Search results for: collective animal behavior algorithm
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11299

Search results for: collective animal behavior algorithm

10249 Unsupervised Feature Learning by Pre-Route Simulation of Auto-Encoder Behavior Model

Authors: Youngjae Jin, Daeshik Kim

Abstract:

This paper describes a cycle accurate simulation results of weight values learned by an auto-encoder behavior model in terms of pre-route simulation. Given the results we visualized the first layer representations with natural images. Many common deep learning threads have focused on learning high-level abstraction of unlabeled raw data by unsupervised feature learning. However, in the process of handling such a huge amount of data, the learning method’s computation complexity and time limited advanced research. These limitations came from the fact these algorithms were computed by using only single core CPUs. For this reason, parallel-based hardware, FPGAs, was seen as a possible solution to overcome these limitations. We adopted and simulated the ready-made auto-encoder to design a behavior model in Verilog HDL before designing hardware. With the auto-encoder behavior model pre-route simulation, we obtained the cycle accurate results of the parameter of each hidden layer by using MODELSIM. The cycle accurate results are very important factor in designing a parallel-based digital hardware. Finally this paper shows an appropriate operation of behavior model based pre-route simulation. Moreover, we visualized learning latent representations of the first hidden layer with Kyoto natural image dataset.

Keywords: auto-encoder, behavior model simulation, digital hardware design, pre-route simulation, Unsupervised feature learning

Procedia PDF Downloads 427
10248 Multimedia Firearms Training System

Authors: Aleksander Nawrat, Karol Jędrasiak, Artur Ryt, Dawid Sobel

Abstract:

The goal of the article is to present a novel Multimedia Firearms Training System. The system was developed in order to compensate for major problems of existing shooting training systems. The designed and implemented solution can be characterized by five major advantages: algorithm for automatic geometric calibration, algorithm of photometric recalibration, firearms hit point detection using thermal imaging camera, IR laser spot tracking algorithm for after action review analysis, and implementation of ballistics equations. The combination of the abovementioned advantages in a single multimedia firearms training system creates a comprehensive solution for detecting and tracking of the target point usable for shooting training systems and improving intervention tactics of uniformed services. The introduced algorithms of geometric and photometric recalibration allow the use of economically viable commercially available projectors for systems that require long and intensive use without most of the negative impacts on color mapping of existing multi-projector multimedia shooting range systems. The article presents the results of the developed algorithms and their application in real training systems.

Keywords: firearms shot detection, geometric recalibration, photometric recalibration, IR tracking algorithm, thermography, ballistics

Procedia PDF Downloads 204
10247 Model-Based Software Regression Test Suite Reduction

Authors: Shiwei Deng, Yang Bao

Abstract:

In this paper, we present a model-based regression test suite reducing approach that uses EFSM model dependence analysis and probability-driven greedy algorithm to reduce software regression test suites. The approach automatically identifies the difference between the original model and the modified model as a set of elementary model modifications. The EFSM dependence analysis is performed for each elementary modification to reduce the regression test suite, and then the probability-driven greedy algorithm is adopted to select the minimum set of test cases from the reduced regression test suite that cover all interaction patterns. Our initial experience shows that the approach may significantly reduce the size of regression test suites.

Keywords: dependence analysis, EFSM model, greedy algorithm, regression test

Procedia PDF Downloads 411
10246 The Effect of Contrast on Approach Distances of Carcharhinus perezi

Authors: Elizabeth Farquhar, Erich Ritter

Abstract:

Studying shark's interaction with humans and their behavioral responses will have enormous implications for other fields of marine biology and oceanography. The health of sharks has direct impacts on the stability of human society with a reported 3.5 billion people depending on the ocean for food and/or livelihood. Discovering how sharks behave and interact with people, will have enormous implications for future studies, along with the development of more effective ways to reduce negative shark/human interactions. This specific study investigates the effects of contrasting ponchos worn by divers on the approach distances of Carcharhinus perezi. Data was collected over a two week period at a test site off the shore of Eleuthera Island in the Bahamas, with a depth of approximately 55 feet during mid-August. Sixty-minute dive trials were conducted and videoed from above with 5-meter radius markers on the ocean floor surrounding the two divers, kneeling back-to-back. Five poncho colors were worn by the two divers (black, navy blue, dark green, yellow and orange), rotating the color permutations randomly to test the distance a shark will approach each color. Results indicate significantly closer approach patterns when divers were wearing orange ponchos, and the combination of orange with black and blue ponchos were found to be statistically significant. These results are relevant to understanding how sharks perceive contrast and dive equipment in the marine environment, which could have the potential to prevent negative shark/human interactions.

Keywords: shark behavior, animal behavior, marine biology, conservation

Procedia PDF Downloads 126
10245 Advanced Hybrid Particle Swarm Optimization for Congestion and Power Loss Reduction in Distribution Networks with High Distributed Generation Penetration through Network Reconfiguration

Authors: C. Iraklis, G. Evmiridis, A. Iraklis

Abstract:

Renewable energy sources and distributed power generation units already have an important role in electrical power generation. A mixture of different technologies penetrating the electrical grid, adds complexity in the management of distribution networks. High penetration of distributed power generation units creates node over-voltages, huge power losses, unreliable power management, reverse power flow and congestion. This paper presents an optimization algorithm capable of reducing congestion and power losses, both described as a function of weighted sum. Two factors that describe congestion are being proposed. An upgraded selective particle swarm optimization algorithm (SPSO) is used as a solution tool focusing on the technique of network reconfiguration. The upgraded SPSO algorithm is achieved with the addition of a heuristic algorithm specializing in reduction of power losses, with several scenarios being tested. Results show significant improvement in minimization of losses and congestion while achieving very small calculation times.

Keywords: congestion, distribution networks, loss reduction, particle swarm optimization, smart grid

Procedia PDF Downloads 431
10244 Simulation of Nonlinear Behavior of Reinforced Concrete Slabs Using Rigid Body-Spring Discrete Element Method

Authors: Felix Jr. Garde, Eric Augustus Tingatinga

Abstract:

Most analysis procedures of reinforced concrete (RC) slabs are based on elastic theory. When subjected to large forces, however, slabs deform beyond elastic range and the study of their behavior and performance require nonlinear analysis. This paper presents a numerical model to simulate nonlinear behavior of RC slabs using rigid body-spring discrete element method. The proposed slab model composed of rigid plate elements and nonlinear springs is based on the yield line theory which assumes that the nonlinear behavior of the RC slab subjected to transverse loads is contained in plastic or yield-lines. In this model, the displacement of the slab is completely described by the rigid elements and the deformation energy is concentrated in the flexural springs uniformly distributed at the potential yield lines. The spring parameters are determined from comparison of transverse displacements and stresses developed in the slab obtained using FEM and the proposed model with assumed homogeneous material. Numerical models of typical RC slabs with varying geometry, reinforcement, support conditions, and loading conditions, show reasonable agreement with available experimental data. The model was also shown to be useful in investigating dynamic behavior of slabs.

Keywords: RC slab, nonlinear behavior, yield line theory, rigid body-spring discrete element method

Procedia PDF Downloads 308
10243 Structure of Tourists’ Shopping Behavior: From the Tyranny of Hotels to Public Markets

Authors: Asmaa M. Marzouk, Abdallah M. Elshaer

Abstract:

Despite the well-recognized value of shopping as a revenue-generating resource, little effort was made to investigate what is the structure of tourists’ shopping behavior, which in turn, affect their travel experience. The purpose of this paper is to study the structure of tourists’ shopping process to better understand their shopping behavior by investigating factors that influence this activity other than hotels tyranny. This study specifically aims to propose a model incorporating those all variables. This empirical study investigates the shopping experience of international tourists using a questionnaire aimed to examine multinational samples selected from the tourist population visiting a specific destination in Egypt. This study highlights the various stakeholders that make tourists do shop independent of hotels. The results, therefore, demonstrate the relationship between the shopping process entities involved and configure the variables within the model in a way that provides a viable solution for visitors to avoid the tyranny of hotel facilities and amenities on the public markets.

Keywords: hotels’ amenities, shopping process, tourist behavior, tourist satisfaction

Procedia PDF Downloads 115
10242 Viscoelastic Behaviour of Hyaluronic Acid Copolymers

Authors: Loredana Elena Nita, Maria Bercea, Aurica P. Chiriac, Iordana Neamtu

Abstract:

The paper is devoted to the behavior of gels based on poly(itaconic anhydride-co-3, 9-divinyl-2, 4, 8, 10-tetraoxaspiro (5.5) undecane) copolymers, with different ratio between the comonomers, and hyaluronic acid (HA). The gel formation was investigated by small-amplitude oscillatory shear measurements following the viscoelastic behavior as a function of gel composition, temperature and shear conditions. Hyaluronic acid was investigated in the same conditions and its rheological behavior is typical to viscous fluids. In the case of the copolymers, the ratio between the two comonomers influences the viscoelastic behavior, a higher content of itaconic anhydride favoring the gel formation. Also, the sol-gel transition was evaluated according to Winter-Chambon criterion that identifies the gelation point when the viscoelastic moduli (G’ and G”) behave similarly as a function of oscillation frequency. From rheological measurements, an optimum composition was evidenced for which the system presents a typical gel-like behavior at 37 °C: the elastic modulus is higher than the viscous modulus and they are not dependent on the oscillation frequency. The formation of the 3D macroporous network was also evidenced by FTIR spectra, SEM microscopy and chemical imaging. These hydrogels present a high potential as drug delivery systems.

Keywords: copolymer, viscoelasticity, gelation, 3D network

Procedia PDF Downloads 273
10241 Self-Disclosure and Suicide

Authors: Netta Horesh Reinman

Abstract:

The inability to communicate feelings and thoughts to people close to oneself may be an important risk factor for suicidal behavior. This inability has been operationalized in the concept of “self-disclosure.” The purpose of this paper was to evaluate the correlation of self-disclosure with suicidal behavior in adolescents. Eighty consecutive admissions to an adolescent psychiatric inpatient unit were evaluated. Thirty-four were suicide attempters, 18 were suicidal ideators, and 18 were non-suicidal. Assessment measures included the Child Suicide Potential Scale, the Suicide Intent Scale, the Suicide Ideation Scale, and the Self-Disclosure Scale. The results show that low self-disclosure levels are associated with suicidal thinking, suicide attempts and suicidal attitudes. Thus, low self-disclosure may well be a risk factor worthy of further evaluation in the attempt to understand adolescent suicidal behavior.

Keywords: self disclosure, suicide, adolescents, treatment

Procedia PDF Downloads 104
10240 Abdominal Organ Segmentation in CT Images Based On Watershed Transform and Mosaic Image

Authors: Belgherbi Aicha, Hadjidj Ismahen, Bessaid Abdelhafid

Abstract:

Accurate Liver, spleen and kidneys segmentation in abdominal CT images is one of the most important steps for computer aided abdominal organs pathology diagnosis. In this paper, we have proposed a new semi-automatic algorithm for Liver, spleen and kidneys area extraction in abdominal CT images. Our proposed method is based on hierarchical segmentation and watershed algorithm. In our approach, a powerful technique has been designed to suppress over-segmentation based on mosaic image and on the computation of the watershed transform. The algorithm is currency in two parts. In the first, we seek to improve the quality of the gradient-mosaic image. In this step, we propose a method for improving the gradient-mosaic image by applying the anisotropic diffusion filter followed by the morphological filters. Thereafter we proceed to the hierarchical segmentation of the liver, spleen and kidney. To validate the segmentation technique proposed, we have tested it on several images. Our segmentation approach is evaluated by comparing our results with the manual segmentation performed by an expert. The experimental results are described in the last part of this work.

Keywords: anisotropic diffusion filter, CT images, morphological filter, mosaic image, multi-abdominal organ segmentation, mosaic image, the watershed algorithm

Procedia PDF Downloads 479
10239 Encryption and Decryption of Nucleic Acid Using Deoxyribonucleic Acid Algorithm

Authors: Iftikhar A. Tayubi, Aabdulrahman Alsubhi, Abdullah Althrwi

Abstract:

The deoxyribonucleic acid text provides a single source of high-quality Cryptography about Deoxyribonucleic acid sequence for structural biologists. We will provide an intuitive, well-organized and user-friendly web interface that allows users to encrypt and decrypt Deoxy Ribonucleic Acid sequence text. It includes complex, securing by using Algorithm to encrypt and decrypt Deoxy Ribonucleic Acid sequence. The utility of this Deoxy Ribonucleic Acid Sequence Text is that, it can provide a user-friendly interface for users to Encrypt and Decrypt store the information about Deoxy Ribonucleic Acid sequence. These interfaces created in this project will satisfy the demands of the scientific community by providing fully encrypt of Deoxy Ribonucleic Acid sequence during this website. We have adopted a methodology by using C# and Active Server Page.NET for programming which is smart and secure. Deoxy Ribonucleic Acid sequence text is a wonderful piece of equipment for encrypting large quantities of data, efficiently. The users can thus navigate from one encoding and store orange text, depending on the field for user’s interest. Algorithm classification allows a user to Protect the deoxy ribonucleic acid sequence from change, whether an alteration or error occurred during the Deoxy Ribonucleic Acid sequence data transfer. It will check the integrity of the Deoxy Ribonucleic Acid sequence data during the access.

Keywords: algorithm, ASP.NET, DNA, encrypt, decrypt

Procedia PDF Downloads 215
10238 Load Balancing and Resource Utilization in Cloud Computing

Authors: Gagandeep Kaur

Abstract:

Cloud computing uses various computing resources such as CPU, memory, processor etc. which is used to deliver service over the network and is one of the emerging fields for large scale distributed computing. In cloud computing, execution of large number of tasks with available resources to achieve high performance, minimal total time for completion, minimum response time, effective utilization of resources etc. are the major research areas. In the proposed research, an algorithm has been proposed to achieve high performance in load balancing and resource utilization. The proposed algorithm is used to reduce the makespan, increase the resource utilization and performance cost for independent tasks. Further scheduling metrics based on algorithm in cloud computing has been proposed.

Keywords: resource utilization, response time, load balancing, performance cost

Procedia PDF Downloads 169
10237 Rodents Control in Poultry Production; Harnessing Conflicting Animal Welfare Interests in Developing Countries

Authors: O. M. Alabi, F. A. Aderemi, M. O. Ayoola

Abstract:

An aspect of biosecurity measures to ensure good welfare for chickens is rodents’ control. Rats and mice are rodents commonly found in poultry houses in most of the African countries. More than 20,000 species of rat have been identified in Africa among which are; Black house rats (Rattus rattus), East African mole rat (Tachyorcytes splendens), Naked mole rat (Heterocephalus glaber), Zambian mole rat (Fukomys mechowii), African grass rat (Arvicanthis niloticus), Nigerian mole rat (Cryptomys foxi), Target rat (Stochomys longicaudatus) and West African Shaggy rat (Dasymis rufulus). Apart from being destructive, rats and mice are voracious in that they compete with chickens for feed and water thereby causing economical losses to the farmer, they are also vectors to many pathogens of poultry diseases such as Salmonellosis, colibacillosis, ascaridiasis, coryza, pasteurellosis and mycoplasmosis. As bad as these rodents are to the poultry farmers, they are good sources of animal protein to local hunters and other farmers in most African countries. Rat is considered a delicacy in Nigeria and many other African countries hence the need to investigate into how the rats species will not go into extinction. Rodents are usually controlled by poultry farmers with the use of rodenticides which can either be anticoagulant or stomach poison, and with the use of baits. However, elimination of rats and mice is being considered as callous act against these species of animal and their natural existence as human food also. This paper therefore suggests that sanitation methods such as feed removal from rats and mice, controlling feed and water spillage, proper disposal of waste eggs, dead birds and garbage, keeping the surroundings of the poultry clean; rodent proofing by making it difficult for rodents to enter the poultry houses are some of the humane ways of controlling rodents in poultry production to avoid improving the welfare of a particular animal at the expense of the other.

Keywords: management, poultry, rodents, welfare

Procedia PDF Downloads 403
10236 A Fast Community Detection Algorithm

Authors: Chung-Yuan Huang, Yu-Hsiang Fu, Chuen-Tsai Sun

Abstract:

Community detection represents an important data-mining tool for analyzing and understanding real-world complex network structures and functions. We believe that at least four criteria determine the appropriateness of a community detection algorithm: (a) it produces useable normalized mutual information (NMI) and modularity results for social networks, (b) it overcomes resolution limitation problems associated with synthetic networks, (c) it produces good NMI results and performance efficiency for Lancichinetti-Fortunato-Radicchi (LFR) benchmark networks, and (d) it produces good modularity and performance efficiency for large-scale real-world complex networks. To our knowledge, no existing community detection algorithm meets all four criteria. In this paper, we describe a simple hierarchical arc-merging (HAM) algorithm that uses network topologies and rule-based arc-merging strategies to identify community structures that satisfy the criteria. We used five well-studied social network datasets and eight sets of LFR benchmark networks to validate the ground-truth community correctness of HAM, eight large-scale real-world complex networks to measure its performance efficiency, and two synthetic networks to determine its susceptibility to resolution limitation problems. Our results indicate that the proposed HAM algorithm is capable of providing satisfactory performance efficiency and that HAM-identified communities were close to ground-truth communities in social and LFR benchmark networks while overcoming resolution limitation problems.

Keywords: complex network, social network, community detection, network hierarchy

Procedia PDF Downloads 208
10235 Fuzzy Logic Control for Flexible Joint Manipulator: An Experimental Implementation

Authors: Sophia Fry, Mahir Irtiza, Alexa Hoffman, Yousef Sardahi

Abstract:

This study presents an intelligent control algorithm for a flexible robotic arm. Fuzzy control is used to control the motion of the arm to maintain the arm tip at the desired position while reducing vibration and increasing the system speed of response. The Fuzzy controller (FC) is based on adding the tip angular position to the arm deflection angle and using their sum as a feedback signal to the control algorithm. This reduces the complexity of the FC in terms of the input variables, number of membership functions, fuzzy rules, and control structure. Also, the design of the fuzzy controller is model-free and uses only our knowledge about the system. To show the efficacy of the FC, the control algorithm is implemented on the flexible joint manipulator (FJM) developed by Quanser. The results show that the proposed control method is effective in terms of response time, overshoot, and vibration amplitude.

Keywords: fuzzy logic control, model-free control, flexible joint manipulators, nonlinear control

Procedia PDF Downloads 81
10234 Digital Watermarking Based on Visual Cryptography and Histogram

Authors: R. Rama Kishore, Sunesh

Abstract:

Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.

Keywords: digital watermarking, visual cryptography, histogram, butter worth filter

Procedia PDF Downloads 342
10233 Indian Road Traffic Flow Analysis Using Blob Tracking from Video Sequences

Authors: Balaji Ganesh Rajagopal, Subramanian Appavu alias Balamurugan, Ayyalraj Midhun Kumar, Krishnan Nallaperumal

Abstract:

Intelligent Transportation System is an Emerging area to solve multiple transportation problems. Several forms of inputs are needed in order to solve ITS problems. Advanced Traveler Information System (ATIS) is a core and important ITS area of this modern era. This involves travel time forecasting, efficient road map analysis and cost based path selection, Detection of the vehicle in the dynamic conditions and Traffic congestion state forecasting. This Article designs and provides an algorithm for traffic data generation which can be used for the above said ATIS application. By inputting the real world traffic situation in the form of video sequences, the algorithm determines the Traffic density in terms of congestion, number of vehicles in a given path which can be fed for various ATIS applications. The Algorithm deduces the key frame from the video sequences and follows the Blob detection, Identification and Tracking using connected components algorithm to determine the correlation between the vehicles moving in the real road scene.

Keywords: traffic transportation, traffic density estimation, blob identification and tracking, relative velocity of vehicles, correlation between vehicles

Procedia PDF Downloads 493
10232 Unhealthy Food Consumption Behavior in Suan Sunandha Rajabhat Universities

Authors: Narumon Piaseu

Abstract:

This survey research was aimed to describe and compare consumption behavior of health risk food among students in Suan Sunandha Rajabhat University. Sample included 400 undergraduate students enrolled in the first semester of 2008 academic year. Data were collected by using self reported questionnaire developed by the researcher. Data were then analyzed by descriptive statistics including frequency, percentage, mean, standard deviation, and inferential statistics including independent t-test, and Oneway ANOVA. Results revealed that most of the sample were women (67%), enrolled in social related programs (74%). Approximately half of them (45.5%) stayed in dormitory. The mean of monthly income was 5,164 Baht and daily food expenditure was 114.55 Baht. Majority of them (83%) had ready-to-eat food. A major factor influencing their food selection was their parents (61%). A main reason for their food selection was food that looks good (70.75%). Almost half of them (46.25%) had heavy exercise less than 3 times per week. Regarding knowledge on health risk food, 43.5% of the sample had good knowledge. The followings were moderate (41%) and poor (41%). Most of the sample (60.75%) had consumption behavior at low risk. The following was at moderate risk (37.25%). Only 2% were at high risk. Among the sample, consumption behavior of health risk food were significantly different in years of study (F = 3.168, p = .024), daily food expenditure (F = 8.950, p <.001), and knowledge on health risk food (F = 37.856, p <.001), while no significant difference in consumption behavior of health risk food was found in those with a difference in gender, program of study, living place, and monthly income. Results indicate the importance of providing knowledge regarding health risk food for students and their parents in order to promote appropriate food consumption behavior among the students.

Keywords: food consumption, risky behavior, Suan Sunandha Rajabhat University, health risk

Procedia PDF Downloads 459
10231 Assessment of Image Databases Used for Human Skin Detection Methods

Authors: Saleh Alshehri

Abstract:

Human skin detection is a vital step in many applications. Some of the applications are critical especially those related to security. This leverages the importance of a high-performance detection algorithm. To validate the accuracy of the algorithm, image databases are usually used. However, the suitability of these image databases is still questionable. It is suggested that the suitability can be measured mainly by the span the database covers of the color space. This research investigates the validity of three famous image databases.

Keywords: image databases, image processing, pattern recognition, neural networks

Procedia PDF Downloads 248
10230 Scheduling Nodes Activity and Data Communication for Target Tracking in Wireless Sensor Networks

Authors: AmirHossein Mohajerzadeh, Mohammad Alishahi, Saeed Aslishahi, Mohsen Zabihi

Abstract:

In this paper, we consider sensor nodes with the capability of measuring the bearings (relative angle to the target). We use geometric methods to select a set of observer nodes which are responsible for collecting data from the target. Considering the characteristics of target tracking applications, it is clear that significant numbers of sensor nodes are usually inactive. Therefore, in order to minimize the total network energy consumption, a set of sensor nodes, called sentinel, is periodically selected for monitoring, controlling the environment and transmitting data through the network. The other nodes are inactive. Furthermore, the proposed algorithm provides a joint scheduling and routing algorithm to transmit data between network nodes and the fusion center (FC) in which not only provides an efficient way to estimate the target position but also provides an efficient target tracking. Performance evaluation confirms the superiority of the proposed algorithm.

Keywords: coverage, routing, scheduling, target tracking, wireless sensor networks

Procedia PDF Downloads 365
10229 FEM Study of Different Methods of Fiber Reinforcement Polymer Strengthening of a High Strength Concrete Beam-Column Connection

Authors: Talebi Aliasghar, Ebrahimpour Komeleh Hooman, Maghsoudi Ali Akbar

Abstract:

In reinforced concrete (RC) structures, beam-column connection region has a considerable effect on the behavior of structures. Using fiber reinforcement polymer (FRP) for the strengthening of connections in RC structures can be one of the solutions to retrofitting this zone which result in the enhanced behavior of structure. In this paper, these changes in behavior by using FRP for high strength concrete beam-column connection have been studied by finite element modeling. The concrete damage plasticity (CDP) model has been used to analyze the RC. The results illustrated a considerable development in load-bearing capacity but also a noticeable reduction in ductility. The study also assesses these qualities for several modes of strengthening and suggests the most effective mode of strengthening. Using FRP in flexural zone and FRP with 45-degree oriented fibers in shear zone of joint showed the most significant change in behavior.

Keywords: HSC, beam-column connection, Fiber Reinforcement Polymer, FRP, Finite Element Modeling, FEM

Procedia PDF Downloads 138
10228 The Good, the Bad and the Ugly in E-Procurement: A Case Study of Agricultural Company in Vietnam

Authors: D. T. Tran, H. P. Tran, L. G. Hoang, V. N. H. Bui, Q. T. Nguyen, A. K. Das

Abstract:

This paper provides some insight information about a current situation of e-procurement implementation in Vietnam, including opportunities and challenges. A case study of Phuc Thien Company which is classified as a medium enterprise in the country, specialising on animal feed production. Since the technological development rapidly changes, companies have implemented advanced technologies in supply chain management to increase efficiency and gain collaboration amidst partners in their manufacturing and development activities. The findings of this research reveal strengths and ongoing weaknesses when Phuc Thien company internally implemented eProcurement system. Although cost savings, visibility of payment and speedy procurement process are one of the largest benefits of eProcurement implementation, the company faces greater hurdles, such as employee capability to use technology and their resistance to change, that overshadow everything else. In terms of governmental policy, the adaptation of e-invoicing has commenced since June 2015 in Vietnam, legal regulations and administrative framework related to e-Procurement carries various ambiguous in its content and extremely fragment. Hence, this adds a great burden to enterprises in general and Phuc Thien in particular in view of creating higher competitive advantage for animal feed industry in Vietnam as well as South East Asia region.

Keywords: procurement, e-procurement, animal feed industry, efficiency

Procedia PDF Downloads 308
10227 Applications of Social Marketing in Road Safety of Georgia

Authors: Charita Jashi

Abstract:

The aim of the paper is to explore the role of social marketing in changing the behavior of consumers on road safety, identify critical aspects and priority needs which impede the implementation of road safety program in Georgia. Given the goals of the study, a quantitative method was used to carry out interviews for primary data collection. This research identified the awareness level of road safety, legislation base, and marketing interventions to change behavior of drivers and pedestrians. During several years the non-governmental sector together with the local authorities and media have been very intensively working on the road safety issue in Georgia, but only seat-belts campaign should be considered rather successful. Despite achievements in this field, efficiency of road safety programs far from fulfillment and needs strong empowering.

Keywords: road safety, social marketing interventions, behavior change, well-being

Procedia PDF Downloads 179
10226 Transgression, Resistance and Independent Art in Russia

Authors: Oxana Vasilyeva

Abstract:

This paper draws on research in progress focusing on independent art in the Russian Federation. I am using the concept of independent art to mean art free from state control and established restrictive narratives. The Russian state pursues its interests by supporting or forbidding certain forms of art, and art that promotes values in opposition to the official political course is often forbidden. Arguments presented below draw from fieldwork carried out in Russian cities of Moscow and Saint Petersburg in June – August 2019, which included in-depth interviews with artists. This research explores socially engaged artistic works and their effect on socio-political state of affairs. It argues that artistic works entering public places have a potential to challenge autocratic system and inspire civil society to be critically engaged and to be capable to resist state propaganda. I am focusing on those artists who have a critical stance towards the current Russian political regime and analyzing their works in terms of transgression. By using the framework of transgression I aim to demonstrate how artists step across existing norms with their art influencing political and social order. To show the connection between the factors mentioned above, I will turn to two examples of transgressive aesthetics; one is individual and another is collective. The first example is Konstantin Benkovich, an artist who makes his works out of steel rebar, which is considered to be a symbol of the lack of freedom, as it is usually encountered in prison settings. The second example is a collective art practice called Monstration. It combines techniques of a demonstration and a carnival atmosphere. In 2019 Monstration was held in 30 Russian cities, despite the dissatisfaction of the authorities.

Keywords: art, culture, resistance, Russia

Procedia PDF Downloads 109
10225 Individualism/Collectivism and Extended Theory of Planned Behavior

Authors: Ela Ari, Aysi̇ma Findikoglu

Abstract:

Consumers’ switching GSM operators’ has been an important research issue since the rise of their competitive offers. Recent research has looked at consumer switching behavior through the theory of planned behavior, but not yet extended the theory with identity, psycho-social and cultural influences within the service context. This research explores an extended version of the theory of planned behavior including social and financial risks and brand loyalty. Moreover, the role of individualism and collectivism at the individual level is investigated in a collectivistic culture that moves toward to individualism due to changing family relationships, use of technology and education. Our preliminary analysis showed that financial risk and vertical individualism prove to be a significant determinant of intention to switch. The study also investigates social risk and intention, subjective norm, perceived behavioral control relationship. The effect of individualism and collectivism and attitudes relationship has been also examined within a service industry. Implications for marketing managers and scholars are also discussed.

Keywords: attitude, individualism, intention, subjective norm

Procedia PDF Downloads 436
10224 Change in Food Choice Behavior: Trend and Challenges

Authors: Gargi S. Kumar, Mrinmoyi Kulkarni

Abstract:

Food choice behavior is complex and determined by biological, psychological, socio-cultural, and economic factors. The past two decades, have seen dramatic changes in food consumption patterns among urban Indian consumers. The objective of the current study was to evaluate perceptions about changes with respect to food choice behavior. Ten participants [urban men and women] ranging in age from 40 to 65 were selected and in-depth interviews were conducted with a set of open ended questions. The recorded interviews were transcribed and thematically analyzed using inductive, open and axial coding. The results identified themes that act as drivers and consequences of change in food choice behavior. Drivers such as globalization [sub themes of urbanization, education, income, and work environment], media and advertising, changing gender roles, women in the workforce, and change in family structure have influenced food choice, both at an individual and national level. The consequences of changes in food choice were health implications, processed food consumption, food decisions driven by children and eating out among others. The study reveals that, over time, food choices change and evolve. However it is interesting to note how market forces and culture interact to influence individual behavior and the overall food environment which subsequently affects food choice and the health of the people.

Keywords: change, consequences, drivers, food choice, globalization

Procedia PDF Downloads 212
10223 Crow Search Algorithm-Based Task Offloading Strategies for Fog Computing Architectures

Authors: Aniket Ganvir, Ritarani Sahu, Suchismita Chinara

Abstract:

The rapid digitization of various aspects of life is leading to the creation of smart IoT ecosystems, where interconnected devices generate significant amounts of valuable data. However, these IoT devices face constraints such as limited computational resources and bandwidth. Cloud computing emerges as a solution by offering ample resources for offloading tasks efficiently despite introducing latency issues, especially for time-sensitive applications like fog computing. Fog computing (FC) addresses latency concerns by bringing computation and storage closer to the network edge, minimizing data travel distance, and enhancing efficiency. Offloading tasks to fog nodes or the cloud can conserve energy and extend IoT device lifespan. The offloading process is intricate, with tasks categorized as full or partial, and its optimization presents an NP-hard problem. Traditional greedy search methods struggle to address the complexity of task offloading efficiently. To overcome this, the efficient crow search algorithm (ECSA) has been proposed as a meta-heuristic optimization algorithm. ECSA aims to effectively optimize computation offloading, providing solutions to this challenging problem.

Keywords: IoT, fog computing, task offloading, efficient crow search algorithm

Procedia PDF Downloads 31
10222 A Design of Elliptic Curve Cryptography Processor based on SM2 over GF(p)

Authors: Shiji Hu, Lei Li, Wanting Zhou, DaoHong Yang

Abstract:

The data encryption, is the foundation of today’s communication. On this basis, how to improve the speed of data encryption and decryption is always a problem that scholars work for. In this paper, we proposed an elliptic curve crypto processor architecture based on SM2 prime field. In terms of hardware implementation, we optimized the algorithms in different stages of the structure. In finite field modulo operation, we proposed an optimized improvement of Karatsuba-Ofman multiplication algorithm, and shorten the critical path through pipeline structure in the algorithm implementation. Based on SM2 recommended prime field, a fast modular reduction algorithm is used to reduce 512-bit wide data obtained from the multiplication unit. The radix-4 extended Euclidean algorithm was used to realize the conversion between affine coordinate system and Jacobi projective coordinate system. In the parallel scheduling of point operations on elliptic curves, we proposed a three-level parallel structure of point addition and point double based on the Jacobian projective coordinate system. Combined with the scalar multiplication algorithm, we added mutual pre-operation to the point addition and double point operation to improve the efficiency of the scalar point multiplication. The proposed ECC hardware architecture was verified and implemented on Xilinx Virtex-7 and ZYNQ-7 platforms, and each 256-bit scalar multiplication operation took 0.275ms. The performance for handling scalar multiplication is 32 times that of CPU(dual-core ARM Cortex-A9).

Keywords: Elliptic curve cryptosystems, SM2, modular multiplication, point multiplication.

Procedia PDF Downloads 76
10221 Exploring Gen Z Consumers’ Behavior Towards Sustainable Fashion

Authors: Lilia Righi

Abstract:

Recently, the fashion industry has demonstrated a keen interest in sustainability and the environment. Sustainable fashion has huge potential and appeals to environmentally conscious Generation Z shoppers. Meanwhile, Generation Z customers have attracted researchers' interest due to their overconsumption of clothing. However, most studies in this area focus on designing or producing sustainable clothing, with little exploration of consumers. To fill this gap, the present study aims to determine the important factors influencing Generation Z consumers' decisions to purchase sustainable fashion by mobilizing the theory of planned behavior (TPB). It uses deductive qualitative research based on 18 semi-structured interviews with Generation Z consumers in France. Qualitative data will be analyzed using reflective thematic analysis. On a theoretical level, this research contributes to enriching the literature by mobilizing, for the first time, the theory of planned behavior in the context of sustainable fashion. On a practical level, the results can help practitioners determine effective marketing strategies to persuade Generation Z to consume sustainable clothing.

Keywords: generation Z, qualitative methodology, sustainable fashion, theory of planned behavior (TPB).

Procedia PDF Downloads 16
10220 Estimation of Transition and Emission Probabilities

Authors: Aakansha Gupta, Neha Vadnere, Tapasvi Soni, M. Anbarsi

Abstract:

Protein secondary structure prediction is one of the most important goals pursued by bioinformatics and theoretical chemistry; it is highly important in medicine and biotechnology. Some aspects of protein functions and genome analysis can be predicted by secondary structure prediction. This is used to help annotate sequences, classify proteins, identify domains, and recognize functional motifs. In this paper, we represent protein secondary structure as a mathematical model. To extract and predict the protein secondary structure from the primary structure, we require a set of parameters. Any constants appearing in the model are specified by these parameters, which also provide a mechanism for efficient and accurate use of data. To estimate these model parameters there are many algorithms out of which the most popular one is the EM algorithm or called the Expectation Maximization Algorithm. These model parameters are estimated with the use of protein datasets like RS126 by using the Bayesian Probabilistic method (data set being categorical). This paper can then be extended into comparing the efficiency of EM algorithm to the other algorithms for estimating the model parameters, which will in turn lead to an efficient component for the Protein Secondary Structure Prediction. Further this paper provides a scope to use these parameters for predicting secondary structure of proteins using machine learning techniques like neural networks and fuzzy logic. The ultimate objective will be to obtain greater accuracy better than the previously achieved.

Keywords: model parameters, expectation maximization algorithm, protein secondary structure prediction, bioinformatics

Procedia PDF Downloads 460