Search results for: build automation
944 QR Technology to Automate Health Condition Detection in Payment System: A Case Study in the Kingdom of Saudi Arabia’s Schools
Authors: Amjad Alsulami, Farah Albishri, Kholod Alzubidi, Lama Almehemadi, Salma Elhag
Abstract:
Food allergy is a common and rising problem among children. Many students have their first allergic reaction at school, one of these is anaphylaxis, which can be fatal. This study discovered that several schools' processes lacked safety regulations and information on how to handle allergy issues and chronic diseases like diabetes where students were not supervised or monitored during the cafeteria purchasing process. There is no obvious prevention or effort in academic institutions when purchasing food containing allergens or negatively impacting the health status of students who suffer from chronic diseases. Students must always be stable to reflect positively on their educational development process. To address this issue, this paper uses a business reengineering process to propose the automation of the whole food-purchasing process, which will aid in detecting and avoiding allergic occurrences and preventing any side effects from eating foods that are conflicting with students' health. This may be achieved by designing a smart card with an embedded QR code that reveals which foods cause an allergic reaction in a student. A survey was distributed to determine and examine how the cafeteria will handle allergic children and whether any management or policy is applied in the school. Also, the survey findings indicate that the integration of QR technology into the food purchasing process would improve health condition detection. The suggested system would be beneficial to all parties, the family agreed, as they would ensure that their children didn't eat foods that were bad for their health. Moreover, by analyzing and simulating the as-is process and the suggested process the results demonstrate that there is an improvement in quality and time.Keywords: QR code, smart card, food allergies, business process reengineering, health condition detection
Procedia PDF Downloads 75943 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case
Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan
Abstract:
The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.Keywords: cloud computing, protocols, UDP multicast, virtualization
Procedia PDF Downloads 590942 Biographical Learning and Its Impact on the Democratization Processes of Post War Societies
Authors: Rudolf Egger
Abstract:
This article shows some results of an ongoing project in Kosova. This project deals with the meaning of social transformation processes in the life-courses of Kosova people. One goal is to create an oral history archive in this country. In the last seven years we did some interpretative work (using narrative interviews) concerning the experiences and meanings of social changes from the perspective of life course. We want to reconstruct the individual possibilities in creating one's life in new social structures. After the terrible massacres of ethnical-territorially defined nationalism in former Yugoslavia it is the main focus to find out something about the many small daily steps which must be done, to build up a kind of “normality” in this country. These steps can be very well reconstructed by narrations, by life stories, because personal experiences are naturally linked with social orders. Each individual story is connected with further stories, in which the collective history will be negotiated and reflected. The view on the biographical narration opens the possibility to analyze the concreteness of the “individual case” in the complexity of collective history. Life stories contain thereby a kind of a transition character, that’s why they can be used for the reconstruction of periods of political transformation. For example: In the individual story we can find very clear the national or mythological character of the Albanian people in Kosova. The shown narrations can be read also as narrative lines in relation to the (re-)interpretation of the past, in which lived life is fixed into history in the so-called collective memory in Kosova.Keywords: biographical learning, adult education, social change, post war societies
Procedia PDF Downloads 419941 Carolina Maria De Jesus' Narrative in a Fundamental Rights Perspective
Authors: Eliziane Fernanda Navarro, Aparecida Eleonora Sitta
Abstract:
Child of the Dark is the work of the Brazilian author Carolina Maria de Jesus, published at the first time by Ática and Francisco Alves in 1960. It is, mostly, a story of lack of rights. It lacks to men who live in the slums what is essential in order to take advantage of the privilege of rationality to develop themselves as civilized humans. It is, therefore, in the withholding of the basic rights that inequality finds space to build itself to be the main misery on Earth. Antonio Candido, a Brazilian sociologist claims that it is the right to literature has the ability to humanize men, once the aptitude to create fiction and fable is essential to the social balance. Hence, for the forming role that literature holds, it must be thought as the number of rights that assure human dignity, such as housing, education, health, freedom, etc. When talking about her routine, Carolina puts in evidence something that has great influence over the formation of human beings, contributing to the way they live: the slum. Even though it happens in a distinct way and using her own linguistics variation, Carolina writes about something that will only be discussed later on Brazil’s Cities Statute and Erminia Maricato: the right to the city, and how the slums are, although inserted in the city, an attachment, an illegal city, a dismissing room. It interests ourselves, for that matter, in this work, to analyse how the deprivation of the rights to the city and literature, detailed in Carolina’s journal, conditions human beings to a life where the instincts overcome the social values.Keywords: Child of the Dark, slum, literature, architecture and urbanism, fundamental rights, Brazil
Procedia PDF Downloads 317940 Quasistationary States and Mean Field Model
Authors: Sergio Curilef, Boris Atenas
Abstract:
Systems with long-range interactions are very common in nature. They are observed from the atomic scale to the astronomical scale and exhibit anomalies, such as inequivalence of ensembles, negative heat capacity, ergodicity breaking, nonequilibrium phase transitions, quasistationary states, and anomalous diffusion. These anomalies are exacerbated when special initial conditions are imposed; in particular, we use the so-called water bag initial conditions that stand for a uniform distribution. Several theoretical and practical implications are discussed here. A potential energy inspired by dipole-dipole interactions is proposed to build the dipole-type Hamiltonian mean-field model. As expected, the dynamics is novel and general to the behavior of systems with long-range interactions, which is obtained through molecular dynamics technique. Two plateaus sequentially emerge before arriving at equilibrium, which are corresponding to two different quasistationary states. The first plateau is a type of quasistationary state the lifetime of which depends on a power law of N and the second plateau seems to be a true quasistationary state as reported in the literature. The general behavior of the model according to its dynamics and thermodynamics is described. Using numerical simulation we characterize the mean kinetic energy, caloric curve, and the diffusion law through the mean square of displacement. The present challenge is to characterize the distributions in phase space. Certainly, the equilibrium state is well characterized by the Gaussian distribution, but quasistationary states in general depart from any Gaussian function.Keywords: dipole-type interactions, dynamics and thermodynamics, mean field model, quasistationary states
Procedia PDF Downloads 211939 An Equivalent Circuit Model Approach for Battery Pack Simulation in a Hybrid Electric Vehicle System Powertrain
Authors: Suchitra Sivakumar, Hajime Shingyouchi, Toshinori Okajima, Kyohei Yamaguchi, Jin Kusaka
Abstract:
The progressing need for powertrain electrification calls for more accurate and reliable simulation models. A battery pack serves as the most vital component for energy storage in an electrified powertrain. Hybrid electric vehicles (HEV) do not behave the same way as they age, and there are several environmental factors that account for the degradation of the battery on a system level. Therefore, in this work, a battery model was proposed to study the state of charge (SOC) variation and the internal dynamic changes that contribute to aging and performance degradation in HEV batteries. An equivalent circuit battery model (ECM) is built using MATLAB Simulink to investigate the output characteristics of the lithium-ion battery. The ECM comprises of circuit elements like a voltage source, a series resistor and a parallel RC network connected in series. A parameter estimation study is conducted on the ECM to study the dependencies of the circuit elements with the state of charge (SOC) and the terminal voltage of the battery. The battery model is extended to simulate the temperature dependence of the individual battery cell and the battery pack with the environment. The temperature dependence model accounts for the heat loss due to internal resistance build up in the battery pack during charging, discharging, and due to atmospheric temperature. The model was validated for a lithium-ion battery pack with an independent drive cycle showing a voltage accuracy of 4% and SOC accuracy of about 2%.Keywords: battery model, hybrid electric vehicle, lithium-ion battery, thermal model
Procedia PDF Downloads 298938 Maker-Based Learning in Secondary Mathematics: Investigating Students’ Proportional Reasoning Understanding through Digital Making
Authors: Juan Torralba
Abstract:
Student digital artifacts were investigated, utilizing a qualitative exploratory research design to understand the ways in which students represented their knowledge of seventh-grade proportionality concepts as they participated in maker-based activities that culminated in the creation of digital 3-dimensional models of their dream homes. Representations of the geometric and numeric dimensions of proportionality were analyzed in the written, verbal, and visual data collected from the students. A directed content analysis approach was utilized in the data analysis, as this work aimed to build upon existing research in the field of maker-based STEAM Education. The results from this work show that students can represent their understanding of proportional reasoning through open-ended written responses more accurately than through verbal descriptions or digital artifacts. The geometric and numeric dimensions of proportionality and their respective components of attributes of similarity representation and percents, rates, and ratios representations were the most represented by the students than any other across the data, suggesting a maker-based instructional approach to teaching proportionality in the middle grades may be promising in helping students gain a solid foundation in those components. Recommendations for practice and research are discussed.Keywords: learning through making, maker-based education, maker education in the middle grades, making in mathematics, the maker movement
Procedia PDF Downloads 71937 Biochemical Approach to Renewable Energy: Enhancing Students' Perception and Understanding of Science of Energy through Integrated Hands-On Laboratory
Authors: Samina Yasmin, Anzar Khaliq, Zareen Tabassum
Abstract:
Acute power shortage in Pakistan requires an urgent attention to take preliminary steps to spread energy awareness at all levels. One such initiative is taken at Habib University (HU), Pakistan, through renewable energy course, one of the core offerings, where students are trained to investigate various aspects of renewable energy concepts. The course is offered to all freshmen enrolled at HU regardless of their academic backgrounds and degree programs. A four-credit modular course includes both theory and laboratory elements. Hands-on laboratories play an important role in science classes, particularly to enhance the motivation and deep understanding of energy science. A set of selected hands-on activities included in course introduced students to explore the latest developments in the field of renewable energy such as dye-sensitized solar cells, gas chromatography, global warming, climate change, fuel cell energy and power of biomass etc. These projects not only helped HU freshmen to build on energy fundamentals but also provided them greater confidence in investigating, questioning and experimenting with renewable energy related conceptions. A feedback survey arranged during and end of term revealed the effectiveness of the hands-on laboratory to enhance the common understanding of real world problems related to energy such as awareness of energy saving, the level of concern about global climate change, environmental pollution and science of energy behind the energy usage.Keywords: biochemical approaches, energy curriculum, hands-on laboratory, renewable energy
Procedia PDF Downloads 256936 A Pipeline for Detecting Copy Number Variation from Whole Exome Sequencing Using Comprehensive Tools
Authors: Cheng-Yang Lee, Petrus Tang, Tzu-Hao Chang
Abstract:
Copy number variations (CNVs) have played an important role in many kinds of human diseases, such as Autism, Schizophrenia and a number of cancers. Many diseases are found in genome coding regions and whole exome sequencing (WES) is a cost-effective and powerful technology in detecting variants that are enriched in exons and have potential applications in clinical setting. Although several algorithms have been developed to detect CNVs using WES and compared with other algorithms for finding the most suitable methods using their own samples, there were not consistent datasets across most of algorithms to evaluate the ability of CNV detection. On the other hand, most of algorithms is using command line interface that may greatly limit the analysis capability of many laboratories. We create a series of simulated WES datasets from UCSC hg19 chromosome 22, and then evaluate the CNV detective ability of 19 algorithms from OMICtools database using our simulated WES datasets. We compute the sensitivity, specificity and accuracy in each algorithm for validation of the exome-derived CNVs. After comparison of 19 algorithms from OMICtools database, we construct a platform to install all of the algorithms in a virtual machine like VirtualBox which can be established conveniently in local computers, and then create a simple script that can be easily to use for detecting CNVs using algorithms selected by users. We also build a table to elaborate on many kinds of events, such as input requirement, CNV detective ability, for all of the algorithms that can provide users a specification to choose optimum algorithms.Keywords: whole exome sequencing, copy number variations, omictools, pipeline
Procedia PDF Downloads 319935 From Creativity to Innovation: Tracking Rejected Ideas
Authors: Lisete Barlach, Guilherme Ary Plonski
Abstract:
Innovative ideas are not always synonymous with business opportunities. Any idea can be creative and not recognized as a potential project in which money and time will be invested, among other resources. Even in firms that promote and enhance innovation, there are two 'check-points', the first corresponding to the acknowledgment of the idea as creative and the second, its consideration as a business opportunity. Both the recognition of new business opportunities or new ideas involve cognitive and psychological frameworks which provide individuals with a basis for noticing connections between seemingly independent events or trends as if they were 'connecting the dots'. It also involves prototypes-representing the most typical member of a certain category–functioning as 'templates' for this recognition. There is a general assumption that these kinds of evaluation processes develop through experience, explaining why expertise plays a central role in this process: the more experienced a professional, the easier for him (her) to identify new opportunities in business. But, paradoxically, an increase in expertise can lead to the inflexibility of thought due to automation of procedures. And, besides this, other cognitive biases can also be present, because new ideas or business opportunities generally depend on heuristics, rather than on established algorithms. The paper presents a literature review about the Einstellung effect by tracking famous cases of rejected ideas, extracted from historical records. It also presents the results of empirical research, with data upon rejected ideas gathered from two different environments: projects rejected during first semester of 2017 at a large incubator center in Sao Paulo and ideas proposed by employees that were rejected by a well-known business company, at its Brazilian headquarter. There is an implicit assumption that Einstellung effect tends to be more and more present in contemporaneity, due to time pressure upon decision-making and idea generation process. The analysis discusses desirability, viability, and feasibility as elements that affect decision-making.Keywords: cognitive biases, Einstellung effect, recognition of business opportunities, rejected ideas
Procedia PDF Downloads 204934 Community Benefitting through Tourism: DASTA-Thailand Model
Authors: Jutamas Wisansing, Thanakarn Vongvisitsin, Udom Hongchatikul
Abstract:
Designated Areas for Sustainable Tourism Administration (DASTA) is a public organization, dedicating to sustainable tourism development in 6 designated areas in Thailand. This paper provides rich reflections from a decade of DASTA, formulating an advanced model to deepen our understanding of 2 key intertwining issues; 1) what are the new landscapes of actors for community based tourism and 2) who are the benefactors and beneficiaries of tourism development within the community? An action research approach was used, enabling the process and evidence-based cases to be better captured. The aim is to build theoretical foundation through 13 communities/cases, which have engaged in community based tourism pilot projects. Drawing from emic and qualitative research, specific and contextual phenomenon provides succinct patterns of ‘Community Benefitting through Tourism (CbtT)’ model. The re-definition of the 2 key issues helps shape the interlinking of actors; practicalities of inclusive tourism and inter-sectoral framework and its value chain will also be set forth. In tourism sector, community members could be active primarily on the supply side as employees, entrepreneurs and local heritage experts. CbtT when well defined stimulates the entire value chain of local economy while promoting social innovation through positive dialogue with wider actors. Collaboration with a new set of actors who are from the tourism-related businesses and non-tourism related businesses create better impacts on mutual benefits.Keywords: community based tourism, community benefitting through tourism -CbtT DASTA model, sustainable tourism in thailand, value chain and inclusive business
Procedia PDF Downloads 298933 Evaluation and Analysis of ZigBee-Based Wireless Sensor Network: Home Monitoring as Case Study
Authors: Omojokun G. Aju, Adedayo O. Sule
Abstract:
ZigBee wireless sensor and control network is one of the most popularly deployed wireless technologies in recent years. This is because ZigBee is an open standard lightweight, low-cost, low-speed, low-power protocol that allows true operability between systems. It is built on existing IEEE 802.15.4 protocol and therefore combines the IEEE 802.15.4 features and newly added features to meet required functionalities thereby finding applications in wide variety of wireless networked systems. ZigBee‘s current focus is on embedded applications of general-purpose, inexpensive, self-organising networks which requires low to medium data rates, high number of nodes and very low power consumption such as home/industrial automation, embedded sensing, medical data collection, smart lighting, safety and security sensor networks, and monitoring systems. Although the ZigBee design specification includes security features to protect data communication confidentiality and integrity, however, when simplicity and low-cost are the goals, security is normally traded-off. A lot of researches have been carried out on ZigBee technology in which emphasis has mainly been placed on ZigBee network performance characteristics such as energy efficiency, throughput, robustness, packet delay and delivery ratio in different scenarios and applications. This paper investigate and analyse the data accuracy, network implementation difficulties and security challenges of ZigBee network applications in star-based and mesh-based topologies with emphases on its home monitoring application using the ZigBee ProBee ZE-10 development boards for the network setup. The paper also expose some factors that need to be considered when designing ZigBee network applications and suggest ways in which ZigBee network can be designed to provide more resilient to network attacks.Keywords: home monitoring, IEEE 802.14.5, topology, wireless security, wireless sensor network (WSN), ZigBee
Procedia PDF Downloads 383932 The Cleaning Equipment to Prevents Dust Diffusion of Bus Air Filters
Authors: Jiraphorn Satechan, Thanaphon Khamthieng, Warunee Phanwong
Abstract:
This action research aimed at designing and developing the cleaning equipment to preventing dust diffusion of bus air filter. Quantitative and qualitative data collection methods were used to conduct data from October 1st, 2018 to September 30th, 2019. All of participants were male (100.0%) with aged 40- 49 years and 57.15%, of them finish bachelor degree. 71.43% of them was a driver and 57.15% of them had the working experience between 10 and 15 years. Research revealed that the participants assessed the quality of the bus air filter cleaning equipment for preventing dust diffusion at a moderate level (σ= 0.29), and 71.43 of them also suggested the development methods in order to improve the quality of bus air filters cleaning equipment as follows: 1) to install the circuit breaker for cutting the electricity and controlling the on-off of the equipment and to change the motor to the DC system, 2) should install the display monitor for wind pressure and electricity system as well as to install the air pressure gauge, 3) should install the tank lid lock for preventing air leakage and dust diffusion by increasing the blowing force and sucking power, 4) to stabilize the holding points for preventing the filter shaking while rotating and blowing for cleaning and to reduce the rotation speed in order to allow the filters to move slowly for the air system to blow for cleaning more thoroughly, 5) the amount of dust should be measured before and after cleaning and should be designed the cleaning equipment to be able to clean with a variety of filters, and sizes. Moreover, the light-weight materials should be used to build the cleaning equipment and the wheels should be installed at the base of the equipment in order to make it easier to move.Keywords: Cleaning Equipment, Bus Air Filters, Preventing Dust Diffusion, Innovation
Procedia PDF Downloads 110931 The Use of Unmanned Aerial System (UAS) in Improving the Measurement System on the Example of Textile Heaps
Authors: Arkadiusz Zurek
Abstract:
The potential of using drones is visible in many areas of logistics, especially in terms of their use for monitoring and control of many processes. The technologies implemented in the last decade concern new possibilities for companies that until now have not even considered them, such as warehouse inventories. Unmanned aerial vehicles are no longer seen as a revolutionary tool for Industry 4.0, but rather as tools in the daily work of factories and logistics operators. The research problem is to develop a method for measuring the weight of goods in a selected link of the clothing supply chain by drones. However, the purpose of this article is to analyze the causes of errors in traditional measurements, and then to identify adverse events related to the use of drones for the inventory of a heap of textiles intended for production purposes. On this basis, it will be possible to develop guidelines to eliminate the causes of these events in the measurement process using drones. In a real environment, work was carried out to determine the volume and weight of textiles, including, among others, weighing a textile sample to determine the average density of the assortment, establishing a local geodetic network, terrestrial laser scanning and photogrammetric raid using an unmanned aerial vehicle. As a result of the analysis of measurement data obtained in the facility, the volume and weight of the assortment and the accuracy of their determination were determined. In this article, this work presents how such heaps are currently being tested, what adverse events occur, indicate and describes the current use of photogrammetric techniques of this type of measurements so far performed by external drones for the inventory of wind farms or construction of the station and compare them with the measurement system of the aforementioned textile heap inside a large-format facility.Keywords: drones, unmanned aerial system, UAS, indoor system, security, process automation, cost optimization, photogrammetry, risk elimination, industry 4.0
Procedia PDF Downloads 86930 Constructions of Linear and Robust Codes Based on Wavelet Decompositions
Authors: Alla Levina, Sergey Taranov
Abstract:
The classical approach to the providing noise immunity and integrity of information that process in computing devices and communication channels is to use linear codes. Linear codes have fast and efficient algorithms of encoding and decoding information, but this codes concentrate their detect and correct abilities in certain error configurations. To protect against any configuration of errors at predetermined probability can robust codes. This is accomplished by the use of perfect nonlinear and almost perfect nonlinear functions to calculate the code redundancy. The paper presents the error-correcting coding scheme using biorthogonal wavelet transform. Wavelet transform applied in various fields of science. Some of the wavelet applications are cleaning of signal from noise, data compression, spectral analysis of the signal components. The article suggests methods for constructing linear codes based on wavelet decomposition. For developed constructions we build generator and check matrix that contain the scaling function coefficients of wavelet. Based on linear wavelet codes we develop robust codes that provide uniform protection against all errors. In article we propose two constructions of robust code. The first class of robust code is based on multiplicative inverse in finite field. In the second robust code construction the redundancy part is a cube of information part. Also, this paper investigates the characteristics of proposed robust and linear codes.Keywords: robust code, linear code, wavelet decomposition, scaling function, error masking probability
Procedia PDF Downloads 489929 Survey of Communication Technologies for IoT Deployments in Developing Regions
Authors: Namugenyi Ephrance Eunice, Julianne Sansa Otim, Marco Zennaro, Stephen D. Wolthusen
Abstract:
The Internet of Things (IoT) is a network of connected data processing devices, mechanical and digital machinery, items, animals, or people that may send data across a network without requiring human-to-human or human-to-computer interaction. Each component has sensors that can pick up on specific phenomena, as well as processing software and other technologies that can link to and communicate with other systems and/or devices over the Internet or other communication networks and exchange data with them. IoT is increasingly being used in fields other than consumer electronics, such as public safety, emergency response, industrial automation, autonomous vehicles, the Internet of Medical Things (IoMT), and general environmental monitoring. Consumer-based IoT applications, like smart home gadgets and wearables, are also becoming more prevalent. This paper presents the main IoT deployment areas for environmental monitoring in developing regions and the backhaul options suitable for them. A detailed review of each of the list of papers selected for the study is included in section III of this document. The study includes an overview of existing IoT deployments, the underlying communication architectures, protocols, and technologies that support them. This overview shows that Low Power Wireless Area Networks (LPWANs), as summarized in Table 1, are very well suited for monitoring environment architectures designed for remote locations. LoRa technology, particularly the LoRaWAN protocol, has an advantage over other technologies due to its low power consumption, adaptability, and suitable communication range. The prevailing challenges of the different architectures are discussed and summarized in Table 3 of the IV section, where the main problem is the obstruction of communication paths by buildings, trees, hills, etc.Keywords: communication technologies, environmental monitoring, Internet of Things, IoT deployment challenges
Procedia PDF Downloads 85928 Ways of Life of Undergraduate Students Based On Sufficiency Economy Philosophy in Suan Sunandha Rajabhat University
Authors: Phusit Phukamchanoad
Abstract:
This study aimed to analyse the application of sufficiency economy in students’ ways of life on campus at Suan Sunandha Rajabhat University. Data was gathered through 394 questionnaires. The study results found that the majority of students were confident that “where there’s a will, there’s a way.” Overall, the students applied the sufficiency economy at a great level, along with being people who do not exploit others, were satisfied with living their lives moderately, according to the sufficiency economy. Importance was also given to kindness and generosity. Importantly, students were happy with living according to their individual circumstances and status at the present. They saw the importance of joint life planning, self-development, and self-dependence, always learning to be satisfied with “adequate”. As for their practices and ways of life, socially relational activities rated highly, especially initiation activities for underclassmen at the university and the seniority system, which are suitable for activities on campus. Furthermore, the students knew how to build a career and find supplemental income, knew how to earnestly work according to convention to finish work, and preferred to study elective subjects which directly benefit career-wise. The students’ application of sufficiency economy philosophy principles depended on their lives in their hometowns. The students from the provinces regularly applied sufficiency economy philosophy to their lives, for example, by being frugal, steadfast, determined, avoiding negligence, and making economical spending plans; more so than the students from the capital.Keywords: application of sufficiency economy philosophy, way of living, undergraduate students, spending plan
Procedia PDF Downloads 213927 The Colombian Linguistic Landscape: A Study of Commercial Signs
Authors: Francia Martinez
Abstract:
This study documents and demonstrates the profound impact of the high status of American English and culture in Colombian commercial landscape due to the globalization and commodification of English. It also documents and describes how Colombian advertisers make use of various language and visual mechanisms in the commercial linguistic landscape to convey messages, create an image with which the target audience can identify, and build a relationship with that target audience. The data (in the form of pictures) were collected in different cities in Colombia and were classified and organized into different categories for the reliability and validity of the analysis. The research questions were: do the ubiquity and high status of American English and culture play a major role in the Colombian commercial linguistic landscape? If so, how?, what roles do national and local culture and language (Spanish) play in the commercial linguistic landscape?, and what different linguistic and visual strategies do Colombian advertisers employ to reach their target audience? Based on data analysis and results, American and local culture and icons play a major role when Colombian advertisers create and design their commercial logos and ads to get consumers’ attention and establish a rapport with them in a successful way. In order to achieve their objectives, Colombian advertisers rely on creative linguistic and visual techniques in their ads, such as puns, humor, irony, comparisons, metaphors, mocking, exaggeration, parody, personification, sarcasm, satire, allusion, onomatopoeias, and imitation (copycat or cloning).Keywords: Colombian ads, linguistic landscape, rhetorical devices, sociolinguistics
Procedia PDF Downloads 310926 The Impact of Leadership Style and Managers Decision Making on Organizational Resulting in Ship Manufacturing Company
Authors: ZeinolAbedin Rahmani, Marzieh Evazi Borazjani, Nooshin Salehi
Abstract:
Organizations are increasingly facing changes and developments scientific, technological, social, cultural changes among these organizations those ones are reckoned successful and effective that in addition to coordinating the development of modern society can forecast future changes and be able to accommodate these changes in order to create favorable developments to build a better future. But we can change that with the changes that occur in the organization of the program it will distinguish. Today's organizations need leaders that change and grow them have to survive. In fact, without transformational managers and leaders, it is certainly difficult to create changes in organizations. Both private and public organizations need to increase knowledge and awareness of the cause widespread changes in the structure, culture and practice for the viability and sustainability of life and growth and development. By now, different signs have determined different causes for a suitable function of employees. However, the important thing is that the commitment of the employees to their organization has always been very important. Since the decrease of organization commitment causes the high rate of absenteeism, turnover intentions, and even to reduce the impact of health staff. and these factors prevent organizations from achieving its goals. If organizations want to retain staff, the organization must find a way to be happy and continue their work with commitment, motivation, and willingness. So here is the need for strong leaders, analysts, creative and transformational upper ranks more than ever is felt. The aim of this study is to revise history, the leadership style of managers shipbuilding company by using the MLQ model.Keywords: leadership style, managers, organizational, manufacturing company, sustainability of life
Procedia PDF Downloads 491925 Food Insecurity and Quality of Life among the Poor Elderly in South Korea
Authors: Jayoung Cho
Abstract:
Poverty has become a social problem in South Korea, given that seven out of ten elderly experience multidimensional poverty. As quality of life is a major social welfare measure of a society, verifying the major factors affecting the quality of life among the elderly in poverty can be used as baseline data for the promotion of welfare. This study aims to investigate the longitudinal relationships between food insecurity and quality of life among the elderly in poverty. In this study, panel regression analysis using 5-year longitudinal panel data were derived from Korea Welfare Panel Study (KWPS, 2011-2015) were used to identify the research question. A total of 1,327 elderly people aged 65 or older with less than 60% of median income was analyzed. The main results of the study are as follows; first, the level of quality of life of the poor elderly was on average of 5, and repeated the increase and decrease over time. Second, food insecurity and quality of life of the elderly in poverty had a longitudinal causal relationship. Furthermore, the statistical significance of food insecurity was the highest despite controlling for major variables affecting the quality of life among the poor elderly. Therefore, political and practical approaches are strongly suggested and considered regarding the food insecurity for the quality of life among the elderly in poverty. In practical intervention, it is necessary to pay attention to food insecurity when assessing the poor elderly. Also, there is a need to build a new delivery system that incorporates segmented health and nutrition-related services. This study has an academic significance in that it brought out the issue of food insecurity of the poor elderly and confirmed the longitudinal relationship between food insecurity and quality of life.Keywords: food insecurity, longitudinal panel analysis, poor elderly, quality of life
Procedia PDF Downloads 240924 Compensatory Articulation of Pressure Consonants in Telugu Cleft Palate Speech: A Spectrographic Analysis
Authors: Indira Kothalanka
Abstract:
For individuals born with a cleft palate (CP), there is no separation between the nasal cavity and the oral cavity, due to which they cannot build up enough air pressure in the mouth for speech. Therefore, it is common for them to have speech problems. Common cleft type speech errors include abnormal articulation (compensatory or obligatory) and abnormal resonance (hyper, hypo and mixed nasality). These are generally resolved after palate repair. However, in some individuals, articulation problems do persist even after the palate repair. Such individuals develop variant articulations in an attempt to compensate for the inability to produce the target phonemes. A spectrographic analysis is used to investigate the compensatory articulatory behaviours of pressure consonants in the speech of 10 Telugu speaking individuals aged between 7-17 years with a history of cleft palate. Telugu is a Dravidian language which is spoken in Andhra Pradesh and Telangana states in India. It is a language with the third largest number of native speakers in India and the most spoken Dravidian language. The speech of the informants is analysed using single word list, sentences, passage and conversation. Spectrographic analysis is carried out using PRAAT, speech analysis software. The place and manner of articulation of consonant sounds is studied through spectrograms with the help of various acoustic cues. The types of compensatory articulation identified are glottal stops, palatal stops, uvular, velar stops and nasal fricatives which are non-native in Telugu.Keywords: cleft palate, compensatory articulation, spectrographic analysis, PRAAT
Procedia PDF Downloads 442923 MIMIC: A Multi Input Micro-Influencers Classifier
Authors: Simone Leonardi, Luca Ardito
Abstract:
Micro-influencers are effective elements in the marketing strategies of companies and institutions because of their capability to create an hyper-engaged audience around a specific topic of interest. In recent years, many scientific approaches and commercial tools have handled the task of detecting this type of social media users. These strategies adopt solutions ranging from rule based machine learning models to deep neural networks and graph analysis on text, images, and account information. This work compares the existing solutions and proposes an ensemble method to generalize them with different input data and social media platforms. The deployed solution combines deep learning models on unstructured data with statistical machine learning models on structured data. We retrieve both social media accounts information and multimedia posts on Twitter and Instagram. These data are mapped into feature vectors for an eXtreme Gradient Boosting (XGBoost) classifier. Sixty different topics have been analyzed to build a rule based gold standard dataset and to compare the performances of our approach against baseline classifiers. We prove the effectiveness of our work by comparing the accuracy, precision, recall, and f1 score of our model with different configurations and architectures. We obtained an accuracy of 0.91 with our best performing model.Keywords: deep learning, gradient boosting, image processing, micro-influencers, NLP, social media
Procedia PDF Downloads 183922 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours
Authors: Elham Rajabian
Abstract:
The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture
Procedia PDF Downloads 97921 Feature Based Unsupervised Intrusion Detection
Authors: Deeman Yousif Mahmood, Mohammed Abdullah Hussein
Abstract:
The goal of a network-based intrusion detection system is to classify activities of network traffics into two major categories: normal and attack (intrusive) activities. Nowadays, data mining and machine learning plays an important role in many sciences; including intrusion detection system (IDS) using both supervised and unsupervised techniques. However, one of the essential steps of data mining is feature selection that helps in improving the efficiency, performance and prediction rate of proposed approach. This paper applies unsupervised K-means clustering algorithm with information gain (IG) for feature selection and reduction to build a network intrusion detection system. For our experimental analysis, we have used the new NSL-KDD dataset, which is a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 60.0% for the training set and the remainder for the testing set, a 2 class classifications have been implemented (Normal, Attack). Weka framework which is a java based open source software consists of a collection of machine learning algorithms for data mining tasks has been used in the testing process. The experimental results show that the proposed approach is very accurate with low false positive rate and high true positive rate and it takes less learning time in comparison with using the full features of the dataset with the same algorithm.Keywords: information gain (IG), intrusion detection system (IDS), k-means clustering, Weka
Procedia PDF Downloads 296920 Web Proxy Detection via Bipartite Graphs and One-Mode Projections
Authors: Zhipeng Chen, Peng Zhang, Qingyun Liu, Li Guo
Abstract:
With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies.Keywords: bipartite graph, one-mode projection, clustering, web proxy detection
Procedia PDF Downloads 245919 Monocular Depth Estimation Benchmarking with Thermal Dataset
Authors: Ali Akyar, Osman Serdar Gedik
Abstract:
Depth estimation is a challenging computer vision task that involves estimating the distance between objects in a scene and the camera. It predicts how far each pixel in the 2D image is from the capturing point. There are some important Monocular Depth Estimation (MDE) studies that are based on Vision Transformers (ViT). We benchmark three major studies. The first work aims to build a simple and powerful foundation model that deals with any images under any condition. The second work proposes a method by mixing multiple datasets during training and a robust training objective. The third work combines generalization performance and state-of-the-art results on specific datasets. Although there are studies with thermal images too, we wanted to benchmark these three non-thermal, state-of-the-art studies with a hybrid image dataset which is taken by Multi-Spectral Dynamic Imaging (MSX) technology. MSX technology produces detailed thermal images by bringing together the thermal and visual spectrums. Using this technology, our dataset images are not blur and poorly detailed as the normal thermal images. On the other hand, they are not taken at the perfect light conditions as RGB images. We compared three methods under test with our thermal dataset which was not done before. Additionally, we propose an image enhancement deep learning model for thermal data. This model helps extract the features required for monocular depth estimation. The experimental results demonstrate that, after using our proposed model, the performance of these three methods under test increased significantly for thermal image depth prediction.Keywords: monocular depth estimation, thermal dataset, benchmarking, vision transformers
Procedia PDF Downloads 32918 Business Education and Passion: The Place of Amore, Consciousness, Discipline, and Commitment as Holonomic Constructs in Pedagogy, A Conceptual Exploration
Authors: Jennifer K. Bowerman, Rhonda L. Reich
Abstract:
The purpose of this paper is to explore the concepts ACDC (Amore, Consciousness, Discipline, and Commitment) which the authors first discovered as a philosophy and framework for recruitment and organizational development in a successful start-up tech company in Brazil. This paper represents an exploration of these concepts as a potential pedagogical foundation for undergraduate business education in the classroom. It explores whether their application has potential to build emotional and practical resilience in the face of constant organizational and societal change. Derived from Holonomy this paper explains the concepts and develops a narrative around how change influences the operation of organizations. Using examples from leading edge organizational theorists, it explains why a different educational approach grounded in ACDC concepts may not only have relevance for the working world, but also for undergraduates about to enter that world. The authors propose that in the global context of constant change, it makes sense to develop an approach to education, particularly business education, beyond cognitive knowledge, models and tools, in such a way that emotional and practical resilience and creative thinking may be developed. Using the classroom as an opportunity to explore these concepts, and aligning personal passion with the necessary discipline and commitment, may provide students with a greater sense of their own worth and potential as they venture into their ever-changing futures.Keywords: ACDC, holonomic thinking, organizational learning, organizational change, business pedagogy
Procedia PDF Downloads 239917 A Study of Faculty Development Programs in India to Assist Pedagogy and Curriculum Development
Authors: Chhavi Rana, Sanjay K Jain
Abstract:
All sides of every education debate agree that quality learning happens when knowledgeable, caring teachers use sound pedagogy. Many deliberations of pedagogy make the fault of considering it as principally being about teaching. There has been lot of research about how to build a positive climate for learning, improve student curiosity, and enhance classroom association. However, these things can only be facilitated when teachers are equipped with better teaching techniques that use sound and accurate pedagogy. Pedagogy is the science and art of education. Its aims range from the full development of the human being to skills acquisition. In India, a project named Mission 10 x has been started by an esteemed IT Corporation Wipro as a faculty development programme (FDP) that particularly focus on elements that facilitated teachers in developing curriculum and new pedagogies that can lead to improvement in student engagement. This paper presents a study of these FDPs and examines (1) the parameters that help teachers in building new pedagogies (2) the extent to which appropriate usage of pedagogy is improved after the conduct of Mission 10 x FDPs, and (3) whether institutions differ in terms of their ability to convert usage of improved pedagogy into academic performance via these FDPs. The sample consisted of 2,236 students at 6 four-year engineering colleges and universities that completed several FDPs during 2012-2014. Many measures of usage of better pedagogy were linked positively with such FDPs, although some of the relationships were weak in strength. The results suggest that the usage of pedagogy were more benefited after conducting these FDPs and application of novel approaches in conducting classes.Keywords: student engagement, critical thinking; achievement, student learning, pedagogy
Procedia PDF Downloads 421916 Establishing a Change Management Model for Precision Machinery Industry in Taiwan
Authors: Feng-Tsung Cheng, Shu-Li Wang, Mei-Fang Wu, , Hui-Yu Chuang
Abstract:
Due to the rapid development of modern technology, the widespread usage of the Internet makes business environment changing quickly. In order to be a leader in the global competitive market and to pursuit survive, “changing” becomes an unspoken rules need to follow for the company survival. The purpose of this paper is to build change model by using SWOT, strategy map, and balance scorecard, KPI and change management theory. The research findings indicate that organizational change plan formulated by the case company should require the employee to resist change factors and performance management system issues into consideration and must be set organizational change related programs, such as performance appraisal reward system, consulting and counseling mechanisms programs to improve motivation and reduce staff negative emotions. Then according to the model revised strategy maps and performance indicators proposed in this paper, such as strategy maps add and modify corporate culture, improve internal processes management, increase the growth rate of net income and other strategies. The performance indicators are based on strategy maps new and modified by adding net income growth rate, to achieve target production rate, manpower training achievement rates and other indicators, through amendments to achieve the company’s goal, be a leading brand of precision machinery industry.Keywords: organizational change, SWOT analysis, strategy maps, performance indicators
Procedia PDF Downloads 284915 A Methodological Concept towards a Framework Development for Social Software Adoption in Higher Education System
Authors: Kenneth N. Ohei, Roelien Brink
Abstract:
For decades, teaching and learning processes have centered on the traditional approach (Web 1.0) that promoted teacher-directed pedagogical practices. Currently, there is a realization that the traditional approach is not adequate to effectively address and improve all student-learning outcomes. The subsequent incorporation of social software, Information, and Communication Technology (ICT) tools in universities may serve as complementary to support educational goals, offering students the affordability and opportunity to educational choices and learning platforms. Consequently, educators’ inability to incorporate these instructional ICT tools in their teaching and learning practices remains a challenge. This will signify that educators still lack the ICT skills required to administer lectures and bridging learning gaps. This study probes a methodological concept with the aim of developing a framework towards the adoption of social software in HES to help facilitate business processes and can build social presence among students. A mixed method will be appropriate to develop a comprehensive framework needed in Higher Educational System (HES). After research have been conducted, the adoption of social software will be based on the developed comprehensive framework which is supposed to impact positively on education and approach of delivery, improves learning experience, engagement and finally, increases educational opportunities and easy access to educational contents.Keywords: blended and integrated learning, learning experience and engagement, higher educational system, HES, information and communication technology, ICT, social presence, Web 1.0, Web 2.0, Web 3.0
Procedia PDF Downloads 157