combining quantitative data analysis with qualitative interviews and surveys to gain a comprehensive understanding of the role of technology in agriculture. Data was collected from various stakeholders, including farmers, agricultural technicians, and industry experts, to capture diverse perspectives on the adoption and utilization of agricultural technologies. The study also utilized case studies and literature reviews to contextualize the findings within the broader agricultural landscape. Major Findings: The research findings reveal that technology plays a pivotal role in transforming traditional farming practices and driving innovation in agriculture. Advanced technologies such as precision agriculture, drone technology, genetic engineering, and smart irrigation systems have significantly improved crop yields, reduced environmental impact, and optimized resource utilization. Farmers who have embraced these technologies have reported increased productivity, enhanced profitability, and improved resilience to environmental challenges. Furthermore, the study highlights the importance of accessible and affordable technology solutions for smallholder farmers in developing countries. Mobile applications, sensor technologies, and digital platforms have enabled small-scale farmers to access market information, weather forecasts, and agricultural best practices, empowering them to make informed decisions and improve their livelihoods. The research emphasizes the need for targeted policies and investments to bridge the digital divide and promote equitable technology adoption in agriculture. Conclusion: In conclusion, this research underscores the transformative potential of technology in agriculture and its critical role in advancing sustainable food production systems. The findings suggest that harnessing technology can address key challenges facing the agricultural sector, including climate change, resource scarcity, and food insecurity. By embracing innovation and leveraging technology, farmers can enhance their productivity, profitability, and resilience in a rapidly evolving global food system. Moving forward, policymakers, researchers, and industry stakeholders must collaborate to facilitate the adoption of appropriate technologies, support capacity building, and promote sustainable agricultural practices for a more resilient and food-secure future.

Keywords: technology development in modern agriculture, the influence of information technology access in agriculture, analyzing agricultural technology development, analyzing of the frontier technology of agriculture loT

Procedia PDF Downloads 31
21754 Combating Illegal Logging in Malaysia: Policies and Strategies under National Forestry Act (NFA) 1984

Authors: Muhammad Nur Haniff Mohd Noor, Rokiah Kadir, Suriyani Muhamad

Abstract:

The National Forestry Act (NFA) 1984 is the primary forest law that regulates forest-related activities in Peninsular Malaysia. In the 1990s, abundance of illegal logging cases have called for legislative reform of the NFA 1984. As a result, NFA 1984 was amended in 1993 with the principal goal of controlling illegal forest encroachment in the forms of illegal logging, unauthorized harvesting, unlicensed forest settlement and other forms of unlawful activities. At a conceptual level, this paper discusses the policies and strategies implemented under the NFA 1984 (Amendment 1993) that are dedicated to overcome illegal logging. Then, the policies and strategies employed are reviewed and evaluated. Next, this paper conceptually discusses the loopholes of NFA 1984 (Amendment 1993) in relation to aspects where the regulation is considered insufficient to curb illegal logging. In the final section, vital actions and suggested improvements to improve the overall effectiveness of NFA 1984 (Amendment 1993) are examined.

Keywords: forest law and regulation, illegal logging, National Forestry Act 1984, NFA 1984, Amendment 1993, Peninsular Malaysia

Procedia PDF Downloads 257
21753 Neoliberal Policies and International Organizations: The OECD and Higher Education Policy

Authors: Ellen Holtmaat

Abstract:

With an ever increasing influence of international organizations (IOs) on national policies and with the expectation that IOs are the transmission belts of world ideologies it is interesting to see to what extent IOs express a specific ideology and what determines the dominance of this ideology. This thesis looks at the OECD as IO and higher education as a field of policy. Evidence is found that the OECD promotes neoliberal developments in higher education and that its position is influenced by business, dominant countries and the dominant beliefs that are carried by the people working for the OECD that form an epistemic community. These results can possibly be extrapolated to other IOs.

Keywords: higher education, international organizations, neoliberal, OECD

Procedia PDF Downloads 366
21752 Efficacy of Knowledge Management Practices in Selected Public Libraries in the Province of Kwazulu-Natal, South Africa

Authors: Petros Dlamini, Bethiweli Malambo, Maggie Masenya

Abstract:

Knowledge management practices are very important in public libraries, especial in the era of the information society. The success of public libraries depends on the recognition and application of knowledge management practices. The study investigates the value and challenges of knowledge management practices in public libraries. Three research objectives informed the study: to identify knowledge management practices in public libraries, understand the value of knowledge management practices in public libraries, and determine the factors hampering knowledge management practices in public libraries. The study was informed by the interpretivism research paradigm, which is associated with qualitative studies. In that light, the study collected data from eight librarians and or library heads, who were purposively selected from public libraries. The study adopted a social anthropological approach, which thoroughly evaluated each participant's response. Data was collected from the respondents through telephonic semi-structured interviews and assessed accordingly. Furthermore, the study used the latest content concept for data interpretation. The chosen data analysis method allowed the study to achieve its main purpose with concrete and valid information. The study's findings showed that all six (100%) selected public libraries apply knowledge management practices. The findings of the study revealed that public libraries have knowledge sharing as the main knowledge management practice. It was noted that public libraries employ many practices, but each library employed its practices of choice depending on their knowledge management practices structure. The findings further showed that knowledge management practices in public libraries are employed through meetings, training, information sessions, and awareness, to mention a few. The findings revealed that knowledge management practices make the libraries usable. Furthermore, it has been asserted that knowledge management practices in public libraries meet users’ needs and expectations and equip them with skills. It was discovered that all participating public libraries from Umkhanyakude district municipality valued their knowledge management practices as the pillar and foundation of services. Noticeably, knowledge management practices improve users ‘standard of living and build an information society. The findings of the study showed that librarians should be responsible for the value of knowledge management practices as they are qualified personnel. The results also showed that 83.35% of public libraries had factors hampering knowledge management practices. The factors are not limited to shortage of funds, resources and space, and political interference. Several suggestions were made to improve knowledge management practices in public libraries. These suggestions include improving the library budget, increasing libraries’ building sizes, and conducting more staff training.

Keywords: knowledge management, knowledge management practices, storage, dissemination

Procedia PDF Downloads 88
21751 The Study on Treatment Technology of Fused Carbonized Blast Furnace Slag

Authors: Jiaxu Huang

Abstract:

The melt carbonized blast furnace slag containing TiC was produced by carbothermal reduction of high titanium blast furnace slag. The treatment technology of melt carbonized blast furnace slag with TiC as raw material was studied, including the influence of different cooling methods, crushing atmosphere and sieving particle size on the target product TiC in the slag. The results show that air-cooling and water-cooling have little effect on TiC content of molten carbide blast furnace slag, and have great effect on crystal structure and grain size. TiC content in slag is different when carbide blast furnace slag is crushed in argon atmosphere and air atmosphere. After screening, the difference of TiC content of carbide blast furnace slag with different particle size distribution is obvious. The average TiC content of 100-400 mesh carbide blast furnace slag is 14%. And the average TiC content of carbide blast furnace slag with particle size less than 400 mesh is 10.5%.

Keywords: crushing atmosphere, cooling methods, sieving particle size, TiC

Procedia PDF Downloads 131
21750 Economic Implications of the Arrival of Syrian Refugees in Jordan

Authors: Ammar Z. Alwrekiat, Sara Ojeda Gonzalez, Maria Jose Miranda Martel, Antonio Mihi-Ramirez

Abstract:

This paper analyses the economic situation in Jordan, which has been the political asylum destination for Syrians since 2011. We analyze the effects of the Jordanian situation through the following indicators: international aid, gross domestic product, remittances, and unemployment. A correlation analysis has been used to identify the main connections of these parameters with the reception of refugees. Although the economic effects of Syrian refugees in Jordan are uncertain, it involves an important challenge in the development of migration policies. Jordan has a special economic situation and limited capacities, but the country has provided humanitarian assistance to Syrian refugees. In this case, the support of the international community is of particular importance, taking an important role in the negotiation of international agreements on refugees.

Keywords: correlation analysis, economic implications, migration, refugees

Procedia PDF Downloads 247
21749 Actually Existing Policy Mobilities in Czechia: Comparing Creative and Smart Cities

Authors: Ondrej Slach, Jan Machacek, Jan Zenka, Lucie Hyllova, Petr Rumpel

Abstract:

The aim of the paper is to identify and asses different trajectories of two fashionable urban policies –creative and smart cities– in specific post-socialistic context. Drawing on the case of Czechia, we employ the concept of policy mobility research. More specifically, we employ a discourse analysis in order to identify the so-called 'infrastructure' of both policies (such as principal actors, journals, conferences, events), with the special focus on 'agents of transfer' in a multiscale perspective. The preliminary results indicate faster and more aggressive spatial penetration of smart cities policy compared to creative cities policy in Czechia. Further, it seems that existed translation and implementation of smart cities policy into the national and urban context resulted in deliberated fragmented policy of smart cities in Czechia (pure technocratic view), which might be a threat for the future development of social sustainability, especially in cities that are facing increasing social polarisation. Last but not least, due to the fast spatial penetration of the concept and policies of smart cities, it seems that creative cities policy has almost been crowded out of the Czech urban agenda.

Keywords: policy mobility, smart cities, creative cities, Czechia

Procedia PDF Downloads 162
21748 Young Adult Gay Men's Healthcare Access in the Era of the Affordable Care Act

Authors: Marybec Griffin

Abstract:

Purpose: The purpose of this cross-sectional study was to get a better understanding of healthcare usage and satisfaction among young adult gay men (YAGM), including the facility used as the usual source of healthcare, preference for coordinated healthcare, and if their primary care provider (PCP) adequately addressed the health needs of gay men. Methods: Interviews were conducted among n=800 YAGM in New York City (NYC). Participants were surveyed about their sociodemographic characteristics and healthcare usage and satisfaction access using multivariable logistic regression models. The surveys were conducted between November 2015 and June 2016. Results: The mean age of the sample was 24.22 years old (SD=4.26). The racial and ethnic background of the participants is as follows: 35.8% (n=286) Black Non-Hispanic, 31.9% (n=225) Hispanic/Latino, 20.5% (n=164) White Non-Hispanic, 4.4% (n=35) Asian/Pacific Islander, and 6.9% (n=55) reporting some other racial or ethnic background. 31.1% (n=249) of the sample had an income below $14,999. 86.7% (n=694) report having either public or private health insurance. For usual source of healthcare, 44.6% (n=357) of the sample reported a private doctor’s office, 16.3% (n=130) reported a community health center, and 7.4% (n=59) reported an urgent care facility, and 7.6% (n=61) reported not having a usual source of healthcare. 56.4% (n=451) of the sample indicated a preference for coordinated healthcare. 54% (n=334) of the sample were very satisfied with their healthcare. Findings from multivariable logistical regression models indicate that participants with higher incomes (AOR=0.54, 95% CI 0.36-0.81, p < 0.01) and participants with a PCP (AOR=0.12, 95% CI 0.07-0.20, p < 0.001) were less likely to use a walk-in facility as their usual source of healthcare. Results from the second multivariable logistic regression model indicated that participants who experienced discrimination in a healthcare setting were less likely to prefer coordinated healthcare (AOR=0.63, 95% CI 0.42-0.96, p < 0.05). In the final multivariable logistic model, results indicated that participants who had disclosed their sexual orientation to their PCP (AOR=2.57, 95% CI 1.25-5.21, p < 0.01) and were comfortable discussing their sexual activity with their PCP (AOR=8.04, 95% CI 4.76-13.58, p < 0.001) were more likely to agree that their PCP adequately addressed the healthcare needs of gay men. Conclusion: Understanding healthcare usage and satisfaction among YAGM is necessary as the healthcare landscape changes, especially given the relatively recent addition of urgent care facilities. The type of healthcare facility used as a usual source of care influences the ability to seek comprehensive and coordinated healthcare services. While coordinated primary and sexual healthcare may be ideal, individual preference for this coordination among YAGM is desired but may be limited due to experiences of discrimination in primary care settings.

Keywords: healthcare policy, gay men, healthcare access, Affordable Care Act

Procedia PDF Downloads 233
21747 How Autonomous Vehicles Transform Urban Policies and Cities

Authors: Adrián P. Gómez Mañas

Abstract:

Autonomous vehicles have already transformed urban policies and cities. This is the main assumption of our research, which aims to understand how the representations of the possible arrival of autonomous vehicles already transform priorities or actions in transport and more largely, urban policies. This research is done within the framework of a Ph.D. doctorate directed by Professor Xavier Desjardins at the Sorbonne University of Paris. Our hypotheses are: (i) the perspectives, representations, and imaginaries on autonomous vehicles already affect the stakeholders of urban policies; (ii) the discourses on the opportunities or threats of autonomous vehicles reflect the current strategies of the stakeholders. Each stakeholder tries to integrate a discourse on autonomous vehicles that allows them to change as little as possible their current tactics and strategies. The objective is to eventually make a comparison between three different cases: Paris, United Arab Emirates, and Bogota. We chose those territories because their contexts are very different, but they all have important interests in mobility and innovation, and they all have started to reflect on the subject of self-driving mobility. The main methodology used is to interview actors of the metropolitan area (local officials, leading urban and transport planners, influent experts, and private companies). This work is supplemented with conferences, official documents, press articles, and websites. The objective is to understand: 1) What they know about autonomous vehicles and where does their knowledge come from; 2) What they expect from autonomous vehicles; 3) How their ideas about autonomous vehicles are transforming their action and strategy in managing daily mobility, investing in transport, designing public spaces and urban planning. We are going to present the research and some preliminary results; we will show that autonomous vehicles are often viewed by public authorities as a lever to reach something else. We will also present that speeches are very influenced by local context (political, geographical, economic, etc.), creating an interesting balance between global and local influences. We will analyze the differences and similarities between the three cases and will try to understand which are the causes.

Keywords: autonomous vehicles, self-driving mobility, urban planning, urban mobility, transport, public policies

Procedia PDF Downloads 194
21746 Artificial Intelligence as a Policy Response to Teaching and Learning Issues in Education in Ghana

Authors: Joshua Osondu

Abstract:

This research explores how Artificial Intelligence (AI) can be utilized as a policy response to address teaching and learning (TL) issues in education in Ghana. The dual (AI and human) instructor model is used as a theoretical framework to examine how AI can be employed to improve teaching and learning processes and to equip learners with the necessary skills in the emerging AI society. A qualitative research design was employed to assess the impact of AI on various TL issues, such as teacher workloads, a lack of qualified educators, low academic performance, unequal access to education and educational resources, a lack of participation in learning, and poor access and participation based on gender, place of origin, and disability. The study concludes that AI can be an effective policy response to TL issues in Ghana, as it has the potential to increase students’ participation in learning, increase access to quality education, reduce teacher workloads, and provide more personalized instruction. The findings of this study are significant for filling in the gaps in AI research in Ghana and other developing countries and for motivating the government and educational institutions to implement AI in TL, as this would ensure quality, access, and participation in education and help Ghana industrialize.

Keywords: artificial intelligence, teacher, learner, students, policy response

Procedia PDF Downloads 87
21745 Visual Servoing for Quadrotor UAV Target Tracking: Effects of Target Information Sharing

Authors: Jason R. King, Hugh H. T. Liu

Abstract:

This research presents simulation and experimental work in the visual servoing of a quadrotor Unmanned Aerial Vehicle (UAV) to stabilize overtop of a moving target. Most previous work in the field assumes static or slow-moving, unpredictable targets. In this experiment, the target is assumed to be a friendly ground robot moving freely on a horizontal plane, which shares information with the UAV. This information includes velocity and acceleration information of the ground target to aid the quadrotor in its tracking task. The quadrotor is assumed to have a downward-facing camera which is fixed to the frame of the quadrotor. Only onboard sensing for the quadrotor is utilized for the experiment, with a VICON motion capture system in place used only to measure ground truth and evaluate the performance of the controller. The experimental platform consists of an ArDrone 2.0 and a Create Roomba, communicating using Robot Operating System (ROS). The addition of the target’s information is demonstrated to help the quadrotor in its tracking task using simulations of the dynamic model of a quadrotor in Matlab Simulink. A nested PID control loop is utilized for inner-loop control the quadrotor, similar to previous works at the Flight Systems and Controls Laboratory (FSC) at the University of Toronto Institute for Aerospace Studies (UTIAS). Experiments are performed with ground truth provided by an indoor motion capture system, and the results are analyzed. It is demonstrated that a velocity controller which incorporates the additional information is able to perform better than the controllers which do not have access to the target’s information.

Keywords: quadrotor, target tracking, unmanned aerial vehicle, UAV, UAS, visual servoing

Procedia PDF Downloads 338
21744 Structured Access Control Mechanism for Mesh-based P2P Live Streaming Systems

Authors: Chuan-Ching Sue, Kai-Chun Chuang

Abstract:

Peer-to-Peer (P2P) live streaming systems still suffer a challenge when thousands of new peers want to join into the system in a short time, called flash crowd, and most of new peers suffer long start-up delay. Recent studies have proposed a slot-based user access control mechanism, which periodically determines a certain number of new peers to enter the system, and a user batch join mechanism, which divides new peers into several tree structures with fixed tree size. However, the slot-based user access control mechanism is difficult for accurately determining the optimal time slot length, and the user batch join mechanism is hard for determining the optimal tree size. In this paper, we propose a structured access control (SAC) mechanism, which constructs new peers to a multi-layer mesh structure. The SAC mechanism constructs new peer connections layer by layer to replace periodical access control, and determines the number of peers in each layer according to the system’s remaining upload bandwidth and average video rate. Furthermore, we propose an analytical model to represent the behavior of the system growth if the system can utilize the upload bandwidth efficiently. The analytical result has shown the similar trend in system growth as the SAC mechanism. Additionally, the extensive simulation is conducted to show the SAC mechanism outperforms two previously proposed methods in terms of system growth and start-up delay.

Keywords: peer-to-peer, live video streaming system, flash crowd, start-up delay, access control

Procedia PDF Downloads 313
21743 The Role of Motivational Beliefs and Self-Regulated Learning Strategies in The Prediction of Mathematics Teacher Candidates' Technological Pedagogical And Content Knowledge (TPACK) Perceptions

Authors: Ahmet Erdoğan, Şahin Kesici, Mustafa Baloğlu

Abstract:

Information technologies have lead to changes in the areas of communication, learning, and teaching. Besides offering many opportunities to the learners, these technologies have changed the teaching methods and beliefs of teachers. What the Technological Pedagogical Content Knowledge (TPACK) means to the teachers is considerably important to integrate technology successfully into teaching processes. It is necessary to understand how to plan and apply teacher training programs in order to balance students’ pedagogical and technological knowledge. Because of many inefficient teacher training programs, teachers have difficulties in relating technology, pedagogy and content knowledge each other. While providing an efficient training supported with technology, understanding the three main components (technology, pedagogy and content knowledge) and their relationship are very crucial. The purpose of this study is to determine whether motivational beliefs and self-regulated learning strategies are significant predictors of mathematics teacher candidates' TPACK perceptions. A hundred seventy five Turkish mathematics teachers candidates responded to the Motivated Strategies for Learning Questionnaire (MSLQ) and the Technological Pedagogical And Content Knowledge (TPACK) Scale. Of the group, 129 (73.7%) were women and 46 (26.3%) were men. Participants' ages ranged from 20 to 31 years with a mean of 23.04 years (SD = 2.001). In this study, a multiple linear regression analysis was used. In multiple linear regression analysis, the relationship between the predictor variables, mathematics teacher candidates' motivational beliefs, and self-regulated learning strategies, and the dependent variable, TPACK perceptions, were tested. It was determined that self-efficacy for learning and performance and intrinsic goal orientation are significant predictors of mathematics teacher candidates' TPACK perceptions. Additionally, mathematics teacher candidates' critical thinking, metacognitive self-regulation, organisation, time and study environment management, and help-seeking were found to be significant predictors for their TPACK perceptions.

Keywords: candidate mathematics teachers, motivational beliefs, self-regulated learning strategies, technological and pedagogical knowledge, content knowledge

Procedia PDF Downloads 477
21742 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 333
21741 The Impact of Project-Based Learning under Representative Minorities Students

Authors: Shwadhin Sharma

Abstract:

As there has been increasing focus on the shorter attention span of the millennials students, there is a relative absence of instructional tools on behavioral assessments in learning information technology skills within the information systems field and textbooks. This study uses project-based learning in which students gain knowledge and skills related to information technology by working on an extended project that allows students to find a real business problem design information systems based on information collected from the company and develop an information system that solves the problem of the company. Eighty students from two sections of the same course engage in the project from the first week of the class till the sixteenth week of the class to deliver a small business information system that allows them to employ all the skills and knowledge that they learned in the class into the systems they are creating. Computer Information Systems related courses are often difficult to understand and process especially for the Under Representative Minorities students who have limited computer or information systems related (academic) experiences. Project-based learning demands constant attention of the students and forces them to apply knowledge learned in the class to a project that helps retaining knowledge. To make sure our assumption is correct, we started with a pre-test and post-test to test the students learning (of skills) based on the project. Our test showed that almost 90% of the students from the two sections scored higher in post-test as compared to pre-test. Based on this premise, we conducted a further survey that measured student’s job-search preparation, knowledge of data analysis, involved with the course, satisfaction with the course, student’s overall reaction the course and students' ability to meet the traditional learning goals related to the course.

Keywords: project-based learning, job-search preparation, satisfaction with course, traditional learning goals

Procedia PDF Downloads 204
21740 Influence of Thermal Processing Methods on Antinutrient of Artocarpus heterophyllus Seeds

Authors: Marina Zulkifli, Mohd Faizal Mashhod, Noriham Abdullah

Abstract:

The aim of this study was to determine the antinutrient compounds of jackfruit (Artocarpus heterophyllus) seeds as affected by thermal processes. Two types of heat treatments were applied namely boiling and microwave cooking. Results of this study showed that boiling caused a significant decrease in phytate content (30.01%), oxalate content (33.22%), saponin content (35.69%) and tannin content (44.58%) as compared to microwave cooking and raw seed. The percentage loss of antinutrient compounds in microwaved seed was: phytate 24.58%, oxalate 27.28%, saponin 16.50% and tannin 32.21%. Hence, these findings suggested that boiling is an effective treatment to reduce the level of toxic compounds in foods.

Keywords: jackfruit, heat treatments, antinutrient compounds, thermal processing

Procedia PDF Downloads 428
21739 Catastrophic Spending on Health: A Determinant of Access to Health Care by Migrant Slum Population

Authors: Saira Mehnaz, Ali Jafar Abedi, Shazia Farooq Fazli, Sakeena Mushfiq, Zulfia Khan, M. Athar Ansari

Abstract:

Introduction: Public health spending is a necessity in an underdeveloped country like India. The people are already suffering from poverty and that clubbed with out of pocket expenditure leads them to a very catastrophic situation, reducing the overall access to healthcare. Objectives: This study was designed to determine the usual source of medical care opted, the illness pattern, the expenditure incurred on illness and its source of procurement by the study population. It also intended to assess this expenditure as a determinant of access to health care. Methodology: Cities like Aligarh, which are classified as B grade cities in India are thought to be ripe sites for getting livelihood and hence are almost half filled with migrants living in urban slums. A cross sectional study was done to study the newer slum pockets. 3409 households with a population of 16,978 were studied with the help of pretested questionnaire; SPSS 20 was used for statistical analysis. Results and Conclusions: In our study, we found that almost all the households suffered from catastrophic health expenditure. The study population, which was already vulnerable owing to their low socio-economic and migrant status was further being forced with into poverty and indebtedness on account of expenditure on illness. This lead to a significant decrease in access to health. National health financing systems should be designed to protect households from financial catastrophe, by reducing out-of-pocket spending.

Keywords: access to healthcare, catastrophic health expenditure, new urban slums, out of pocket expenditure

Procedia PDF Downloads 202
21738 Effect of Storage Time on the Properties of Seeds, Oil and Biodiesel from Reutealis trisperma

Authors: Muhammad Yusuf Abduh, Syaripudin, Laksmitha Dyanie, Robert Manurung

Abstract:

The time profile of moisture content for different fractions (PT-3, PT-7, PT-14, NPT-21) of trisperma seeds (Reutealis trisperma) was determined at a relative humidity of 67% and 27°C for a four months period. The diffusion coefficient of water in the trisperma seeds was determined using an analytical solution of instationary diffusion equation and used to model the moisture content in the seeds. The total oil content of the seeds and the acid value of the extracted oil from the stored seeds were periodically measured for four months. The acid value of the extracted oil from the stored seeds increased for all conditions (1.1 to 2.8 mg KOH/g for PT-3, 1.9 to 9.9 mg KOH/g for PT-7, 3.4 to 11.6 mg KOH/g for PT-14 and 4.7 to 25.4 mg KOH/g for NPT-21). The acid value of trisperma oil and biodiesel that has been stored for four months (27°C, closed container) was also determined. Upon storage, the acid value of trisperma oil and biodiesel only slightly increased from 1.1 to 1.3 mg KOH/g and 0.4 to 0.43 mg KOH/g, respectively.

Keywords: acid value, biodiesel, moisture content, Reutealis trisperma, storage

Procedia PDF Downloads 286
21737 The Effectiveness of Banks’ Web Sites: A Study of Turkish Banking Sector

Authors: Raif Parlakkaya, Huseyin Cetin, Duygu Irdiren

Abstract:

By the development of World Wide Web, the usage rate of Internet has rapidly grown globally; and provided a basis for the emergence of electronic business. As well as other sectors, the banking sector has adopted the use of internet with the developments in information and communication technologies. Due to the public disclosure and transparency principle of Corporate Governance, the importance of information disclosure of banks on their web sites has increased significantly. For the purpose of this study, a Bank Disclosure Attribute Index (BDAI) in Turkey has been constructed through classifying the information disclosure on banks’ web sites into general, financial, investors and corporate governance attributes. All 47 banks in Turkish Banking System have been evaluated according to the index with the aim of providing a comparison between banks. By Chi Square Test, Pearson Correlation, T-Test, and ANOVA statistical tools, it has been concluded that the majority of banks in Turkey have shared information on their web sites adequately with respect to their total index score. Although there is a positive correlation between various types of information on banks’ web sites, there is no uniformity among them. Also, no significant difference between various types of information disclosure and bank types has been observed. Compared with the total index score averages of the five largest banks in Turkey, there are some banks that need to improve the content of their web sites.

Keywords: internet banking, websites evaluation, customer adoption, Turkey

Procedia PDF Downloads 388
21736 Performance Evaluation of DSR and OLSR Routing Protocols in MANET Using Varying Pause Time

Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi

Abstract:

MANET for Mobile Ad hoc NETwork is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration, due to the higher mobility and limited radio transmission range, routing is an important issue in ad hoc network, so in order to ensure reliable and efficient route between to communicating nodes quickly, an appropriate routing protocol is needed. In this paper, we present the performance analysis of two mobile ad hoc network routing protocols namely DSR and OLSR using NS2.34, the performance is determined on the basis of packet delivery ratio, throughput, average jitter and end to end delay with varying pause time.

Keywords: DSR, OLSR, quality of service, routing protocols, MANET

Procedia PDF Downloads 548
21735 Introducing Information and Communication Technologies in Prison: A Proposal in Favor of Social Reintegration

Authors: Carmen Rocio Fernandez Diaz

Abstract:

This paper focuses on the relevance of information and communication technologies (hereinafter referred as ‘ICTs’) as an essential part of the day-to-day life of all societies nowadays, as they offer the scenario where an immense number of behaviors are performed that previously took place in the physical world. In this context, areas of reality that have remained outside the so-called ‘information society’ are hardly imaginable. Nevertheless, it is possible to identify a means that continue to be behind this reality, and it is the penitentiary area regarding inmates rights, as security aspects in prison have already be improved by new technologies. Introducing ICTs in prisons is still a matter subject to great rejections. The study of comparative penitentiary systems worldwide shows that most of them use ICTs only regarding educational aspects of life in prison and that communications with the outside world are generally based on traditional ways. These are only two examples of the huge range of activities where ICTs can carry positive results within the prison. Those positive results have to do with the social reintegration of persons serving a prison sentence. Deprivation of liberty entails contact with the prison subculture and the harmful effects of it, causing in cases of long-term sentences the so-called phenomenon of ‘prisonization’. This negative effect of imprisonment could be reduced if ICTs were used inside prisons in the different areas where they can have an impact, and which are treated in this research, as (1) access to information and culture, (2) basic and advanced training, (3) employment, (4) communication with the outside world, (5) treatment or (6) leisure and entertainment. The content of all of these areas could be improved if ICTs were introduced in prison, as it is shown by the experience of some prisons of Belgium, United Kingdom or The United States. However, rejections to introducing ICTs in prisons obey to the fact that it could carry also risks concerning security and the commission of new offences. Considering these risks, the scope of this paper is to offer a real proposal to introduce ICTs in prison, trying to avoid those risks. This enterprise would be done to take advantage of the possibilities that ICTs offer to all inmates in order to start to build a life outside which is far from delinquency, but mainly to those inmates who are close to release. Reforming prisons in this sense is considered by the author of this paper an opportunity to offer inmates a progressive resettlement to live in freedom with a higher possibility to obey the law and to escape from recidivism. The value that new technologies would add to education, employment, communications or treatment to a person deprived of liberty constitutes a way of humanization of prisons in the 21st century.

Keywords: deprivation of freedom, information and communication technologies, imprisonment, social reintegration

Procedia PDF Downloads 161
21734 The EU Omnipotence Paradox: Inclusive Cultural Policies and Effects of Exclusion

Authors: Emmanuel Pedler, Elena Raevskikh, Maxime Jaffré

Abstract:

Can the cultural geography of European cities be durably managed by European policies? To answer this question, two hypotheses can be proposed. (1) Either European cultural policies are able to erase cultural inequalities between the territories through the creation of new areas of cultural attractiveness in each beneficiary neighborhood, city or country. Or, (2) each European region historically rooted in a number of endogenous socio-historical, political or demographic factors is not receptive to exogenous political influences. Thus, the cultural attractiveness of a territory is difficult to measure and to impact by top-down policies in the long term. How do these two logics - European and local - interact and contribute to the emergence of a valued, popular sense of a common European cultural identity? Does this constant interaction between historical backgrounds and new political concepts encourage a positive identification with the European project? The European cultural policy programs, such as ECC (European Capital of Culture), seek to develop new forms of civic cohesion through inclusive and participative cultural events. The cultural assets of a city elected ‘ECC’ are mobilized to attract a wide range of new audiences, including populations poorly integrated into local cultural life – and consequently distant from pre-existing cultural offers. In the current context of increasingly heterogeneous individual perceptions of Europe, the ECC program aims to promote cultural forms and institutions that should accelerate both territorial and cross-border European cohesion. The new cultural consumption pattern is conceived to stimulate integration and mobility, but also to create a legitimate and transnational ideal European citizen type. Our comparative research confronts contrasting cases of ‘European Capitals of Culture’ from the south and from the north of Europe, cities recently concerned by the ECC political mechanism and cities that were elected ECC in the past, multi-centered cultural models vs. highly centralized cultural models. We aim to explore the impacts of European policies on the urban cultural geography, but also to understand the current obstacles for its efficient implementation.

Keywords: urbanism, cultural policies, cultural institutions, european cultural capitals, heritage industries, exclusion effects

Procedia PDF Downloads 257
21733 Information Needs and Seeking Behaviour of Postgraduate Students of Kohat University of Science and Technology, Khyber Pakhtunkhwa, Pakistan

Authors: Saeed Ullah Jan, Muhammad Ali, Misbah Ullah Awan

Abstract:

Purpose: This study investigated the information needs and seeking behaviour, and hurdles to information seeking of Post Graduate students of Kohat University of Science and Technology (KUST), Khyber Pakhtunkhwa. It focused on the information requirements of the post-graduate students of the university, the pattern they use for seeking information, and the difficulties they face while seeking information. Design/Methodology/approach: This study used a quantitative approach, adapting a survey questionnaire method for data collection. The population of this study was composed of M.Phil. and Ph.D. students of 2019 and 2020 in the faculties of Physical and Numerical Sciences, Chemical and Pharmaceutical Sciences, Biological Sciences, and Social Sciences of KUST. The sample size was 260. Students were selected randomly. The study response rate was 77%, and data were analyzed through SPSS (22 versions). Key findings: The study revealed that Most students' information needs were for study and research activities, new knowledge, and career development. To fulfill these needs, the scholars use various sources and resources. The sources they used for information needs were journal articles, textbooks, and research projects commonly. For the information-seeking purpose, often, students prefer books that have some importance. The other factors that played an essential role in selecting material were topical relevance, Novelty, Recommended by colleagues, and publisher's reputation. Most of the students thought that Book Exhibitions, Open Access systems in the Library, and the Display of new arrivals could enhance the students' information-seeking. The main problem seeking information was faced by them was a shortage of printed information resources. Overall they wanted more facilities, enhancement in the library collection, and better services. Delimitations of the study: This study has not included 1) BS and M.Sc. Students of KUST; 2) The colleges and institutions affiliated with KUST; 3) This study was delimited only to the Post Graduate students of KUST. Practical implication(s): The findings of the study motivate the policymakers and authorities of KUST to restructure the information literacy programs to fulfill the scholars' information needs. It may inform the policymakers to know the difficulties faced by scholars during information seeking. Contribution to the knowledge: No significant work has been done on the students' information needs and seeking behaviour at KUST. The study analyzed the information needs and seeking behaviour of post graduate students. It brought a clear picture of information needs and seeking behaviour of scholars and addressed the problems faced by them during the seeking process.

Keywords: information needs of Pakistan, information-seeking behaviors, postgraduate students, university libraries, Kohat university of science and technology, Khyber Pakhtunkhwa, Pakistan

Procedia PDF Downloads 86
21732 The Effect of Water and Fines Content on Shear Strength of Silty Soils

Authors: Dellal Seyyid Ali

Abstract:

This work Contains an experimental study of the behavior of Chlef sand under effect of various parameters influencing on shear strength. Because of their distinct nature, sands, silts and clays exhibit completely different behavior (shear strength, the Contracting and dilatancy, the angle of internal friction and cohesion ...). By cons when these materials are mixed, their behavior will become different from each considered alone. The behavior of these mixtures (silty sands ...) is currently the state of several studies to better use. We have studied in this work: The influence of the following factors on the shear strength: The density (loose and dense), the fines content (silt), the water content. The apparatus used for the tests is the casagrande shear box. This device, although one may have some disadvantages and modern instrumentation is appropriate used to study the shear strength of soils.

Keywords: shear strength, sand, silt, contractanct, dilatancy, friction angle, cohesion, fines content

Procedia PDF Downloads 252
21731 Fertilizer Procurement and Distribution in Nigeria: Assessing Policy against Implementation

Authors: Jacob Msughter Gwa, Rhys Williams

Abstract:

It is widely known that food security is a major concern in Sub-Saharan Africa. In many regions, including Nigeria, this is due to an agriculture-old problem of soil erosion beyond replacement levels. It seems that the use of fertilizer would be an immediate solution as it can boost agricultural productivity, and low agricultural productivity is attributed to the low use of fertilizers in Nigeria. The Government of Nigeria has been addressing the challenges of food shortage but with limited success. The utilisation of a practical and efficient subsidy programme in addressing this issue seems to be needed. However, the problem of procurement and distribution changes from one stage of subsidy to another. This paper looks at the difference between the ideal and the actual implementation of agricultural fertilizer policies in Nigeria, as it currently runs the risk of meeting required standards on paper but missing the desired real outcomes, and recognises the need to close the gap between the paper work and the realities on the ground.

Keywords: agricultural productivity, fertilizer distribution, fertilizer procurement, Nigeria

Procedia PDF Downloads 361