Search results for: enterprise architecture implementation methodology
10232 Insight-Based Evaluation of a Map-Based Dashboard
Authors: Anna Fredriksson Häägg, Charlotte Weil, Niklas Rönnberg
Abstract:
Map-based dashboards are used for data exploration every day. The present study used an insight-based methodology for evaluating a map-based dashboard that presents research findings of water management and ecosystem services in the Amazon. In addition to analyzing the insights gained from using the dashboard, the evaluation method was compared to standardized questionnaires and task-based evaluations. The result suggests that the dashboard enabled the participants to gain domain-relevant, complex insights regarding the topic presented. Furthermore, the insight-based analysis highlighted unexpected insights and hypotheses regarding causes and potential adaptation strategies for remediation. Although time- and resource-consuming, the insight-based methodology was shown to have the potential of thoroughly analyzing how end users can utilize map-based dashboards for data exploration and decision making. Finally, the insight-based methodology is argued to evaluate tools in scenarios more similar to real-life usage compared to task-based evaluation methods.Keywords: visual analytics, dashboard, insight-based evaluation, geographic visualization
Procedia PDF Downloads 11610231 Impact of Alternative Fuel Feeding on Fuel Cell Performance and Durability
Authors: S. Rodosik, J. P. Poirot-Crouvezier, Y. Bultel
Abstract:
With the expansion of the hydrogen economy, Proton Exchange Membrane Fuel Cell (PEMFC) systems are often presented as promising energy converters suitable for transport applications. However, reaching a durability of 5000 h recommended by the U.S. Department of Energy and decreasing system cost are still major hurdles to their development. In order to increase the system efficiency and simplify the system without affecting the fuel cell lifetime, an architecture called alternative fuel feeding has been developed. It consists in a fuel cell stack divided into two parts, alternatively fed, implemented on a 5-kW system for real scale testing. The operation strategy can be considered close to Dead End Anode (DEA) with specific modifications to avoid water and nitrogen accumulation in the cells. The two half-stacks are connected in series to enable each stack to be alternatively fed. Water and nitrogen accumulated can be shifted from one half-stack to the other one according to the alternative feeding frequency. Thanks to the homogenization of water vapor along the stack, water management was improved. The operating conditions obtained at system scale are close to recirculation without the need of a pump or an ejector. In a first part, a performance comparison with the DEA strategy has been performed. At high temperature and low pressure (80°C, 1.2 bar), performance of alternative fuel feeding was higher, and the system efficiency increased. In a second part, in order to highlight the benefits of the architecture on the fuel cell lifetime, two durability tests, lasting up to 1000h, have been conducted. A test on the 5-kW system has been compared to a reference test performed on a test bench with a shorter stack, conducted with well-controlled operating parameters and flow-through hydrogen strategy. The durability test is based upon the Fuel Cell Dynamic Load Cycle (FC-DLC) protocol but adapted to the system limitations: without OCV steps and a maximum current density of 0.4 A/cm². In situ local measurements with a segmented S++® plate performed all along the tests, showed a more homogeneous distribution of the current density with alternative fuel feeding than in flow-through strategy. Tests performed in this work enabled the understanding of this architecture advantages and drawbacks. Alternative fuel feeding architecture appeared to be a promising solution to ensure the humidification function at the anode side with a simplified fuel cell system.Keywords: automotive conditions, durability, fuel cell system, proton exchange membrane fuel cell, stack architecture
Procedia PDF Downloads 14210230 Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4
Authors: Mardiyansyah Mardiyansyah, Hendrik Maulana, Eka Kurnia Sari, Imam Baehaki, Mohammad Agus Prihandono
Abstract:
Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia.Keywords: mobile security, mobile security framework, NIST SP 1800-4, regulations
Procedia PDF Downloads 15510229 Embodied Cognition and Its Implications in Education: An Overview of Recent Literature
Authors: Panagiotis Kosmas, Panayiotis Zaphiris
Abstract:
Embodied Cognition (EC) as a learning paradigm is based on the idea of an inseparable link between body, mind, and environment. In recent years, the advent of theoretical learning approaches around EC theory has resulted in a number of empirical studies exploring the implementation of the theory in education. This systematic literature overview identifies the mainstream of EC research and emphasizes on the implementation of the theory across learning environments. Based on a corpus of 43 manuscripts, published between 2013 and 2017, it sets out to describe the range of topics covered under the umbrella of EC and provides a holistic view of the field. The aim of the present review is to investigate the main issues in EC research related to the various learning contexts. Particularly, the study addresses the research methods and technologies that are utilized, and it also explores the integration of body into the learning context. An important finding from the overview is the potential of the theory in different educational environments and disciplines. However, there is a lack of an explicit pedagogical framework from an educational perspective for a successful implementation in various learning contexts.Keywords: embodied cognition, embodied learning, education, technology, schools
Procedia PDF Downloads 14510228 Facial Emotion Recognition with Convolutional Neural Network Based Architecture
Authors: Koray U. Erbas
Abstract:
Neural networks are appealing for many applications since they are able to learn complex non-linear relationships between input and output data. As the number of neurons and layers in a neural network increase, it is possible to represent more complex relationships with automatically extracted features. Nowadays Deep Neural Networks (DNNs) are widely used in Computer Vision problems such as; classification, object detection, segmentation image editing etc. In this work, Facial Emotion Recognition task is performed by proposed Convolutional Neural Network (CNN)-based DNN architecture using FER2013 Dataset. Moreover, the effects of different hyperparameters (activation function, kernel size, initializer, batch size and network size) are investigated and ablation study results for Pooling Layer, Dropout and Batch Normalization are presented.Keywords: convolutional neural network, deep learning, deep learning based FER, facial emotion recognition
Procedia PDF Downloads 27510227 Free Secondary Education in Tanzania: Prospects, Challenges, and Proposals
Authors: Yazidu Saidi Mbalamula
Abstract:
Free Basic Education (FBE) policy implementation in Secondary Schools has been one of thrilled undertaking both to the government and household in Tanzania. On the one hand, the government has achieved citizenry acceptance to responsibility and accountability, and on the other hand, the household has been relieved from social costs that were unbearable and deprived many Tanzanians access to basic education and secondary education in particular. Specifically, this study presents a descriptive survey conducted in two districts of Kagera region located at the northern part of Tanzania. Three objectives were pursued to identify achievements realized and challenges in the FBE implementation, and also stakeholders’ proposals were explored on how to improve FBE implementation. A sample of 91 respondents, including school managers, teachers, students, and parents, were involved in the study. Both questionnaires and interviews were used whereby the quantitative data were analyzed using Statistical Package for Social Sciences (SPSS), and content analysis was used to analyze the qualitative data. The results show that implementation of free education policy in secondary schools had far positive impact on the improvement of school management, school attendance, reduced school drop-out, reduced parents-school managers conflicts, and increased enrollment rates. Notwithstanding that, the political machinery remains instrumental to instigate policy reforms in education sector. Nevertheless, the alienating interests of politibureau, often top-down and blanketed by superficial government redness, can hardly be feasible to wield such huge programme given staggering stakeholders’ awareness of the actual requirements and unlatching resources to back up policy implementation. The study recommends that further studies on stakeholders’ conceptions on the FBE and equity of financing of basic education in Tanzania.Keywords: capitation grant, CCM, free basic education, kagera, education policy
Procedia PDF Downloads 7210226 Agile Methodology for Modeling and Design of Data Warehouses -AM4DW-
Authors: Nieto Bernal Wilson, Carmona Suarez Edgar
Abstract:
The organizations have structured and unstructured information in different formats, sources, and systems. Part of these come from ERP under OLTP processing that support the information system, however these organizations in OLAP processing level, presented some deficiencies, part of this problematic lies in that does not exist interesting into extract knowledge from their data sources, as also the absence of operational capabilities to tackle with these kind of projects. Data Warehouse and its applications are considered as non-proprietary tools, which are of great interest to business intelligence, since they are repositories basis for creating models or patterns (behavior of customers, suppliers, products, social networks and genomics) and facilitate corporate decision making and research. The following paper present a structured methodology, simple, inspired from the agile development models as Scrum, XP and AUP. Also the models object relational, spatial data models, and the base line of data modeling under UML and Big data, from this way sought to deliver an agile methodology for the developing of data warehouses, simple and of easy application. The methodology naturally take into account the application of process for the respectively information analysis, visualization and data mining, particularly for patterns generation and derived models from the objects facts structured.Keywords: data warehouse, model data, big data, object fact, object relational fact, process developed data warehouse
Procedia PDF Downloads 41210225 Performance-Based Quality Evaluation of Database Conceptual Schemas
Authors: Janusz Getta, Zhaoxi Pan
Abstract:
Performance-based quality evaluation of database conceptual schemas is an important aspect of database design process. It is evident that different conceptual schemas provide different logical schemas and performance of user applications strongly depends on logical and physical database structures. This work presents the entire process of performance-based quality evaluation of conceptual schemas. First, we show format. Then, the paper proposes a new specification of object algebra for representation of conceptual level database applications. Transformation of conceptual schemas and expression of object algebra into implementation schema and implementation in a particular database system allows for precise estimation of the processing costs of database applications and as a consequence for precise evaluation of performance-based quality of conceptual schemas. Then we describe an experiment as a proof of concept for the evaluation procedure presented in the paper.Keywords: conceptual schema, implementation schema, logical schema, object algebra, performance evaluation, query processing
Procedia PDF Downloads 29310224 Departures from Anatolian Seljuk Building Complex with Iwan/Eyvan: The Tradition of Iwan Tombs
Authors: Mehmet Uysal, Yavuz Arat, Uğur Tuztaşı
Abstract:
As man constructed the spaces that he lived in he also designed spaces where their dead will stay according to their belief systems. These spaces are sometimes monumentalized by the means of a stone on the top of a mountain, sometimes signed by totems and sometimes became structures to protect graves and symbolize the person or make him unforgettable. Various grave monuments have been constructed from the earliest primitive societies to developed societies. Every belief system built structures for itself; Pyramids for pharaohs, grave monuments for kings and emperors, temples and tombs for important men of religion. These spaces are also architectural works like a school or a dwelling and have importance in history of architecture. After Turks embraced Islamism, examples of very beautiful tombs are built in Middle Asia during the Seljuk Period. By the time Seljuks came to Anatolia they built important tombs having peerless architectural characteristics firstly around Ahlat. After Anatolia Seljuks made Konya the capital city and Konya became administrative, cultural and scientific center, very important tombs were built in Konya. Different from the local tomb architecture, the architecture of tombs with half-open “eyvan/Iwan” is significant. Although iwan buildings is vastly used in Anatolian civil architecture and monumental buildings its best exmaples are observed in 13th century Medrese buildings. The iwan tomb tradition which was observed during the time period when this building typology was shaped and departed from the resident tradition in the form of iwan tombs are rarely represented. However, similar tombs were build in resemblance to this tradition. This study provides information on samples of iwan tombs (Gömeç Hatun Tomb, Emir Yavaştagel Tomb, and Beşparmak Tomb) and evaluates the departures from iwan building complexes in view of architectural language. This paper also gives information about iwan tombs among tombs having importance in Islamic Architectural Heritage.Keywords: Seljuk Building Complex, Eyvan/Iwan, Anatolia, Islamic Architectural Heritage, tomb
Procedia PDF Downloads 40510223 Real-Time Big-Data Warehouse a Next-Generation Enterprise Data Warehouse and Analysis Framework
Authors: Abbas Raza Ali
Abstract:
Big Data technology is gradually becoming a dire need of large enterprises. These enterprises are generating massively large amount of off-line and streaming data in both structured and unstructured formats on daily basis. It is a challenging task to effectively extract useful insights from the large scale datasets, even though sometimes it becomes a technology constraint to manage transactional data history of more than a few months. This paper presents a framework to efficiently manage massively large and complex datasets. The framework has been tested on a communication service provider producing massively large complex streaming data in binary format. The communication industry is bound by the regulators to manage history of their subscribers’ call records where every action of a subscriber generates a record. Also, managing and analyzing transactional data allows service providers to better understand their customers’ behavior, for example, deep packet inspection requires transactional internet usage data to explain internet usage behaviour of the subscribers. However, current relational database systems limit service providers to only maintain history at semantic level which is aggregated at subscriber level. The framework addresses these challenges by leveraging Big Data technology which optimally manages and allows deep analysis of complex datasets. The framework has been applied to offload existing Intelligent Network Mediation and relational Data Warehouse of the service provider on Big Data. The service provider has 50+ million subscriber-base with yearly growth of 7-10%. The end-to-end process takes not more than 10 minutes which involves binary to ASCII decoding of call detail records, stitching of all the interrogations against a call (transformations) and aggregations of all the call records of a subscriber.Keywords: big data, communication service providers, enterprise data warehouse, stream computing, Telco IN Mediation
Procedia PDF Downloads 17610222 A New Model for Production Forecasting in ERP
Authors: S. F. Wong, W. I. Ho, B. Lin, Q. Huang
Abstract:
ERP has been used in many enterprises for management, the accuracy of the production forecasting module is vital to the decision making of the enterprise, and the profit is affected directly. Therefore, enhancing the accuracy of the production forecasting module can also increase the efficiency and profitability. To deal with a lot of data, a suitable, reliable and accurate statistics model is necessary. LSSVM and Grey System are two main models to be studied in this paper, and a case study is used to demonstrate how the combination model is effective to the result of forecasting.Keywords: ERP, grey system, LSSVM, production forecasting
Procedia PDF Downloads 46410221 The Legal Effects of Coronavirus (COVID-19) on the Implementation of Administrative Contracts in Saudi Arabia: Application of Emergency Circumstances Theory
Authors: Ali Obaid Alyami
Abstract:
In Saudi Arabia, the pandemic of Coronavirus (COVID-19) has been affecting administrative contracts in many different ways. Lots of planned projects were stopped temporarily or implemented partially. Many contractors have suffered financial struggles and the absence of manpower. These administrative contracts are governed by Government Tenders and Procurement Law (GTPL) which was issued by a royal decree in 2019. This law addresses some challenges that could be stumbling blocks in the way of implementing a contract. One significant challenge is emergency circumstances that occur during the implementation of an administrative contract. The law provides some solutions for this disruption, but these solutions may not compensate for the whole damages that contractors suffer. This study will use the doctrinal methodology to analyze the rules of law and their application to the research problem. Most importantly, the issue that arises in this research is the possibility of governmental entities’ consideration, in administrative contracts, of the pandemic Coronavirus (COVID-19) as an emergency circumstance. This study points out the conditions for applying the theory of emergency circumstances on administrative contracts in addition to the definition of the theory and analyzing its elements. The other significant question is the limits on governmental entities to make a change in an administrative contract to achieve contractual rebalancing. GPTL and its implementing regulation set the conditions and limits of contractual rebalancing. However, this study finds that although GTPL provides rules for contractual rebalancing, there are some other mechanisms that contractors may take to fully compensate for the damages. For instance, when the loss cannot be minimized by GTPL, contractors might file lawsuits before the administrative judiciary. The study concludes that GTPL is a very comprehensive law system that stipulates specific rules for contractual rebalance and treats the emergency circumstances that obstruct the performance of administrative contracts.Keywords: administrative contracts, emergency circumstances, balance of contract, administrative judiciary, government tenders, procurement law
Procedia PDF Downloads 7810220 Systematic Mapping Study of Digitization and Analysis of Manufacturing Data
Authors: R. Clancy, M. Ahern, D. O’Sullivan, K. Bruton
Abstract:
The manufacturing industry is currently undergoing a digital transformation as part of the mega-trend Industry 4.0. As part of this phase of the industrial revolution, traditional manufacturing processes are being combined with digital technologies to achieve smarter and more efficient production. To successfully digitally transform a manufacturing facility, the processes must first be digitized. This is the conversion of information from an analogue format to a digital format. The objective of this study was to explore the research area of digitizing manufacturing data as part of the worldwide paradigm, Industry 4.0. The formal methodology of a systematic mapping study was utilized to capture a representative sample of the research area and assess its current state. Specific research questions were defined to assess the key benefits and limitations associated with the digitization of manufacturing data. Research papers were classified according to the type of research and type of contribution to the research area. Upon analyzing 54 papers identified in this area, it was noted that 23 of the papers originated in Germany. This is an unsurprising finding as Industry 4.0 is originally a German strategy with supporting strong policy instruments being utilized in Germany to support its implementation. It was also found that the Fraunhofer Institute for Mechatronic Systems Design, in collaboration with the University of Paderborn in Germany, was the most frequent contributing Institution of the research papers with three papers published. The literature suggested future research directions and highlighted one specific gap in the area. There exists an unresolved gap between the data science experts and the manufacturing process experts in the industry. The data analytics expertise is not useful unless the manufacturing process information is utilized. A legitimate understanding of the data is crucial to perform accurate analytics and gain true, valuable insights into the manufacturing process. There lies a gap between the manufacturing operations and the information technology/data analytics departments within enterprises, which was borne out by the results of many of the case studies reviewed as part of this work. To test the concept of this gap existing, the researcher initiated an industrial case study in which they embedded themselves between the subject matter expert of the manufacturing process and the data scientist. Of the papers resulting from the systematic mapping study, 12 of the papers contributed a framework, another 12 of the papers were based on a case study, and 11 of the papers focused on theory. However, there were only three papers that contributed a methodology. This provides further evidence for the need for an industry-focused methodology for digitizing and analyzing manufacturing data, which will be developed in future research.Keywords: analytics, digitization, industry 4.0, manufacturing
Procedia PDF Downloads 11310219 The Facilitators and Barriers to the Implementation of Educational Neuroscience: Teachers’ Perspectives
Authors: S. Kawther, C. Marshall
Abstract:
Educational neuroscience has the intention of transforming research findings of the underpinning neural processes of learning to educational practices. A main criticism of the field, hitherto, is that less focus has been put on studying the in-progress practical application of these findings. Therefore, this study aims to gain a better understanding of teachers’ perceptions of the practical application and utilization of brain knowledge. This was approached by investigating the answer to 'What are the facilitators and barriers for bringing research from neuroscience to bear on education?'. Following a qualitative design, semi-structured interviews were conducted with 12 teachers who had a proficient course in educational neuroscience. Thematic analysis was performed on the transcribed data applying Braun & Clark’s steps. Findings emerged with four main themes: time, knowledge, teacher’s involvement, and system. These themes revealed that some effective brain-based practices are being engaged in by the teachers. However, the lack of guidance and challenges regarding this implementation were also found. This study discusses findings in light of the development of educational neuroscience implementation.Keywords: brain-based, educational neuroscience, neuroeducation, neuroscience-informed
Procedia PDF Downloads 17010218 Hysteresis Modeling in Iron-Dominated Magnets Based on a Deep Neural Network Approach
Authors: Maria Amodeo, Pasquale Arpaia, Marco Buzio, Vincenzo Di Capua, Francesco Donnarumma
Abstract:
Different deep neural network architectures have been compared and tested to predict magnetic hysteresis in the context of pulsed electromagnets for experimental physics applications. Modelling quasi-static or dynamic major and especially minor hysteresis loops is one of the most challenging topics for computational magnetism. Recent attempts at mathematical prediction in this context using Preisach models could not attain better than percent-level accuracy. Hence, this work explores neural network approaches and shows that the architecture that best fits the measured magnetic field behaviour, including the effects of hysteresis and eddy currents, is the nonlinear autoregressive exogenous neural network (NARX) model. This architecture aims to achieve a relative RMSE of the order of a few 100 ppm for complex magnetic field cycling, including arbitrary sequences of pseudo-random high field and low field cycles. The NARX-based architecture is compared with the state-of-the-art, showing better performance than the classical operator-based and differential models, and is tested on a reference quadrupole magnetic lens used for CERN particle beams, chosen as a case study. The training and test datasets are a representative example of real-world magnet operation; this makes the good result obtained very promising for future applications in this context.Keywords: deep neural network, magnetic modelling, measurement and empirical software engineering, NARX
Procedia PDF Downloads 13110217 Exploration and Evaluation of the Effect of Multiple Countermeasures on Road Safety
Authors: Atheer Al-Nuaimi, Harry Evdorides
Abstract:
Every day many people die or get disabled or injured on roads around the world, which necessitates more specific treatments for transportation safety issues. International road assessment program (iRAP) model is one of the comprehensive road safety models which accounting for many factors that affect road safety in a cost-effective way in low and middle income countries. In iRAP model road safety has been divided into five star ratings from 1 star (the lowest level) to 5 star (the highest level). These star ratings are based on star rating score which is calculated by iRAP methodology depending on road attributes, traffic volumes and operating speeds. The outcome of iRAP methodology are the treatments that can be used to improve road safety and reduce fatalities and serious injuries (FSI) numbers. These countermeasures can be used separately as a single countermeasure or mix as multiple countermeasures for a location. There is general agreement that the adequacy of a countermeasure is liable to consistent losses when it is utilized as a part of mix with different countermeasures. That is, accident diminishment appraisals of individual countermeasures cannot be easily added together. The iRAP model philosophy makes utilization of a multiple countermeasure adjustment factors to predict diminishments in the effectiveness of road safety countermeasures when more than one countermeasure is chosen. A multiple countermeasure correction factors are figured for every 100-meter segment and for every accident type. However, restrictions of this methodology incorporate a presumable over-estimation in the predicted crash reduction. This study aims to adjust this correction factor by developing new models to calculate the effect of using multiple countermeasures on the number of fatalities for a location or an entire road. Regression models have been used to establish relationships between crash frequencies and the factors that affect their rates. Multiple linear regression, negative binomial regression, and Poisson regression techniques were used to develop models that can address the effectiveness of using multiple countermeasures. Analyses are conducted using The R Project for Statistical Computing showed that a model developed by negative binomial regression technique could give more reliable results of the predicted number of fatalities after the implementation of road safety multiple countermeasures than the results from iRAP model. The results also showed that the negative binomial regression approach gives more precise results in comparison with multiple linear and Poisson regression techniques because of the overdispersion and standard error issues.Keywords: international road assessment program, negative binomial, road multiple countermeasures, road safety
Procedia PDF Downloads 24110216 Promoting Class Cooperation-Competition (Coo-Petition) and Empowerment to Graduating Architecture Students through a Holistic Planning Approach in Their Thesis Proposals
Authors: Felicisimo Azagra Tejuco Jr.
Abstract:
Mentoring architecture thesis students is a very critical and exhausting task for both the adviser and advisee. It poses the challenges of resource and time management for the candidate while the best professional guidance from the mentor. The University of Santo Tomas (Manila, Philippines) is Asia's oldest university. Among its notable program is its Architecture curriculum. Presently, the five-year Architecture program requires ten semesters of academic coursework. The last three semesters are relevant to each Architecture graduating student's thesis proposal and defense. The thesis proposal is developed and submitted for approval in the subject Research Methods for Architecture (RMA). Data gathering and initial schemes are conducted in Architectural Design (AD), 9, and are finalized and defended in AD 10. In recent years, their graduating students have maintained an average of 300 candidates before the pandemic. They are encouraged to explore any topic of interest or relevance. Since 2019-2020, one thesis class has used a community planning approach in mentoring the class. Compared to other sections, the first meeting of RMA has been allocated for a visioning exercise and assessment of the class's strengths-weaknesses and opportunities-threats (SWOT). Here, the work activities of the group have been finetuned to address some identified concerns while still being aligned with the academic calendar. Occasional peer critics complement class lectures. The course will end with the approval of the student's proposal. The final year or last two semesters of the graduating class will be focused on the approved proposal. Compared to the other class, the 18 weeks of the first semester consist of regular consultations, complemented by lectures from the adviser or guest speakers. Through remote peer consultations, the mentor maximized each meeting in groups of three to five, encouraging constructive criticism among the class. At the end of the first semester, mock presentations to the external jury are conducted to check the design outputs for improvement. The final semester is spent more on the finalization of the plans. Feedback from the previous semester is expected to be integrated into the final outputs. Before the final deliberations, at least two technical rehearsals were conducted per group. Regardless of the outcome, an assessment of each student's performance is held as a class. Personal realizations and observations are encouraged. Through Online surveys, Interviews, and Focused Group Discussions with the former students, the effectiveness of the mentoring strategies was reviewed and evaluated. Initial feedback highlighted the relevance of setting a positive tone for the course, constructive criticisms from peers & experts, and consciousness of deadlines as essential elements for a practical semester.Keywords: cooperation, competition, student empowerment, class vision
Procedia PDF Downloads 8010215 A Model for Revenue Leakage Prevention Kabul Municipality Lesson Learned from Jakarta and Mitaka City
Authors: Saifurahman Fayiz
Abstract:
E-government has become a widespread focus of government efforts in various countries around the world. Many governments around the world have been adopted and introduced e-government systems. This research examines the implementation of the Information& communication technology (ICTS) Model in the Kabul Municipality. The objective of this research is to propose an ICT model in the Kabul Municipality to prevent revenue leakage. The research methodology consists qualitative research method based on a comparative case study. The research findings propose that implementing ICT prevent revenue leakage, increases transparency and paves the way for better services. The key conclusion of this research is that the practice of advanced technology in revenue collection paves the way for transparency and provides services in a decent way. The usage of experiences from other Municipalities, especially Jakarta province and Mitaka Municipality Helps KM to improve revenue and provide better services to the citizensKeywords: E-government, ICT, municipality, revenue
Procedia PDF Downloads 23810214 Particle Observation in Secondary School Using a Student-Built Instrument: Design-Based Research on a STEM Sequence about Particle Physics
Authors: J.Pozuelo-Muñoz, E. Cascarosa-Salillas, C. Rodríguez-Casals, A. de Echave, E. Terrado-Sieso
Abstract:
This study focuses on the development, implementation, and evaluation of an instructional sequence aimed at 16–17-year-old students, involving the design and use of a cloud chamber—a device that allows observation of subatomic particles. The research addresses the limited presence of particle physics in Spanish secondary and high school curricula, a gap that restricts students' learning of advanced physics concepts and diminishes engagement with complex scientific topics. The primary goal of this project is to introduce particle physics in the classroom through a practical, interdisciplinary methodology that promotes autonomous learning and critical thinking. The methodology is framed within Design-Based Research (DBR), an approach that enables iterative and pragmatic development of educational resources. The research proceeded in several phases, beginning with the design of an experimental teaching sequence, followed by its implementation in high school classrooms. This sequence was evaluated, redesigned, and reimplemented with the aim of enhancing students’ understanding and skills related to designing and using particle detection instruments. The instructional sequence was divided into four stages: introduction to the activity, research and design of cloud chamber prototypes, observation of particle tracks, and analysis of collected data. In the initial stage, students were introduced to the fundamentals of the activity and provided with bibliographic resources to conduct autonomous research on cloud chamber functioning principles. During the design stage, students sourced materials and constructed their own prototypes, stimulating creativity and understanding of physics concepts like thermodynamics and material properties. The third stage focused on observing subatomic particles, where students recorded and analyzed the tracks generated in their chambers. Finally, critical reflection was encouraged regarding the instrument's operation and the nature of the particles observed. The results show that designing the cloud chamber motivates students and actively engages them in the learning process. Additionally, the use of this device introduces advanced scientific topics beyond particle physics, promoting a broader understanding of science. The study’s conclusions emphasize the need to provide students with ample time and space to thoroughly understand the role of materials and physical conditions in the functioning of their prototypes and to encourage critical analysis of the obtained data. This project not only highlights the importance of interdisciplinarity in science education but also provides a practical framework for teachers to adapt complex concepts for educational contexts where these topics are often absent.Keywords: cloud chamber, particle physics, secondary education, instructional design, design-based research, STEM
Procedia PDF Downloads 1510213 Life Cycle Assessment in Road Pavements: A Literature Review and the Potential Use in Brazil
Authors: B. V. Santos, M. T. M. Carvalho, J. H. S. Rêgo
Abstract:
The article presents a literature review on recent advances related to studies of the environmental impact of road pavements, with reference to the concepts of Life Cycle Assessment (LCA). An introduction with the main motivations for the development of the research is presented, with a current overview of the Brazilian transport infrastructure and the projections for the road mode for the coming years, and the possibility of using the referred methodology by the road sector in Brazil. The article explores the origin of LCA in road pavements and the details linked to its implementation from the perspective of the four main phases of the study (goal and scope definition, inventory analysis, impact assessment, and interpretation). Finally, the main advances and deficiencies observed in the selected studies are gathered, with the proposition of research fields that can be explored in future national or international studies of LCA of road pavements.Keywords: Brazil, life cycle assessment, road pavements, sustainable
Procedia PDF Downloads 7910212 TMBCoI-SIOT: Trust Management System Based on the Community of Interest for the Social Internet of Things
Authors: Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, Leila Saidane
Abstract:
In this paper, we propose a trust management system based on clustering architecture for the social internet of things called TMBCO-SIOT. The proposed model integrates numerous factors such as direct and indirect trust; transaction factor; precaution factor; and social modeling of trust. The novelty of our approach can be summed up in two aspects. The first aspect concerns the architecture based on the community of interest (CoT) where each community is headed by an administrator (admin). However, the second aspect is the trust management system that tries to prevent On-Off attacks and mitigates dishonest recommendations using the k-means algorithm and guarantor things. The effectiveness of the proposed system is proved by simulation against malicious nodes.Keywords: IoT, trust management system, attacks, trust, dishonest recommendations, K-means algorithm
Procedia PDF Downloads 21310211 A Modernist Project: An Analysis on Dupont’s Translations of Faulkner’s Works
Authors: Edilei Reis, Jose Carlos Felix
Abstract:
This paper explores Waldir Dupont’s translations of William Faulkner’s novels to Brazilian Portuguese language in order to comprehend how his translation project regarding Faulkner’s works has addressed modernist traits of the novelist fiction, particularly the ambivalence of language, multiple and fragmented points of view and syntax. Wladir Dupont (1939-2014) was a prolific Brazilian journalist who benefitted from his experiences as an international correspondent living abroad (EUA and Mexico) to become an acclaimed translator later in life. He received a Jabuiti Award (Brazilian most prestigious literary award) for his translation of ‘La Otra Voz’ (1994), by Mexican poet, critic and translator Octavio Paz, a writer to whom he devoted the first years of his carrier as a translator. As Dupont pointed out in some interviews, the struggles in finding a way out to overcome linguistic and cultural obstacles in the process of translating texts from Spanish to Portuguese was paramount for ascertaining his engagement in the long-term project of translating to Brazilian Portuguese the fiction of William Faulkner. His first enterprise was the translation of Faulkner’s trilogy Snopes: The Hamlet (1940) and The Town (1957), the first two novels, were published in 1997 as O povoado and A cidade; in 1999 the last novel, The mansion (1959), was published as A mansão. In 2001, Dupont tackled what is considered one of the most challenging novels by the author due to his use of multiple points of view, As I lay dying (1930). In 2003, The Reivers (1962) was published under the title Os invictos. His enterprise finishes in 2012 with the publication of an anthology of Faulkner’s thriller short-stories Knight’s Gambit (1932) as Lance mortal. Hence, in this paper we will consider the Dupont’s trajectory as a translator, paying special attention to the way in which his identity as such is constituted through the process of translating Faulkner’s works.Keywords: literary translation, translator’s identity, William Faulkner, Wladir DuPont
Procedia PDF Downloads 25010210 A Model for Reverse-Mentoring in Education
Authors: Sabine A. Zauchner-Studnicka
Abstract:
As the term indicates, reverse-mentoring flips the classical roles of mentoring: In school, students take over the role of mentors for adults, i.e. teachers or parents. Originally reverse-mentoring stems from US enterprises, which implemented this innovative method in order to benefit from the resources of skilled younger employees for the enhancement of IT competences of senior colleagues. However, reverse-mentoring in schools worldwide is rare. Based on empirical studies and theoretical approaches, in this article an implementation model for reverse-mentoring is developed in order to bring the significant potential reverse-mentoring has for education into practice.Keywords: reverse-mentoring, innovation in education, implementation model, school education
Procedia PDF Downloads 24910209 Deterministic Modelling to Estimate Economic Impact from Implementation and Management of Large Infrastructure
Authors: Dimitrios J. Dimitriou
Abstract:
It is widely recognised that the assets portfolio development is helping to enhance economic growth, productivity and competitiveness. While numerous studies and reports certify the positive effect of investments in large infrastructure investments on the local economy, still, the methodology to estimate the contribution in economic development is a challenging issue for researchers and economists. The key question is how to estimate those economic impacts in each economic system. This paper provides a compact and applicable methodological framework providing quantitative results in terms of the overall jobs and income generated into the project life cycle. According to a deterministic mathematical approach, the key variables and the modelling framework are presented. The numerical case study highlights key results for a new motorway project in Greece, which is experienced economic stress for many years, providing the opportunity for comparisons with similar cases.Keywords: quantitative modelling, economic impact, large transport infrastructure, economic assessment
Procedia PDF Downloads 20410208 Kinematic Modelling and Task-Based Synthesis of a Passive Architecture for an Upper Limb Rehabilitation Exoskeleton
Authors: Sakshi Gupta, Anupam Agrawal, Ekta Singla
Abstract:
An exoskeleton design for rehabilitation purpose encounters many challenges, including ergonomically acceptable wearing technology, architectural design human-motion compatibility, actuation type, human-robot interaction, etc. In this paper, a passive architecture for upper limb exoskeleton is proposed for assisting in rehabilitation tasks. Kinematic modelling is detailed for task-based kinematic synthesis of the wearable exoskeleton for self-feeding tasks. The exoskeleton architecture possesses expansion and torsional springs which are able to store and redistribute energy over the human arm joints. The elastic characteristics of the springs have been optimized to minimize the mechanical work of the human arm joints. The concept of hybrid combination of a 4-bar parallelogram linkage and a serial linkage were chosen, where the 4-bar parallelogram linkage with expansion spring acts as a rigid structure which is used to provide the rotational degree-of-freedom (DOF) required for lowering and raising of the arm. The single linkage with torsional spring allows for the rotational DOF required for elbow movement. The focus of the paper is kinematic modelling, analysis and task-based synthesis framework for the proposed architecture, keeping in considerations the essential tasks of self-feeding and self-exercising during rehabilitation of partially healthy person. Rehabilitation of primary functional movements (activities of daily life, i.e., ADL) is routine activities that people tend to every day such as cleaning, dressing, feeding. We are focusing on the feeding process to make people independent in respect of the feeding tasks. The tasks are focused to post-surgery patients under rehabilitation with less than 40% weakness. The challenges addressed in work are ensuring to emulate the natural movement of the human arm. Human motion data is extracted through motion-sensors for targeted tasks of feeding and specific exercises. Task-based synthesis procedure framework will be discussed for the proposed architecture. The results include the simulation of the architectural concept for tracking the human-arm movements while displaying the kinematic and static study parameters for standard human weight. D-H parameters are used for kinematic modelling of the hybrid-mechanism, and the model is used while performing task-based optimal synthesis utilizing evolutionary algorithm.Keywords: passive mechanism, task-based synthesis, emulating human-motion, exoskeleton
Procedia PDF Downloads 13810207 A Large Dataset Imputation Approach Applied to Country Conflict Prediction Data
Authors: Benjamin Leiby, Darryl Ahner
Abstract:
This study demonstrates an alternative stochastic imputation approach for large datasets when preferred commercial packages struggle to iterate due to numerical problems. A large country conflict dataset motivates the search to impute missing values well over a common threshold of 20% missingness. The methodology capitalizes on correlation while using model residuals to provide the uncertainty in estimating unknown values. Examination of the methodology provides insight toward choosing linear or nonlinear modeling terms. Static tolerances common in most packages are replaced with tailorable tolerances that exploit residuals to fit each data element. The methodology evaluation includes observing computation time, model fit, and the comparison of known values to replaced values created through imputation. Overall, the country conflict dataset illustrates promise with modeling first-order interactions while presenting a need for further refinement that mimics predictive mean matching.Keywords: correlation, country conflict, imputation, stochastic regression
Procedia PDF Downloads 12010206 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud
Authors: N. Nalini, Bhanu Prakash Gopularam
Abstract:
The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping
Procedia PDF Downloads 38510205 IEEE802.15.4e Based Scheduling Mechanisms and Systems for Industrial Internet of Things
Authors: Ho-Ting Wu, Kai-Wei Ke, Bo-Yu Huang, Liang-Lin Yan, Chun-Ting Lin
Abstract:
With the advances in advanced technology, wireless sensor network (WSN) has become one of the most promising candidates to implement the wireless industrial internet of things (IIOT) architecture. However, the legacy IEEE 802.15.4 based WSN technology such as Zigbee system cannot meet the stringent QoS requirement of low powered, real-time, and highly reliable transmission imposed by the IIOT environment. Recently, the IEEE society developed IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) access mode to serve this purpose. Furthermore, the IETF 6TiSCH working group has proposed standards to integrate IEEE 802.15.4e with IPv6 protocol smoothly to form a complete protocol stack for IIOT. In this work, we develop key network technologies for IEEE 802.15.4e based wireless IIoT architecture, focusing on practical design and system implementation. We realize the OpenWSN-based wireless IIOT system. The system architecture is divided into three main parts: web server, network manager, and sensor nodes. The web server provides user interface, allowing the user to view the status of sensor nodes and instruct sensor nodes to follow commands via user-friendly browser. The network manager is responsible for the establishment, maintenance, and management of scheduling and topology information. It executes centralized scheduling algorithm, sends the scheduling table to each node, as well as manages the sensing tasks of each device. Sensor nodes complete the assigned tasks and sends the sensed data. Furthermore, to prevent scheduling error due to packet loss, a schedule inspection mechanism is implemented to verify the correctness of the schedule table. In addition, when network topology changes, the system will act to generate a new schedule table based on the changed topology for ensuring the proper operation of the system. To enhance the system performance of such system, we further propose dynamic bandwidth allocation and distributed scheduling mechanisms. The developed distributed scheduling mechanism enables each individual sensor node to build, maintain and manage the dedicated link bandwidth with its parent and children nodes based on locally observed information by exchanging the Add/Delete commands via two processes. The first process, termed as the schedule initialization process, allows each sensor node pair to identify the available idle slots to allocate the basic dedicated transmission bandwidth. The second process, termed as the schedule adjustment process, enables each sensor node pair to adjust their allocated bandwidth dynamically according to the measured traffic loading. Such technology can sufficiently satisfy the dynamic bandwidth requirement in the frequently changing environments. Last but not least, we propose a packet retransmission scheme to enhance the system performance of the centralized scheduling algorithm when the packet delivery rate (PDR) is low. We propose a multi-frame retransmission mechanism to allow every single network node to resend each packet for at least the predefined number of times. The multi frame architecture is built according to the number of layers of the network topology. Performance results via simulation reveal that such retransmission scheme is able to provide sufficient high transmission reliability while maintaining low packet transmission latency. Therefore, the QoS requirement of IIoT can be achieved.Keywords: IEEE 802.15.4e, industrial internet of things (IIOT), scheduling mechanisms, wireless sensor networks (WSN)
Procedia PDF Downloads 16410204 Economic Policy Promoting Economically Rational Behavior of Start-Up Entrepreneurs in Georgia
Authors: Gulnaz Erkomaishvili
Abstract:
Introduction: The pandemic and the current economic crisis have created problems for entrepreneurship and, therefore for start-up entrepreneurs. The paper presents the challenges of start-up entrepreneurs in Georgia in the time of pandemic and the analysis of the state economic policy measures. Despite many problems, the study found that in 54.2% of start-ups surveyed under the pandemic, innovation opportunities were growing. It can be stated that the pandemic was a good opportunity to increase the innovative capacity of the enterprise. 52% of the surveyed start-up entrepreneurs managed to adapt to the current situation and increase the sale of their products/services through remote channels. As for the assessment of state support measures by start-up entrepreneurs, a large number of Georgian start-ups do not assess the measures implemented by the state positively. Methodology: The research process uses methods of analysis and synthesis, quantitative and qualitative, interview/survey, grouping, relative and average values, graphing, comparison, data analysis, and others. Main Findings: Studies have shown that for the start-up entrepreneurs, the main problem remains: inaccessible funding, workers' qualifications gap, inflation, taxes, regulation, political instability, inadequate provision of infrastructure, amount of taxes, and other factors. Conclusions: The state should take the following measures to support business start-ups: create an attractive environment for investment, availability of soft loans, creation of an insurance system, infrastructure development, increase the effectiveness of tax policy (simplicity of the tax system, clarity, optimal tax level ); promote export growth (develop strategy for opening up international markets, build up a broad marketing network, etc.).Keywords: start-up entrepreneurs, startups, start-up entrepreneurs support programs, start-up entrepreneurs support economic policy
Procedia PDF Downloads 11710203 Strategy in Practice: Strategy Development, Strategic Error and Project Delivery
Authors: Nipun Agarwal, David Paul, Fareed Un Din
Abstract:
Strategy development and implementation is the key to an organization’s success in today’s competitive marketplace. Many organizations develop excellent strategy but are unable to implement this strategy in order to succeed. The difference between strategic goals and its implementation is called strategic error. Strategic error occurs when an organization does not have structures in place to implement their strategy. Strategy implementation happens through projects and having a project management method that provides certainty and agility will help an organization become more competitive in implementing strategy. Numerous project management methods exist in theory and practice. However, projects mainly used the Waterfall method in the past that provides certainty in terms of budget, delivery date and resourcing. It is common practice now to utilise Agile based methods. However, Agile based methods do not provide specific deadlines and budgets. But provide agility in product design and project delivery, which is useful to companies. Both Waterfall and Agile methods in some forms are the opposites of each other. Executive management prefer agility in delivery projects as the competitive landscape changes frequently. However, they also appreciate certainty in the projects being able to quantify budgets, deadlines and resources that is harder for an Agile based method to provide. This paper attempts to develop a hybrid project management method that attempts to merge these Waterfall and Agile methods to provide the positives from both these approaches.Keywords: strategy, project management, strategy implementation, agile
Procedia PDF Downloads 118