Search results for: Research information systems (RIS)
35994 Stability of Hybrid Systems
Authors: Kreangkri Ratchagit
Abstract:
This paper is concerned with exponential stability of switched linear systems with interval time-varying delays. The time delay is any continuous function belonging to a given interval, in which the lower bound of delay is not restricted to zero. By constructing a suitable augmented Lyapunov-Krasovskii functional combined with Leibniz-Newton’s formula, a switching rule for the exponential stability of switched linear systems with interval time-varying delays and new delay-dependent sufficient conditions for the exponential stability of the systems are first established in terms of LMIs. Finally, some examples are exploited to illustrate the effectiveness of the proposed schemes.Keywords: exponential stability, hybrid systems, timevarying delays, Lyapunov-Krasovskii functional, Leibniz-Newton’s formula
Procedia PDF Downloads 45835993 Modern Construction Methods and Technologies and Their Impacts on Construction Projects
Authors: Michael Anthony Doherty
Abstract:
Modern Methods of Construction (MMC) is a significant topic in the construction industry; while reviewing (MMC) over different fields that are significant in the modern construction world, the following areas were assessed where (MMC) is developing, supply chain management, automation, digital technology, and new construction technologies. Different methods were considered as an approach to research and exploring areas highlighted within the construction industry that are making advancements using Modern Methods of Construction Methods and Technologies (MCMTs). The research was conducted using the following methodologies, literature review of academic sources, primary and secondary data sources, questionaries, and interviews. The paper is composed of two parts, firstly a literature review and secondly a questionnaire used as the basis for interviews were utilised to achieve the following key objectives: to identify (MCMTs) being implemented in the construction industry, research and compile information with regards to these methods, determine their purpose and their application in the industry, establishing what (MCMTs) are being used in the industry while also determining the success of the methods. The research considers the evolution and development of these methods in projects and within the industry itself. Major findings were as follows; automation technologies such as robotics, offsite fabrication utilising automated production lines are increasingly part of project execution, digital technologies such as AR and VR are increasingly utilised in project co-ordination, (MMCTs) are proving to be a solution to the construction industry problems such as a lack of skilled workforce, hazardous work tasks, and situations, new construction technologies are available and finding their place in mainstream construction, (SCM) and (GSCM) are evolving to new levels using new systems and technologies such as block chain technology as well as Company Size and Project size influence the use of (MMCTs) and the adoption of (MMCTS). In summary the paper endeavours to identify and detail how areas of (MMCTs) are developing and are gaining traction within mainstream construction.Keywords: automation, digital technology, new construction technologies, supply chain management
Procedia PDF Downloads 6435992 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes
Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi
Abstract:
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing
Procedia PDF Downloads 30635991 Key Success Factors of Customer Relationship Management: An Empirical Study of Tunisian Firms
Authors: Khlif Hamadi
Abstract:
Customer Relationship Management has become the main interest of researchers and practitioners especially in the domains of Management and Information Systems (IS). This paper is an overview of success factors that could facilitate successful adoption of CRM. There are 2 factors: the organizational climate and the capacity for innovation. The survey was developed with 200 CRM users. Empirical research is in the positivist paradigm based on the hypothetico-deductive method. Indeed, the approach adopted is the quantitative approach based on a questionnaire complied by Tunisian companies operating in different sectors of activity. For the data analyses, the structural equations method was used to conduct our exploratory and confirmatory analysis. The results revealed that the creative organizational climate and high innovation capacity positively influence the success of CRM practice.Keywords: CRM practices, innovation capacity, organizational climate, the structural equation
Procedia PDF Downloads 11735990 The Role of Law in Promoting Democratic Governance
Authors: Mozamil Mohamed Ali
Abstract:
Understanding the relationship between law and democratic governance, this research, titled “The Role of Law in Enhancing Democratic Governance: A Comparative Study of Political Systems in Developing Countries,” focuses on examining the impact of legal frameworks on strengthening democratic practices within developing nations. Democratic governance requires transparency and institutional accountability to meet citizens’ needs, which necessitates legal frameworks that ensure compliance with governance standards. These frameworks hold greater significance in developing countries, where challenges such as corruption, weak public institutions, and socio-political conflicts affect their ability to achieve sustainable democratic governance. In this context, the research explores how laws influence these aspects. The study compares various developing countries that have experienced different levels of success and difficulty in enhancing democratic governance, focusing on the legal frameworks and public policies each country has implemented to improve transparency, accountability, and strengthen the role of public institutions. This comparative analysis aims to reveal the effectiveness of legal systems in supporting democratic governance and to identify the factors that lead to the success or failure of these legal frameworks in different contexts. For example, the study includes cases from countries in Asia, Africa, and Latin America, analyzing the legal and institutional policies and their roles in achieving justice and reducing corruption. It examines the impact of legislation that promotes freedom of the press, human rights, and judicial independence as fundamental elements for transparent and democratic governance. Additionally, the research discusses how anti-corruption policies and laws governing electoral competition contribute to improving government responsiveness to public demands. The hypothesis of the research centers on the idea that developing transparent and fair laws contributes to achieving sustainable democratic governance. The analyses show that applying laws equally and impartially strengthens citizens’ trust in public institutions and encourages political participation. At the same time, the research highlights the importance of local adaptation to global legal frameworks, as it may be necessary to consider local socio-political and economic contexts to ensure the success of these frameworks. In conclusion, this research underscores the importance of legal frameworks as a pivotal factor in the success of democratic governance. It provides recommendations related to enhancing judicial independence, enforcing anti-corruption laws, and improving access to information as essential steps for strengthening democratic governance in developing countries. The findings suggest that laws respected and carefully implemented can form a solid foundation for building more transparent and effective government institutions, contributing to sustainable development and social justice in these nations.Keywords: impact of legislation, role of institutions in controlling power, community participation, role of the judiciary
Procedia PDF Downloads 2235989 Spatio-Temporal Pest Risk Analysis with ‘BioClass’
Authors: Vladimir A. Todiras
Abstract:
Spatio-temporal models provide new possibilities for real-time action in pest risk analysis. It should be noted that estimation of the possibility and probability of introduction of a pest and of its economic consequences involves many uncertainties. We present a new mapping technique that assesses pest invasion risk using online BioClass software. BioClass is a GIS tool designed to solve multiple-criteria classification and optimization problems based on fuzzy logic and level set methods. This research describes a method for predicting the potential establishment and spread of a plant pest into new areas using a case study: corn rootworm (Diabrotica spp.), tomato leaf miner (Tuta absoluta) and plum fruit moth (Grapholita funebrana). Our study demonstrated that in BioClass we can combine fuzzy logic and geographic information systems with knowledge of pest biology and environmental data to derive new information for decision making. Pests are sensitive to a warming climate, as temperature greatly affects their survival and reproductive rate and capacity. Changes have been observed in the distribution, frequency and severity of outbreaks of Helicoverpa armigera on tomato. BioClass has demonstrated to be a powerful tool for applying dynamic models and map the potential future distribution of a species, enable resource to make decisions about dangerous and invasive species management and control.Keywords: classification, model, pest, risk
Procedia PDF Downloads 28235988 Sustainable Mitigation of Urban Stormwater Runoff: The Applicability of Green Infrastructure Approach in Finnish Climate
Authors: Rima Almalla
Abstract:
The purpose of the research project in Geography is to evaluate the applicability of urban green infrastructure approach in Finnish climate. The key focus will be on the operation and efficiency of green infrastructure on urban stormwater management. Green infrastructure approach refers to the employment of sufficient green covers as a modern and smart environmental solution to improve the quality of urban environments. Green infrastructure provides a wide variety of micro-scale ecosystem services, such as stormwater runoff management, regulation of extreme air temperatures, reduction of energy consumption, plus a variety of social benefits and human health and wellbeing. However, the cold climate of Finland with seasonal ground frost, snow cover and relatively short growing season bring about questions of whether green infrastructure works as efficiently as expected. To tackle this question, green infrastructure solutions will be studied and analyzed with manifold methods: stakeholder perspectives regarding existing and planned GI solutions will be collected by web based questionnaires, semi structured interviews and group discussions, and analyzed in both qualitative and quantitative methods. Targeted empirical field campaigns will be conducted on selected sites. A systematic literature review with global perspective will support the analyses. The findings will be collected, compiled and analyzed using geographic information systems (GIS). The findings of the research will improve our understanding of the functioning of green infrastructure in the Finnish environment in urban stormwater management, as a landscape element for citizens’ wellbeing, and in climate change mitigation and adaptation. The acquired information will be shared with stakeholders in interactive co-design workshops. As green covers have great demand and potential globally, the conclusions will have relevance in other cool climate regions and may support Finnish business in green infrastructure sector.Keywords: climate change adaptation, climate change, green infrastructure, stormwater
Procedia PDF Downloads 16635987 Exploring the Correlation between Students' Performance in Educational Statistics and Research Methods in Education: The Influence of Undergraduate Programs
Authors: Justice Dadzie, Stacy H. Surman, Ruth K. Annan-Brew, Ifesinachi J. Ezugwu, Evans Addison
Abstract:
This study aimed to explore the correlation between students' performance in educational statistics and research methods in education, as well as investigate potential differences in performance based on their undergraduate programs. A cross-sectional design was employed, and data was collected from 170 students enrolled in master of philosophy programs in the department of education and psychology. The correlation analysis revealed a strong positive correlation between students' performance in intermediate statistics in education and research methods in education. This indicates a close relationship between the two domains. The MANOVA analysis showed no significant differences in the linear combination of intermediate statistics in education and research methods in education scores across the different undergraduate programs. The tests of between-subjects effects further confirmed that the student's performance in intermediate statistics in education and research methods in education did not differ significantly across the different undergraduate programs. These findings contribute to the existing literature by providing insights into the correlation between educational statistics and research methods, and the influence of undergraduate program backgrounds on students' performance in these domains. The strong positive correlation between intermediate statistics and research methods highlights the importance of a solid foundation in statistics for understanding and applying research methods. Moreover, the consistent relationship across different academic backgrounds emphasizes the need for targeted interventions and support systems to enhance graduate students' competencies in these critical areas.Keywords: educational statistics, research methods, undergraduate programs, students performance
Procedia PDF Downloads 4435986 Agent/Group/Role Organizational Model to Simulate an Industrial Control System
Authors: Noureddine Seddari, Mohamed Belaoued, Salah Bougueroua
Abstract:
The modeling of complex systems is generally based on the decomposition of their components into sub-systems easier to handle. This division has to be made in a methodical way. In this paper, we introduce an industrial control system modeling and simulation based on the Multi-Agent System (MAS) methodology AALAADIN and more particularly the underlying conceptual model Agent/Group/Role (AGR). Indeed, in this division using AGR model, the overall system is decomposed into sub-systems in order to improve the understanding of regulation and control systems, and to simplify the implementation of the obtained agents and their groups, which are implemented using the Multi-Agents Development KIT (MAD-KIT) platform. This approach appears to us to be the most appropriate for modeling of this type of systems because, due to the use of MAS, it is possible to model real systems in which very complex behaviors emerge from relatively simple and local interactions between many different individuals, therefore a MAS is well adapted to describe a system from the standpoint of the activity of its components, that is to say when the behavior of the individuals is complex (difficult to describe with equations). The main aim of this approach is the take advantage of the performance, the scalability and the robustness that are intuitively provided by MAS.Keywords: complex systems, modeling and simulation, industrial control system, MAS, AALAADIN, AGR, MAD-KIT
Procedia PDF Downloads 23935985 Identifying Barriers of Implementing Building Information Modelling in Construction
Authors: Kasra HosseinMostofi, Mohamadamin Oyar Hossein, Reza Mehdizadeh Anvigh
Abstract:
BIM is an innovative concept for the majority of firms operating in industry. BIM offers a new paradigm to design, construct, operate, and maintain a facility. However, even with the most conscientious use, stakeholders can run into trouble during its implementation on a project or within an organization. At times, project stakeholders are unaware of the challenges that they can face with the implementation at the project level or an organizational level. Therefore, the study aimed to identify and compile barriers associated with the BIM implementation at the project and organizational level, as per the literature. Despite the fact that innumerable advantageous involved in exploiting BIM, there are some barriers to implement it properly. These barriers have been proved as impediments for academicians and members of construction team project to take the maximum advantage of its utilization. Although some research has been conducted to identify these barriers regarding BIM implementation in construction industry, more research is needed to be carried out among academicians to identify these barriers in institutions, and most importantly, to make suggestions for eliminating these obstacles.Keywords: building information modelling, construction, design and construction, designers
Procedia PDF Downloads 18435984 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems
Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi
Abstract:
The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks
Procedia PDF Downloads 35335983 Knowledge Management Strategies within a Corporate Environment of Papers
Authors: Daniel J. Glauber
Abstract:
Knowledge transfer between personnel could benefit an organization’s improved competitive advantage in the marketplace from a strategic approach to knowledge management. The lack of information sharing between personnel could create knowledge transfer gaps while restricting the decision-making processes. Knowledge transfer between personnel can potentially improve information sharing based on an implemented knowledge management strategy. An organization’s capacity to gain more knowledge is aligned with the organization’s prior or existing captured knowledge. This case study attempted to understand the overall influence of a KMS within the corporate environment and knowledge exchange between personnel. The significance of this study was to help understand how organizations can improve the Return on Investment (ROI) of a knowledge management strategy within a knowledge-centric organization. A qualitative descriptive case study was the research design selected for this study. The lack of information sharing between personnel may create knowledge transfer gaps while restricting the decision-making processes. Developing a knowledge management strategy acceptable at all levels of the organization requires cooperation in support of a common organizational goal. Working with management and executive members to develop a protocol where knowledge transfer becomes a standard practice in multiple tiers of the organization. The knowledge transfer process could be measurable when focusing on specific elements of the organizational process, including personnel transition to help reduce time required understanding the job. The organization studied in this research acknowledged the need for improved knowledge management activities within the organization to help organize, retain, and distribute information throughout the workforce. Data produced from the study indicate three main themes including information management, organizational culture, and knowledge sharing within the workforce by the participants. These themes indicate a possible connection between an organizations KMS, the organizations culture, knowledge sharing, and knowledge transfer.Keywords: knowledge transfer, management, knowledge management strategies, organizational learning, codification
Procedia PDF Downloads 44235982 Between AACR2 and RDA What Changes Occurs in Them
Authors: Ibrahim Abdullahi Mohammad
Abstract:
A library catalogue exists not only as an inventory of the collections of the particular library, but also as a retrieval device. It is provided to assist the library user in finding whatever information or information resources they may be looking for. The paper proposes that this location objective of the library catalogue can only be fulfilled, if the library catalogue is constructed, bearing in mind the information needs and searching behavior of the library user. Comparing AACR2 and RDA viz-a-viz the changes RDA has introduced into bibliographic standards, the paper tries to establish the level of viability of RDA in relation to AACR2.Keywords: library catalogue, information retrieval, AACR2, RDA
Procedia PDF Downloads 5435981 A Research Using Remote Monitoring Technology for Pump Output Monitoring in Distributed Fuel Stations in Nigeria
Authors: Ofoegbu Ositadinma Edward
Abstract:
This research paper discusses a web based monitoring system that enables effective monitoring of fuel pump output and sales volume from distributed fuel stations under the domain of a single company/organization. The traditional method of operation by these organizations in Nigeria is non-automated and accounting for dispensed product is usually approximated and manual as there is little or no technology implemented to presently provide information relating to the state of affairs in the station both to on-ground staff and to supervisory staff that are not physically present in the station. This results in unaccountable losses in product and revenue as well as slow decision making. Remote monitoring technology as a vast research field with numerous application areas incorporating various data collation techniques and sensor networks can be applied to provide information relating to fuel pump status in distributed fuel stations reliably. Thus, the proposed system relies upon a microcontroller, keypad and pump to demonstrate the traditional fuel dispenser. A web-enabled PC with an accompanying graphic user interface (GUI) was designed using virtual basic which is connected to the microcontroller via the serial port which is to provide the web implementation.Keywords: fuel pump, microcontroller, GUI, web
Procedia PDF Downloads 43335980 Impacts of Climate Change and Natural Gas Operations on the Hydrology of Northeastern BC, Canada: Quantifying the Water Budget for Coles Lake
Authors: Sina Abadzadesahraei, Stephen Déry, John Rex
Abstract:
Climate research has repeatedly identified strong associations between anthropogenic emissions of ‘greenhouses gases’ and observed increases of global mean surface air temperature over the past century. Studies have also demonstrated that the degree of warming varies regionally. Canada is not exempt from this situation, and evidence is mounting that climate change is beginning to cause diverse impacts in both environmental and socio-economic spheres of interest. For example, northeastern British Columbia (BC), whose climate is controlled by a combination of maritime, continental and arctic influences, is warming at a greater rate than the remainder of the province. There are indications that these changing conditions are already leading to shifting patterns in the region’s hydrological cycle, and thus its available water resources. Coincident with these changes, northeastern BC is undergoing rapid development for oil and gas extraction: This depends largely on subsurface hydraulic fracturing (‘fracking’), which uses enormous amounts of freshwater. While this industrial activity has made substantial contributions to regional and provincial economies, it is important to ensure that sufficient and sustainable water supplies are available for all those dependent on the resource, including ecological systems. In this turn demands a comprehensive understanding of how water in all its forms interacts with landscapes, the atmosphere, and of the potential impacts of changing climatic conditions on these processes. The aim of this study is therefore to characterize and quantify all components of the water budget in the small watershed of Coles Lake (141.8 km², 100 km north of Fort Nelson, BC), through a combination of field observations and numerical modelling. Baseline information will aid the assessment of the sustainability of current and future plans for freshwater extraction by the oil and gas industry, and will help to maintain the precarious balance between economic and environmental well-being. This project is a perfect example of interdisciplinary research, in that it not only examines the hydrology of the region but also investigates how natural gas operations and growth can affect water resources. Therefore, a fruitful collaboration between academia, government and industry has been established to fulfill the objectives of this research in a meaningful manner. This project aims to provide numerous benefits to BC communities. Further, the outcome and detailed information of this research can be a huge asset to researchers examining the effect of climate change on water resources worldwide.Keywords: northeastern British Columbia, water resources, climate change, oil and gas extraction
Procedia PDF Downloads 26435979 Indium-Gallium-Zinc Oxide Photosynaptic Device with Alkylated Graphene Oxide for Optoelectronic Spike Processing
Authors: Seyong Oh, Jin-Hong Park
Abstract:
Recently, neuromorphic computing based on brain-inspired artificial neural networks (ANNs) has attracted huge amount of research interests due to the technological abilities to facilitate massively parallel, low-energy consuming, and event-driven computing. In particular, research on artificial synapse that imitate biological synapses responsible for human information processing and memory is in the spotlight. Here, we demonstrate a photosynaptic device, wherein a synaptic weight is governed by a mixed spike consisting of voltage and light spikes. Compared to the device operated only by the voltage spike, ∆G in the proposed photosynaptic device significantly increased from -2.32nS to 5.95nS with no degradation of nonlinearity (NL) (potentiation/depression values were changed from 4.24/8 to 5/8). Furthermore, the Modified National Institute of Standards and Technology (MNIST) digit pattern recognition rates improved from 36% and 49% to 50% and 62% in ANNs consisting of the synaptic devices with 20 and 100 weight states, respectively. We expect that the photosynaptic device technology processed by optoelectronic spike will play an important role in implementing the neuromorphic computing systems in the future.Keywords: optoelectronic synapse, IGZO (Indium-Gallium-Zinc Oxide) photosynaptic device, optoelectronic spiking process, neuromorphic computing
Procedia PDF Downloads 17335978 The Influence of Online Marketing Tactics in Tourist Destination Reputation: Egypt as a Case Study
Authors: Alyaa Darwish, Peter Burns, Sofia Reino
Abstract:
Online marketing has been the key focus of attention for the majority of destinations since the Internet became the primarily information tool for travel marketing. Tourism is a reputation-dependent industry; potential travelers who do not have previous experience with the destination face numerous risks during the process of decision-making. An accurate perception of the destination’s reputation helps to minimize risk against unsatisfying travel experiences. However, there has been limited investigation with regards to the reputation of tourist destination. Taking the importance of reputation to the tourism industry, this research aims to: 1) Develop a destination reputation model; 2) Assess the tourist destination approach towards online marketing tactics; 3) Evaluate the impact of differentiated online marketing tactics on reputation; and 4) Measure the potential for using online marketing tactics to manage the destination’s online reputation. This research follows an interpretivism epistemological research approach through using four research methods; interviews, questionnaire, content analysis, and experiment to achieve the research goals.Keywords: destination reputation, online marketing, reputation, tactics
Procedia PDF Downloads 35535977 A Qualitative Research of Online Fraud Decision-Making Process
Authors: Semire Yekta
Abstract:
Many online retailers set up manual review teams to overcome the limitations of automated online fraud detection systems. This study critically examines the strategies they adapt in their decision-making process to set apart fraudulent individuals from non-fraudulent online shoppers. The study uses a mix method research approach. 32 in-depth interviews have been conducted alongside with participant observation and auto-ethnography. The study found out that all steps of the decision-making process are significantly affected by a level of subjectivity, personal understandings of online fraud, preferences and judgments and not necessarily by objectively identifiable facts. Rather clearly knowing who the fraudulent individuals are, the team members have to predict whether they think the customer might be a fraudster. Common strategies used are relying on the classification and fraud scorings in the automated fraud detection systems, weighing up arguments for and against the customer and making a decision, using cancellation to test customers’ reaction and making use of personal experiences and “the sixth sense”. The interaction in the team also plays a significant role given that some decisions turn into a group discussion. While customer data represent the basis for the decision-making, fraud management teams frequently make use of Google search and Google Maps to find out additional information about the customer and verify whether the customer is the person they claim to be. While this, on the one hand, raises ethical concerns, on the other hand, Google Street View on the address and area of the customer puts customers living in less privileged housing and areas at a higher risk of being classified as fraudsters. Phone validation is used as a final measurement to make decisions for or against the customer when previous strategies and Google Search do not suffice. However, phone validation is also characterized by individuals’ subjectivity, personal views and judgment on customer’s reaction on the phone that results in a final classification as genuine or fraudulent.Keywords: online fraud, data mining, manual review, social construction
Procedia PDF Downloads 34335976 Characterization and Geochemical Modeling of Cu and Zn Sorption Using Mixed Mineral Systems Injected with Iron Sulfide under Sulfidic-Anoxic Conditions I: Case Study of Cwmheidol Mine Waste Water, Wales, United Kingdom
Authors: D. E. Egirani, J. E. Andrews, A. R. Baker
Abstract:
This study investigates sorption of Cu and Zn contained in natural mine wastewater, using mixed mineral systems in sulfidic-anoxic condition. The mine wastewater was obtained from disused mine workings at Cwmheidol in Wales, United Kingdom. These contaminants flow into water courses. These water courses include River Rheidol. In this River fishing activities exist. In an attempt to reduce Cu-Zn levels of fish intake in the watercourses, single mineral systems and 1:1 mixed mineral systems of clay and goethite were tested with the mine waste water for copper and zinc removal at variable pH. Modelling of hydroxyl complexes was carried out using phreeqc method. Reactions using batch mode technique was conducted at room temperature. There was significant differences in the behaviour of copper and zinc removal using mixed mineral systems when compared to single mineral systems. All mixed mineral systems sorb more Cu than Zn when tested with mine wastewater.Keywords: Cu- Zn, hydroxyl complexes, kinetics, mixed mineral systems, reactivity
Procedia PDF Downloads 49935975 Implementation of a Web-Based Wireless ECG Measuring and Recording System
Authors: Onder Yakut, Serdar Solak, Emine Dogru Bolat
Abstract:
Measuring the Electrocardiogram (ECG) signal is an essential process for the diagnosis of the heart diseases. The ECG signal has the information of the degree of how much the heart performs its functions. In medical diagnosis and treatment systems, Decision Support Systems processing the ECG signal are being developed for the use of clinicians while medical examination. In this study, a modular wireless ECG (WECG) measuring and recording system using a single board computer and e-Health sensor platform is developed. In this designed modular system, after the ECG signal is taken from the body surface by the electrodes first, it is filtered and converted to digital form. Then, it is recorded to the health database using Wi-Fi communication technology. The real time access of the ECG data is provided through the internet utilizing the developed web interface.Keywords: ECG, e-health sensor shield, Raspberry Pi, wiFi technology
Procedia PDF Downloads 40035974 Indirect Environmental Benefits from Cloud Computing Information and Communications Technology Integration in Rural Agricultural Communities
Authors: Jeana Cadby, Kae Miyazawa
Abstract:
With rapidly expanding worldwide adoption of mobile technologies, Information and Communication Technology (ITC) is a major energy user and a contributor to global carbon emissions, due to infrastructure and operational energy consumption. The agricultural sector is also significantly responsible for contributing to global carbon emissions. However, ICT cloud computing using mobile technology can directly reduce environmental impacts in the agricultural sector through applications and mobile connectivity, such as precision fertilizer and pesticide applications, or access to weather data, for example. While direct impacts are easily calculated, indirect environmental impacts from ICT cloud computing usage have not been thoroughly investigated. For example, while women may be more poorly equipped for adaptation to environmentally sustainable agricultural practices due to resource constraints, this research concludes that indirect environmental benefits can be achieved by improving rural access to mobile technology for women. Women in advanced roles and secure land tenure are more likely to invest in long-term agricultural conservation strategies, which protect against environmental degradation. This study examines how ICT using mobile technology advances the role of women in rural agricultural systems and indirectly reduces environmental impacts from agricultural production, through literature examination from secondary sources. Increasing access for women to ICT mobile technology provides indirect environmental and social benefits in the rural agricultural sector.Keywords: cloud computing, environmental benefits, mobile technology, women
Procedia PDF Downloads 16935973 Developing a Model for Information Giving Behavior in Virtual Communities
Authors: Pui-Lai To, Chechen Liao, Tzu-Ling Lin
Abstract:
Virtual communities have created a range of new social spaces in which to meet and interact with one another. Both as a stand-alone model or as a supplement to sustain competitive advantage for normal business models, building virtual communities has been hailed as one of the major strategic innovations of the new economy. However for a virtual community to evolve, the biggest challenge is how to make members actively give information or provide advice. Even in busy virtual communities, usually, only a small fraction of members post information actively. In order to investigate the determinants of information giving willingness of those contributors who usually actively provide their opinions, we proposed a model to understand the reasons for contribution in communities. The study will definitely serve as a basis for the future growth of information giving in virtual communities.Keywords: information giving, social identity, trust, virtual community
Procedia PDF Downloads 32235972 A Strategic Approach in Utilising Limited Resources to Achieve High Organisational Performance
Authors: Collen Tebogo Masilo, Erik Schmikl
Abstract:
The demand for the DataMiner product by customers has presented a great challenge for the vendor in Skyline Communications in deploying its limited resources in the form of human resources, financial resources, and office space, to achieve high organisational performance in all its international operations. The rapid growth of the organisation has been unable to efficiently support its existing customers across the globe, and provide services to new customers, due to the limited number of approximately one hundred employees in its employ. The combined descriptive and explanatory case study research methods were selected as research design, making use of a survey questionnaire which was distributed to a sample of 100 respondents. A sample return of 89 respondents was achieved. The sampling method employed was non-probability sampling, using the convenient sampling method. Frequency analysis and correlation between the subscales (the four themes) were used for statistical analysis to interpret the data. The investigation was conducted into mechanisms that can be deployed to balance the high demand for products and the limited production capacity of the company’s Belgian operations across four aspects: demand management strategies, capacity management strategies, communication methods that can be used to align a sales management department, and reward systems in use to improve employee performance. The conclusions derived from the theme ‘demand management strategies’ are that the company is fully aware of the future market demand for its products. However, there seems to be no evidence that there is proper demand forecasting conducted within the organisation. The conclusions derived from the theme 'capacity management strategies' are that employees always have a lot of work to complete during office hours, and, also, employees seem to need help from colleagues with urgent tasks. This indicates that employees often work on unplanned tasks and multiple projects. Conclusions derived from the theme 'communication methods used to align sales management department with operations' are that communication is not good throughout the organisation. This means that information often stays with management, and does not reach non-management employees. This also means that there is a lack of smooth synergy as expected and a lack of good communication between the sales department and the projects office. This has a direct impact on the delivery of projects to customers by the operations department. The conclusions derived from the theme ‘employee reward systems’ are that employees are motivated, and feel that they add value in their current functions. There are currently no measures in place to identify unhappy employees, and there are also no proper reward systems in place which are linked to a performance management system. The research has made a contribution to the body of research by exploring the impact of the four sub-variables and their interaction on the challenges of organisational productivity, in particular where an organisation experiences a capacity problem during its growth stage during tough economic conditions. Recommendations were made which, if implemented by management, could further enhance the organisation’s sustained competitive operations.Keywords: high demand for products, high organisational performance, limited production capacity, limited resources
Procedia PDF Downloads 14335971 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network
Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad
Abstract:
Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway
Procedia PDF Downloads 48235970 Repositioning Nigerian University Libraries for Effective Information Provision and Delivery in This Age of Globalization
Authors: S. O. Uwaifo
Abstract:
The paper examines the pivotal role of the library in university education through the provision of a wide range of information materials (print and non- print) required for the teaching, learning and research activities of the university. However certain impediments to the effectiveness of Nigerian university libraries, such as financial constraints, high foreign exchange, global disparities in accessing the internet, lack of local area networks, erratic electric power supply, absence of ICT literacy, poor maintenance culture, etc., were identified. Also, the necessity of repositioning Nigerian university libraries for effective information provision and delivery was stressed by pointing out their dividends, such as users’ access to Directory of Open Access Journals (DOAJ), Online Public Access Catalogue (OPAC), Institutional Repositories, Electronic Document Delivery, Social Media Networks, etc. It therefore becomes necessary for the libraries to be repositioned by way of being adequately automated or digitized for effective service delivery, in this age of globalization. Based on the identified barriers by this paper, some recommendations were proffered.Keywords: repositioning, Nigerian university libraries, effective information provision and delivery, globalization
Procedia PDF Downloads 32435969 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos
Abstract:
Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system
Procedia PDF Downloads 18335968 Gaussian Operations with a Single Trapped Ion
Authors: Bruna G. M. Araújo, Pedro M. M. Q. Cruz
Abstract:
In this letter, we review the literature of the major concepts that govern Gaussian quantum information. As we work with quantum information and computation with continuous variables, Gaussian states are needed to better describe these systems. Analyzing a single ion locked in a Paul trap we use the interaction picture to obtain a toolbox of Gaussian operations with the ion-laser interaction Hamiltionian. This is achieved exciting the ion through the combination of two lasers of distinct frequencies corresponding to different sidebands of the external degrees of freedom. First we study the case of a trap with 1 mode and then the case with 2 modes. In this way, we achieve different continuous variables gates just by changing the external degrees of freedom of the trap and combining the Hamiltonians of blue and red sidebands.Keywords: Paul trap, ion-laser interaction, Gaussian operations
Procedia PDF Downloads 68535967 The Management Information System for Convenience Stores: Case Study in 7 Eleven Shop in Bangkok
Authors: Supattra Kanchanopast
Abstract:
The purpose of this research is to develop and design a management information system for 7 eleven shop in Bangkok. The system was designed and developed to meet users’ requirements via the internet network by use of application software such as My SQL for database management, Apache HTTP Server for Web Server and PHP Hypertext Preprocessor for an interface between web server, database and users. The system was designed into two subsystems as the main system, or system for head office, and the branch system for branch shops. These consisted of three parts which are classified by user management as shop management, inventory management and Point of Sale (POS) management. The implementation of the MIS for the mini-mart shop, can lessen the amount of paperwork and reduce repeating tasks so it may decrease the capital of the business and support an extension of branches in the future as well.Keywords: convenience store, the management information system, inventory management, 7 eleven shop
Procedia PDF Downloads 48235966 Unified Theory of Acceptance and Use of Technology in Evaluating Voters' Intention Towards the Adoption of Electronic Forensic Election Audit System
Authors: Sijuade A. A., Oguntoye J. P., Awodoye O. O., Adedapo O. A., Wahab W. B., Okediran O. O., Omidiora E. O., Olabiyisi S. O.
Abstract:
Electronic voting systems have been introduced to improve the efficiency, accuracy, and transparency of the election process in many countries around the world, including Nigeria. However, concerns have been raised about the security and integrity of these systems. One way to address these concerns is through the implementation of electronic forensic election audit systems. This study aims to evaluate voters' intention to the adoption of electronic forensic election audit systems using the Unified Theory of Acceptance and Use of Technology (UTAUT) model. In the study, the UTAUT model which is a widely used model in the field of information systems to explain the factors that influence individuals' intention to use a technology by integrating performance expectancy, effort expectancy, social influence, facilitating conditions, cost factor and privacy factor to voters’ behavioural intention was proposed. A total of 294 sample data were collected from a selected population of electorates who had at one time or the other participated in at least an electioneering process in Nigeria. The data was then analyzed statistically using Partial Least Square Structural Equation Modeling (PLS-SEM). The results obtained show that all variables have a significant effect on the electorates’ behavioral intention to adopt the development and implementation of an electronic forensic election audit system in Nigeria.Keywords: election Audi, voters, UTAUT, performance expectancy, effort expectancy, social influence, facilitating condition social influence, facilitating conditions, cost factor, privacy factor, behavioural intention
Procedia PDF Downloads 7335965 A Review on Medical Image Registration Techniques
Authors: Shadrack Mambo, Karim Djouani, Yskandar Hamam, Barend van Wyk, Patrick Siarry
Abstract:
This paper discusses the current trends in medical image registration techniques and addresses the need to provide a solid theoretical foundation for research endeavours. Methodological analysis and synthesis of quality literature was done, providing a platform for developing a good foundation for research study in this field which is crucial in understanding the existing levels of knowledge. Research on medical image registration techniques assists clinical and medical practitioners in diagnosis of tumours and lesion in anatomical organs, thereby enhancing fast and accurate curative treatment of patients. Literature review aims to provide a solid theoretical foundation for research endeavours in image registration techniques. Developing a solid foundation for a research study is possible through a methodological analysis and synthesis of existing contributions. Out of these considerations, the aim of this paper is to enhance the scientific community’s understanding of the current status of research in medical image registration techniques and also communicate to them, the contribution of this research in the field of image processing. The gaps identified in current techniques can be closed by use of artificial neural networks that form learning systems designed to minimise error function. The paper also suggests several areas of future research in the image registration.Keywords: image registration techniques, medical images, neural networks, optimisaztion, transformation
Procedia PDF Downloads 177