Search results for: agriculture technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9048

Search results for: agriculture technology

7998 Using Geopolymer Technology on Stabilization and Reutilization the Expansion Behavior Slag

Authors: W. H. Lee, T. W. Cheng, K. Y. Lin, S. W. Huang, Y. C. Ding

Abstract:

Basic Oxygen Furnace (BOF) Slag and electric arc furnace (EAF) slag is the by-product of iron making and steel making. Each of slag with produced over 100 million tons annually in Taiwan. The type of slag has great engineering properties, such as, high hardness and density, high compressive strength, low abrasion ratio, and can replace natural aggregate for building materials. However, no matter BOF or EAF slag, both have the expansion problem, due to it contains free lime. The purpose of this study was to stabilize the BOF and EAF slag by using geopolymer technology, hoping can prevent and solve the expansion problem. The experimental results showed that using geopolymer technology can successfully solve and prevent the expansion problem. Their main properties are analyzed with regard to their use as building materials. Autoclave is used to study the volume stability of these specimens. Finally, the compressive strength of geopolymer mortar with BOF/FAF slag can be reached over 21MPa after curing for 28 days. After autoclave testing, the volume expansion does not exceed 0.2%. Even after the autoclave test, the compressive strength can be grown to over 35MPa. In this study have success using these results on ready-mixed concrete plant, and have the same experimental results as laboratory scale. These results gave encouragement that the stabilized and reutilized BOF/EAF slag could be replaced as a feasible natural fine aggregate by using geopolymer technology.

Keywords: BOF slag, EAF slag, autoclave test, geopolymer

Procedia PDF Downloads 133
7997 Evaluation of Commercial Herbicides for Weed Control and Yield under Direct Dry Seeded Rice Cultivation System in Pakistan

Authors: Sanaullah Jalil, Abid Majeed, Syed Haider Abbas

Abstract:

Direct dry seeded rice cultivation system is an emerging production technology in Pakistan. Weeds are a major constraint to the success of direct dry seeded rice (DDSR). Studies were carried out for two years during 2015 and 2016 to evaluate the performance of applications of pre-emergence herbicides (Top Max @ 2.25 lit/ha, Click @1.5 lit/ha and Pendimethaline @ 1.25 lit/ha) and post-emergence herbicides (Clover @ 200 g/ha, Pyranex Gold @ 250 g/ha, Basagran @ 2.50 lit/ha, Sunstar Gold @ 50 g/ha and Wardan @ 1.25 lit/ha) at rice research field area of National Agriculture Research Center (NARC), Islamabad. The experiments were laid out in Randomized Complete Block Design (RCBD) with three replications. All evaluated herbicides reduced weed density and biomass by a significant amount. The net plot size was 2.5 x 5 m with 10 rows. Basmati-385 was used as test variety of rice. Data indicated that Top Max and Click provided best weed control efficiency but suppressed the germination of rice seed which causes the lowest grain yield production (680.6 kg/ha and 314.5 kg/ha respectively). A weedy check plot contributed 524.7 kg/ha paddy yield with highest weed density. Pyranex Gold provided better weed control efficiency and contributed to significantly higher paddy yield 5116.6 kg/ha than that of all other herbicide applications followed by the Clover which give paddy yield 4241.7 kg/ha. The results of our study suggest that pre-emergence herbicides provided best weed control but not fit for direct dry seeded rice (DDSR) cultivation system, and therefore post-emergence herbicides (Pyranex Gold and Clover) can be suggested for weed control and higher yield.

Keywords: pyranex gold, clover, direct dry seeded rice (DDSR), yield

Procedia PDF Downloads 261
7996 An Empirical Investigation of Mobile Banking Services Adoption in Pakistan

Authors: Aijaz A. Shaikh, Richard Glavee-Geo, Heikki Karjaluoto

Abstract:

Adoption of Information Systems (IS) is receiving increasing attention such that its implications have been closely monitored and studied by the IS management community, industry and professional gatekeepers. Building on previous research regarding the adoption of technology, this paper develops and validates an integrated model of the adoption of mobile banking. The model originates from the Technology Acceptance Model (TAM) and the Theory of Planned Behaviour (TPB). This paper intends to offer a preliminary scrutiny of the antecedents of the adoption of mobile banking services in the context of a developing country. Data was collected from Pakistan. The findings showed that an integrated TAM and TPB model greatly explains the adoption intention of mobile banking; and perceived behavioural control and its antecedents play a significant role in predicting adoption Theoretical and managerial implications of findings are presented and discussed.

Keywords: developing country, mobile banking service adoption, technology acceptance model, theory of planned behavior

Procedia PDF Downloads 418
7995 Drought Detection and Water Stress Impact on Vegetation Cover Sustainability Using Radar Data

Authors: E. Farg, M. M. El-Sharkawy, M. S. Mostafa, S. M. Arafat

Abstract:

Mapping water stress provides important baseline data for sustainable agriculture. Recent developments in the new Sentinel-1 data which allow the acquisition of high resolution images and varied polarization capabilities. This study was conducted to detect and quantify vegetation water content from canopy backscatter for extracting spatial information to encourage drought mapping activities throughout new reclaimed sandy soils in western Nile delta, Egypt. The performance of radar imagery in agriculture strongly depends on the sensor polarization capability. The dual mode capabilities of Sentinel-1 improve the ability to detect water stress and the backscatter from the structure components improves the identification and separation of vegetation types with various canopy structures from other features. The fieldwork data allowed identifying of water stress zones based on land cover structure; those classes were used for producing harmonious water stress map. The used analysis techniques and results show high capability of active sensors data in water stress mapping and monitoring especially when integrated with multi-spectral medium resolution images. Also sub soil drip irrigation systems cropped areas have lower drought and water stress than center pivot sprinkler irrigation systems. That refers to high level of evaporation from soil surface in initial growth stages. Results show that high relationship between vegetation indices such as Normalized Difference Vegetation Index NDVI the observed radar backscattering. In addition to observational evidence showed that the radar backscatter is highly sensitive to vegetation water stress, and essentially potential to monitor and detect vegetative cover drought.

Keywords: canopy backscatter, drought, polarization, NDVI

Procedia PDF Downloads 144
7994 Desertification of Earth and Reverting Strategies

Authors: V. R. Venugopal

Abstract:

Human being evolved 200,000 years ago in an area which is now the Sahara desert and lived all along in the northern part of Africa. It was around 10,000 to15,00 years that he moved out of Africa. Various ancient civilizations – mainly the Egyptian, Mesopotamian, Indus valley and the Chinese yellow river valley civilizations - developed and perished till the beginning of the Christian era. Strangely the regions where all these civilizations flourished are no deserts. After the ancient civilizations the two major religions of the world the Christianity and Islam evolved. These too evolved in the regions of Jerusalem and Mecca which are now in the deserts of the present Israel and Saudi Arabia. Human activity since ancient age right from his origin was in areas which are now deserts. This is only because wherever Man lived in large numbers he has turned them into deserts. Unfortunately, this is not the case with the ancient days alone. Over the last 500 years the forest cover on the earth is reduced by 80 percent. Even more currently Just over the last forty decades human population has doubled but the number of bugs, beetles, worms and butterflies (micro fauna) have declined by 45%. Deforestation and defaunation are the first signs of desertification and Desertification is a process parallel to the extinction of life. There is every possibility that soon most of the earth will be in deserts. This writer has been involved in the process of forestation and increase of fauna as a profession since twenty years and this is a report of his efforts made in the process, the results obtained and concept generated to revert the ongoing desertification of this earth. This paper highlights how desertification can be reverted by applying these basic principles. 1) Man is not owner of this earth and has no right destroy vegetation and micro fauna. 2) Land owner shall not have the freedom to do anything that he wishes with the land. 3) The land that is under agriculture shall be reduced at least by a half. 4) Irrigation and modern technology shall be used for the forest growth also. 5) Farms shall have substantial permanent vegetation and the practice of all in all out shall stop.

Keywords: desertification, extinction, micro fauna, reverting

Procedia PDF Downloads 312
7993 How Manufacturing Firm Manages Information Security: Need Pull and Technology Push Perspective

Authors: Geuna Kim, Sanghyun Kim

Abstract:

This study investigates various factors that may influence the ISM process, including the organization’s internal needs and external pressure, and examines the role of regulatory pressure in ISM development and performance. The 105 sets of data collected in a survey were tested against the research model using SEM. The results indicate that NP and TP had positive effects on the ISM process, except for perceived benefits. Regulatory pressure had a positive effect on the relationship between ISM awareness and ISM development and performance.

Keywords: information security management, need pull, technology push, regulatory pressure

Procedia PDF Downloads 296
7992 The Effect of Supercritical Carbon Dioxide Process Variables on The Recovery of Extracts from Bentong Ginger: Study on Process Variables

Authors: Muhamad Syafiq Hakimi Kamaruddin, Norhidayah Suleiman

Abstract:

Ginger extracts (Zingiber officinale Rosc.) have been attributed therapeutic properties primarily as antioxidant, anticancer, and anti-inflammatory properties. Conventional extractions including Soxhlet and maceration are commonly used to extract the bioactive compounds from plant material. Nevertheless, high energy consumption and being non-environmentally friendly are the predominant limitations of the conventional extractions method. Herein, green technology, namely supercritical carbon dioxide (scCO2) extraction, is used to study process variables' effects on extract yields. Herein, green technology, namely supercritical carbon dioxide (scCO2) extraction, is used to study process variables' effects on extract yields. A pressure (10-30 MPa), temperature (40-60 °C), and median particle size (300-600 µm) were conducted at a CO2 flow rate of 0.9 ± 0.2 g/min for 120 mins. The highest overall yield was 4.58% obtained by the scCO2 extraction conditions of 300 bar and 60 °C with 300µm of ginger powder for 120 mins. In comparison, the yield of the extract was increased considerably within a short extraction time. The results show that scCO2 has a remarkable ability over ginger extract and is a promising technology for extracting bioactive compounds from plant material.

Keywords: conventional, ginger, non-environmentally, supercritical carbon dioxide, technology

Procedia PDF Downloads 116
7991 Dual Role of Microalgae: Carbon Dioxide Capture Nutrients Removal

Authors: Mohamad Shurair, Fares Almomani, Simon Judd, Rahul Bhosale, Anand Kumar, Ujjal Gosh

Abstract:

This study evaluated the use of mixed indigenous microalgae (MIMA) as a treatment process for wastewaters and CO2 capturing technology at different temperatures. The study follows the growth rate of MIMA, removals of organic matter, removal of nutrients from synthetic wastewater and its effectiveness as CO2 capturing technology from flue gas. A noticeable difference between the growth patterns of MIMA was observed at different CO2 and different operational temperatures. MIMA showed the highest growth grate when injected with CO2 dosage of 10% and limited growth was observed for the systems injected with 5% and 15 % of CO2 at 30 ◦C. Ammonia and phosphorus removals for Spirulina were 69%, 75%, and 83%, and 20%, 45%, and 75% for the media injected with 0, 5 and 10% CO2. The results of this study show that simple and cost-effective microalgae-based wastewater treatment systems can be successfully employed at different temperatures as a successful CO2 capturing technology even with the small probability of inhibition at high temperatures

Keywords: greenhouse, climate change, CO2 capturing, green algae

Procedia PDF Downloads 333
7990 Advances in the Design of Wireless Sensor Networks for Environmental Monitoring

Authors: Shathya Duobiene, Gediminas Račiukaitis

Abstract:

Wireless Sensor Networks (WSNs) are an emerging technology that opens up a new field of research. The significant advance in WSN leads to an increasing prevalence of various monitoring applications and real-time assistance in labs and factories. Selective surface activation induced by laser (SSAIL) is a promising technology that adapts to the WSN design freedom of shape, dimensions, and material. This article proposes and implements a WSN-based temperature and humidity monitoring system, and its deployed architectures made for the monitoring task are discussed. Experimental results of newly developed sensor nodes implemented in university campus laboratories are shown. Then, the simulation and the implementation results obtained through monitoring scenarios are displayed. At last, a convenient solution to keep the WSN alive and functional as long as possible is proposed. Unlike other existing models, on success, the node is self-powered and can utilise minimal power consumption for sensing and data transmission to the base station.

Keywords: IoT, network formation, sensor nodes, SSAIL technology

Procedia PDF Downloads 88
7989 Tanzanian Food Origins and Protected Geographical Indications

Authors: Innocensia John, Henrik Egelyng, Razack Lokina

Abstract:

As the world`s population is constantly growing, food security has become a thorny trending issue. The impact has particularly been felt more in Africa as most of the people depend on food Agriculture products. Geographical Indications can aid in transforming the Tanzania agriculture-dependent economy through tapping the unique attributes of their quality products like soil, taste color etc. Consumers worldwide demand more uniquer products featuring a ´connect´ with the land use systems producing particular qualities. Tanzania has demonstrated the capacity to tap into the organic world market and has untapped potential for harvesting market value from geographical indications. This paper presents preliminary results from VALOR — a research project investigating conditions under which Tanzanian origin food producers can add value by incorporating territory specific cultural, environmental and social qualities into marketing, production and processing of unique local, niche and specialty products. Cases are investigated of the prospects for Tanzania to leapfrog perhaps into exports of geographical indications products, and certainly into allowing smallholders to create employment and build monetary value, while stewarding local food cultures and natural environments and resources, and increasing the diversity of supply of natural and unique quality products and so contribute to enhanced food security. Rice from Kyela, coffee and Sugar from Kilimanjaro, are some of the product cases investigated and provides for the in-depth case study, as ´landscape´ products incorporating ´taste of place´. Framework conditions for producers creating or capturing market value as stewards of cultural and landscape values and environments and institutional requirements for such creation or capturing to happen, including presence of export opportunities, are discussed.

Keywords: food origins, food security, protected geographical indications, case study analysis

Procedia PDF Downloads 302
7988 Research and Application of the Three-Dimensional Visualization Geological Modeling of Mine

Authors: Bin Wang, Yong Xu, Honggang Qu, Rongmei Liu, Zhenji Gao

Abstract:

Today's mining industry is advancing gradually toward digital and visual direction. The three dimensional visualization geological modeling of mine is the digital characterization of mineral deposit, and is one of the key technology of digital mine. The three-dimensional geological modeling is a technology that combines the geological spatial information management, geological interpretation, geological spatial analysis and prediction, geostatistical analysis, entity content analysis and graphic visualization in three-dimensional environment with computer technology, and is used in geological analysis. In this paper, the three-dimensional geological modeling of an iron mine through the use of Surpac is constructed, and the weight difference of the estimation methods between distance power inverse ratio method and ordinary kriging is studied, and the ore body volume and reserves are simulated and calculated by using these two methods. Compared with the actual mine reserves, its result is relatively accurate, so it provided scientific bases for mine resource assessment, reserve calculation, mining design and so on.

Keywords: three-dimensional geological modeling, geological database, geostatistics, block model

Procedia PDF Downloads 70
7987 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 137
7986 Ecosystems: An Analysis of Generation Z News Consumption, Its Impact on Evolving Concepts and Applications in Journalism

Authors: Bethany Wood

Abstract:

The world pandemic led to a change in the way social media was used by audiences, with young people spending more hours on the platform due to lockdown. Reports by Ofcom have demonstrated that the internet is the second most popular platform for accessing news after television in the UK with social media and the internet ranked as the most popular platform to access news for those aged between 16-24. These statistics are unsurprising considering that at the time of writing, 98 percent of Generation Z (Gen Z) owned a smartphone and the subsequent ease and accessibility of social media. Technology is constantly developing and with this, its importance is becoming more prevalent with each generation: the Baby Boomers (1946-1964) consider it something useful whereas millennials (1981-1997) believe it a necessity for day to day living. Gen Z, otherwise known as the digital native, have grown up with this technology at their fingertips and social media is a norm. It helps form their identity, their affiliations and opens gateways for them to engage with news in a new way. It is a common misconception that Gen Z do not consume news, they are simply doing so in a different way to their predecessors. Using a sample of 800 18-20 year olds whilst utilising Generational theory, Actor Network Theory and the Social Shaping of Technology, this research provides a critical analyse regarding how Gen Z’s news consumption and engagement habits are developing along with technology to sculpture the future format of news and its distribution. From that perspective, allied with the empirical approach, it is possible to provide research orientated advice for the industry and even help to redefine traditional concepts of journalism.

Keywords: journalism, generation z, digital, social media

Procedia PDF Downloads 86
7985 Empowering Certificate Management with Blockchain Technology

Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware

Abstract:

The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.

Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker

Procedia PDF Downloads 46
7984 Exploring Transitions between Communal- and Market-Based Knowledge Sharing

Authors: Benbya Hind, Belbaly Nassim

Abstract:

Markets and communities are often cast as alternative forms of knowledge sharing, but an open question is how and why people dynamically transition between them. To study these transitions, we design a technology that allows geographically distributed participants to either buy knowledge (using virtual points) or request it for free. We use a data-driven, inductive approach, studying 550 members in over 5000 interactions, during nine months. Because the technology offered participants choices between market or community forms, we can document both individual and collective transitions that emerge as people cycle between these forms. Our inductive analysis revealed that uncertainties endemic to knowledge sharing were the impetus for these transitions. Communities evoke uncertainties about knowledge sharing’s costs and benefits, which markets resolve by quantifying explicit prices. However, if people manipulate markets, they create uncertainties about the validity of those prices, allowing communities to reemerge to establish certainty via identity-based validation.

Keywords: knowledge sharing, communities, information technology design, transitions, markets

Procedia PDF Downloads 180
7983 Knowledge, Hierarchy and Decision-Making: Analysis of Documentary Filmmaking Practices in India

Authors: Nivedita Ghosh

Abstract:

In his critique of Lefebvre’s view that ‘technological capacities’ are class-dependent, Francois Hetman argues that technology today is participatory, allowing the entry of individuals from different levels of social stratification. As a result, we are entering into an era of technology operators or ‘clerks’ who become the new decision-makers because of the knowledge they possess of the use of technologies. In response to Hetman’s thesis, this paper argues that knowledge of technology, while indeed providing a momentary space for decision-making, does not necessarily restructure social hierarchies. Through case studies presented from the world of Indian documentary filmmaking, this paper puts forth the view that Hetman’s clerks, despite being technologically advanced, do not break into the filmmaking hierarchical order. This remains true even for a situation where technical knowledge rests most with those in the lowest rungs of the filmmaking ladder. Instead, technological knowledge provides the space for other kinds of relationships to evolve, such as those of ‘trusting the technician’ or ‘admiration for the technician’s work’. Furthermore, what continues to define documentary filmmaking hierarchy is conceptualization capacities of the practitioners, which are influenced by a similarity in socio-cultural backgrounds and film school training accessible primarily to the filmmakers instead of the technicians. Accordingly, the paper concludes with the argument that more than ‘technological-capacities’, it is ‘conceptualization capacities’ which are class-dependent, especially when we study the field of documentary filmmaking.

Keywords: documentary filmmaking, India, technology, knowledge, hierarchy

Procedia PDF Downloads 262
7982 An Extensive Review of Drought Indices

Authors: Shamsulhaq Amin

Abstract:

Drought can arise from several hydrometeorological phenomena that result in insufficient precipitation, soil moisture, and surface and groundwater flow, leading to conditions that are considerably drier than the usual water content or availability. Drought is often assessed using indices that are associated with meteorological, agricultural, and hydrological phenomena. In order to effectively handle drought disasters, it is essential to accurately determine the kind, intensity, and extent of the drought using drought characterization. This information is critical for managing the drought before, during, and after the rehabilitation process. Over a hundred drought assessments have been created in literature to evaluate drought disasters, encompassing a range of factors and variables. Some models utilise solely hydrometeorological drivers, while others employ remote sensing technology, and some incorporate a combination of both. Comprehending the entire notion of drought and taking into account drought indices along with their calculation processes are crucial for researchers in this discipline. Examining several drought metrics in different studies requires additional time and concentration. Hence, it is crucial to conduct a thorough examination of approaches used in drought indices in order to identify the most straightforward approach to avoid any discrepancies in numerous scientific studies. In case of practical application in real-world, categorizing indices relative to their usage in meteorological, agricultural, and hydrological phenomena might help researchers maximize their efficiency. Users have the ability to explore different indexes at the same time, allowing them to compare the convenience of use and evaluate the benefits and drawbacks of each. Moreover, certain indices exhibit interdependence, which enhances comprehension of their connections and assists in making informed decisions about their suitability in various scenarios. This study provides a comprehensive assessment of various drought indices, analysing their types and computation methodologies in a detailed and systematic manner.

Keywords: drought classification, drought severity, drought indices, agriculture, hydrological

Procedia PDF Downloads 41
7981 Consumer Experience of 3D Body Scanning Technology and Acceptance of Related E-Commerce Market Applications in Saudi Arabia

Authors: Moudi Almousa

Abstract:

This research paper explores Saudi Arabian female consumers’ experiences using 3D body scanning technology and their level of acceptance of possible market applications of this technology to adopt for apparel online shopping. Data was collected for 82 women after being scanned then viewed a short video explaining three possible scenarios of 3D body scanning applications, which include size prediction, customization, and virtual try-on, before completing the survey questionnaire. Although respondents have strong positive responses towards the scanning experience, the majority were concerned about their privacy during the scanning process. The results indicated that size prediction and virtual try on had greater market application potential and a higher chance of crossing the gap based on consumer interest. The results of the study also indicated a strong positive correlation between respondents’ concern with inability to try on apparel products in online environments and their willingness to use the 3D possible market applications.

Keywords: 3D body scanning, market applications, online, apparel fit

Procedia PDF Downloads 145
7980 Toward an Informed Capacity Development Program in Inclusive and Sustainable Agricultural and Rural Development

Authors: Maria Ana T. Quimbo

Abstract:

As the Southeast Asian Regional Center for Graduate Study and Research in Agriculture (SEARCA) approaches its 50th founding anniversary. It continues to pursue its mission of strengthening the capacities of Southeast Asian leaders and institutions under its reformulated mission of Inclusive and Sustainable Agricultural and Rural Development (ISARD). Guided by this mission, this study analyzed the desired and priority capacity development needs of institutions heads and key personnel toward addressing the constraints, problems, and issues related to agricultural and rural development toward achieving their institutional goals. Adopting an exploratory, descriptive research design, the study examined the competency needs at the institutional and personnel levels. A total of 35 institution heads from seven countries and 40 key personnel from eight countries served as research participants. The results showed a variety of competencies in the areas of leadership and management, agriculture, climate change, research, monitoring, and evaluation, planning, and extension or community service. While mismatch was found in a number of desired and priority competency areas as perceived by the respondents, there were also interesting concordant answers in both technical and non-technical areas. Interestingly, the competency needs both desired and prioritized were a combination of “hard” or technical skills and “soft” or interpersonal skills. Policy recommendations were forwarded on the need to continue building capacities in core competencies along ISARD; have a balance of 'hard' skills and 'soft' skills through the use of appropriate training strategies and explicit statement in training objectives, strengthen awareness on “soft” skills through its integration in workplace culture, build capacity on action research, continue partnerships encourage mentoring, prioritize competencies, and build capacity of desired and priority competency areas.

Keywords: capacity development, competency needs assessment, sustainability and development, ISARD

Procedia PDF Downloads 378
7979 Aerial Survey and 3D Scanning Technology Applied to the Survey of Cultural Heritage of Su-Paiwan, an Aboriginal Settlement, Taiwan

Authors: April Hueimin Lu, Liangj-Ju Yao, Jun-Tin Lin, Susan Siru Liu

Abstract:

This paper discusses the application of aerial survey technology and 3D laser scanning technology in the surveying and mapping work of the settlements and slate houses of the old Taiwanese aborigines. The relics of old Taiwanese aborigines with thousands of history are widely distributed in the deep mountains of Taiwan, with a vast area and inconvenient transportation. When constructing the basic data of cultural assets, it is necessary to apply new technology to carry out efficient and accurate settlement mapping work. In this paper, taking the old Paiwan as an example, the aerial survey of the settlement of about 5 hectares and the 3D laser scanning of a slate house were carried out. The obtained orthophoto image was used as an important basis for drawing the settlement map. This 3D landscape data of topography and buildings derived from the aerial survey is important for subsequent preservation planning as well as building 3D scan provides a more detailed record of architectural forms and materials. The 3D settlement data from the aerial survey can be further applied to the 3D virtual model and animation of the settlement for virtual presentation. The information from the 3D scanning of the slate house can also be used for further digital archives and data queries through network resources. The results of this study show that, in large-scale settlement surveys, aerial surveying technology is used to construct the topography of settlements with buildings and spatial information of landscape, as well as the application of 3D scanning for small-scale records of individual buildings. This application of 3D technology, greatly increasing the efficiency and accuracy of survey and mapping work of aboriginal settlements, is much helpful for further preservation planning and rejuvenation of aboriginal cultural heritage.

Keywords: aerial survey, 3D scanning, aboriginal settlement, settlement architecture cluster, ecological landscape area, old Paiwan settlements, slat house, photogrammetry, SfM, MVS), Point cloud, SIFT, DSM, 3D model

Procedia PDF Downloads 167
7978 Social Affiliation Effects of Technology in 2022

Authors: Johanna Goeß

Abstract:

In this field study, it is hypothesised that affiliation motivation is relevant to dark terminal technology readiness. The theoretical basis for this work was the TAM 2, focusing on the social process variables and the short-scale technology readiness. Two hypotheses to be tested are the focus of consideration:
 H1: The TAM constructs are independently positively related to dark device use. H2: Sense of social belonging is positively related to dark device use.
 In this quantitative study, 30 male subjects participated with their dark devices. Using a post-basket exercise, affiliation is manipulated by content items on the website to investigate whether affiliation between computers and people and smartphones and people leads to similar effects as an affiliation between people. The entire scientific study, including the questionnaire, took about 30 minutes. This study contributes to the current literature and draws attention to the fact that male users' terminal devices have an influence in the form of affiliation effects.

Keywords: human-computer-interaction, computers, smartphones, addiction, social affiliation effects, TAM 2, pyramid of needs, social actors

Procedia PDF Downloads 117
7977 Water Security and Transboundary Issues for Food Security of Ethiopia. The Case of Nile River

Authors: Kebron Asnake

Abstract:

Water security and transboundary issues are critical concerns for countries, particularly in regions where shared water resources are significant. This Research focuses on exploring the challenges and opportunities related to water security and transboundary issues in Ethiopia, using the case of the Nile River. Ethiopia, as a riparian country of the Nile River, faces complex water security issues due to its dependence on this transboundary water resource. This abstract aims to analyze the various factors that affect water security in Ethiopia, including population growth, climate change, and competing water demands. The Study examines the challenges linked to transboundary water management of the Nile River. It delves into the complexities of negotiating water allocations and addressing potential conflicts among the downstream riparian countries. The paper also discusses the role of international agreements and cooperation in promoting sustainable water resource management. Additionally, the paper highlights the opportunities for collaboration and sustainable development that arise from transboundary water management. It explores the potential for joint investments in water infrastructure, hydropower generation, and irrigation systems that can contribute to regional economic growth and water security. Furthermore, the study emphasizes the need for integrated water management approaches in Ethiopia to ensure the equitable and sustainable use of the Nile River's waters. It highlights the importance of involving stakeholders from diverse sectors, including agriculture, energy, and environmental conservation, in decision-making processes. By presenting the case of the Nile River in Ethiopia, this Abstract contributes to the understanding of water security and transboundary issues. It underscores the significance of regional cooperation and informed policy-making to address the challenges and opportunities presented by transboundary water resources. The paper serves as a foundation for further research and policy in water management in Ethiopia and other regions facing similar challenges.

Keywords: water, health, agriculture, medicine

Procedia PDF Downloads 85
7976 Topics of Blockchain Technology to Teach at Community College

Authors: Penn P. Wu, Jeannie Jo

Abstract:

Blockchain technology has rapidly gained popularity in industry. This paper attempts to assist academia to answer four questions. First, should community colleges begin offering education to nurture blockchain-literate students for the job market? Second, what are the appropriate topical areas to cover? Third, should it be an individual course? And forth, should it be a technical or management course? This paper starts with identifying the knowledge domains of blockchain technology and the topical areas each domain has, and continues with placing them in appropriate academic territories (Computer Sciences vs. Business) and subjects (programming, management, marketing, and laws), and then develops an evaluation model to determine the appropriate topical area for community colleges to teach. The evaluation is based on seven factors: maturity of technology, impacts on management, real-world applications, subject classification, knowledge prerequisites, textbook readiness, and recommended pedagogies. The evaluation results point to an interesting direction that offering an introductory course is an ideal option to guide students through the learning journey of what blockchain is and how it applies to business. Such an introductory course does not need to engage students in the discussions of mathematics and sciences that make blockchain technologies possible. While it is inevitable to brief technical topics to help students build a solid knowledge foundation of blockchain technologies, community colleges should avoid offering students a course centered on the discussion of developing blockchain applications.

Keywords: blockchain, pedagogies, blockchain technologies, blockchain course, blockchain pedagogies

Procedia PDF Downloads 133
7975 The Challenges to Information Communication Technology Integration in Mathematics Teaching and Learning

Authors: George Onomah

Abstract:

Background: The integration of information communication technology (ICT) in Mathematics education faces notable challenges, which this study aimed to dissect and understand. Objectives: The primary goal was to assess the internal and external factors affecting the adoption of ICT by in-service Mathematics teachers. Internal factors examined included teachers' pedagogical beliefs, prior teaching experience, attitudes towards computers, and proficiency with technology. External factors included the availability of technological resources, the level of ICT training received, the sufficiency of allocated time for technology use, and the institutional culture within educational environments. Methods: A descriptive survey design was employed to methodically investigate these factors. Data collection was carried out using a five-point Likert scale questionnaire, administered to a carefully selected sample of 100 in-service Mathematics teachers through a combination of purposive and convenience sampling techniques. Findings: Results from multiple regression analysis revealed a significant underutilization of ICT in Mathematics teaching, highlighting a pronounced deficiency in current classroom practices. Recommendations: The findings suggest an urgent need for educational department heads to implement regular and comprehensive ICT training programs aimed at enhancing teachers' technological capabilities and promoting the integration of ICT in Mathematics teaching methodologies.

Keywords: ICT, Mathematics, integration, barriers

Procedia PDF Downloads 40
7974 Improving Food Security and Commercial Development through Promotion of High Value Medicinal and Industrial Plants in the Swat Valley of Pakistan

Authors: Hassan Sher

Abstract:

Agriculture has a pivotal role in Pakistan’s economy, accounting for about one-fourth of the GDP and employing almost half the population. However, the competitiveness, productivity, growth, employment potential, export opportunity, and contribution to GDP of the sector is significantly hampered by agriculture marketing laws/regulations at the provincial level that reward rent seeking behavior, promote monopoly power, artificially reduce farmer incomes while inflating prices to consumers, and act as disincentives to investment. Although of more recent vintage than some other provincial agricultural marketing laws, the NWFP Agricultural and Livestock Produce Markets Act, 2007 is a throwback to a colonial paradigm, where restrictions on agricultural produce marketing and Government control of distribution channels is the norm. The Swat Valley (in which we include its tributary valleys) is an area of Pakistan in which there is poverty is both extreme and pervasive. For many, a significant portion of the family’s income comes from selling plants that are used as herbs, medicines, and perfumes. Earlier studies have shown that the benefit they derive from this work is less than they might because of: Lack of knowledge concerning which plants and which plant parts are valuable, Lack of knowledge concerning optimal preservation and storage of material, illiteracy. Another concern that much of the plant material sold from the valley is collected in the wild, without an appreciation of the negative impact continued collecting has on wild populations. We propose: Creating colored cards to help inhabitants recognize the 25 most valuable plants in their area; Developing and sharing protocols for growing the 25 most valuable plants in a home garden; Developing and sharing efficient mechanisms for drying plants so they do not lose value; Encouraging increased literacy by incorporating numbers and a few words in the handouts.

Keywords: food security, medicinal plants, industrial plants, economic development

Procedia PDF Downloads 326
7973 Technology Transfer of Indigenous Technologies: Emerging Aid to Indian Health Sector

Authors: Tripta Dixit, Smita Sahu, William Selvamurthy, Sadhana Srivastava

Abstract:

India is battling with the issues of accessibility, affordability and availability of quality health to the masses. Indian medical heritage which dated back to 3000 BC unveils the rich knowledge pool which has undergone a perceptible change over years, such as eradication of many communicable diseases, increasing individual awareness of quality health and import driven medical device market etc. Despite a slew of initiatives the holistic slogan of ‘health for all’ remains elusive and a concern for the nation. The 21st-century projects a myriad of challenges like cultural diversity, large population, demographic dividend and geographical segmentation leading to varied needs of people as per their regional conditions of climate, disease prevalence, nutrition and sanitation. But these challenges are also opportunities for the development of indigenous, low cost and accessible technologies to tackle them. This requires reinforcing the potential of indigenous technologies in coordination with prevailing health issues in various regions of country. This paper emphasis on the strategy for exploring the indigenous technologies with entrusted up-scaling to meet the diverse needs of the people. This review proposes to adopt technology transfer as a strategy to establish a vibrant ecosystem for identifying and up-scaling the indigenous medical technologies with diligent hand-holding for public health.

Keywords: health, indigenous, medical technology, technology transfer

Procedia PDF Downloads 251
7972 Research of the Three-Dimensional Visualization Geological Modeling of Mine Based on Surpac

Authors: Honggang Qu, Yong Xu, Rongmei Liu, Zhenji Gao, Bin Wang

Abstract:

Today's mining industry is advancing gradually toward digital and visual direction. The three-dimensional visualization geological modeling of mine is the digital characterization of mineral deposits and is one of the key technology of digital mining. Three-dimensional geological modeling is a technology that combines geological spatial information management, geological interpretation, geological spatial analysis and prediction, geostatistical analysis, entity content analysis and graphic visualization in a three-dimensional environment with computer technology and is used in geological analysis. In this paper, the three-dimensional geological modeling of an iron mine through the use of Surpac is constructed, and the weight difference of the estimation methods between the distance power inverse ratio method and ordinary kriging is studied, and the ore body volume and reserves are simulated and calculated by using these two methods. Compared with the actual mine reserves, its result is relatively accurate, so it provides scientific bases for mine resource assessment, reserve calculation, mining design and so on.

Keywords: three-dimensional geological modeling, geological database, geostatistics, block model

Procedia PDF Downloads 77
7971 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 264
7970 An Investigation of the Integration of Synchronous Online Tools into Task-Based Language Teaching: The Example of SpeakApps

Authors: Nouf Aljohani

Abstract:

The research project described in this presentation focuses on designing and evaluating oral tasks related to students’ needs and levels to foster communication and negotiation of meaning for a group of female Saudi university students. The significance of the current research project lies in its contribution to determining the usefulness of synchronous technology-mediated interactive group discussion in improving different speaking strategies through using synchronous technology. Also, it discovers how to optimize learning outcomes, expand evaluation for online learning tasks and engaging students’ experience in evaluating synchronous interactive tools and tasks. The researcher used SpeakApps, a synchronous technology, that allows the students to practice oral interaction outside the classroom. Such a course of action was considered necessary due to low English proficiency among Saudi students. According to the author's knowledge, the main factor that causes poor speaking skills is that students do not have sufficient time to communicate outside English language classes. Further, speaking and listening course contents are not well designed to match the Saudi learning context. The methodology included designing speaking tasks to match the educational setting; a CALL framework for designing and evaluating tasks; participant involvement in evaluating these tasks in each online session; and an investigation of the factors that led to the successful implementation of Task-based Language Teaching (TBLT) and using SpeakApps. The analysis and data were drawn from the technology acceptance model surveys, a group interview, teachers’ and students’ weekly reflections, and discourse analysis of students’ interactions.

Keywords: CALL evaluation, synchronous technology, speaking skill, task-based language teaching

Procedia PDF Downloads 310
7969 Simulating the Unseen: David Cronenberg’s Body Horror through Baudrillard’s Lens

Authors: Mario G. Rodriguez

Abstract:

This paper undertakes an in-depth exploration of David Cronenberg's filmography through Jean Baudrillard's theory of simulacra and simulation. Little has been written to show how Cronenberg’s cinema exemplifies Baudrillard’s conceptualization of postmodernity. The study employs Baudrillard’s historical orders of simulacra, as well as his definitions of hyperreality and simulation, to recontextualize Cronenberg’s films in an era characterized by the increasing influence of media and technology and Cronenberg's oeuvre presents a compelling canvas for examining the interplay between the real and the simulated. Through films like "Videodrome" (1983), "The Fly" (1986), and "eXistenZ" (1999), Cronenberg navigates the complex terrain of the human body, technology, and societal perceptions, echoing Baudrillard's concerns about the hyperreal and the dissolution of reality. The study concludes with a consideration of the role of "body-horror" as it pertains to Baudrillard's theory. It sheds light on how fear of loss of bodily autonomy, the relationship between technology and the human body, and the intersection of science, medicine, and horror reflect the nature of hyperreality and simulation.

Keywords: Cronenberg, hyperreality, simulation, Baudrillard

Procedia PDF Downloads 68