Search results for: social network size
17584 Meeting the Parents on Facebook : A Case Study of the Swedish Social Insurance Agency’s Social Media Use
Authors: Cecilia Teljas
Abstract:
Many government agencies use social media to supplement their traditional communication channels. Government agencies are typically risk-averse, which makes social media practices problematic. However, this case study of the social media use of the Swedish social insurance agency shows considerable bi-directional communication between the agency and the public. On one hand, the agency’s aims, strategies, ways of working and experiences related to its social media communication practice are analyzed. On the other hand, the communication by both the agency and the public is studied on one of the agency’s Facebook pages. The results showed that it is possible for an agency to provide relevant and accurate information in real-time in social media if identifying and addressing different segments separately. Furthermore, as a result of context adaption this communication was rather informal and the practice can be considered to manifest positive democratic effects due to the increased availability and inclusion.Keywords: e-government, social media, case study, discourse analysis
Procedia PDF Downloads 42917583 Propagation of the Effects of Certain Types of Military Psychological Operations in a Networked Population
Authors: Colette Faucher
Abstract:
In modern asymmetric conflicts, the Armed Forces generally have to intervene in countries where the internal peace is in danger. They must make the local population an ally in order to be able to deploy the necessary military actions with its support. For this purpose, psychological operations (PSYOPs) are used to shape people’s behaviors and emotions by the modification of their attitudes in acting on their perceptions. PSYOPs aim at elaborating and spreading a message that must be read, listened to and/or looked at, then understood by the info-targets in order to get from them the desired behavior. A message can generate in the info-targets, reasoned thoughts, spontaneous emotions or reflex behaviors, this effect partly depending on the means of conveyance used to spread this message. In this paper, we focus on psychological operations that generate emotions. We present a method based on the Intergroup Emotion Theory, that determines, from the characteristics of the conveyed message and of the people from the population directly reached by the means of conveyance (direct info-targets), the emotion likely to be triggered in them and we simulate the propagation of the effects of such a message on indirect info-targets that are connected to them through the social networks that structure the population.Keywords: military psychological operations, social identity, social network, emotion propagation
Procedia PDF Downloads 40917582 Social Impact Evaluation in the Housing Sector
Authors: Edgard Barki, Tânia Modesto Veludo-de-Oliveira, Felipe Zambaldi
Abstract:
The social enterprise sector can be characterized as organizations that aim to solve social problems with financial sustainability and using market mechanisms. This sector has shown an increasing interest worldwide. Despite the growth and relevance of the sector, there is still a gap regarding the assessment of the social impact resulting from the initiatives of the organizations in this field. A number of metrics have been designed worldwide to evaluate the impact of social enterprises (e.g., IRIS, GIIRS, BACO), as well as some ad hoc studies that have been carried out, mainly in the microcredit sector, but there is still a gap to be filled in the development of research in social impact evaluation. Therefore, this research seeks to evaluate the social impact of two social enterprises (Terra Nova and Vivenda) in the area of housing in Brazil. To evaluate these impacts and their dimensions, we conducted an exploratory research, through three focus groups, thirty in-depth interviews and a survey with beneficiaries of both organizations. The results allowed us to evaluate how the two organizations were able to create a deep social impact in the populations served. Terra Nova has a more collective perspective, with a clear benefit of social inclusion and improvement of the community’s infrastructure, while Vivenda has a more individualized perspective, improving self-esteem, sociability and family coexistence.Keywords: Brazil, housing, social enterprise, social impact evaluation
Procedia PDF Downloads 44317581 The Influence of Social Media on the Body Image of First Year Female Medical Students of University of Khartoum, 2022
Authors: Razan Farah, Siham Ballah
Abstract:
Facebook, Instagram, TikTok and other social media applications have become an integral component of everyone’s social life, particularly among younger generations and adolescences. These social apps have been changing a lot of conceptions and believes in the population by representing public figures and celebrities as role models. The social comparison theory, which says that people self-evaluate based on comparisons with similar others, is commonly used to explore the impact of social media on body image. There is a need to study the influence of those social platforms on the body image as there have been an increase in body dissatisfaction in the recent years. This cross sectional study used a self administered questionnaire on a simple random sample of 133 female medical students of the first year. Finding shows that the response rate was 75%. There was an association between social media usage and noticing how the person look(p value = .022), but no significant association between social media use and body image influence or dissatisfaction was found. This study implies more research under this topic in Sudan as the literature are scarce.Keywords: body image, body dissatisfaction, social media, adolescences
Procedia PDF Downloads 7117580 Effective Supply Chain Coordination with Hybrid Demand Forecasting Techniques
Authors: Gurmail Singh
Abstract:
Effective supply chain is the main priority of every organization which is the outcome of strategic corporate investments with deliberate management action. Value-driven supply chain is defined through development, procurement and by configuring the appropriate resources, metrics and processes. However, responsiveness of the supply chain can be improved by proper coordination. So the Bullwhip effect (BWE) and Net stock amplification (NSAmp) values were anticipated and used for the control of inventory in organizations by both discrete wavelet transform-Artificial neural network (DWT-ANN) and Adaptive Network-based fuzzy inference system (ANFIS). This work presents a comparative methodology of forecasting for the customers demand which is non linear in nature for a multilevel supply chain structure using hybrid techniques such as Artificial intelligence techniques including Artificial neural networks (ANN) and Adaptive Network-based fuzzy inference system (ANFIS) and Discrete wavelet theory (DWT). The productiveness of these forecasting models are shown by computing the data from real world problems for Bullwhip effect and Net stock amplification. The results showed that these parameters were comparatively less in case of discrete wavelet transform-Artificial neural network (DWT-ANN) model and using Adaptive network-based fuzzy inference system (ANFIS).Keywords: bullwhip effect, hybrid techniques, net stock amplification, supply chain flexibility
Procedia PDF Downloads 12717579 Multi Criteria Authentication Method in Cognitive Radio Networks
Authors: Shokoufeh Monjezi Kouchak
Abstract:
Cognitive radio network (CRN) is future network .Without this network wireless devices can’t work appropriately in the next decades. Today, wireless devices use static spectrum access methods and these methods don’t use spectrums optimum so we need use dynamic spectrum access methods to solve shortage spectrum challenge and CR is a great device for DSA but first of all its challenges should be solved .security is one of these challenges .In this paper we provided a survey about CR security. You can see this survey in tables 1 to 7 .After that we proposed a multi criteria authentication method in CRN. Our criteria in this method are: sensing results, following sending data rules, position of secondary users and no talk zone. Finally we compared our method with other authentication methods.Keywords: authentication, cognitive radio, security, radio networks
Procedia PDF Downloads 39217578 Machine Learning Methods for Network Intrusion Detection
Authors: Mouhammad Alkasassbeh, Mohammad Almseidin
Abstract:
Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE. Procedia PDF Downloads 23417577 Detection of Autistic Children's Voice Based on Artificial Neural Network
Authors: Royan Dawud Aldian, Endah Purwanti, Soegianto Soelistiono
Abstract:
In this research we have been developed an automatic investigation to classify normal children voice or autistic by using modern computation technology that is computation based on artificial neural network. The superiority of this computation technology is its capability on processing and saving data. In this research, digital voice features are gotten from the coefficient of linear-predictive coding with auto-correlation method and have been transformed in frequency domain using fast fourier transform, which used as input of artificial neural network in back-propagation method so that will make the difference between normal children and autistic automatically. The result of back-propagation method shows that successful classification capability for normal children voice experiment data is 100% whereas, for autistic children voice experiment data is 100%. The success rate using back-propagation classification system for the entire test data is 100%.Keywords: autism, artificial neural network, backpropagation, linier predictive coding, fast fourier transform
Procedia PDF Downloads 46117576 The Antecedents of Continued Usage on Social-Oriented Virtual Communities Based on Automaticity Mechanism
Authors: Hsiu-Hua Cheng
Abstract:
In recent years, the number of social-oriented virtual communities users has increased significantly. Corporate investment in advertising on social-oriented virtual communities increases quickly. With the gigantic commercial value of the digital market, competitions between virtual communities are keen. In this context, how to retain existing customers to continue using social-oriented virtual communities is an urgent issue for virtual community managers. This study employs the perspective of automaticity mechanism and combines the social embeddedness theory with the literature of involvement and habit in order to explore antecedents of users’ continuous usage on social-oriented virtual communities. The results can be a reference for scholars and managers of social-oriented virtual communities.Keywords: continued usage, habit, social embeddedness, involvement, virtual community
Procedia PDF Downloads 42417575 The Polarization on Twitter and COVID-19 Vaccination in Brazil
Authors: Giselda Cristina Ferreira, Carlos Alberto Kamienski, Ana Lígia Scott
Abstract:
The COVID-19 pandemic has enhanced the anti-vaccination movement in Brazil, supported by unscientific theories and false news and the possibility of wide communication through social networks such as Twitter, Facebook, and YouTube. The World Health Organization (WHO) classified the large volume of information on the subject against COVID-19 as an Infodemic. In this paper, we present a protocol to identify polarizing users (called polarizers) and study the profiles of Brazilian polarizers on Twitter (renamed to X some weeks ago). We analyzed polarizing interactions on Twitter (in Portuguese) to identify the main polarizers and how the conflicts they caused influenced the COVID-19 vaccination rate throughout the pandemic. This protocol uses data from this social network, graph theory, Java, and R-studio scripts to model and analyze the data. The information about the vaccination rate was obtained in a public database for the government called OpenDataSus. The results present the profiles of Twitter’s Polarizer (political position, gender, professional activity, immunization opinions). We observed that social and political events influenced the participation of these different profiles in conflicts and the vaccination rate.Keywords: Twitter, polarization, vaccine, Brazil
Procedia PDF Downloads 7517574 The Savior, the Absent, and the Model: The Role Social Workers Play in Young Women’s Romantic Relationships
Authors: Tehila Wright
Abstract:
Being involved in romantic relationships is a key task in the development of identity during emerging adulthood. To date, little research has focused on romantic relationships among young women who have coped with situations of distress and are treated by social workers. Moreover, the role of social workers in young women’s romantic relations is underexplored. This paper focuses on young women’s perception of the role played by their social workers in guiding them through romantic relationships. Methodology: This qualitative-feminist study is based on semi-structured in-depth interviews with 25 young heterosexual Jewish women aged 18-25 who are currently supported by social workers in the welfare system. Findings: The findings uncover three meanings given by participants to their relations with social workers regarding the young women's romantic relationships: 1)” The social worker as role model” namely, the social worker as setting an example for healthy conduct in romantic relationships. 2) "The social worker as savior," namely, the social worker as the one who supports participants escaping abusive romantic relationships. 3) "The present-absent social worker,” namely, despite being a significant figure in their lives, the social worker is experienced as disconnected and alienated. Conclusions and practice: Social workers can have a positive and important contribution to the romantic relationships of these young women. To be a central source of support in the young women's life, the social workers must be able to establish a relationship of trust with the young women.Keywords: young women, emerging adulthood, romantic relationship, women in distress
Procedia PDF Downloads 10917573 Comparative Performance Analysis of Fiber Delay Line Based Buffer Architectures for Contention Resolution in Optical WDM Networks
Authors: Manoj Kumar Dutta
Abstract:
Wavelength division multiplexing (WDM) technology is the most promising technology for the proper utilization of huge raw bandwidth provided by an optical fiber. One of the key problems in implementing the all-optical WDM network is the packet contention. This problem can be solved by several different techniques. In time domain approach the packet contention can be reduced by incorporating fiber delay lines (FDLs) as optical buffer in the switch architecture. Different types of buffering architectures are reported in literatures. In the present paper a comparative performance analysis of three most popular FDL architectures are presented in order to obtain the best contention resolution performance. The analysis is further extended to consider the effect of different fiber non-linearities on the network performance.Keywords: WDM network, contention resolution, optical buffering, non-linearity, throughput
Procedia PDF Downloads 45117572 A Remote Sensing Approach to Calculate Population Using Roads Network Data in Lebanon
Authors: Kamel Allaw, Jocelyne Adjizian Gerard, Makram Chehayeb, Nada Badaro Saliba
Abstract:
In developing countries, such as Lebanon, the demographic data are hardly available due to the absence of the mechanization of population system. The aim of this study is to evaluate, using only remote sensing data, the correlations between the number of population and the characteristics of roads network (length of primary roads, length of secondary roads, total length of roads, density and percentage of roads and the number of intersections). In order to find the influence of the different factors on the demographic data, we studied the degree of correlation between each factor and the number of population. The results of this study have shown a strong correlation between the number of population and the density of roads and the number of intersections.Keywords: population, road network, statistical correlations, remote sensing
Procedia PDF Downloads 16217571 Influence of the Flow Rate Ratio in a Jet Pump on the Size of Air Bubbles
Authors: L. Grinis, N. Lubashevsky, Y. Ostrovski
Abstract:
In waste water treatment processes, aeration introduces air into a liquid. In these systems, air is introduced by different devices submerged in the waste water. Smaller bubbles result in more bubble surface area per unit of volume and higher oxygen transfer efficiency. Jet pumps are devices that use air bubbles and are widely used in waste water treatment processes. The principle of jet pumps is their ability to transfer energy of one fluid, called primary or motive, into a secondary fluid or gas. These pumps have no moving parts and are able to work in remote areas under extreme conditions. The objective of this work is to study experimentally the characteristics of the jet pump and the size of air bubbles in the laboratory water tank. The effect of flow rate ratio on pump performance is investigated in order to have a better understanding about pump behavior under various conditions, in order to determine the efficiency of receiving air bubbles different sizes. The experiments show that we should take care when increasing the flow rate ratio while seeking to decrease bubble size in the outlet flow. This study will help improve and extend the use of the jet pump in many practical applications.Keywords: jet pump, air bubbles size, retention time, waste water
Procedia PDF Downloads 30717570 Cooperative Cross Layer Topology for Concurrent Transmission Scheduling Scheme in Broadband Wireless Networks
Authors: Gunasekaran Raja, Ramkumar Jayaraman
Abstract:
In this paper, we consider CCL-N (Cooperative Cross Layer Network) topology based on the cross layer (both centralized and distributed) environment to form network communities. Various performance metrics related to the IEEE 802.16 networks are discussed to design CCL-N Topology. In CCL-N topology, nodes are classified as master nodes (Master Base Station [MBS]) and serving nodes (Relay Station [RS]). Nodes communities are organized based on the networking terminologies. Based on CCL-N Topology, various simulation analyses for both transparent and non-transparent relays are tabulated and throughput efficiency is calculated. Weighted load balancing problem plays a challenging role in IEEE 802.16 network. CoTS (Concurrent Transmission Scheduling) Scheme is formulated in terms of three aspects – transmission mechanism based on identical communities, different communities and identical node communities. CoTS scheme helps in identifying the weighted load balancing problem. Based on the analytical results, modularity value is inversely proportional to that of the error value. The modularity value plays a key role in solving the CoTS problem based on hop count. The transmission mechanism for identical node community has no impact since modularity value is same for all the network groups. In this paper three aspects of communities based on the modularity value which helps in solving the problem of weighted load balancing and CoTS are discussed.Keywords: cross layer network topology, concurrent scheduling, modularity value, network communities and weighted load balancing
Procedia PDF Downloads 26517569 Demonstration of Powering up Low Power Wireless Sensor Network by RF Energy Harvesting System
Authors: Lim Teck Beng, Thiha Kyaw, Poh Boon Kiat, Lee Ngai Meng
Abstract:
This work presents discussion on the possibility of merging two emerging technologies in microwave; wireless power transfer (WPT) and RF energy harvesting. The current state of art of the two technologies is discussed and the strength and weakness of the two technologies is also presented. The equivalent circuit of wireless power transfer is modeled and explained as how the range and efficiency can be further increased by controlling certain parameters in the receiver. The different techniques of harvesting the RF energy from the ambient are also extensive study. Last but not least, we demonstrate that a low power wireless sensor network (WSN) can be power up by RF energy harvesting. The WSN is designed to transmit every 3 minutes of information containing the temperature of the environment and also the voltage of the node. One thing worth mention is both the sensors that are used for measurement are also powering up by the RF energy harvesting system.Keywords: energy harvesting, wireless power transfer, wireless sensor network and magnetic coupled resonator
Procedia PDF Downloads 51917568 Fostering Resilience in Early Adolescents: A Canadian Evaluation of the HEROES Program
Authors: Patricia L. Fontanilla, David Nordstokke
Abstract:
Introduction: Today’s children and youth face increasing social and behavioural challenges, leading to delays in social development and greater mental health needs. Early adolescents (aged 9 to 14) are experiencing a rise in mental health symptoms and diagnoses. This study examines the impact of HEROES, a social-emotional learning (SEL) program, on resilience and academic outcomes in early adolescents. The HEROES program is designed to enhance resilience the ability to adapt and thrive in the face of adversity, equipping youth to navigate developmental transitions and challenges. This study’s objective was to evaluate the program’s long-term effectiveness by measuring changes in resilience and academic resilience across 10 months. Methodology: This study collected data from 21 middle school students (grades 7 to 9) in a rural Canadian school. Quantitative data were gathered at four intervals: pre-intervention, post-intervention, and at 2- and 4-month follow-ups. Data were analyzed with linear mixed models (LMM). Results: Findings showed statistically significant increases in academic resilience over time and significant increases in resilience from pre-intervention to 2 and 4 months later. Limitations included a small sample size, which may affect generalizability. Conclusion: The HEROES program demonstrates promise in increasing resilience and academic resilience among early adolescents through SEL skill development.Keywords: academic resilience, early adolescence, resilience, SEL, social-emotional learning program
Procedia PDF Downloads 1117567 The Relationship between Selfesteem, Social Support, and Mental Health among High School Students in Iran
Authors: Mohsen Shahbakhti
Abstract:
The aim of this study was to examine the relationship between self-esteem, social support and mental health in a sample of government high school students in Eshtehard city in Alborz Province in Iran. Three hundred and eleven students (boys) were included in this study. All participants completed the General Health Questionnaire (GHQ 12), Multidimensional Scale of Perceived Social Support (MSPSS -12), and Self-Esteem Scale (SS-10). The results revealed that self-esteem was positively associated with social support. Self-esteem and social support negatively associated with psychological distress. Self-esteem and social support to influence on mental health.Keywords: self-esteem, social support, mental health, high school students
Procedia PDF Downloads 48417566 A Theoretical Framework on Using Social Stories with the Creative Arts for Individuals on the Autistic Spectrum
Authors: R. Bawazir, P. Jones
Abstract:
Social Stories are widely used to teach social and communication skills or concepts to individuals on the autistic spectrum. This paper presents a theoretical framework for using Social Stories in conjunction with the creative arts. The paper argues that Bandura’s social learning theory can be used to explain the mechanisms behind Social Stories and the way they influence changes in response, while Gardner’s multiple intelligences theory can be used simultaneously to demonstrate the role of the creative arts in learning. By using Social Stories with the creative arts for individuals on the autistic spectrum, the aim is to meet individual needs and help individuals with autism to develop in different areas of learning and communication.Keywords: individuals on the autistic spectrum, social stories, the creative arts, theoretical framework
Procedia PDF Downloads 32117565 Review of Energy Efficiency Routing in Ad Hoc Wireless Networks
Authors: P. R. Dushantha Chaminda, Peng Kai
Abstract:
In this review paper, we enclose the thought of wireless ad hoc networks and particularly mobile ad hoc network (MANET), their field of study, intention, concern, benefit and disadvantages, modifications, with relation of AODV routing protocol. Mobile computing is developing speedily with progression in wireless communications and wireless networking protocols. Making communication easy, we function most wireless network devices and sensor networks, movable, battery-powered, thus control on a highly constrained energy budget. However, progress in battery technology presents that only little improvements in battery volume can be expected in the near future. Moreover, recharging or substitution batteries is costly or unworkable, it is preferable to support energy waste level of devices low.Keywords: wireless ad hoc network, energy efficient routing protocols, AODV, EOAODV, AODVEA, AODVM, AOMDV, FF-AOMDV, AOMR-LM
Procedia PDF Downloads 21417564 The Impact of Illegal Firearms Possession, Limited Security Staff and Porosity of Border on Human Security in Ipokia Local Government Area, Ogun State
Authors: Ogunmefun Folorunsho Muyideen, Aluko Tolulope Evelyn
Abstract:
One of the trending menaces faced in the world today is centered on the porosity of borders and proliferation of illegal weapons among the state members without the state authorizations. The proliferation of weapons along porous borders remains a germane and unsolvable question among developed and developing nations due to crisis degenerated from the menace (loss of lives, properties, traumatization, civil unrest and retrogressive economic development). A mixed method was adopted while the survey method was used for communities’ selection (Oke-Odan, Ajilete, Illaise, Lanlate) at Ipokia Local Government as a sample frame. Multi-stage sampling was employed to break down the site into wards, streets, and different house numbers before randomizing administration of the questionnaires using face to face method, while purposive sampling was used for collecting verbal information through an in-depth interviews method. The population size for the site is 150.398, while 399 was the sample size derived from the use of Yamane sample size formula. After retrieval of structured questionnaires, 346 were found useful, while 10 percent (399) of the quantitative instruments was summed to 30 participants that were interviewed using the in-depth interviews technique. The result of the first hypothesis shows a composite relationship between the variables tested (independents and dependent). The result indicated that the porosity of the border, illegal possession of guns, and limited security staff jointly predispose insecurity among the residents of the selected study site. The result of the second hypothesis deciphers that the illegal gun possession (independent) variable predict business outcome among the residents of the study site because sporadic gun shoot will regress the business activities in the study area. The result of third result indicated that the independent (porosity of borders) variable predict social bonding network because a high level of insecurity will destroy the level of trust in the communication among the residents of the study area. The last questions give comprehensive meaning to one of the recommendations derived using content systematic analysis, which explains that out of 30 participants interviewed, 18 submitted individual involvement in monitoring communities will solve the problem, 7 out of 30 opines that governmental agents are to be trained for effective combat, 3 participants out 30 submits that the fight is for both government and the citizens while 2 participants out of 30 claimed that there must be an agreement between Nigerian and neighbouring countries on border security. International donors must totally control the sales of weapons to unauthorized personalities. Criminal cases must be treated with deterrence measures and target hardened procedures through decoying and blending, stakeout, and sting tactics.Keywords: human security, illegal weapons, porous borders, development
Procedia PDF Downloads 17917563 A Comparison of Methods for Neural Network Aggregation
Authors: John Pomerat, Aviv Segev
Abstract:
Recently, deep learning has had many theoretical breakthroughs. For deep learning to be successful in the industry, however, there need to be practical algorithms capable of handling many real-world hiccups preventing the immediate application of a learning algorithm. Although AI promises to revolutionize the healthcare industry, getting access to patient data in order to train learning algorithms has not been easy. One proposed solution to this is data- sharing. In this paper, we propose an alternative protocol, based on multi-party computation, to train deep learning models while maintaining both the privacy and security of training data. We examine three methods of training neural networks in this way: Transfer learning, average ensemble learning, and series network learning. We compare these methods to the equivalent model obtained through data-sharing across two different experiments. Additionally, we address the security concerns of this protocol. While the motivating example is healthcare, our findings regarding multi-party computation of neural network training are purely theoretical and have use-cases outside the domain of healthcare.Keywords: neural network aggregation, multi-party computation, transfer learning, average ensemble learning
Procedia PDF Downloads 16217562 An Introductory Study on Optimization Algorithm for Movable Sensor Network-Based Odor Source Localization
Authors: Yossiri Ariyakul, Piyakiat Insom, Poonyawat Sangiamkulthavorn, Takamichi Nakamoto
Abstract:
In this paper, the method of optimization algorithm for sensor network comprised of movable sensor nodes which can be used for odor source localization was proposed. A sensor node is composed of an odor sensor, an anemometer, and a wireless communication module. The odor intensity measured from the sensor nodes are sent to the processor to perform the localization based on optimization algorithm by which the odor source localization map is obtained as a result. The map can represent the exact position of the odor source or show the direction toward it remotely. The proposed method was experimentally validated by creating the odor source localization map using three, four, and five sensor nodes in which the accuracy to predict the position of the odor source can be observed.Keywords: odor sensor, odor source localization, optimization, sensor network
Procedia PDF Downloads 30017561 Investigation of the Morphology of SiO2 Nano-Particles Using Different Synthesis Techniques
Authors: E. Gandomkar, S. Sabbaghi
Abstract:
In this paper, the effects of variation synthesized methods on morphology and size of silica nanostructure via modifying sol-gel and precipitation method have been investigated. Meanwhile, resulting products have been characterized by particle size analyzer, scanning electron microscopy (SEM), X-ray Diffraction (XRD) and Fourier transform infrared (FT-IR) spectra. As result, the shape of SiO2 with sol-gel and precipitation methods was spherical but with modifying sol-gel method we have been had nanolayer structure.Keywords: modified sol-gel, precipitation, nanolayer, Na2SiO3, nanoparticle
Procedia PDF Downloads 29217560 The Mediatory Role of Innovation in the Link between Social and Financial Performance
Authors: Bita Mashayekhi, Amin Jahangard, Milad Samavat, Saeid Homayoun
Abstract:
In the modern competitive business environment, one cannot overstate the importance of corporate social responsibility. The controversial link between the social and financial performance of firms has become a topic of interest for scholars. Hence, this study examines the social and financial performance link by taking into account the mediating role of innovation performance. We conducted the Covariance-based Structural Equation Modeling (CB-SEM) method on an international sample of firms provided by the ASSET4 database. In this research, to explore the black box of the social and financial performance relationship, we first examined the effect of social performance separately on financial performance and innovation; then, we measured the mediation role of innovation in the social and financial performance link. While our results indicate the positive effect of social performance on financial performance and innovation, we cannot document the positive mediating role of innovation. This possibly relates to the long-term nature of benefits from investments in innovation.Keywords: ESG, financial performance, innovation, social performance, structural equation modeling
Procedia PDF Downloads 10217559 Missing Link Data Estimation with Recurrent Neural Network: An Application Using Speed Data of Daegu Metropolitan Area
Authors: JaeHwan Yang, Da-Woon Jeong, Seung-Young Kho, Dong-Kyu Kim
Abstract:
In terms of ITS, information on link characteristic is an essential factor for plan or operation. But in practical cases, not every link has installed sensors on it. The link that does not have data on it is called “Missing Link”. The purpose of this study is to impute data of these missing links. To get these data, this study applies the machine learning method. With the machine learning process, especially for the deep learning process, missing link data can be estimated from present link data. For deep learning process, this study uses “Recurrent Neural Network” to take time-series data of road. As input data, Dedicated Short-range Communications (DSRC) data of Dalgubul-daero of Daegu Metropolitan Area had been fed into the learning process. Neural Network structure has 17 links with present data as input, 2 hidden layers, for 1 missing link data. As a result, forecasted data of target link show about 94% of accuracy compared with actual data.Keywords: data estimation, link data, machine learning, road network
Procedia PDF Downloads 51017558 Two-stage Robust Optimization for Collaborative Distribution Network Design Under Uncertainty
Authors: Reza Alikhani
Abstract:
This research focuses on the establishment of horizontal cooperation among companies to enhance their operational efficiency and competitiveness. The study proposes an approach to horizontal collaboration, called coalition configuration, which involves partnering companies sharing distribution centers in a network design problem. The paper investigates which coalition should be formed in each distribution center to minimize the total cost of the network. Moreover, potential uncertainties, such as operational and disruption risks, are considered during the collaborative design phase. To address this problem, a two-stage robust optimization model for collaborative distribution network design under surging demand and facility disruptions is presented, along with a column-and-constraint generation algorithm to obtain exact solutions tailored to the proposed formulation. Extensive numerical experiments are conducted to analyze solutions obtained by the model in various scenarios, including decisions ranging from fully centralized to fully decentralized settings, collaborative versus non-collaborative approaches, and different amounts of uncertainty budgets. The results show that the coalition formation mechanism proposes some solutions that are competitive with the savings of the grand coalition. The research also highlights that collaboration increases network flexibility and resilience while reducing costs associated with demand and capacity uncertainties.Keywords: logistics, warehouse sharing, robust facility location, collaboration for resilience
Procedia PDF Downloads 6917557 Social Dimension of Air Transport Sustainable Development
Authors: Dimitrios J. Dimitriou, Maria F. Sartzetaki
Abstract:
Air Transport links markets and individuals, making regions more competitive and promoting social and economic development. The assessment of social contribution is the key objective of this paper, focusing on the definition of the components of social dimension and welfare metrics in the national scale. According to a top-down approach, the key dimensions that affect the social welfare are presented. Conventional wisdom is to provide estimations on added value to social issues caused by the air transport development and present the methodology framework for measuring the contribution of transport development in social value chain. Greece is the case study of this paper, providing results from the contribution of air transport infrastructures in national welfare. The application key findings are essential for managers and decision makers to support actions and plans towards economic recovery of an economy presenting strong seasonal characteristics (because of tourism) and suffering from recession.Keywords: air transport, social coherence, resilient business development, socioeconomic impact
Procedia PDF Downloads 22217556 The Vision Baed Parallel Robot Control
Abstract:
In this paper, we describe the control strategy of high speed parallel robot system with EtherCAT network. This work deals the parallel robot system with centralized control on the real-time operating system such as window TwinCAT3. Most control scheme and algorithm is implemented master platform on the PC, the input and output interface is ported on the slave side. The data is transferred by maximum 20usecond with 1000byte. EtherCAT is very high speed and stable industrial network. The control strategy with EtherCAT is very useful and robust on Ethernet network environment. The developed parallel robot is controlled pre-design nonlinear controller for 6G/0.43 cycle time of pick and place motion tracking. The experiment shows the good design and validation of the controller.Keywords: parallel robot control, etherCAT, nonlinear control, parallel robot inverse kinematic
Procedia PDF Downloads 57117555 Applying Polyphonic Dialogue as an Approach to Thematically Analyse the Development of Online Identities in Social Media
Authors: Maryam Khosronejad
Abstract:
In social media, differences between individuals become salient as they become a member of different groups with particular social and cultural practices and get engaged in various conversations. The influence of the presence of social media on the promotion of self-expression and polyphonic dialogue is an understudied area and is, therefore, the focus of this paper. This exploration aims to understand the formation of online identities as an ongoing process of orchestrating polyphonic dialogue and responding to available positions. In addition, applying the thematic analysis, it gives examples of how discursive transactions facilitate this process. The implications for the use of social media in education will be discussed based on the findings.Keywords: online identity, polyphonic dialogue, self expression, social media
Procedia PDF Downloads 225