Search results for: information centric network
4629 Employing Remotely Sensed Soil and Vegetation Indices and Predicting by Long Short-Term Memory to Irrigation Scheduling Analysis
Authors: Elham Koohikerade, Silvio Jose Gumiere
Abstract:
In this research, irrigation is highlighted as crucial for improving both the yield and quality of potatoes due to their high sensitivity to soil moisture changes. The study presents a hybrid Long Short-Term Memory (LSTM) model aimed at optimizing irrigation scheduling in potato fields in Quebec City, Canada. This model integrates model-based and satellite-derived datasets to simulate soil moisture content, addressing the limitations of field data. Developed under the guidance of the Food and Agriculture Organization (FAO), the simulation approach compensates for the lack of direct soil sensor data, enhancing the LSTM model's predictions. The model was calibrated using indices like Surface Soil Moisture (SSM), Normalized Vegetation Difference Index (NDVI), Enhanced Vegetation Index (EVI), and Normalized Multi-band Drought Index (NMDI) to effectively forecast soil moisture reductions. Understanding soil moisture and plant development is crucial for assessing drought conditions and determining irrigation needs. This study validated the spectral characteristics of vegetation and soil using ECMWF Reanalysis v5 (ERA5) and Moderate Resolution Imaging Spectrometer (MODIS) data from 2019 to 2023, collected from agricultural areas in Dolbeau and Peribonka, Quebec. Parameters such as surface volumetric soil moisture (0-7 cm), NDVI, EVI, and NMDI were extracted from these images. A regional four-year dataset of soil and vegetation moisture was developed using a machine learning approach combining model-based and satellite-based datasets. The LSTM model predicts soil moisture dynamics hourly across different locations and times, with its accuracy verified through cross-validation and comparison with existing soil moisture datasets. The model effectively captures temporal dynamics, making it valuable for applications requiring soil moisture monitoring over time, such as anomaly detection and memory analysis. By identifying typical peak soil moisture values and observing distribution shapes, irrigation can be scheduled to maintain soil moisture within Volumetric Soil Moisture (VSM) values of 0.25 to 0.30 m²/m², avoiding under and over-watering. The strong correlations between parcels suggest that a uniform irrigation strategy might be effective across multiple parcels, with adjustments based on specific parcel characteristics and historical data trends. The application of the LSTM model to predict soil moisture and vegetation indices yielded mixed results. While the model effectively captures the central tendency and temporal dynamics of soil moisture, it struggles with accurately predicting EVI, NDVI, and NMDI.Keywords: irrigation scheduling, LSTM neural network, remotely sensed indices, soil and vegetation monitoring
Procedia PDF Downloads 414628 Money Laundering and Financing of Terrorism
Authors: Covadonga Mallada Fernández
Abstract:
Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.Keywords: control of financial flows, money laundering, terrorism, financing of terrorism
Procedia PDF Downloads 4544627 Investigating Translations of Websites of Pakistani Public Offices
Authors: Sufia Maroof
Abstract:
This empirical study investigated the web-translations of five Pakistani public offices (FPSC, FIA, HEC, USB, and Ministry of Finance) offering Urdu tab as an option to access information on their official websites. Triangulation of quantitative and qualitative research design informed the researcher of the semantic, lexical and syntactic caveats in these translations. The study hypothesized that majority of the Pakistani population is oblivious of the Supreme Court’s amendments in language policy concerning national and official language; hence, Urdu web-translations of the public departments have not been accessed effectively. Firstly, the researcher conducted an online survey, comprising of two sections, close ended and short answer based questions. Secondly, the researcher compiled corpus of the five selected websites in a tabular form to compare the data. Thirdly, the administrators of the departments had been contacted regarding the methods of translation and the expertise of the personnel involved. The corpus was assessed for TQA after examining the lexical, semantic, syntactical and technical alignment inaccuracies and imperfections. The study suggests the public offices to invest in their Urdu webs by either hiring expert translators or engaging expertise of a translation agency for this project to offer quality translation to public.Keywords: machine translations, public offices, Urdu translations, websites
Procedia PDF Downloads 1264626 Identification and Understanding of Colloidal Destabilization Mechanisms in Geothermal Processes
Authors: Ines Raies, Eric Kohler, Marc Fleury, Béatrice Ledésert
Abstract:
In this work, the impact of clay minerals on the formation damage of sandstone reservoirs is studied to provide a better understanding of the problem of deep geothermal reservoir permeability reduction due to fine particle dispersion and migration. In some situations, despite the presence of filters in the geothermal loop at the surface, particles smaller than the filter size (<1 µm) may surprisingly generate significant permeability reduction affecting in the long term the overall performance of the geothermal system. Our study is carried out on cores from a Triassic reservoir in the Paris Basin (Feigneux, 60 km Northeast of Paris). Our goal is to first identify the clays responsible for clogging, a mineralogical characterization of these natural samples was carried out by coupling X-Ray Diffraction (XRD), Scanning Electron Microscopy (SEM) and Energy Dispersive X-ray Spectroscopy (EDS). The results show that the studied stratigraphic interval contains mostly illite and chlorite particles. Moreover, the spatial arrangement of the clays in the rocks as well as the morphology and size of the particles, suggest that illite is more easily mobilized than chlorite by the flow in the pore network. Thus, based on these results, illite particles were prepared and used in core flooding in order to better understand the factors leading to the aggregation and deposition of this type of clay particles in geothermal reservoirs under various physicochemical and hydrodynamic conditions. First, the stability of illite suspensions under geothermal conditions has been investigated using different characterization techniques, including Dynamic Light Scattering (DLS) and Scanning Transmission Electron Microscopy (STEM). Various parameters such as the hydrodynamic radius (around 100 nm), the morphology and surface area of aggregates were measured. Then, core-flooding experiments were carried out using sand columns to mimic the permeability decline due to the injection of illite-containing fluids in sandstone reservoirs. In particular, the effects of ionic strength, temperature, particle concentration and flow rate of the injected fluid were investigated. When the ionic strength increases, a permeability decline of more than a factor of 2 could be observed for pore velocities representative of in-situ conditions. Further details of the retention of particles in the columns were obtained from Magnetic Resonance Imaging and X-ray Tomography techniques, showing that the particle deposition is nonuniform along the column. It is clearly shown that very fine particles as small as 100 nm can generate significant permeability reduction under specific conditions in high permeability porous media representative of the Triassic reservoirs of the Paris basin. These retention mechanisms are explained in the general framework of the DLVO theoryKeywords: geothermal energy, reinjection, clays, colloids, retention, porosity, permeability decline, clogging, characterization, XRD, SEM-EDS, STEM, DLS, NMR, core flooding experiments
Procedia PDF Downloads 1764625 Scientometrics Review of Embodied Carbon Benchmarks for Buildings
Authors: A. Rana, M. Badri, D. Lopez Behar, O. Yee, H. Al Bqaei
Abstract:
The building sector is one of the largest emitters of greenhouse gases. However, as operation energy demands of this sector decrease with more effective energy policies and strategies, there is an urgent need to parallel focus on the growing proportion of embodied carbons. In this regard, benchmarks on embodied carbon of buildings can provide a point of reference to compare and improve the environmental performance of buildings for the stakeholders. Therefore, embodied carbon benchmarks can serve as a useful tool to address climate change challenges. This research utilizes the method to provide a knowledge roadmap of embodied carbon benchmarks development and implementation trends. Two main databases, Web of Science and Engineering Village, are considered for the study. The mapping was conducted with the help of VosViewer tool to provide information regarding: the critical research areas; most cited authors and publications; and countries with the highest publications. It is revealed that the role of benchmarks in energy policies is an emerging trend. In addition, the research highlighted that in policies, embodied carbon benchmarks are gaining importance at the material, whole building, and building portfolio levels. This research reveals direction for improvement and future research and of relevance to building industry professionals, policymakers, and researchers.Keywords: buildings embodied carbon benchmark, methods, policy
Procedia PDF Downloads 1724624 Investigation of Public Perception of Air Pollution and Life Quality in Tehran
Authors: Roghayeh Karami, Ahmad Gharaei
Abstract:
Backgrounds and objectives: This study was undertaken at four different sites (north polluted, south polluted, south healthy and north healthy) in Tehran, in order to examine whether there was a relationship between publicly available air quality data and the public’s perception of air quality and to suggest some guidelines for reducing air pollution. Materials and Methods: A total of 200 people were accidentally filled out the research questionnaires at mentioned sites and air quality data were obtained simultaneously from the Air Quality Control Department. Data was analyzed in Excel and SPSS software. Results: Clean air and secure job were of great importance to people comparing to other pleasant aspect of life. Also air pollution and fear of dangerous diseases were the most important of people concerns. The Indies bored /news paper services on air quality were little used by the public as a means of obtaining information on air pollution. Using public transportation and avoid unessential journeys are the most important ways for reducing air pollution. Conclusion: The results reveal that the public’s perception of air quality is not a reliable indicator of the actual levels of air pollution. Current earths to down actions are not effective and enough in reducing air pollution, therefore it seems participatory management and public participation is suitable guideline.Keywords: air pollution, quality of life, opinion poll, public participation
Procedia PDF Downloads 4874623 Municipal Solid Waste Generation Trend in the Metropolitan Cities of the Muslim World
Authors: Farzaneh Fakheri Raof, Abdolkhalegh vadian
Abstract:
One of the most important environmental issues in developing countries is municipal solid waste management. In this context, knowledge of the quantity and composition of solid waste provides the basic information for the optimal management of solid waste. Many studies have been conducted to investigate the impact of economic, social and cultural factors on generation trend of solid waste, however, few of these have addressed the role of religion in the matter. The present study is a field investigation on generation trend of solid waste in Mashhad, a metropolitan city in northeastern Iran. Accordingly, the religious rituals, quantity and composition of municipal solid waste were considered as independent and dependent variables, respectively. For this purpose, the quantity of the solid waste was initially determined. Afterwards, they were classified into 12 groups using the relevant standard methods. The results showed that the production rate of the municipal solid waste was 1,507 tons per day. Composing 65.2% of the whole; the organic materials constitute the largest share of the total municipal solid waste in Mashhad. The obtained results also revealed that there is a positive relationship between waste generation and the months of religious ceremonies so that the greatest amount of waste generated in the city was reported from Ramadan (as a religious month) in a way that it was significantly different from other months.Keywords: Mashhad, municipal solid waste, religious months, waste composition, organic waste
Procedia PDF Downloads 5134622 How to “Eat” without Actually Eating: Marking Metaphor with Spanish Se and Italian Si
Authors: Cinzia Russi, Chiyo Nishida
Abstract:
Using data from online corpora (Spanish CREA, Italian CORIS), this paper examines the relatively understudied use of Spanish se and Italian si exemplified in (1) and (2), respectively. (1) El rojo es … el que se come a los demás. ‘The red (bottle) is the one that outshines/*eats the rest.’(2) … ebbe anche la saggezza di mangiarsi tutto il suo patrimonio. ‘… he even had the wisdom to squander/*eat all his estate.’ In these sentences, se/si accompanies the consumption verb comer/mangiare ‘to eat’, without which the sentences would not be interpreted appropriately. This se/si cannot readily be attributed to any of the multiple functions so far identified in the literature: reflexive, ergative, middle/passive, inherent, benefactive, and complete consumptive. In particular, this paper argues against the feasibility of a recent construction-based analysis of sentences like (1) and (2), which situates se/si within a prototype-based network of meanings all deriving from the central meaning of 'COMPLETE CONSUMPTION' (e.g., Alice se comió toda la torta/Alicesi è mangiata tutta la torta ‘John ate the whole cake’). Clearly, the empirical adequacy of such an account is undermined by the fact that the events depicted in the se/si-sentences at issue do not always entail complete consumption because they may lack an INCREMENTAL THEME, the distinguishing property of complete consumption. Alternatively, it is proposed that the sentences under analysis represent instances of verbal METAPHORICAL EXTENSION: se/si represents an explicit marker of this cognitive process, which has independently developed from the complete consumptive se/si, and the meaning extension is captured by the general tenets of Conceptual Metaphor Theory (CMT). Two conceptual domains, Source (DS) and target (DT), are related by similarity, assigning an appropriate metaphorical interpretation to DT. The domains paired here are comer/mangiare (DS) and comerse/mangiarsi (DT). The eating event (DS) involves (a) the physical process of xEATER grinding yFOOD-STUFF into pieces and swallowing it; and (b) the aspect of xEATER savoring yFOOD-STUFF and being nurtured by it. In the physical act of eating, xEATER has dominance and exercises his force over yFOOD-STUFF. This general sense of dominance and force is mapped onto DT and is manifested in the ways exemplified in (1) and (2), and many others. According to CMT, two other properties are observed in each pair of DS & DT. First, DS tends to be more physical and concrete and DT more abstract, and systematic mappings are established between constituent elements in DS and those in DT: xEATER corresponds to the element that destroys and yFOOD-STUFF to the element that is destroyed in DT, as exemplified in (1) and (2). Though the metaphorical extension marker se/si appears by far most frequently with comer/mangiare in the corpora, similar systematic mappings are observed in several other verb pairs, for example, jugar/giocare ‘to play (games)’ and jugarse/giocarsi ‘to jeopardize/risk (life, reputation, etc.)’, perder/perdere ‘to lose (an object)’ and perderse/perdersi ‘to miss out on (an event)’, etc. Thus, this study provides evidence that languages may indeed formally mark metaphor using means available to them.Keywords: complete consumption value, conceptual metaphor, Italian si/Spanish se, metaphorical extension.
Procedia PDF Downloads 534621 Towards a Successful Implementation of ICT in Education : Analyzing Teacher Practices and Perceptions
Authors: Azzeddine Atibi, Lamalif latifa, Khadija El Kababi, Salim Ahmed, Mohamed Radid
Abstract:
This study analyzes the integration of Information and Communication Technologies (ICT) in modern education, where these tools have become essential. Due to the rapid emergence of new technologies and their increasing adoption in education, it is important to understand how teachers use and perceive these tools. The study pursues three objectives : examining current teacher practices regarding ICT, evaluating their impact on student skills and engagement, and making recommendations for better integration of ICT in education. The study's methodology is based on a quantitative approach, using a questionnaire administered to a sample of 104 teachers. This questionnaire, rigorously validated to ensure its reliability, gathers representative data on perceptions and challenges related to the use of ICT. The results show widespread adoption of ICT by teachers, with the majority reporting an improvement in student skills due to these technologies. However, opinions diverge on their impact on student engagement : some teachers note an increase in engagement, while others remain skeptical. Persistent challenges include insufficient technological infrastructure and the need for ongoing training. The recommendations highlight the importance of improving infrastructures and supporting the professional development of teachers to optimize the integration of ICT.Keywords: ICT, education, teaching practices, teacher perceptions, continuing education
Procedia PDF Downloads 334620 Analysis of the Interventions Performed in Pediatric Cardiology Unit Based on Nursing Interventions Classification (NIC-6th): A Pilot Study
Authors: Ji Wen Sun, Nan Ping Shen, Yi Bei Wu
Abstract:
This study used Nursing Interventions Classification (NIC-6th) to identify the interventions performed in a pediatric cardiology unit, and then to analysis its frequency, time and difficulty, so as to give a brief review on what our nurses have done. The research team selected a 35 beds pediatric cardiology unit, and drawn all the nursing interventions in the nursing record from our hospital information system (HIS) from 1 October 2015 to 30 November 2015, using NIC-6th to do the matching and then counting their frequencies. Then giving each intervention its own time and difficulty code according to NIC-6th. The results showed that nurses in pediatric cardiology unit performed totally 43 interventions from 5394 statements, and most of them were in RN(basic) education level needed and less than 15 minutes time needed. There still had some interventions just needed by a nursing assistant but done by nurses, which should call for nurse managers to think about the suitable staffing. Thus, counting the summary of the product of frequency, time and difficulty for each intervention of each nurse can know one's performance. Acknowledgement Clinical Management Optimization Project of Shanghai Shen Kang Hospital Development Center (SHDC2014615); Hundred-Talent Program of Construction of Nursing Plateau Discipline (hlgy16073qnhb).Keywords: nursing interventions, nursing interventions classification, nursing record, pediatric cardiology
Procedia PDF Downloads 3644619 CFD simulation of Near Wall Turbulence and Heat Transfer of Molten Salts
Authors: C. S. Sona, Makrand A. Khanwale, Channamallikarjun S. Mathpati
Abstract:
New generation nuclear power plants are currently being developed to be highly economical, to be passive safe, to produce hydrogen. An important feature of these reactors will be the use of coolants at temperature higher than that being used in current nuclear reactors. The molten fluoride salt with a eutectic composition of 46.5% LiF - 11.5% NaF - 42% KF (mol %) commonly known as FLiNaK is a leading candidate for heat transfer coolant for these nuclear reactors. CFD simulations were carried out using large eddy simulations to investigate the flow characteristics of molten FLiNaK at 850°C at a Reynolds number of 10,500 in a cylindrical pipe. Simulation results have been validated with the help of mean velocity profile using direct numerical simulation data. Transient velocity information was used to identify and characterise turbulent structures which are important for transfer of heat across solid-fluid interface. A wavelet transform based methodology called wavelet transform modulus maxima was used to identify and characterise the singularities. This analysis was also used for flow visualisation, and also to calculate the heat transfer coefficient using small eddy model. The predicted Nusselt number showed good agreement with the available experimental data.Keywords: FLiNaK, heat transfer, molten salt, turbulent structures
Procedia PDF Downloads 4494618 A Conceptual Stakeholder Engagement Model for Change Management in the South African Public Sector
Authors: Mokgata Matjie, Sibo Mayime
Abstract:
The 4IR brought with it an inevitable need for change in all organisations, regardless of sector. As a member of the global community, South African organisations are bound to experience the 4IR pressure, and the need to digitize becomes unavoidable. The South African government sector has various departments, of which one of them is the land administration solely responsible for the registration, management, and maintenance of the property registry of South Africa. For the past many years, the registration of deeds was done manually, ranging from 7-10 days, with lots and loads of paperwork handled manually by conveyancers and Registry Clerks. Some information might get lost during the registration period, thus delaying the whole process. This conceptual paper proposes ways to digitalize the land administration office by consulting all relevant literature and ultimately developing a theoretical change management framework for all public sector organisations in South Africa. Change is inevitable, but careful consideration is necessary in terms of consulting all relevant stakeholders for their buy-in and successful implementation of digitalization. The developed framework will serve as a theoretical basis for the empirical research envisaged as a PhD study.Keywords: stakeholders, engagement, change management, land administration, digitalisation, South African public sector
Procedia PDF Downloads 1094617 Internal Product Management: The Key to Achieving Digital Maturity and Business Agility for Manufacturing IT Organizations
Authors: Frederick Johnson
Abstract:
Product management has a long and well-established history within the consumer goods industry, despite being one of the most obscure aspects of brand management. Many global manufacturing organizations are now opting for external cloud-based Manufacturing Execution Systems (MES) to replace costly and outdated monolithic MES solutions. Other global manufacturing leaders are restructuring their organizations to support human-centered values, agile methodologies, and fluid operating principles. Still, industry-leading organizations struggle to apply the appropriate framework for managing evolving external MES solutions as internal "digital products." Product management complements these current trends in technology and philosophical thinking in the market. This paper discusses the central problems associated with adopting product management processes by analyzing its traditional theories and characteristics. Considering these ideas, the article then constructs a translated internal digital product management framework by combining new and existing approaches and principles. The report concludes by demonstrating the framework's capabilities and potential effectiveness in achieving digital maturity and business agility within a manufacturing environment.Keywords: internal product management, digital transformation, manufacturing information technology, manufacturing execution systems
Procedia PDF Downloads 1354616 Towards Logical Inference for the Arabic Question-Answering
Authors: Wided Bakari, Patrice Bellot, Omar Trigui, Mahmoud Neji
Abstract:
This article constitutes an opening to think of the modeling and analysis of Arabic texts in the context of a question-answer system. It is a question of exceeding the traditional approaches focused on morphosyntactic approaches. Furthermore, we present a new approach that analyze a text in order to extract correct answers then transform it to logical predicates. In addition, we would like to represent different levels of information within a text to answer a question and choose an answer among several proposed. To do so, we transform both the question and the text into logical forms. Then, we try to recognize all entailment between them. The results of recognizing the entailment are a set of text sentences that can implicate the user’s question. Our work is now concentrated on an implementation step in order to develop a system of question-answering in Arabic using techniques to recognize textual implications. In this context, the extraction of text features (keywords, named entities, and relationships that link them) is actually considered the first step in our process of text modeling. The second one is the use of techniques of textual implication that relies on the notion of inference and logic representation to extract candidate answers. The last step is the extraction and selection of the desired answer.Keywords: NLP, Arabic language, question-answering, recognition text entailment, logic forms
Procedia PDF Downloads 3424615 Smartphone Photography in Urban China
Authors: Wen Zhang
Abstract:
The smartphone plays a significant role in media convergence, and smartphone photography is reconstructing the way we communicate and think. This article aims to explore the smartphone photography practices of urban Chinese smartphone users and images produced by smartphones from a techno-cultural perspective. The analysis consists of two types of data: One is a semi-structured interview of 21 participants, and the other consists of the images created by the participants. The findings are organised in two parts. The first part summarises the current tendencies of capturing, editing, sharing and archiving digital images via smartphones. The second part shows that food and selfie/anti-selfie are the preferred subjects of smartphone photographic images from a technical and multi-purpose perspective and demonstrates that screenshots and image texts are new genres of non-photographic images that are frequently made by smartphones, which contributes to improving operational efficiency, disseminating information and sharing knowledge. The analyses illustrate the positive impacts between smartphones and photography enthusiasm and practices based on the diffusion of innovation theory, which also makes us rethink the value of photographs and the practice of ‘photographic seeing’ from the screen itself.Keywords: digital photography, image-text, media convergence, photographic- seeing, selfie/anti-selfie, smartphone, technological innovation
Procedia PDF Downloads 3544614 Analyzing Log File of Community Question Answering for Online Learning
Authors: Long Chen
Abstract:
With the proliferation of E-Learning, collaborative learning becomes more and more popular in various teaching and learning occasions. Studies over the years have proved that actively participating in classroom discussion can enhance student's learning experience, consolidating their knowledge and understanding of the class content. Collaborative learning can also allow students to share their resources and knowledge by exchanging, absorbing, and observing one another's opinions and ideas. Community Question Answering (CQA) services are particularly suitable paradigms for collaborative learning, since it is essentially an online collaborative learning platform where one can get information from multiple sources for he/her to choose from. However, current CQA services have only achieved limited success in collaborative learning due to the uncertainty of answers' quality. In this paper, we predict the quality of answers in a CQA service, i.e. Yahoo! Answers, for the use of online education and distance learning, which would enable a student to find relevant answers and potential answerers more effectively and efficiently, and thus greatly increase students' user experience in CQA services. Our experiment reveals that the quality of answers is influenced by a series of factors such as asking time, relations between users, and his/her experience in the past. We also show that by modelling user's profile with our proposed personalized features, student's satisfaction towards the provided answers could be accurately estimated.Keywords: Community Question Answering, Collaborative Learning, Log File, Co-Training
Procedia PDF Downloads 4414613 Calculation of Effective Masses and Curie Temperature of (Ga, Mn) as Diluted Magnetic Semiconductor from the Eight-band k.p Model
Authors: Khawlh A. Alzubaidi, Khadijah B. Alziyadi, Amor M. Alsayari
Abstract:
The discovery of a dilute magnetic semiconductor (DMS) in which ferromagnetism is carrier-mediated and persists above room temperature is a major step toward the implementation of spintronic devices for processing, transferring, and storing of information. Among the many types of DMS materials which have been investigated, Mn-doped GaAs has become one of the best candidates for technological application. However, despite major developments over the last few decades, the maximum Curie temperature (~200 K) remains well below room temperature. In this work, we have studied the effect of Mn content and strain on the GaMnAs effective masses of electron, heavy and light holes calculated in the different crystallographic direction. Also, the Curie temperature in the DMS GaMnAs alloy is determined. Compilation of GaMnAs band parameters have been carried out using the 8-band k.p model based on Lowdin perturbation theory where spin orbit, sp-d exchange interaction, and biaxial strain are taken into account. Our results show that effective masses, calculated along the different crystallographic directions, have a strong dependence on strain, ranging from -2% (tensile strain) to 2% (compressive strain), and Mn content increased from 1 to 5%. The Curie temperature is determined within the mean-field approach based on the Zener model.Keywords: diluted magnetic semiconductors, k.p method, effective masses, curie temperature, strain
Procedia PDF Downloads 964612 Identifying the Goals of a Multicultural Curriculum for the Primary Education Course
Authors: Fatemeh Havas Beigi
Abstract:
The purpose of this study is to identify the objectives of a multicultural curriculum for the primary education period from the perspective of ethnic teachers and education experts and cultural professionals. The research paradigm is interpretive, the research approach is qualitative, the research strategy is content analysis, the sampling method is purposeful and it is a snowball, and the sample of informants in the research for Iranian ethnic teachers and experts until the theoretical saturation was estimated to be 67 people. The data collection tools used were based on semi-structured interviews and individual interviews and focal interviews were used to collect information. The data format was also in audio format and the first period coding and the second coding were used to analyze the data. Based on data analysis 11 Objective: Paying attention to ethnic equality, expanding educational opportunities and justice, peaceful coexistence, anti-ethnic and racial discrimination education, paying attention to human value and dignity, accepting religious diversity, getting to know ethnicities and cultures, promoting teaching-learning, fostering self-confidence, building national unity, and developing cultural commonalities for a multicultural curriculum were identified.Keywords: objective, multicultural curriculum, connect, elementary education period
Procedia PDF Downloads 944611 Blockchain for IoT Security and Privacy in Healthcare Sector
Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab
Abstract:
The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data
Procedia PDF Downloads 1804610 Research on Sensitivity of Geological Disasters in Road Area Based on Analytic Hierarchy Process
Authors: Li Yongyi
Abstract:
In order to explore the distribution of geological disasters within the expressway area of Shaanxi Province, the Analytic Hierarchy Process theory is applied based on the geographic information system technology platform, and the ground elevation, rainfall, vegetation coverage and other indicators are selected for analysis, and the expressway area is sensitive Sexual evaluation. The results show that the highway area disasters in Shaanxi Province are mainly distributed in the southern mountainous areas and are dominated by landslides; the disaster area ratio basically increases with the increase in ground elevation, surface slope, surface undulation, rainfall, and vegetation coverage. The increase in the distance from the river shows a decreasing trend; after grading the disaster sensitivity within 5km of the expressway, the extremely sensitive area, the highly sensitive area, the medium sensitive area, the low sensitive area, and the extremely low sensitive area respectively account for 8.17%、15.80%、22.99%、26.22%、26.82%. Highly sensitive road areas are mainly distributed in southern Shaanxi.Keywords: highway engineering, sensitivity, analytic hierarchy process, geological hazard, road area
Procedia PDF Downloads 1014609 The Governance of Islamic Banks in Morocco: Meaning, Strategic Vision and Purposes Attributed to the Governance System
Authors: Lalla Nezha Lakmiti, Abdelkahar Zahid
Abstract:
Due to the setbacks on the international scene and the wave of cacophonic financial scandals affecting large international groups, the new Islamic finance industry is not immune despite its initial resistance. The purpose of this paper is to understand and analyze the meaning of the Corporate Governance (CG) concept in Moroccan Islamic banking systems with specific reference to their institutions. The research objective is to identify also the path taken and adopted by these banks recently set up in Morocco. The foundation is rooted in shari'a, in particular, no stakeholder (the shareholding approach) must be harmed, and the ethical value is reflected into these parties’ behavior. We chose a qualitative method, semi-structured interviews where six managers provided answers about their banking systems. Since these respondents held a senior position (directors) within their organizations, it is felt that they are well placed and have the necessary knowledge to provide us with information to answer the questions asked. The results identified the orientation of participating banks and assessing how governance works, while determining which party is fovoured: shareholders, stakeholders or both. This study discusses the favorable condition to the harmonization of the regulations and therefore a better integration between Islamic finance and conventional ones in the economic context of Morocco.Keywords: corporate governance, Islamic Banks, stakeholders, shareholders
Procedia PDF Downloads 1104608 Mentor and Mentee Based Learning
Authors: Erhan Eroğlu
Abstract:
This paper presents a new method called Mentor and Mentee Based Learning. This new method is becoming more and more common especially at workplaces. This study is significant as it clearly underlines how it works well. Education has always aimed at equipping people with the necessary knowledge and information. For many decades it went on teachers’ talk and chalk methods. In the second half of the nineteenth century educators felt the need for some changes in delivery systems. Some new terms like self- discovery, learner engagement, student centered learning, hands on learning have become more and more popular for such a long time. However, some educators believe that there is much room for better learning methods in many fields as they think the learners still cannot fulfill their potential capacities. Thus, new systems and methods are still being developed and applied at education centers and work places. One of the latest methods is assigning some mentors for the newly recruited employees and training them within a mentor and mentee program which allows both parties to see their strengths and weaknesses and the areas which can be improved. This paper aims at finding out the perceptions of the mentors and mentees on the programs they are offered at their workplaces and suggests some betterment alternatives. The study has been conducted via a qualitative method whereby some interviews have been done with both mentors and mentees separately and together. Results show that it is a great way to train inexperienced one and also to refresh the older ones. Some points to be improved have also been underlined. The paper shows that education is not a one way path to follow.Keywords: learning, mentor, mentee, training
Procedia PDF Downloads 2284607 Increasing Yam Production as a Means of Solving the Problem of Hunger in Nigeria
Authors: Samual Ayeni, A. S. Akinbani
Abstract:
At present when the price of petroleum is going down beyond bearable level, there is a need to diversify the economy towards arable crop production since Nigeria is an agrarian country. Yam plays prominent role in solving the problem of hunger in Nigeria. There is scarcity of information on the effect of fertilizers in increasing the yield of yam and maintaining soil properties in South Western Nigeria. This study was therefore set up to determine fertilizer effect on properties and yield of yam. The experiment was conducted at Adeyemi College of Education Teaching and Research Farm to compare the effect of organic, Organomineral and mineral fertilizers on yield of yam. Ten treatments were used 10t/ha Wood Ash, 10t/ha Cattle Dung, 10t/ha Poultry Manure, 10t/ha Manufactured Organic, 10t/ha Organomineral Fertilizer, 400kg/ha NPK, 400kg/ha SSP, 400kg/ha Urea and control with treatment. The treatments were laid out in a Randomized Complete Block Design (RCBD) and replicated three times. Compared with control, Organomineral fertilizer significantly (P < 0.05) increased the soil moisture content, poultry manure, wood ash significantly decreased (< 0.05) the bulk density. Application of 10t/ha Organomineral fertilizer recorded the highest increase in the yield of yam among the treatments.Keywords: organomineral fertilizer, organic fertilizer, SSP, bulk density
Procedia PDF Downloads 2974606 English Learning Strategy and Proficiency Level of the First Year Students, International College, Suan Sunandha Rajabhat University
Authors: Kanokrat Kunasaraphan
Abstract:
The purpose of the study was to identify whether English language learning strategies commonly used by the first year students at International College, Suan Sunandha Rajabhat University include six direct and indirect strategies. The study served to explore whether there was a difference in these students’ use of six direct and indirect English learning strategies between the different levels of their English proficiency. The questionnaire used as a research instrument was comprised of two parts: General information of participants and the Strategy Inventory for Language Learning (SILL). The researcher employed descriptive statistics and one-way ANOVA (F-test) to analyze the data. The results of the analysis revealed that English learning strategies commonly used by the first year students include six direct and indirect strategies, including differences in strategy use of the students with different levels of English proficiency. Recommendations for future research include the study of language learning strategy use with other research methods focusing on other languages, specific language skills, and/or the relationship of language learning strategy use and other factors in other programs and/or institutions.Keywords: English learning strategies, direct strategies, indirect strategies, proficiency level
Procedia PDF Downloads 3034605 Computational Study of Flow and Heat Transfer Characteristics of an Incompressible Fluid in a Channel Using Lattice Boltzmann Method
Authors: Imdat Taymaz, Erman Aslan, Kemal Cakir
Abstract:
The Lattice Boltzmann Method (LBM) is performed to computationally investigate the laminar flow and heat transfer of an incompressible fluid with constant material properties in a 2D channel with a built-in triangular prism. Both momentum and energy transport is modelled by the LBM. A uniform lattice structure with a single time relaxation rule is used. Interpolation methods are applied for obtaining a higher flexibility on the computational grid, where the information is transferred from the lattice structure to the computational grid by Lagrange interpolation. The flow is researched on for different Reynolds number, while Prandtl number is keeping constant as a 0.7. The results show how the presence of a triangular prism effects the flow and heat transfer patterns for the steady-state and unsteady-periodic flow regimes. As an evaluation of the accuracy of the developed LBM code, the results are compared with those obtained by a commercial CFD code. It is observed that the present LBM code produces results that have similar accuracy with the well-established CFD code, as an additionally, LBM needs much smaller CPU time for the prediction of the unsteady phonema.Keywords: laminar forced convection, lbm, triangular prism
Procedia PDF Downloads 3734604 Criminal Liability for Copyright and Related Rights Infringement: Albania Legislation Perspective
Authors: Ilda Muçmataj, Anjeza Liçenji, Borana Kalemi
Abstract:
Copyright and related rights have been pivotal in driving the economic growth of nations worldwide and fostering culture and new forms of entertainment. The introduction of the internet and technological advancement has significantly expanded the opportunities for creators and rights holders to promote their works and boost their revenues. However, this digital era has also brought about complex challenges, leading to a more extensive range of copyright infringement, primarily due to the substantial surge in piracy and counterfeiting. Despite being reported internationally, the mechanisms to tackle and the responsibility for enforcing copyright infringements often remain rooted in national jurisdictions, resulting in a gap between the scale of the problem and the efficacy of enforcement measures. Thus, it is essential to ensure adequate legal protection, a vital safeguard for authors' economic and moral interests, information security, innovative development promotion, and intellectual creativity preservation. This paper describes Albanian criminal law-based copyright enforcement legislation, focusing on doctrinal guidance and practical judicial considerations. Lastly, the paper offers recommendations for enhancing copyright protection and related rights.Keywords: author, copyright infringement, copyright, criminal liability, intellectual property, piracy
Procedia PDF Downloads 364603 Supervised/Unsupervised Mahalanobis Algorithm for Improving Performance for Cyberattack Detection over Communications Networks
Authors: Radhika Ranjan Roy
Abstract:
Deployment of machine learning (ML)/deep learning (DL) algorithms for cyberattack detection in operational communications networks (wireless and/or wire-line) is being delayed because of low-performance parameters (e.g., recall, precision, and f₁-score). If datasets become imbalanced, which is the usual case for communications networks, the performance tends to become worse. Complexities in handling reducing dimensions of the feature sets for increasing performance are also a huge problem. Mahalanobis algorithms have been widely applied in scientific research because Mahalanobis distance metric learning is a successful framework. In this paper, we have investigated the Mahalanobis binary classifier algorithm for increasing cyberattack detection performance over communications networks as a proof of concept. We have also found that high-dimensional information in intermediate features that are not utilized as much for classification tasks in ML/DL algorithms are the main contributor to the state-of-the-art of improved performance of the Mahalanobis method, even for imbalanced and sparse datasets. With no feature reduction, MD offers uniform results for precision, recall, and f₁-score for unbalanced and sparse NSL-KDD datasets.Keywords: Mahalanobis distance, machine learning, deep learning, NS-KDD, local intrinsic dimensionality, chi-square, positive semi-definite, area under the curve
Procedia PDF Downloads 784602 Comparative Appraisal of Polymeric Matrices Synthesis and Characterization Based on Maleic versus Itaconic Anhydride and 3,9-Divinyl-2,4,8,10-Tetraoxaspiro[5.5]-Undecane
Authors: Iordana Neamtu, Aurica P. Chiriac, Loredana E. Nita, Mihai Asandulesa, Elena Butnaru, Nita Tudorachi, Alina Diaconu
Abstract:
In the last decade, the attention of many researchers is focused on the synthesis of innovative “intelligent” copolymer structures with great potential for different uses. This considerable scientific interest is stimulated by possibility of the significant improvements in physical, mechanical, thermal and other important specific properties of these materials. Functionalization of polymer in synthesis by designing a suitable composition with the desired properties and applications is recognized as a valuable tool. In this work is presented a comparative study of the properties of the new copolymers poly(maleic anhydride maleic-co-3,9-divinyl-2,4,8,10-tetraoxaspiro[5.5]undecane) and poly(itaconic-anhydride-co-3,9-divinyl-2,4,8,10-tetraoxaspiro[5.5]undecane) obtained by radical polymerization in dioxane, using 2,2′-azobis(2-methylpropionitrile) as free-radical initiator. The comonomers are able for generating special effects as for example network formation, biodegradability and biocompatibility, gel formation capacity, binding properties, amphiphilicity, good oxidative and thermal stability, good film formers, and temperature and pH sensitivity. Maleic anhydride (MA) and also the isostructural analog itaconic anhydride (ITA) as polyfunctional monomers are widely used in the synthesis of reactive macromolecules with linear, hyperbranched and self & assembled structures to prepare high performance engineering, bioengineering and nano engineering materials. The incorporation of spiroacetal groups in polymer structures improves the solubility and the adhesive properties, induce good oxidative and thermal stability, are formers of good fiber or films with good flexibility and tensile strength. Also, the spiroacetal rings induce interactions on ether oxygen such as hydrogen bonds or coordinate bonds with other functional groups determining bulkiness and stiffness. The synthesized copolymers are analyzed by DSC, oscillatory and rotational rheological measurements and dielectric spectroscopy with the aim of underlying the heating behavior, solution viscosity as a function of shear rate and temperature and to investigate the relaxation processes and the motion of functional groups present in side chain around the main chain or bonds of the side chain. Acknowledgments This work was financially supported by the grant of the Romanian National Authority for Scientific Research, CNCS-UEFISCDI, project number PN-II-132/2014 “Magnetic biomimetic supports as alternative strategy for bone tissue engineering and repair’’ (MAGBIOTISS).Keywords: Poly(maleic anhydride-co-3, 9-divinyl-2, 4, 8, 10-tetraoxaspiro (5.5)undecane); Poly(itaconic anhydride-co-3, 9-divinyl-2, 4, 8, 10-tetraoxaspiro (5.5)undecane); DSC; oscillatory and rotational rheological analysis; dielectric spectroscopy
Procedia PDF Downloads 2274601 Blind Channel Estimation for Frequency Hopping System Using Subspace Based Method
Authors: M. M. Qasaymeh, M. A. Khodeir
Abstract:
Subspace channel estimation methods have been studied widely. It depends on subspace decomposition of the covariance matrix to separate signal subspace from noise subspace. The decomposition normally is done by either Eigenvalue Decomposition (EVD) or Singular Value Decomposition (SVD) of the Auto-Correlation matrix (ACM). However, the subspace decomposition process is computationally expensive. In this paper, the multipath channel estimation problem for a Slow Frequency Hopping (SFH) system using noise space based method is considered. An efficient method to estimate multipath the time delays basically is proposed, by applying MUltiple Signal Classification (MUSIC) algorithm which used the null space extracted by the Rank Revealing LU factorization (RRLU). The RRLU provides accurate information about the rank and the numerical null space which make it a valuable tool in numerical linear algebra. The proposed novel method decreases the computational complexity approximately to the half compared with RRQR methods keeping the same performance. Computer simulations are also included to demonstrate the effectiveness of the proposed scheme.Keywords: frequency hopping, channel model, time delay estimation, RRLU, RRQR, MUSIC, LS-ESPRIT
Procedia PDF Downloads 4104600 Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea
Authors: Min Jin Kwon, Seung Won Kim, Eui Yeon Kim, Haeyoung Lee
Abstract:
Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist.Keywords: deep packet inspection, internet filtering, juvenile protection, technical blocking
Procedia PDF Downloads 349