Search results for: word cloud
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1419

Search results for: word cloud

369 Study of Knowledge, Attitudes and Practices of Menstrual Hygiene of Adolescent Girls Aged 12 to 19 Years Old in Secondary School

Authors: Jean Marie Vianney Ininahazwe, Patrick Bitangumutwenzi

Abstract:

Context: The issue of menstrual hygiene is an entry point for demonstrating the gender-specific nature of the needs of women and adolescent girls. Women and girls around the world face many challenges in managing their periods. They may be deprived of certain basic human rights, including those relating to education, work and health. This work describes the Knowledge, Attitudes and Practices of menstrual hygiene among adolescent girls from 12 to 19 years at Lake Tanganyika Secondary School. Method: This is a descriptive cross-sectional study among 384 adolescent girls from Lake Tanganyika secondary school over a period of 2 weeks from September 13 to September 27 and with a purely general objective of describing the Knowledge, Attitudes and Practices of menstrual hygiene in secondary schools. The study was conducted using a non-probability method and the sampling technique was for convenience. The data collection technique used was the survey by questionnaire and the exploitation of the documentary. The data collection tool used was the questionnaire. Microsoft Word 2013, Microsoft Excel 2.13 and EPI INFO7 software were used for this purpose. Results: We noticed that 55.47% of the participants knew that menstruation is a physiological process; 57.55% of the teenage girls surveyed get their information about menstrual hygiene from their mothers; 75.72% use sanitary napkins and 24.02% use fabrics as protective material; 35.16% of respondents have already lacked sanitary napkins since their menarche; 37.29% are absent from classes due to lack of sanitary napkins; 23.82% use soap and other products to wash.

Keywords: knowledge, attitudes, practices, menstrual hygiene

Procedia PDF Downloads 48
368 Inappropriate Antibiotic Use: An Online Survey in Thailand

Authors: Surarong Chinwong, Namthip Intarakumhang Na Rachasima, Siyaporn Kuikhiew, Dujrudee Chinwong

Abstract:

Irrational use of medicines is a major problem in public health. Half of all patients take medicines incorrectly. An inappropriate use of antibiotics is one of the common types of irrational medicine use; for example, patients use antibiotic for treatment of common cold or diarrhea. Objectives: This cross-sectional study aimed to investigate the behaviors on antibiotic use, using amoxicillin and norfloxacin as examples, as well as sources of received health information. Methods: An online self-administered questionnaire was used to collect data from participants in Thailand between September and December 2015. Participants were asked about their behaviors on antibiotic use. Data were analyzed using descriptive statistics. Results: Of all 405 participants, most were female (65.3 %), aged 18-30 years (49.4 %), undergraduate or lower (69.7%), and civil servant or state enterprises (31.7 %). We found inappropriate behaviors in use of amoxicillin or norfloxacin: 1) there were 201/400 participants (50.3%) taking amoxicillin right away in case of having a common cold, such as having sore throat, running nose, and cough; 2) there were 170/405 participants (42.0%) using amoxicillin for relieving inflammatory symptoms, e.g. muscle inflammation or osteoarthritis; 3) there were 71/398 participants (17.8%) using amoxicillin as a muscle relaxant; 4) there were 135/398 participants (33.9%) using norfloxacin for treating diarrhea. Sources of health information received by the participants were from the internet (78.5%), the radio and/or television (42.2%), advertising publishing (33.3 %), and word of mouth (30.1%). Conclusion: This study showed improper behaviors in antibiotic use especially amoxicillin and norfloxacin. Health care providers including pharmacists should raise the public awareness on dangers of inappropriate antibiotic use and promote the rational use of antibiotics.

Keywords: antibiotic use, amoxicillin, norfloxacin, rational drug use

Procedia PDF Downloads 253
367 Object Oriented Fault Tree Analysis Methodology

Authors: Yi Xiong, Tao Kong

Abstract:

Traditional safety, risk and reliability analysis approaches are problem-oriented, which make it great workload when analyzing complicated and huge system, besides, too much repetitive work would to do if the analyzed system composed by many similar components. It is pressing need an object and function oriented approach to maintain high consistency with problem domain. A new approach is proposed to overcome these shortcomings of traditional approaches, the concepts: class, abstract, inheritance, polymorphism and encapsulation are introduced into FTA and establish the professional class library that the abstractions of physical objects in real word, four areas relevant information also be proposed as the establish help guide. The interaction between classes is completed by the inside or external methods that mapping the attributes to base events through fully search the knowledge base, which forms good encapsulation. The object oriented fault tree analysis system that analyze and evaluate the system safety and reliability according to the original appearance of the problem is set up, where could mapped directly from the class and object to the problem domain of the fault tree analysis. All the system failure situations can be analyzed through this bottom-up fault tree construction approach. Under this approach architecture, FTA approach is developed, which avoids the human influence of the analyst on analysis results. It reveals the inherent safety problems of analyzed system itself and provides a new way of thinking and development for safety analysis. So that object oriented technology in the field of safety applications and development, safety theory is conducive to innovation.

Keywords: FTA, knowledge base, object-oriented technology, reliability analysis

Procedia PDF Downloads 232
366 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 212
365 Oneness of Scriptures and Oneness of God

Authors: Shyam Sunder Gupta

Abstract:

GOD is an infinite source of knowledge. From time to time, as per the need of mankind, GOD keeps revealing, some small, selected part of HIS knowledge as WORDS, to a chosen entity whose responsibility is to function as Messenger and share WORDS, in the form of verses, with common masses. GOD has confirmed that Messenger may not understand every WORD revealed to him, and HE directs Messenger to learn from persons who have knowledge of WORDS revealed in earlier times, as some revealed content is identical and some different by design. In due course of time, Verses, as communicated orally, are collected, and edited by an individual in a planned manner or by a group of individuals and get edited unintentionally and converted in the form of Scripture. Whatever gets collected, depending on the knowledge of the Editor(s), some errors, scientific and other forms, get into Scripture. In the present world, there are three major religions: Christianity, Islam and Hinduism, accounting for more than two-thirds of the world’s population. Each of the religions has its own Scripture, namely the Bible, Quran, and Veda. Since the source of WORDS for each of these Scriptures is the same, there is ONENESS of all Scriptures. There are amazing similarities between the events described, like the flood during the time of Noah and King Satyavara. The description of the creation of man and woman is identical. Description of Last Day, categorization of human beings, identical names, etc., have remarkable similarities. Ram, the hero of Ramayana, is a common name in Hinduism and two of Jesus’ ancestors’ names were Ram and many names in the Bible are derived from Ram. Attributes of GOD are common in all Scriptures, namely, GOD is Eternal, Unborn, Immortal, Creator of Universe(s) and everything that exists within the Universe, Omnipotent, Omnipresent, Omniscient, Subtlest of all, Unchangeable, Unique, Always Works, Source of Eternal Bliss, etc. There is the Oneness of GOD.

Keywords: GOD, scriptures, oneness, WORDS, Jesus, Ram

Procedia PDF Downloads 47
364 Knowledge, Attitudes and Practices of Menstrual Hygiene of Adolescent Girls Aged 12 to 19 Years Old at Lake Tanganyika Lycee

Authors: Yvette Nsabimana, Nadine Misago, Minani Methode

Abstract:

Context: the issue of menstrual hygiene is an entry point for demonstrating the gender-specific nature of the needs of women and adolescent girls. Women and girls around the world face many challenges in managing their periods. They may be deprived of certain basic human rights, including those relating to education, work and health. This work describes the Knowledge, Attitudes and Practices of menstrual hygiene among adolescent girls from 12 to 19 years of Lake Tanganyika Secondary School. Method: This is a descriptive cross-sectional study among 384 adolescent girls from Lake Tanganyika secondary school over a period of 2 weeks from September 13 to September 27 and with a purely general objective of describing the Knowledge, Attitudes and Practices of menstrual hygiene in secondary schools. The study was conducted using a non-probability method and the sampling technique was for convenience. The data collection technique used was the survey by questionnaire and the exploitation of the documentary. The data collection tool used was the questionnaire. Microsoft Word 2013, Microsoft Excel 2.13 and EPI INFO7 software were used for this purpose. Results: We noticed that 55.47% of the participants knew that menstruation is a physiological process; 57.55% of the teenage girls surveyed get their information about menstrual hygiene from their mothers; 75.72% use sanitary napkins and 24.02% use fabrics as protective material; 35.16% of respondents have already lacked sanitary napkins since their menarche; 37.29% are absent from classes due to lack of sanitary napkins; 23.82% use soap and other products to wash.

Keywords: knowledge, attitudes, practices, menstrual hygiene

Procedia PDF Downloads 51
363 Design of Effective Decoupling Point in Build-To-Order Systems: Focusing on Trade-Off Relation between Order-To-Delivery Lead Time and Work in Progress

Authors: Zhiyong Li, Hiroshi Katayama

Abstract:

Since 1990s, e-commerce and internet business have been grown gradually over the word and customers tend to express their demand attributes in terms of specification requirement on parts, component, product structure etc. This paper deals with designing effective decoupling points for build to order systems under e-commerce environment, which can be realized through tradeoff relation analysis between two major criteria, customer order lead time and value of work in progress. These KPIs are critical for successful BTO business, namely time-based service effectiveness on coping with customer requirements for the first issue and cost effective ness with risk aversive operations for the second issue. Approach of this paper consists of investigation of successful business standing for BTO scheme, manufacturing model development of this scheme, quantitative evaluation of proposed models by calculation of two KPI values under various decoupling point distributions and discussion of the results brought by pattern of decoupling point distribution, where some cases provide the pareto optimum performances. To extract the relevant trade-off relation between considered KPIs among 2-dimensional resultant performance, useful logic developed by former research work, i.e. Katayama and Fonseca, is applied. Obtained characteristics are evaluated as effective information for managing BTO manufacturing businesses.

Keywords: build-to-order (BTO), decoupling point, e-commerce, order-to-delivery lead time (ODLT), work in progress (WIP)

Procedia PDF Downloads 302
362 Moral Identity and Moral Attentiveness as Predictors of Ethical Leadership in Financial Sector

Authors: Pilar Gamarra Gamarra, Michele Girotto

Abstract:

In the expanding field of leaders’ ethical behavior research, little attention has been paid to the association between finance leaders’ ethical traits (beyond personality) and ethical leadership, and more importantly, how these ethical characteristics can be predictors of ethical behavior at the leadership level in the financial sector. In this study, we tested a theoretical model based on uponsocial cognitive theory (Bandura, 1986) and the cognitive-developmental model (Piaget, 1932) to examine leaders’ moral identity and moral attentiveness as antecedents of ethical leadership. After the 2008 economic crisis, the marketplace has awakened to the potential dangers of unethical behavior. The unethical behavior of the leaders of the financial sector was identified as guilty of this economic catastrophe. For that reason, it seems increasingly prudent for organizations to have leaders who are cognitively inclined toward ethical behavior. This evidence suggests that moral attentiveness and moral identity is perhaps one way of identifying those kinds of leaders. For leaders who are morally attentive and have a high moral identity, themes of ethics interventions are consistent with their way of seeing the word. As a result, these leaders could become critical components of change in organizations and could provide the energy and skills necessary for these efforts to be successful. Ethical behavior of leader from the financial sector and marketing sectors must be joined to manage the change. In this study, a leader’s moral identity, leader’s moral attentiveness, and self-importance of Ethical Leadership are measured for financial and marketing leaders to be compared to determine the relationship between the three variables in each sector. Other conclusion related to gender, educational level or generation are obtained.

Keywords: ethical leadership, moral identity, moral attentiveness, financial leaders, marketing leaders, ethical behavior

Procedia PDF Downloads 153
361 Chatbots as Language Teaching Tools for L2 English Learners

Authors: Feiying Wu

Abstract:

Chatbots are computer programs that attempt to engage a human in a dialogue, which originated in the 1960s with MIT's Eliza. However, they have become widespread more recently as advances in language technology have produced chatbots with increasing linguistic quality and sophistication, leading to their potential to serve as a tool for Computer-Assisted Language Learning(CALL). The aim of this article is to assess the feasibility of using two chatbots, Mitsuku and CleverBot, as pedagogical tools for learning English as a second language by stimulating L2 learners with distinct English proficiencies. Speaking of the input of stimulated learners, they are measured by AntWordProfiler to match the user's expected vocabulary proficiency. Totally, there are four chat sessions as each chatbot will converse with both beginners and advanced learners. For evaluation, it focuses on chatbots' responses from a linguistic standpoint, encompassing vocabulary and sentence levels. The vocabulary level is determined by the vocabulary range and the reaction to misspelled words. Grammatical accuracy and responsiveness to poorly formed sentences are assessed for the sentence level. In addition, the assessment of this essay sets 25% lexical and grammatical incorrect input to determine chatbots' corrective ability towards different linguistic forms. Based on statistical evidence and illustration of examples, despite the small sample size, neither Mitsuku nor CleverBot is ideal as educational tools based on their performance through word range, grammatical accuracy, topic range, and corrective feedback for incorrect words and sentences, but rather as a conversational tool for beginners of L2 English.

Keywords: chatbots, CALL, L2, corrective feedback

Procedia PDF Downloads 60
360 Fashion, Art and Culture in the Anthropological Management Model

Authors: Lucia Perez, Maria Gaton y Santa Palella

Abstract:

Starting from the etymology of the word culture, the Latin term ‘colere’, whose meaning is to cultivate, we understand that the society that cultivates its knowledge is laying the foundations for new possibilities. In this sense, art and fashion contain the same attributes: concept, aesthetic principles, and refined techniques. Both play a crucial role, communication, and this implies a sense of community, relationship with tradition, and innovation. This is the mirror in which to contemplate, but also the space that helps to grow. This is the framework where our object of study opens up: the anthropological management or the mission management model applied to fashion exhibitions in museums and cultural institutions. For this purpose, a bibliographic review has been carried out with its subsequent analysis, a case study of three successful exhibitions: ‘Christian Dior: designer of dreams’, ‘Balenciaga and the Spanish painting’, and ‘China: Through the Looking Glass’. The methodology has been completed with interviews focused on the curators. Amongst the results obtained, it is worth highlighting the fundamental role of transcendent leadership, which, in addition to being results-oriented, must align the motivations of the collaborators with the mission. The anthropological management model conceives management as a service, and it is oriented to the interests of the staff and the public, in short, of the person; this is what enables the objectives of effectiveness, efficiency, and social value to be achieved; dimensions, all necessary for the proper development of the mission of the exhibitions. Fashion, understood as art, is at the service of culture, and therefore of the human being, which defines a transcendent mission. We conclude that the profile of an anthropological management model applied to fashion exhibitions in museums is the ideal one to achieve the purpose of these institutions.

Keywords: art, culture, fashion, anthropological model, fashion exhibitions

Procedia PDF Downloads 85
359 Low-Cost Parking Lot Mapping and Localization for Home Zone Parking Pilot

Authors: Hongbo Zhang, Xinlu Tang, Jiangwei Li, Chi Yan

Abstract:

Home zone parking pilot (HPP) is a fast-growing segment in low-speed autonomous driving applications. It requires the car automatically cruise around a parking lot and park itself in a range of up to 100 meters inside a recurrent home/office parking lot, which requires precise parking lot mapping and localization solution. Although Lidar is ideal for SLAM, the car OEMs favor a low-cost fish-eye camera based visual SLAM approach. Recent approaches have employed segmentation models to extract semantic features and improve mapping accuracy, but these AI models are memory unfriendly and computationally expensive, making deploying on embedded ADAS systems difficult. To address this issue, we proposed a new method that utilizes object detection models to extract robust and accurate parking lot features. The proposed method could reduce computational costs while maintaining high accuracy. Once combined with vehicles’ wheel-pulse information, the system could construct maps and locate the vehicle in real-time. This article will discuss in detail (1) the fish-eye based Around View Monitoring (AVM) with transparent chassis images as the inputs, (2) an Object Detection (OD) based feature point extraction algorithm to generate point cloud, (3) a low computational parking lot mapping algorithm and (4) the real-time localization algorithm. At last, we will demonstrate the experiment results with an embedded ADAS system installed on a real car in the underground parking lot.

Keywords: ADAS, home zone parking pilot, object detection, visual SLAM

Procedia PDF Downloads 48
358 Mobile Crowdsensing Scheme by Predicting Vehicle Mobility Using Deep Learning Algorithm

Authors: Monojit Manna, Arpan Adhikary

Abstract:

In Mobile cloud sensing across the globe, an emerging paradigm is selected by the user to compute sensing tasks. In urban cities current days, Mobile vehicles are adapted to perform the task of data sensing and data collection for universality and mobility. In this work, we focused on the optimality and mobile nodes that can be selected in order to collect the maximum amount of data from urban areas and fulfill the required data in the future period within a couple of minutes. We map out the requirement of the vehicle to configure the maximum data optimization problem and budget. The Application implementation is basically set up to generalize a realistic online platform in which real-time vehicles are moving apparently in a continuous manner. The data center has the authority to select a set of vehicles immediately. A deep learning-based scheme with the help of mobile vehicles (DLMV) will be proposed to collect sensing data from the urban environment. From the future time perspective, this work proposed a deep learning-based offline algorithm to predict mobility. Therefore, we proposed a greedy approach applying an online algorithm step into a subset of vehicles for an NP-complete problem with a limited budget. Real dataset experimental extensive evaluations are conducted for the real mobility dataset in Rome. The result of the experiment not only fulfills the efficiency of our proposed solution but also proves the validity of DLMV and improves the quantity of collecting the sensing data compared with other algorithms.

Keywords: mobile crowdsensing, deep learning, vehicle recruitment, sensing coverage, data collection

Procedia PDF Downloads 56
357 Space Debris: An Environmental Hazard

Authors: Anwesha Pathak

Abstract:

Space law refers to all legal provisions that may regulate or apply to space travel, as well as to space-related activity. Although there is undoubtedly a core corpus of “space law,” rather than designating a conceptually distinct single kind of law, the phrase can be seen as a label applied to a bucket that includes a variety of different laws and regulations. Similar to ‘family law' or ‘environmental law' "space law" refers to a variety of laws that are identified by the subject matter they address rather than by the logical extension of a single legal concept. The word "space law" refers to the Law of Space, which can cover anything from the specifics of an insurance agreement for a specific space launch to the most general guidelines that direct state behaviour in space. Space debris, often referred to as space junk, space pollution, space waste, space trash, or space garbage, is a term used to describe abandoned human-made objects in space, primarily in Earth orbit. These include disused spacecraft, discarded launch vehicle stages, mission-related detritus, and fragmentation material from the destruction of disused rocket bodies and spacecraft, which is particularly prevalent in Earth orbit. Other types of space debris, besides abandoned human-made objects in orbit, include pieces left over from collisions, erosion, and disintegration, or even paint specks, solidified liquids ejected from spacecraft, and unburned components from solid rocket engines. The initial action of launching or using a spacecraft in near-Earth orbit imposes an external cost on others that is typically not taken into account or fully accounted for in the cost by the launcher or payload owner.

Keywords: space, outer space treaty, geostationary orbit, satellites, spacecrafts

Procedia PDF Downloads 67
356 Multiscale Hub: An Open-Source Framework for Practical Atomistic-To-Continuum Coupling

Authors: Masoud Safdari, Jacob Fish

Abstract:

Despite vast amount of existing theoretical knowledge, the implementation of a universal multiscale modeling, analysis, and simulation software framework remains challenging. Existing multiscale software and solutions are often domain-specific, closed-source and mandate a high-level of experience and skills in both multiscale analysis and programming. Furthermore, tools currently existing for Atomistic-to-Continuum (AtC) multiscaling are developed with the assumptions such as accessibility of high-performance computing facilities to the users. These issues mentioned plus many other challenges have reduced the adoption of multiscale in academia and especially industry. In the current work, we introduce Multiscale Hub (MsHub), an effort towards making AtC more accessible through cloud services. As a joint effort between academia and industry, MsHub provides a universal web-enabled framework for practical multiscaling. Developed on top of universally acclaimed scientific programming language Python, the package currently provides an open-source, comprehensive, easy-to-use framework for AtC coupling. MsHub offers an easy to use interface to prominent molecular dynamics and multiphysics continuum mechanics packages such as LAMMPS and MFEM (a free, lightweight, scalable C++ library for finite element methods). In this work, we first report on the design philosophy of MsHub, challenges identified and issues faced regarding its implementation. MsHub takes the advantage of a comprehensive set of tools and algorithms developed for AtC that can be used for a variety of governing physics. We then briefly report key AtC algorithms implemented in MsHub. Finally, we conclude with a few examples illustrating the capabilities of the package and its future directions.

Keywords: atomistic, continuum, coupling, multiscale

Procedia PDF Downloads 159
355 Customer Satisfaction with Artificial Intelligence-Based Service in Catering Industry: Empirical Study on Smart Kiosks

Authors: Mai Anh Tuan, Wenlong Liu, Meng Li

Abstract:

Despite warnings and concerns about the use of fast food that has health effects, the fast-food industry is actually a source of profit for the global food industry. Obviously, in the face of such huge economic benefits, investors will not hesitate to continuously add recipes, processing methods, menu diversity, etc., to improve and apply information technology in enhancing the diners' experience; the ultimate goal is still to attract diners to find their brand and give them the fastest, most convenient and enjoyable service. In China, as the achievements of the industrial revolution 4.0, big data and artificial intelligence are reaching new heights day by day, now fast-food diners can instantly pay the bills only by identifying the biometric signature available on the self-ordering kiosk, using their own face without any additional form of confirmation. In this study, the author will evaluate the acceptance level of customers with this new form of payment through a survey of customers who have used and witnessed the use of smart kiosks and biometric payments within the city of Nanjing, China. A total of 200 valid volunteers were collected in order to test the customers' intentions and feelings when choosing and experiencing payment through AI services. 55% think that it bothers them because of the need for personal information, but more than 70% think that smart kiosk brings out many benefits and convenience. According to the data analysis findings, perceived innovativeness has a positive influence on satisfaction which in turn affects behavioral intentions, including reuse and word-of-mouth intentions.

Keywords: artificial intelligence, catering industry, smart kiosks, technology acceptance

Procedia PDF Downloads 77
354 The Analysis of Deceptive and Truthful Speech: A Computational Linguistic Based Method

Authors: Seham El Kareh, Miramar Etman

Abstract:

Recently, detecting liars and extracting features which distinguish them from truth-tellers have been the focus of a wide range of disciplines. To the author’s best knowledge, most of the work has been done on facial expressions and body gestures but only few works have been done on the language used by both liars and truth-tellers. This paper sheds light on four axes. The first axis copes with building an audio corpus for deceptive and truthful speech for Egyptian Arabic speakers. The second axis focuses on examining the human perception of lies and proving our need for computational linguistic-based methods to extract features which characterize truthful and deceptive speech. The third axis is concerned with building a linguistic analysis program that could extract from the corpus the inter- and intra-linguistic cues for deceptive and truthful speech. The program built here is based on selected categories from the Linguistic Inquiry and Word Count program. Our results demonstrated that Egyptian Arabic speakers on one hand preferred to use first-person pronouns and present tense compared to the past tense when lying and their lies lacked of second-person pronouns, and on the other hand, when telling the truth, they preferred to use the verbs related to motion and the nouns related to time. The results also showed that there is a need for bigger data to prove the significance of words related to emotions and numbers.

Keywords: Egyptian Arabic corpus, computational analysis, deceptive features, forensic linguistics, human perception, truthful features

Procedia PDF Downloads 187
353 Monitor Vehicle Speed Using Internet of Things Based Wireless Sensor Network System

Authors: Akber Oumer Abdurezak

Abstract:

Road traffic accident is a major problem in Ethiopia, resulting in the deaths of many people and potential injuries and crash every year and loss of properties. According to the Federal Transport Authority, one of the main causes of traffic accident and crash in Ethiopia is over speeding. Implementation of different technologies is used to monitor the speed of vehicles in order to minimize accidents and crashes. This research aimed at designing a speed monitoring system to monitor the speed of travelling vehicles and movements, reporting illegal speeds or overspeeding vehicles to the concerned bodies. The implementation of the system is through a wireless sensor network. The proposed system can sense and detect the movement of vehicles, process, and analysis the data obtained from the sensor and the cloud system. The data is sent to the central controlling server. The system contains accelerometer and gyroscope sensors to sense and collect the data of the vehicle. Arduino to process the data and Global System for Mobile Communication (GSM) module for communication purposes to send the data to the concerned body. When the speed of the vehicle exceeds the allowable speed limit, the system sends a message to database as “over speeding”. Both accelerometer and gyroscope sensors are used to collect acceleration data. The acceleration data then convert to speed, and the corresponding speed is checked with the speed limit, and those above the speed limit are reported to the concerned authorities to avoid frequent accidents. The proposed system decreases the occurrence of accidents and crashes due to overspeeding and can be used as an eye opener for the implementation of other intelligent transport system technologies. This system can also integrate with other technologies like GPS and Google Maps to obtain better output.

Keywords: accelerometer, IOT, GSM, gyroscope

Procedia PDF Downloads 53
352 Study and Simulation of a Dynamic System Using Digital Twin

Authors: J.P. Henriques, E. R. Neto, G. Almeida, G. Ribeiro, J.V. Coutinho, A.B. Lugli

Abstract:

Industry 4.0, or the Fourth Industrial Revolution, is transforming the relationship between people and machines. In this scenario, some technologies such as Cloud Computing, Internet of Things, Augmented Reality, Artificial Intelligence, Additive Manufacturing, among others, are making industries and devices increasingly intelligent. One of the most powerful technologies of this new revolution is the Digital Twin, which allows the virtualization of a real system or process. In this context, the present paper addresses the linear and nonlinear dynamic study of a didactic level plant using Digital Twin. In the first part of the work, the level plant is identified at a fixed point of operation, BY using the existing method of least squares means. The linearized model is embedded in a Digital Twin using Automation Studio® from Famous Technologies. Finally, in order to validate the usage of the Digital Twin in the linearized study of the plant, the dynamic response of the real system is compared to the Digital Twin. Furthermore, in order to develop the nonlinear model on a Digital Twin, the didactic level plant is identified by using the method proposed by Hammerstein. Different steps are applied to the plant, and from the Hammerstein algorithm, the nonlinear model is obtained for all operating ranges of the plant. As for the linear approach, the nonlinear model is embedded in the Digital Twin, and the dynamic response is compared to the real system in different points of operation. Finally, yet importantly, from the practical results obtained, one can conclude that the usage of Digital Twin to study the dynamic systems is extremely useful in the industrial environment, taking into account that it is possible to develop and tune controllers BY using the virtual model of the real systems.

Keywords: industry 4.0, digital twin, system identification, linear and nonlinear models

Procedia PDF Downloads 123
351 Deep Reinforcement Learning-Based Computation Offloading for 5G Vehicle-Aware Multi-Access Edge Computing Network

Authors: Ziying Wu, Danfeng Yan

Abstract:

Multi-Access Edge Computing (MEC) is one of the key technologies of the future 5G network. By deploying edge computing centers at the edge of wireless access network, the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios. Meanwhile, with the development of IOV (Internet of Vehicles) technology, various delay-sensitive and compute-intensive in-vehicle applications continue to appear. Compared with traditional internet business, these computation tasks have higher processing priority and lower delay requirements. In this paper, we design a 5G-based Vehicle-Aware Multi-Access Edge Computing Network (VAMECN) and propose a joint optimization problem of minimizing total system cost. In view of the problem, a deep reinforcement learning-based joint computation offloading and task migration optimization (JCOTM) algorithm is proposed, considering the influences of multiple factors such as concurrent multiple computation tasks, system computing resources distribution, and network communication bandwidth. And, the mixed integer nonlinear programming problem is described as a Markov Decision Process. Experiments show that our proposed algorithm can effectively reduce task processing delay and equipment energy consumption, optimize computing offloading and resource allocation schemes, and improve system resource utilization, compared with other computing offloading policies.

Keywords: multi-access edge computing, computation offloading, 5th generation, vehicle-aware, deep reinforcement learning, deep q-network

Procedia PDF Downloads 84
350 Treaties-Fulfilled or Breached: A Study for Peacefulness of Religions

Authors: Syed A. Alam, Arifa Bilal

Abstract:

A propagated wave of barbaric and injustice Muslims has been popularized by the International powers in the recent past to divert the winning force of Muslims in the Afghan war against Russia. It is a tactic to demolish the power of Jihaad and the religious image of Islam. The propaganda picturized that Muslims were not peaceful or trustworthy people by displaying some brutal actions of a little number of funded people. The word ‘Islam’ is titled as ‘complete codes of life’ because of the peacefulness and trustworthiness of these codes for whole lives. These codes help the whole of humanity beyond the boundaries of any religion, sect, creed, color, geography, or race to lead their lives peacefully and trustfully. The human beings who act upon these codes of life, Islam, can be called Muslims. Those people are not Muslims who do not act upon these codes of life. History is evident that the Muslims proved themselves, collectively, that they are acting upon these codes of life. In this article, an analytical study was conducted regarding popular treaties signed between Muslims and non-Muslim communities in different times and regions on different matters. The study included the treaties of Hudabiyah Treaty, Mithaq-e-Madinah, Lucknow Pact, Indus Water Pact, Air Space Violation Treaty, Gallipoli Treaty, Amity Treaty, US-Russia Peace Treaty, and Wadi Arab Peace Treaty. After critical analysis of these treaties, it can be clearly concluded that Muslims fulfilled these treatises, but non-Muslim stakeholders of these treaties broke these treaties in one aspect or many and in the start or later. It can be concluded that the history of treaties between Muslim and non-Muslim communities declared that Muslims had fulfilled these treaties and pacts, so they are more trustworthy and peaceful people.

Keywords: fulfilled treaties, Muslim and non-muslim pacts, Islam and peacefulness, Islam and treaties

Procedia PDF Downloads 117
349 Biography and Psychotherapy: Oral History Interviews with Psychotherapists

Authors: Barbara Papp

Abstract:

Purpose: This article aims to rethink the relationship between the trauma and the choice of professions. By studying a homogenous sample of respondents, it seeks answers to the following question: how did personal losses that were caused by historical upheavals motivate people to enter the helping professions. By becoming helping professionals, the respondents of the survey sought to handle both historical representation and self-representation. How did psychotherapists working in the second half of the 20th century (Kádár-era in Hungary) shape their course of life? How did their family members respond to their choice of career? What forces supported or hindered them? How did they become professional helpers? Methodology: When interviewing 40 psychotherapists, the interviewer used the oral history technique. In-depth interviews were made with a focus on motivation. First, the collected material was examined using traditional content analysis tools: searching for content patterns, applying a word frequency analysis, and identifying the connections between key events and key persons. Second, a narrative psychological content analysis (NarrCat) was made. Findings: Interconnections were established between attachment, family and historical traumas and career choices. The history of the mid-20th-century period was traumatic and full of losses for the families of most of the psychotherapists concerned. Those experiences may have considerably influenced their choice of career. Working as helping therapists, they could get the opportunity to revise their losses. Conclusion: The results revealed core components that play a role in the psychotherapists’ choice of career, and also emphasized the importance of post-traumatic growth.

Keywords: biography, identity, narrative psychological content analysis, psychotherapists, trauma

Procedia PDF Downloads 109
348 Can (E-)Mentoring Be a Tool for the Career of Future Translators?

Authors: Ana Sofia Saldanha

Abstract:

The answer is yes. Globalization is changing the translation world day after day, year after year. The need to know more about new technologies, clients, companies, project management and social networks is becoming more and more demanding and increasingly competitive. The great majority of the recently graduated Translators do not know where to go, what to do or even who to contact to start their careers in translation. It is well known that there are innumerous webinars, books, blogs and webpages with the so-called “tips do become a professional translator” indicating for example, what to do, what not to do, rates, how your resume should look like, etc. but are these pieces of advice coming from real translators? Translators who work daily with clients, who understand their demands, requests, questions? As far as today`s trends, the answer is no. Most of these pieces of advice are just theoretical and coming from “brilliant minds” who are more interested in spreading their word and winning “likes” to become, in some way, “important people in some area. Mentoring is, indeed, a highly important tool to help and guide new translators starting their career. An effective and well oriented Mentoring is a powerful way to orient these translators on how to create their resumes, where to send resumes, how to approach clients, how to answer emails and how to negotiate rates in an efficient way. Mentoring is a crucial tool and even some kind of “psychological trigger”, when properly delivered by professional and experienced translators, to help in the so aimed career development. The advice and orientation sessions which can bem 100% done online, using Skype for example, are almost a “weapon” to destroy the barriers created by opinions, by influences or even by universities. This new orientation trend is the future path for new translators and is the future of the Translation industry and professionals and Universities who must update their way of approaching the real translation world, therefore, minds and spirits need to be opened and engaged in this new trend of developing skills.

Keywords: mentoring, orientation, professional follow-up, translation

Procedia PDF Downloads 98
347 High Resolution Sandstone Connectivity Modelling: Implications for Outcrop Geological and Its Analog Studies

Authors: Numair Ahmed Siddiqui, Abdul Hadi bin Abd Rahman, Chow Weng Sum, Wan Ismail Wan Yousif, Asif Zameer, Joel Ben-Awal

Abstract:

Advances in data capturing from outcrop studies have made possible the acquisition of high-resolution digital data, offering improved and economical reservoir modelling methods. Terrestrial laser scanning utilizing LiDAR (Light detection and ranging) provides a new method to build outcrop based reservoir models, which provide a crucial piece of information to understand heterogeneities in sandstone facies with high-resolution images and data set. This study presents the detailed application of outcrop based sandstone facies connectivity model by acquiring information gathered from traditional fieldwork and processing detailed digital point-cloud data from LiDAR to develop an intermediate small-scale reservoir sandstone facies model of the Miocene Sandakan Formation, Sabah, East Malaysia. The software RiScan pro (v1.8.0) was used in digital data collection and post-processing with an accuracy of 0.01 m and point acquisition rate of up to 10,000 points per second. We provide an accurate and descriptive workflow to triangulate point-clouds of different sets of sandstone facies with well-marked top and bottom boundaries in conjunction with field sedimentology. This will provide highly accurate qualitative sandstone facies connectivity model which is a challenge to obtain from subsurface datasets (i.e., seismic and well data). Finally, by applying this workflow, we can build an outcrop based static connectivity model, which can be an analogue to subsurface reservoir studies.

Keywords: LiDAR, outcrop, high resolution, sandstone faceis, connectivity model

Procedia PDF Downloads 199
346 Moving from Practice to Theory

Authors: Maria Lina Garrido

Abstract:

This paper aims to reflect upon instruction in English classes with the specific purpose of reading comprehension development, having as its paradigm the considerations presented by William Grabe, in his book Reading in a Second Language: Moving from theory to practice. His concerns regarding the connection between research findings and instructional practices have stimulated the present author to re-evaluate both her long practice as an English reading teacher and as the author of two reading textbooks for graduate students. Elements of the reading process such as linguistic issues, prior knowledge, reading strategies, critical evaluation, and motivation are the main foci of this analysis as far as the activities developed in the classroom are concerned. The experience with university candidates on postgraduate courses with different levels of English knowledge in Bahia, Brazil, has definitely demanded certain adjustments to this author`s classroom setting. Word recognition based on cognates, for example, has been emphasized given the fact that academic texts use many Latin words which have the same roots as the Brazilian Portuguese lexicon. Concerning syntactic parsing, the tenses/verbal aspects, modality and linking words are included in the curriculum, but not with the same depth as the general English curricula. Reading strategies, another essential predictor for developing reading skills, have been largely stimulated in L2 classes in order to compensate for a lack of the appropriate knowledge of the foreign language. This paper presents results that demonstrate that this author`s teaching practice is compatible with the implications and instruction concerning the reading process outlined by Grabe, however, it admits that each class demands specific instructions to meet the needs of that particular group.

Keywords: classroom practice, instructional activities, reading comprehension, reading skills

Procedia PDF Downloads 432
345 A Pilot Study Exploring Dog Owners’ Perceptions on Volunteering With Their Dogs in Animal-Assisted Therapy Program in Singapore

Authors: Julia Wong, Hua Beng Lim, Cheryl Ho, Gin Jen Gwee, Rachel Tay

Abstract:

In Singapore, a few hospitals and non-governmental social service agencies have been utilising animal-assisted therapy (AAT) in their practice in recent years, although the animals used (e.g., dogs, cats, and horses) and program modality may differ due to the different practice settings, client profiles, and intervention goals. This pilot study explores dog owners’ perceptions of AAT with a focus on examining the enablers and barriers towards volunteering with their dogs in AAT programs in Singapore. A qualitative, thematic analysis study was conducted using in-depth, semi-structured interviews with 16 dog owners. 3 of the dog owners had previous experience volunteering with their dogs serving elderly patients in a community hospital, while the rest of the dog owners had no previous experience volunteering with their dogs. The former group was recruited with the help of the hospital, while the latter group was recruited via word-of-mouth. Dog owners who had volunteering experiences in AAT program versus those who had none differed in their perceptions towards AAT. Dog owners who had volunteered with their dogs in an AAT program in a hospital felt that their volunteering experience were meaningful to patients and to themselves, as they were intrinsically motivated by the desire to serve the community. Those who had not volunteered were hesitant to volunteer with their dogs as they were not comfortable with strangers touching their dogs. They also felt that it would be a huge commitment in terms of time and money; most of them do not own a car as it is uneconomical, and pets are not allowed on Singapore’s public transport systems. This study is limited by its small sample size, and its findings are not generalisable. However, given that volunteers are an invaluable resource in healthcare settings, future studies can examine more stakeholders’ perceptions towards AAT.

Keywords: animal-assisted therapy, dog-assisted therapy, volunteers, complementary therapy

Procedia PDF Downloads 76
344 The Effect of Phonetics Factors in Interpretation of Japanese Degree Adverbs

Authors: Yan Lyu

Abstract:

Japanese degree adverbs can be explained in different ways, which is hard for Japanese learners to comprehend. For instance, when ‘tyotto’ is used as a degree word, it can be interpreted literally or not. In the sentence ‘Ano mise, tyotto oishi yo. zehi iku to ii yo.’, ‘tyotto’ can be interpreted as a high degree contextually. Despite pragmatic factors, phonetics factors can also affect the interpretation of such ‘tyotto’. Concentrating on the pattern of ‘tyotto +adjective’, the paper aims to investigate the correlation between the interpretation of ‘tyotto’ and the phonetic factors in some specific contexts based on a listening experiment via PRAAT. It is also investigated that how the phonetic factors affect the interpretation of high degree adverbs, including ‘soutou’ , ‘totemo’ , ‘kanari’ and ‘sugoku’. In the experiment, Japanese speakers listened to sentences which were composed of degree adverbs and adjectives in different intonations and judged which degree the sentences expressed. Two conclusions can be drawn from the experiment results. Firstly, for adverbs expressing a high degree, in the pattern of ‘degree adverb + adjective’, either degree adverb or adjective is pronounced in a higher pitch, or both are highly pronounced, a higher degree can be expressed. Besides, with the insertion of geminate consonant and the extension of the vowel, the longer the duration of the degree adverb becomes, the higher degree can be expressed. Secondly, for ‘tyotto’, which expresses a low degree, the interpretation will be influenced by both phonetic and contextual factors. Phonetically, there are three factors causing ‘tyotto’ to be interpreted as a common degree or a high degree. The three factors are the high pitch of the modified adjective, the extended silence period of the geminate consonant and the change in the intonations of ‘tyotto’. In some contexts just like the comparison sentences, no matter how ‘tyotto + adjective’ is pronounced, ‘tyotto’ tends to be interpreted as a low degree literally.

Keywords: contextual interpretation, Japanese degree adverbs, phonetic interpretation, PRAAT

Procedia PDF Downloads 246
343 Genre Hybridity and Postcolonialism in 'Chairil: The Voice of Indonesia's Decolonisation'

Authors: Jack Johnstone

Abstract:

This research presents postcolonial translation as an approach to eradicate traces of colonialism in former colonies. An example of demonstrating postcolonial translation in the Indonesian context is in Hasan Aspahani's Chairil, a biographical narrative and history book based on the personal life of a well-known Indonesian poet and writer, Chairil Anwar (1922-1949) in Dutch occupied Indonesia. This postcolonial translation approach has been applied in the first five chapters on his early years under Dutch colonization, in an attempt to show a postcolonialised TT. This approach aims to demonstrate the postcolonial refutation of the Dutch colonial language to convey the Indonesian setting to target readers. It is also designed to explicate the summary of the book as well as my attempt to apply postcolonial translation as a strategy to reject the Dutch colonial terms in this book. The data conveys 26 important examples of the ST and TT, in consideration of the chosen three factors of culture, forced-Europeanisation, and cross-genre between a biographical narrative and history under categories of Cultural Bound Objects, Politics and Place. However, the 10 selected examples will be analyzed in the Analysis Chapter, which are discussed at word, sentence, and paragraph level. As well, the translation strategies used, namely retention, substitution and specification on four main examples, on the methods utilized to achieve a postcolonialised translation that attempts to 1) examine the way the alteration of the TT can affect the message portrayed within the ST, 2) show the notion of disagreement between the Dutch colonizers and colonized Indonesians on their views on the way Indonesia should be governed and 3) present a translation that reverses the inequality between the superior colonials and inferior Indigenous Indonesians during the Dutch colonial era.

Keywords: Chairil, Dutch colonialism, Indonesia, postcolonial translation

Procedia PDF Downloads 140
342 Exploring the Effects of Cuisine Experience, Emotions, Place Attachment on Heritage Tourists’ Revisit Behavioral Intentions: The Case Study of Lu-Kang

Authors: An-Na Li, Ying-Yu Chen, Yu-Lung Lin

Abstract:

Food tourism is one of the growing industries in the tourism industry today. The Destination Marketing Organizations (DMOs) are aware of the importance of gastronomy to stimulate local and regional economic development. From the heritage and cultural aspects, gastronomy is becoming a more important part of the cultural heritage of the region. Heritage destinations provide culinary heritage, which fits the current interest in traditional food, and cuisine is a part of a general desire for authentic experience. However, few studies have empirically examined antecedents of food tourists’ behavioral intentions. This study examined the effects of cuisine experience; emotions, place attachment and tourists’ revisit behavioral intentions. A total of 408 individuals responded to the on-site survey in the historic town of Lu-Kang in Taiwan. The results indicated that tourists’ cuisine experience include place flavor, media recommendation, local learning, life transfer and interpersonal share. In addition, cuisine experience had significant impacts on emotions and place attachment, emotions had significant effects on place attachment, furthermore, which in turn place attachment had significant effects on tourists’ revisit behavioral intentions. The findings suggested that the cuisine experience is a multi-dimensions construct. On the other hands, the good quality of cuisine experience could evoke tourists’ positive emotions and it could play a significant role in promoting tourist revisit intentions or word of mouth. Implications for theory and practice are discussed.

Keywords: culinary tourism, cuisine experiences, emotions, revisit intentions

Procedia PDF Downloads 224
341 An Approach to Building a Recommendation Engine for Travel Applications Using Genetic Algorithms and Neural Networks

Authors: Adrian Ionita, Ana-Maria Ghimes

Abstract:

The lack of features, design and the lack of promoting an integrated booking application are some of the reasons why most online travel platforms only offer automation of old booking processes, being limited to the integration of a smaller number of services without addressing the user experience. This paper represents a practical study on how to improve travel applications creating user-profiles through data-mining based on neural networks and genetic algorithms. Choices made by users and their ‘friends’ in the ‘social’ network context can be considered input data for a recommendation engine. The purpose of using these algorithms and this design is to improve user experience and to deliver more features to the users. The paper aims to highlight a broader range of improvements that could be applied to travel applications in terms of design and service integration, while the main scientific approach remains the technical implementation of the neural network solution. The motivation of the technologies used is also related to the initiative of some online booking providers that have made the fact that they use some ‘neural network’ related designs public. These companies use similar Big-Data technologies to provide recommendations for hotels, restaurants, and cinemas with a neural network based recommendation engine for building a user ‘DNA profile’. This implementation of the ‘profile’ a collection of neural networks trained from previous user choices, can improve the usability and design of any type of application.

Keywords: artificial intelligence, big data, cloud computing, DNA profile, genetic algorithms, machine learning, neural networks, optimization, recommendation system, user profiling

Procedia PDF Downloads 143
340 Study of Information Technology Support to Knowledge Sharing in Social Enterprises

Authors: Maria Granados

Abstract:

Information technology (IT) facilitates the management of knowledge in organisations through the effective leverage of collective experience and knowledge of employees. This supports information processing needs, as well as enables and facilitates sense-making activities of knowledge workers. The study of IT support for knowledge management (KM) has been carried out mainly in larger organisations where resources and competitive conditions can trigger the use of KM. However, there is still a lack of understanding on how IT can support the management of knowledge under different organisational settings influenced by: constant tensions between social and economic objectives, more focus on sustainability than competiveness, limited resources, and high levels of democratic participation and intrinsic motivations among employees. All these conditions are presented in Social Enterprises (SEs), which are normally micro and small businesses that trade to tackle social problems, improve communities, people’s life chances, and the environment. Thus, their importance to society and economies is increasing. However, there is still a need for more understanding of how these organisations operate, perform, innovate and scale-up. This knowledge is crucial to design and provide accurate strategies to enhance the sector and increase its impact and coverage. To obtain a conceptual and empirical understanding of how IT can facilitate KM in the particular organisational conditions of SEs, a quantitative study was conducted with 432 owners and senior members of SEs in UK, underpinned by 21 interviews. The findings demonstrated how IT was supporting more the recovery and storage of necessary information in SEs, and less the collaborative work and communication among enterprise members. However, it was established that SEs were using cloud solutions, web 2.0 tools, Skype and centralised shared servers to manage informally their knowledge. The possible impediments for SEs to support themselves more on IT solutions can be linked mainly to economic and human constraints. These findings elucidate new perspectives that can contribute not only to SEs and SE supporters, but also to other businesses.

Keywords: social enterprises, knowledge management, information technology, collaboration, small firms

Procedia PDF Downloads 250