Search results for: virtual environments computer auditing
4202 In Silico Screening, Identification and Validation of Cryptosporidium hominis Hypothetical Protein and Virtual Screening of Inhibitors as Therapeutics
Authors: Arpit Kumar Shrivastava, Subrat Kumar, Rajani Kanta Mohapatra, Priyadarshi Soumyaranjan Sahu
Abstract:
Computational approaches to predict structure, function and other biological characteristics of proteins are becoming more common in comparison to the traditional methods in drug discovery. Cryptosporidiosis is a major zoonotic diarrheal disease particularly in children, which is caused primarily by Cryptosporidium hominis and Cryptosporidium parvum. Currently, there are no vaccines for cryptosporidiosis and recommended drugs are not effective. With the availability of complete genome sequence of C. hominis, new targets have been recognized for the development of effective and better drugs and/or vaccines. We identified a unique hypothetical epitopic protein in C. hominis genome through BLASTP analysis. A 3D model of the hypothetical protein was generated using I-Tasser server through threading methodology. The quality of the model was validated through Ramachandran plot by PROCHECK server. The functional annotation of the hypothetical protein through DALI server revealed structural similarity with human Transportin 3. Phylogenetic analysis for this hypothetical protein also showed C. hominis hypothetical protein (CUV04613) was the closely related to human transportin 3 protein. The 3D protein model is further subjected to virtual screening study with inhibitors from the Zinc Database by using Dock Blaster software. Docking study reported N-(3-chlorobenzyl) ethane-1,2-diamine as the best inhibitor in terms of docking score. Docking analysis elucidated that Leu 525, Ile 526, Glu 528, Glu 529 are critical residues for ligand–receptor interactions. The molecular dynamic simulation was done to access the reliability of the binding pose of inhibitor and protein complex using GROMACS software at 10ns time point. Trajectories were analyzed at each 2.5 ns time interval, among which, H-bond with LEU-525 and GLY- 530 are significantly present in MD trajectories. Furthermore, antigenic determinants of the protein were determined with the help of DNA Star software. Our study findings showed a great potential in order to provide insights in the development of new drug(s) or vaccine(s) for control as well as prevention of cryptosporidiosis among humans and animals.Keywords: cryptosporidium hominis, hypothetical protein, molecular docking, molecular dynamics simulation
Procedia PDF Downloads 3654201 The Examination of Prospective ICT Teachers’ Attitudes towards Application of Computer Assisted Instruction
Authors: Agâh Tuğrul Korucu, Ismail Fatih Yavuzaslan, Lale Toraman
Abstract:
Nowadays, thanks to development of technology, integration of technology into teaching and learning activities is spreading. Increasing technological literacy which is one of the expected competencies for individuals of 21st century is associated with the effective use of technology in education. The most important factor in effective use of technology in education institutions is ICT teachers. The concept of computer assisted instruction (CAI) refers to the utilization of information and communication technology as a tool aided teachers in order to make education more efficient and improve its quality in the process of educational. Teachers can use computers in different places and times according to owned hardware and software facilities and characteristics of the subject and student in CAI. Analyzing teachers’ use of computers in education is significant because teachers are the ones who manage the course and they are the most important element in comprehending the topic by students. To accomplish computer-assisted instruction efficiently is possible through having positive attitude of teachers. Determination the level of knowledge, attitude and behavior of teachers who get the professional knowledge from educational faculties and elimination of deficiencies if any are crucial when teachers are at the faculty. Therefore, the aim of this paper is to identify ICT teachers' attitudes toward computer-assisted instruction in terms of different variables. Research group consists of 200 prospective ICT teachers studying at Necmettin Erbakan University Ahmet Keleşoğlu Faculty of Education CEIT department. As data collection tool of the study; “personal information form” developed by the researchers and used to collect demographic data and "the attitude scale related to computer-assisted instruction" are used. The scale consists of 20 items. 10 of these items show positive feature, while 10 of them show negative feature. The Kaiser-Meyer-Olkin (KMO) coefficient of the scale is found 0.88 and Barlett test significance value is found 0.000. The Cronbach’s alpha reliability coefficient of the scale is found 0.93. In order to analyze the data collected by data collection tools computer-based statistical software package used; statistical techniques such as descriptive statistics, t-test, and analysis of variance are utilized. It is determined that the attitudes of prospective instructors towards computers do not differ according to their educational branches. On the other hand, the attitudes of prospective instructors who own computers towards computer-supported education are determined higher than those of the prospective instructors who do not own computers. It is established that the departments of students who previously received computer lessons do not affect this situation so much. The result is that; the computer experience affects the attitude point regarding the computer-supported education positively.Keywords: computer based instruction, teacher candidate, attitude, technology based instruction, information and communication technologies
Procedia PDF Downloads 2954200 Social Networking Application: What Is Their Quality and How Can They Be Adopted in Open Distance Learning Environments?
Authors: Asteria Nsamba
Abstract:
Social networking applications and tools have become compelling platforms for generating and sharing knowledge across the world. Social networking applications and tools refer to a variety of social media platforms which include Facebook, Twitter WhatsApp, blogs and Wikis. The most popular of these platforms are Facebook, with 2.41 billion active users on a monthly basis, followed by WhatsApp with 1.6 billion users and Twitter with 330 million users. These communication platforms have not only impacted social lives but have also impacted students’ learning, across different delivery modes in higher education: distance, conventional and blended learning modes. With this amount of interest in these platforms, knowledge sharing has gained importance within the context in which it is required. In open distance learning (ODL) contexts, social networking platforms can offer students and teachers the platform on which to create and share knowledge, and form learning collaborations. Thus, they can serve as support mechanisms to increase interactions and reduce isolation and loneliness inherent in ODL. Despite this potential and opportunity, research indicates that many ODL teachers are not inclined to using social media tools in learning. Although it is unclear why these tools are uncommon in these environments, concerns raised in the literature have indicated that many teachers have not mastered the art of teaching with technology. Using technological, pedagogical content knowledge (TPCK) and product quality theory, and Bloom’s Taxonomy as lenses, this paper is aimed at; firstly, assessing the quality of three social media applications: Facebook, Twitter and WhatsApp, in order to determine the extent to which they are suitable platforms for teaching and learning, in terms of content generation, information sharing and learning collaborations. Secondly, the paper demonstrates the application of teaching, learning and assessment using Bloom’s Taxonomy.Keywords: distance education, quality, social networking tools, TPACK
Procedia PDF Downloads 1244199 Mobile-Assisted Language Learning (MALL) Applications for Interactive and Engaging Classrooms: APPsolutely!
Authors: Ajda Osifo, Amanda Radwan
Abstract:
Mobile-assisted language learning (MALL) or m-learning which is defined as learning with mobile devices that can be utilized in any place that is equipped with unbroken transmission signals, has created new opportunities and challenges for educational use. It introduced a new learning model combining new types of mobile devices, wireless communication services and technologies with teaching and learning. Recent advancements in the mobile world such as the Apple IOS devices (IPhone, IPod Touch and IPad), Android devices and other smartphone devices and environments (such as Windows Phone 7 and Blackberry), allowed learning to be more flexible inside and outside the classroom, making the learning experience unique, adaptable and tailored to each user. Creativity, learner autonomy, collaboration and digital practices of language learners are encouraged as well as innovative pedagogical applications, like the flipped classroom, for such practices in classroom contexts are enhanced. These developments are gradually embedded in daily life and they also seem to be heralding the sustainable move to paperless classrooms. Since mobile technologies are increasingly viewed as a main platform for delivery, we as educators need to design our activities, materials and learning environments in such a way to ensure that learners are engaged and feel comfortable. For the purposes of our session, several core MALL applications that work on the Apple IPad/IPhone will be explored; the rationale and steps needed to successfully implement these applications will be discussed and student examples will be showcased. The focus of the session will be on the following points: 1-Our current pedagogical approach, 2-The rationale and several core MALL apps, 3-Possible Challenges for Teachers and Learners, 4-Future implications. This session is aimed at instructors who are interested in integrating MALL apps into their own classroom planning.Keywords: MALL, educational technology, iPads, apps
Procedia PDF Downloads 3944198 Computer Aided Classification of Architectural Distortion in Mammograms Using Texture Features
Authors: Birmohan Singh, V.K.Jain
Abstract:
Computer aided diagnosis systems provide vital opinion to radiologists in the detection of early signs of breast cancer from mammogram images. Masses and microcalcifications, architectural distortions are the major abnormalities. In this paper, a computer aided diagnosis system has been proposed for distinguishing abnormal mammograms with architectural distortion from normal mammogram. Four types of texture features GLCM texture, GLRLM texture, fractal texture and spectral texture features for the regions of suspicion are extracted. Support Vector Machine has been used as classifier in this study. The proposed system yielded an overall sensitivity of 96.47% and accuracy of 96% for the detection of abnormalities with mammogram images collected from Digital Database for Screening Mammography (DDSM) database.Keywords: architecture distortion, mammograms, GLCM texture features, GLRLM texture features, support vector machine classifier
Procedia PDF Downloads 4914197 Inquiry-based Science Education in Computer Science Learning in Primary School
Authors: Maslin Masrom, Nik Hasnaa Nik Mahmood, Wan Normeza Wan Zakaria, Azizul Azizan, Norshaliza Kamaruddin
Abstract:
Traditionally, in science education, the teacher provides facts and the students learn them. It is outmoded for today’s students to equip them with real-life situations, mainly because knowledge and life skills are acquired passively from the instructors. Inquiry-Based Science Education (IBSE) is an approach that allows students to experiment, ask questions, and develop responses based on reasoning. It has provided students and teachers with opportunities to actively engage in collaborative learning via inquiry. This approach inspires the students to become active thinkers, research for solutions, and gain life-long experience and self-confidence. Therefore, the research aims to investigate how the primary-school teacher supports students or pupils through an inquiry-based science education approach for computer science, specifically coding skills. The results are presented and described.Keywords: inquiry-based science education, student-centered learning, computer science, primary school
Procedia PDF Downloads 1574196 A Case Study to Observe How Students’ Perception of the Possibility of Success Impacts Their Performance in Summative Exams
Authors: Rochelle Elva
Abstract:
Faculty in Higher Education today are faced with the challenge of convincing their students of the importance of learning and mastery of skills. This is because most students often have a single motivation -to get high grades. If it appears that this goal will not be met, they lose their motivation, and their academic efforts wane. This is true even for students in the competitive fields of STEM, including Computer Science majors. As educators, we have to understand our students and leverage what motivates them to achieve our learning outcomes. This paper presents a case study that utilizes cognitive psychology’s Expectancy Value Theory and Motivation Theory to investigate the effect of sustained expectancy for success on students’ learning outcomes. In our case study, we explore how students’ motivation and persistence in their academic efforts are impacted by providing them with an unexpected possible path to success that continues to the end of the semester. The approach was tested in an undergraduate computer science course with n = 56. The results of the study indicate that when presented with the real possibility of success, despite existing low grades, both low and high-scoring students persisted in their efforts to improve their performance. Their final grades were, on average, one place higher on the +/-letter grade scale, with some students scoring as high as three places above their predicted grade.Keywords: expectancy for success and persistence, motivation and performance, computer science education, motivation and performance in computer science
Procedia PDF Downloads 804195 Estimation of Soil Erosion Potential in Herat Province, Afghanistan
Authors: M. E. Razipoor, T. Masunaga, K. Sato, M. S. Saboory
Abstract:
Estimation of soil erosion is economically and environmentally important in Herat, Afghanistan. Degradation of soil has negative impact (decreased soil fertility, destroyed soil structure, and consequently soil sealing and crusting) on life of Herat residents. Water and wind are the main erosive factors causing soil erosion in Herat. Furthermore, scarce vegetation cover, exacerbated by socioeconomic constraint, and steep slopes accelerate soil erosion. To sustain soil productivity and reduce soil erosion impact on human life, due to sustaining agricultural production and auditing the environment, it is needed to quantify the magnitude and extent of soil erosion in a spatial domain. Thus, this study aims to estimate soil loss potential and its spatial distribution in Herat, Afghanistan by applying RUSLE in GIS environment. The rainfall erosivity factor ranged between values of 125 and 612 (MJ mm ha-1 h-1 year-1). Soil erodibility factor varied from 0.036 to 0.073 (Mg h MJ-1 mm-1). Slope length and steepness factor (LS) values were between 0.03 and 31.4. The vegetation cover factor (C), derived from NDVI analysis of Landsat-8 OLI scenes, resulting in range of 0.03 to 1. Support practice factor (P) were assigned to a value of 1, since there is not significant mitigation practices in the study area. Soil erosion potential map was the product of these factors. Mean soil erosion rate of Herat Province was 29 Mg ha-1 year-1 that ranged from 0.024 Mg ha-1 year-1 in flat areas with dense vegetation cover to 778 Mg ha-1 year-1 in sharp slopes with high rainfall but least vegetation cover. Based on land cover map of Afghanistan, areas with soil loss rate higher than soil loss tolerance (8 Mg ha-1 year-1) occupies 98% of Forests, 81% rangelands, 64% barren lands, 60% rainfed lands, 28% urban area and 18% irrigated Lands.Keywords: Afghanistan, erosion, GIS, Herat, RUSLE
Procedia PDF Downloads 4344194 Reliability Modeling of Repairable Subsystems in Semiconductor Fabrication: A Virtual Age and General Repair Framework
Authors: Keshav Dubey, Swajeeth Panchangam, Arun Rajendran, Swarnim Gupta
Abstract:
In the semiconductor capital equipment industry, effective modeling of repairable system reliability is crucial for optimizing maintenance strategies and ensuring operational efficiency. However, repairable system reliability modeling using a renewal process is not as popular in the semiconductor equipment industry as it is in the locomotive and automotive industries. Utilization of this approach will help optimize maintenance practices. This paper presents a structured framework that leverages both parametric and non-parametric approaches to model the reliability of repairable subsystems based on operational data, maintenance schedules, and system-specific conditions. Data is organized at the equipment ID level, facilitating trend testing to uncover failure patterns and system degradation over time. For non-parametric modeling, the Mean Cumulative Function (Mean Cumulative Function) approach is applied, offering a flexible method to estimate the cumulative number of failures over time without assuming an underlying statistical distribution. This allows for empirical insights into subsystem failure behavior based on historical data. On the parametric side, virtual age modeling, along with Homogeneous and Non-Homogeneous Poisson Process (Homogeneous Poisson Process and Non-Homogeneous Poisson Process) models, is employed to quantify the effect of repairs and the aging process on subsystem reliability. These models allow for a more structured analysis by characterizing repair effectiveness and system wear-out trends over time. A comparison of various Generalized Renewal Process (GRP) approaches highlights their utility in modeling different repair effectiveness scenarios. These approaches provide a robust framework for assessing the impact of maintenance actions on system performance and reliability. By integrating both parametric and non-parametric methods, this framework offers a comprehensive toolset for reliability engineers to better understand equipment behavior, assess the effectiveness of maintenance activities, and make data-driven decisions that enhance system availability and operational performance in semiconductor fabrication facilities.Keywords: reliability, maintainability, homegenous poission process, repairable system
Procedia PDF Downloads 194193 Adopt and Apply Research-Supported Standards and Practices to Ensure Quality for Online Education and Digital Learning at Course, Program and Institutional Levels
Authors: Yaping Gao
Abstract:
With the increasing globalization of education and the continued momentum and wider adoption of online and digital learning all over the world, post pandemic, how could best practices and extensive experience gained from the higher education community over the past few decades be adopted and adapted to benefit international communities, which can be vastly different culturally and pedagogically? How can schools and institutions adopt, adapt and apply these proven practices to develop strategic plans for digital transformation at institutional levels, and to improve or create quality online or digital learning environments at course and program levels to help all students succeed? The presenter will introduce the primary components of the US-based quality assurance process, including : 1) five sets of research-supported standards to guide the design, development and review of online and hybrid courses; 2) professional development offerings and pathways for administrators, faculty and instructional support staff; 3) a peer-review process for course/program reviews resulting in constructive recommendations for continuous improvement, certification of quality and international recognition; and 4) implementation of the quality assurance process on a continuum to program excellence, achievement of institutional goals, and facilitation of accreditation process and success. Regardless language, culture, pedagogical practices, or technological infrastructure, the core elements of quality teaching and learning remain the same across all delivery formats. What is unique is how to ensure quality of teaching and learning in online education and digital learning. No one knows all the answers to everything but no one needs to reinvent the wheel either. Together the international education community can support and learn from each other to achieve institutional goals and ensure all students succeed in the digital learning environments.Keywords: Online Education, Digital Learning, Quality Assurance, Standards and Best Practices
Procedia PDF Downloads 254192 Investigating Software Engineering Challenges in Game Development
Authors: Fawad Zaidi
Abstract:
This paper discusses a variety of challenges and solutions involved with creating computer games and the issues faced by the software engineers working in this field. This review further investigates the articles coverage of project scope and the problem of feature creep that appears to be inherent with game development. The paper tries to answer the following question: Is this a problem caused by a shortage, or bad software engineering practices, or is this outside the control of the software engineering component of the game production process?Keywords: software engineering, computer games, software applications, development
Procedia PDF Downloads 4754191 Design and Implementation of Wireless Syncronized AI System for Security
Authors: Saradha Priya
Abstract:
Developing virtual human is very important to meet the challenges occurred in many applications where human find difficult or risky to perform the task. A robot is a machine that can perform a task automatically or with guidance. Robotics is generally a combination of artificial intelligence and physical machines (motors). Computational intelligence involves the programmed instructions. This project proposes a robotic vehicle that has a camera, PIR sensor and text command based movement. It is specially designed to perform surveillance and other few tasks in the most efficient way. Serial communication has been occurred between a remote Base Station, GUI Application, and PC.Keywords: Zigbee, camera, pirsensor, wireless transmission, DC motor
Procedia PDF Downloads 3484190 Accessible Mobile Augmented Reality App for Art Social Learning Based on Technology Acceptance Model
Authors: Covadonga Rodrigo, Felipe Alvarez Arrieta, Ana Garcia Serrano
Abstract:
Mobile augmented reality technologies have become very popular in the last years in the educational field. Researchers have studied how these technologies improve the engagement of the student and better understanding of the process of learning. But few studies have been made regarding the accessibility of these new technologies applied to digital humanities. The goal of our research is to develop an accessible mobile application with embedded augmented reality main characters of the art work and gamification events accompanied by multi-sensorial activities. The mobile app conducts a learning itinerary around the artistic work, driving the user experience in and out the museum. The learning design follows the inquiry-based methodology and social learning conducted through interaction with social networks. As for the software application, it’s being user-centered designed, following the universal design for learning (UDL) principles to assure the best level of accessibility for all. The mobile augmented reality application starts recognizing a marker from a masterpiece of a museum using the camera of the mobile device. The augmented reality information (history, author, 3D images, audio, quizzes) is shown through virtual main characters that come out from the art work. To comply with the UDL principles, we use a version of the technology acceptance model (TAM) to study the easiness of use and perception of usefulness, extended by the authors with specific indicators for measuring accessibility issues. Following a rapid prototype method for development, the first app has been recently produced, fulfilling the EN 301549 standard and W3C accessibility guidelines for mobile development. A TAM-based web questionnaire with 214 participants with different kinds of disabilities was previously conducted to gather information and feedback on user preferences from the artistic work on the Museo del Prado, the level of acceptance of technology innovations and the easiness of use of mobile elements. Preliminary results show that people with disabilities felt very comfortable while using mobile apps and internet connection. The augmented reality elements seem to offer an added value highly engaging and motivating for the students.Keywords: H.5.1 (multimedia information systems), artificial, augmented and virtual realities, evaluation/methodology
Procedia PDF Downloads 1354189 Activity-Based Safety Assessment of Real Estate Projects in Western India
Authors: Patel Parul, Harsh Ganvit
Abstract:
The construction industry is the second highest industry after agriculture provides employment in India. In developing countries like India, many construction projects are coming up to meet the demand. On the one hand, construction projects are increasing; on the other hand still, construction companies are struggling with many problems. One of the major problems is to ensure safe working conditions at the construction site. Due to a lack of safety awareness and ignorance of safety aspects, many fatal accidents are very common at the construction site in India. One of the key success factors for construction projects is “Accident-Free Construction Projects”. The construction projects can be divided into various categories like Infrastructure projects, industrial construction and real estate construction. Real estate projects are mainly comprised of commercial and residential projects. In the construction industry, private sectors play a huge role in urban and rural development and also contribute significantly to the growth of the nation. Infrastructure and Industrial projects are mainly executed by well-qualified construction contractors. For such projects, ensuring safety at construction projects is inevitable and probably one of the major clauses of contract documents as well. These projects are monitored from time to time by national agencies and researchers, too. However, Real estate projects are rarely monitored for safety aspects. No systematic contract system is followed for these projects. Safety is the most neglected aspect of these projects. In the current research projects, an attempt is made to carry out safety auditing for about 75 real estate projects. The objective of this work is to collect the activity-based safety survey of real estate projects in western India. The analysis of activity-based safety implementation for real estate projects is discussed in the present work. The activities are divided into three categories based on the data collected. The findings of this work will help local monitoring authorities to implement a safety management plan for real estate projects.Keywords: construction safety, safety assessment, activity-based safety, real estate projects
Procedia PDF Downloads 554188 Image Processing techniques for Surveillance in Outdoor Environment
Authors: Jayanth C., Anirudh Sai Yetikuri, Kavitha S. N.
Abstract:
This paper explores the development and application of computer vision and machine learning techniques for real-time pose detection, facial recognition, and number plate extraction. Utilizing MediaPipe for pose estimation, the research presents methods for detecting hand raises and ducking postures through real-time video analysis. Complementarily, facial recognition is employed to compare and verify individual identities using the face recognition library. Additionally, the paper demonstrates a robust approach for extracting and storing vehicle number plates from images, integrating Optical Character Recognition (OCR) with a database management system. The study highlights the effectiveness and versatility of these technologies in practical scenarios, including security and surveillance applications. The findings underscore the potential of combining computer vision techniques to address diverse challenges and enhance automated systems for both individual and vehicular identification. This research contributes to the fields of computer vision and machine learning by providing scalable solutions and demonstrating their applicability in real-world contexts.Keywords: computer vision, pose detection, facial recognition, number plate extraction, machine learning, real-time analysis, OCR, database management
Procedia PDF Downloads 264187 Wave Agitated Signatures in the Oolitic Limestones of Kunihar Formation, Proterozoic Simla Group, Lesser Himalaya, India
Authors: Alono Thorie, Ananya Mukhopadhyay
Abstract:
Ooid bearing horizons of the Proterozoic Kunihar Formation, Simla Group, Lesser Himalaya have been addressed in the present work. The study is concentrated around the outskirts of Arki town, Solan district, Himachal Pradesh, India. Based on the sedimentary facies associations, the processes that promote the formation of ooids have been documented. The facies associations that have been recorded are: (i) Oolitic-Intraclastic grainstone (FA1), (ii) Oolitic grainstone (FA2), (iii) Boundstone (FA3), (iv) Dolomudstone (FA4) and (v) Rudstone (FA5). Oolitic-Intraclastic grainstone (FA1) mainly consists of well sorted ooids with concentric laminae and intraclasts. Large ooids with grain sizes more than 4 mm are characteristic of oolites throughout the area. Normally graded beds consisting of ooids and intraclasts are frequently documented in storm sediments in shelf environments and carbonate platforms. The well-sorted grainstone fabric indicates deposition in a high-energy shoal with tidal currents and storm reworking. FA2 comprises spherical to elliptical grains up to 8.5cm in size with concentric cortex and micritic nuclei. Peloids in FA2 are elliptical, rounded objects <0.3 mm in size. FA1 and FA2 have been recorded alongside boundstones (FA3) comprising stromatolites having columnar, wavy and domal morphology. Boundstones (FA3) reflect microbial growth in carbonate platforms and reefs. Dolomudstones (FA4) interbedded with cross laminated sandstones and erosional surfaces reflect sedimentation in storm dominated zones below fair-weather wave base. Rudstone (FA5) is composed of oolitic grainstone (FA2), boundstone (FA3) and dolomudstone (FA4). These clasts are few mm to more than 10 cm in length. Rudstones indicate deposition along a slope with intermittent influence of wave currents and storm activities. Most ooids from the Kunihar Formation are regular ooids with abundance of broken ooids. Compound and concentric ooids indicating medium to low energy environments are present but scarce. Ooids from high energy domains are more dominant than ooids developed from low energy environments. The unusually large size of the Kunihar ooids (more than 8.5 cm) is rare in the geological record. Development of carbonate deposits such as oolitic- intraclastic Grainstones (FA1), oolitic grainstones (FA2) and rudstones (FA5), and reflect deposition in an agitated beach environment with abundant microbial activity and high energy shallow marine waters influenced by tide, wave and storm currents. Occurrences of boundstone (FA4) or stromatolitic carbonate amongst oolitic facies (FA1 and FA2) and appearance of compound and concentric ooids indicate intervals of calm in between agitated phases of storm, wave and tidal activities.Keywords: proterozoic, Simla Group, ooids, stromatolites
Procedia PDF Downloads 1884186 Client Importance and Audit Quality under Civil Law versus Common Law Societies
Authors: Kelly Grani Yuen
Abstract:
Accounting scandals and auditing frauds are perceived to be driven by aggressive companies and misrepresentation of audit reports. However, local legal systems and law enforcements may affect the services auditors provide to their ‘important’ clients. Under the civil law and common law jurisdictions, the standard setters, the government, and the regulatory bodies treat cases differently. As such, whether or not different forms of legal systems and extent of law enforcement plays an important role in auditor’s Audit Quality is a question this paper attempts to explore. The paper focuses on the investigation in Asia, where Hong Kong represents the common-law jurisdiction, while Taiwan and China represent the civil law jurisdiction. Only the ten reputable accounting firms are used in this study due to the differences in rankings and establishments of some of the small local audit firms. This will also contribute to the data collected between the years 2007-2013. By focusing on the use of multiple regression based on the dependent (Audit Quality) and independent variables (Client Importance, Law Enforcement, and Press Freedom), six different models are established. Results demonstrate that since different jurisdictions have different legal systems and market regulations, auditor’s treatment on ‘important’ clients will vary. However, with the moderators in place (law enforcement and press freedom), the relationship between client importance and audit quality may be smoothed out. With that in mind, this study contributes to local governments and standard setters’ consideration on legal reform and proper law enforcement in the market. Perhaps, with such modifications on the economic systems, collusion between companies and auditors can finally be put to a halt.Keywords: audit quality, client importance, jurisdiction, modified audit opinions
Procedia PDF Downloads 4104185 The Promotion of a Risk Culture: a Descriptive Study of Ghanaian Banks
Authors: Gerhard Grebe, Johan Marx
Abstract:
The aim of the study is to assess the state of operational risk management and the adoption of an appropriate risk culture in Ghanaian banks. The Bank of Ghana (BoG) joined the Basel Consultative Group (BCG) of the Basel Committee on Bank Supervision (BCBS) in 2021 and is proceeding with the implementation of the Basel III international regulatory framework for banks. The BoG’s Directive about risk management encourages, inter alia, the creation of an appropriate risk culture by Ghanaian banks. However, it is not evident how the risk management staff of Ghanaian banks experience the risk culture and the implementation of operational risk management in the banks where they are employed. Ghana is a developing economy, and it is addressing challenges with its organisational culture. According to Transparency International, successive Ghanaian governments claim to be fighting corruption, but little success has been achieved so far. This points to a possible lack of accountability, transparency, and integrity in the environment in which Ghanaian banks operate and which could influence their risk culture negatively. Purposive sampling was used for the survey, and the questionnaire was completed byGhanaian bank personnel who specializesin operational risk management, risk governance, and compliance, bank supervision, risk analyses, as well as the implementation of the operational risk management requirements of the Basel regulatory frameworks. The respondents indicated that they are fostering a risk culture and implementing monitoring and reporting procedures; the three lines of defence (3LOD); compliance; internal auditing; disclosure of operational risk information; and receiving guidance from the bank supervisor in an attempt to improve their operational risk management practices. However, the respondents reported the following challenges with staff members who are not inside the risk management departments(in order of priority), namelydemonstrating a risk culture, training and development; communication; reporting and disclosure; roles and responsibilities; performance appraisal; and technological and environmental barriers. Recommendations to address these challenges are providedKeywords: ghana, operational risk, risk culture, risk management
Procedia PDF Downloads 1224184 Revolutionary Solutions for Modeling and Visualization of Complex Software Systems
Abstract:
Existing software modeling and visualization approaches using UML are outdated, which are outcomes of reductionism and the superposition principle that the whole of a system is the sum of its parts, so that with them all tasks of software modeling and visualization are performed linearly, partially, and locally. This paper introduces revolutionary solutions for modeling and visualization of complex software systems, which make complex software systems much easy to understand, test, and maintain. The solutions are based on complexity science, offering holistic, automatic, dynamic, virtual, and executable approaches about thousand times more efficient than the traditional ones.Keywords: complex systems, software maintenance, software modeling, software visualization
Procedia PDF Downloads 4014183 ICT Education: Digital History Learners
Authors: Lee Bih Ni, Elvis Fung
Abstract:
This article is to review and understand the new generation of students to understand their expectations and attitudes. There are a group of students on school projects, creative work, educational software and digital signal source, the use of social networking tools to communicate with friends and a part in the competition. Today's students have been described as the new millennium students. They use information and communication technology in a more creative and innovative at home than at school, because the information and communication technologies for different purposes, in the home, usually occur in school. They collaborate and communicate more effectively when they are at home. Most children enter school, they will bring about how to use information and communication technologies, some basic skills and some tips on how to use information and communication technology will provide a more advanced than most of the school's expectations. Many teachers can help students, however, still a lot of work, "tradition", without a computer, and did not see the "new social computing networks describe young people to learn and new ways of working life in the future", in the education system of the benefits of using a computer.Keywords: ICT education, digital history, new generation of students, benefits of using a computer
Procedia PDF Downloads 4054182 '3D City Model' through Quantum Geographic Information System: A Case Study of Gujarat International Finance Tec-City, Gujarat, India
Authors: Rahul Jain, Pradhir Parmar, Dhruvesh Patel
Abstract:
Planning and drawing are the important aspects of civil engineering. For testing theories about spatial location and interaction between land uses and related activities the computer based solution of urban models are used. The planner’s primary interest is in creation of 3D models of building and to obtain the terrain surface so that he can do urban morphological mappings, virtual reality, disaster management, fly through generation, visualization etc. 3D city models have a variety of applications in urban studies. Gujarat International Finance Tec-City (GIFT) is an ongoing construction site between Ahmedabad and Gandhinagar, Gujarat, India. It will be built on 3590000 m2 having a geographical coordinates of North Latitude 23°9’5’’N to 23°10’55’’ and East Longitude 72°42’2’’E to 72°42’16’’E. Therefore to develop 3D city models of GIFT city, the base map of the city is collected from GIFT office. Differential Geographical Positioning System (DGPS) is used to collect the Ground Control Points (GCP) from the field. The GCP points are used for the registration of base map in QGIS. The registered map is projected in WGS 84/UTM zone 43N grid and digitized with the help of various shapefile tools in QGIS. The approximate height of the buildings that are going to build is collected from the GIFT office and placed on the attribute table of each layer created using shapefile tools. The Shuttle Radar Topography Mission (SRTM) 1 Arc-Second Global (30 m X 30 m) grid data is used to generate the terrain of GIFT city. The Google Satellite Map is used to place on the background to get the exact location of the GIFT city. Various plugins and tools in QGIS are used to convert the raster layer of the base map of GIFT city into 3D model. The fly through tool is used for capturing and viewing the entire area in 3D of the city. This paper discusses all techniques and their usefulness in 3D city model creation from the GCP, base map, SRTM and QGIS.Keywords: 3D model, DGPS, GIFT City, QGIS, SRTM
Procedia PDF Downloads 2464181 Effects of Repetitive Strain/Stress Injury on the Human Body
Authors: Mohd Abdullah
Abstract:
This review describes some of the effects of repetitive strain/stress injury (RSI) on the human body especially among computer professionals today that spend extended hours of prolonged sitting in front of a computer day in and day out. The review briefly introduces the main factors that contribute to an increase of RSI among such computer professionals. The review briefly discusses how the human spinal column and knees are mainly affected by the onset of RSI resulting in poor posture. The root and secondary causes and effects of RSI are reviewed. The importance and value of the various breathing techniques are reviewed in an attempt to alleviate some of the effects of RSI. The review concludes with a small sample of suggested office stretches and poses geared towards at reducing RSI follows in this review. Readers will learn about the effects of RSI, as well as ways to cope with it. A better understanding of coping strategies may lead to well-being and a healthier overall lifestyle. Ultimately, the investment of time to connect with oneself with the poses and the power of the breath would promote a well-being that is overall healthier thus resulting in a better ability to cope/manage life stresses.Keywords: health, wellness, repetitive, chairs
Procedia PDF Downloads 1054180 Uranium Migration Process: A Multi-Technique Investigation Strategy for a Better Understanding of the Role of Colloids
Authors: Emmanuelle Maria, Pierre Crançon, Gaëtane Lespes
Abstract:
The knowledge of uranium migration processes within underground environments is a major issue in the environmental risk assessment associated with nuclear activities. This process is identified as strongly controlled by adsorption mechanisms, thus leading to strongly delayed migration paths. Colloidal ligands are likely to significantly increase the mobility of uranium in natural environments. The ability of colloids to mobilize and transport uranium depends on their origin, their nature, their structure, their stability and their reactivity with uranium. Thus, the colloidal mobilization and transport properties are often described as site-specific. In this work, the colloidal phases of two leachates obtained from two different horizons of the same podzolic soil were characterized with a speciation approach. For this purpose, a multi-technique strategy was used, based on Field-Flow Fractionation coupled to Ultraviolet, Multi-Angle Light Scattering and Inductively Coupled Plasma Mass Spectrometry (AF4-UV-MALS-ICPMS), Transmission Electron Microscopy (TEM), Electrospray Ionization Orbitrap Mass Spectrometry (ESI-Orbitrap), and Time-Resolved Laser Fluorescence Spectroscopy (TRLFS-EEM). Thus, elemental composition, size distribution, microscopic structure, colloidal stability and possible organic and/or inorganic content of colloids were determined, as well as their association with uranium. The leachates exhibit differences in their physical and chemical characteristics, mainly in the nature of organic matter constituents. The multi-technique investigation strategy used provides original data about colloidal phase structure and composition, offering a new vision of the way the uranium can be mobilized and transported in the considered soil. This information is a real significant contribution opening the way to our understanding and predicting of the colloidal transport.Keywords: colloids, migration, multi-technique, speciation, transport, uranium
Procedia PDF Downloads 1444179 An Accurate Computer-Aided Diagnosis: CAD System for Diagnosis of Aortic Enlargement by Using Convolutional Neural Networks
Authors: Mahdi Bazarganigilani
Abstract:
Aortic enlargement, also known as an aortic aneurysm, can occur when the walls of the aorta become weak. This disease can become deadly if overlooked and undiagnosed. In this paper, a computer-aided diagnosis (CAD) system was introduced to accurately diagnose aortic enlargement from chest x-ray images. An enhanced convolutional neural network (CNN) was employed and then trained by transfer learning by using three different main areas from the original images. The areas included the left lung, heart, and right lung. The accuracy of the system was then evaluated on 1001 samples by using 4-fold cross-validation. A promising accuracy of 90% was achieved in terms of the F-measure indicator. The results showed using different areas from the original image in the training phase of CNN could increase the accuracy of predictions. This encouraged the author to evaluate this method on a larger dataset and even on different CAD systems for further enhancement of this methodology.Keywords: computer-aided diagnosis systems, aortic enlargement, chest X-ray, image processing, convolutional neural networks
Procedia PDF Downloads 1624178 Embedding Employability Skills in Computer and Information Science Program Curriculum
Authors: Nadezda Pizika
Abstract:
The paper discusses possible approaches of embedding the development of employability skills in the program curriculum. This paper contains analysis of the problem areas raised by employers regarding new graduates’ readiness to join workforce, the ways of possible improvements, and the actions required from different stakeholders. The case discussed in the paper is related to Computer and Information Science (CIS) Program offered at Higher Colleges of Technology (UAE).Keywords: curriculum design, employability skills, employers, graduates, education, entrepreneurship
Procedia PDF Downloads 3254177 Directors’ Liability for Losses Incurred in the Management of PT Merpati Nusantara Airlines, Persero
Authors: Eny Suastuti
Abstract:
This paper is about state’s capital equity in establishing State-owned Company (PT Merpati Persero). Under private law regime, PT Merpati Persero equity is a state asset allocated separately from the State Budget. Consequently, it is no longer a state asset; rather, it becomes a part of company assets. The adoption of Act No. 17 of 2003 on State Finance, Act No. 31 of 1999, which is amended by Act No. 20 of 2001 on Eradication of Corrupt Practices, Act No. 15 of 2004 on Auditing, Management, and Accountability of State Finance, and Act No. 15 of 2006 Audit Board raises legal issues of whether State-owned Company’s (PT Merpati Persero) loss may be deemed as loss on state finance made by the Directors of PT Merpati Persero, which implication leads to corrupt practices conducted by the Directors. The principle of civil law states that state assets are separated from the state budget is not a government asset. Therefore the case of a lease agreement 2 (two) units of Boeing 737-400 and Boeing 737-500 between PT Merpati Nusantara Airlines with companies Third Stone Aircraft Leasing Group (TALG) the United States cannot be prosecuted under Articles 2 and 3 of Act No. 31 of 1999 Jo Act No. 20 of 2001 on Eradication of Corrupt Practices (Law PTPK). From this paper, three things are found. First, state’s capital equity, which has been allocated separately from state assets in establishing the PT Merpati Perserois not state asset; rather, it is company’s asset. Second, in the case of mismanagement leading to company loss, the Directors of PT Merpati Persero may not be charged with committing corrupt practice as prescribed in Articles 2 and 3 of Corrupt Practices Eradication Law. Third, misperception has been made by judicial practices since the courts consider loss in certain transaction made by Directors of PT Merpati Persero to be loss of state finance whose implication is applicability of Articles 2 and 3 of Corrupt Practices Eradication Law.Keywords: corrupt practice, loss, state's capital equity, state finance (PT Merpati Persero)
Procedia PDF Downloads 2614176 Protocol for Dynamic Load Distributed Low Latency Web-Based Augmented Reality and Virtual Reality
Authors: Rohit T. P., Sahil Athrij, Sasi Gopalan
Abstract:
Currently, the content entertainment industry is dominated by mobile devices. As the trends slowly shift towards Augmented/Virtual Reality applications the computational demands on these devices are increasing exponentially and we are already reaching the limits of hardware optimizations. This paper proposes a software solution to this problem. By leveraging the capabilities of cloud computing we can offload the work from mobile devices to dedicated rendering servers that are way more powerful. But this introduces the problem of latency. This paper introduces a protocol that can achieve high-performance low latency Augmented/Virtual Reality experience. There are two parts to the protocol, 1) In-flight compression The main cause of latency in the system is the time required to transmit the camera frame from client to server. The round trip time is directly proportional to the amount of data transmitted. This can therefore be reduced by compressing the frames before sending. Using some standard compression algorithms like JPEG can result in minor size reduction only. Since the images to be compressed are consecutive camera frames there won't be a lot of changes between two consecutive images. So inter-frame compression is preferred. Inter-frame compression can be implemented efficiently using WebGL but the implementation of WebGL limits the precision of floating point numbers to 16bit in most devices. This can introduce noise to the image due to rounding errors, which will add up eventually. This can be solved using an improved interframe compression algorithm. The algorithm detects changes between frames and reuses unchanged pixels from the previous frame. This eliminates the need for floating point subtraction thereby cutting down on noise. The change detection is also improved drastically by taking the weighted average difference of pixels instead of the absolute difference. The kernel weights for this comparison can be fine-tuned to match the type of image to be compressed. 2) Dynamic Load distribution Conventional cloud computing architectures work by offloading as much work as possible to the servers, but this approach can cause a hit on bandwidth and server costs. The most optimal solution is obtained when the device utilizes 100% of its resources and the rest is done by the server. The protocol balances the load between the server and the client by doing a fraction of the computing on the device depending on the power of the device and network conditions. The protocol will be responsible for dynamically partitioning the tasks. Special flags will be used to communicate the workload fraction between the client and the server and will be updated in a constant interval of time ( or frames ). The whole of the protocol is designed so that it can be client agnostic. Flags are available to the client for resetting the frame, indicating latency, switching mode, etc. The server can react to client-side changes on the fly and adapt accordingly by switching to different pipelines. The server is designed to effectively spread the load and thereby scale horizontally. This is achieved by isolating client connections into different processes.Keywords: 2D kernelling, augmented reality, cloud computing, dynamic load distribution, immersive experience, mobile computing, motion tracking, protocols, real-time systems, web-based augmented reality application
Procedia PDF Downloads 724175 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users
Authors: Haydar Teymourlouei
Abstract:
It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.Keywords: cyber-attacks, home user, prevention, security, technology
Procedia PDF Downloads 3934174 A Comparative Study of the Challenges of E-Learning in Nigerian Universities
Authors: J. N. Anene, A. A. Bello, C. C. Anene
Abstract:
The paper carried out a comparative study of the challenges of e-learning in Nigerian universities. The purpose of the study was to determine if there was a significant difference in the challenges faced by students in e-learning in Nigerian Universities. A total of two hundred and twenty-eight students from nine universities constituted the sample for the study. A simple random sampling technique was employed in selecting thirty–two students from one of each university in the six geo-political zones of Nigeria. The questionnaire based on 'yes or no' and column charts constituted the instrument employed in the study. Percentages were used to analyse 'yes or no' while column charts were used to compare responds of the students. The finding of the study revealed that majority of students in all the universities under study claimed that their universities lacked appropriate software, that good quality educational content online was lacking, they also agreed that sustainability of e-learning was not prioritized, that they had no access to appropriate content for ICT-enhanced learning and training and that they had access to affordable and reliable computers. For lecturers, the computer certification should be the first on the list of promotion requirements. The finding of the study revealed that students from seven out of nine universities confirmed that their universities lack of appropriate software whereas the other two claimed that they have appropriate software. Also, out of nine universities, two disagreed to the fact that good quality educational content online lacked, whereas seven agreed that they lacked good quality educational content online. The finding of the study also revealed that most of the respondents in almost all the university under study agreed that sustainability of e-learning was not prioritized. The study recommended among other that the Nigerian Government should make concerted effort to provide the enablement for all lecturers and students to become computer literate. This should be done within a time frame, and at the end of the computer course, certificates should be issued, and no student should graduate in his or her field of study without passing the computer course.Keywords: e-learning, developing countries, computer literacy, ICT
Procedia PDF Downloads 3364173 A Real-Time Moving Object Detection and Tracking Scheme and Its Implementation for Video Surveillance System
Authors: Mulugeta K. Tefera, Xiaolong Yang, Jian Liu
Abstract:
Detection and tracking of moving objects are very important in many application contexts such as detection and recognition of people, visual surveillance and automatic generation of video effect and so on. However, the task of detecting a real shape of an object in motion becomes tricky due to various challenges like dynamic scene changes, presence of shadow, and illumination variations due to light switch. For such systems, once the moving object is detected, tracking is also a crucial step for those applications that used in military defense, video surveillance, human computer interaction, and medical diagnostics as well as in commercial fields such as video games. In this paper, an object presents in dynamic background is detected using adaptive mixture of Gaussian based analysis of the video sequences. Then the detected moving object is tracked using the region based moving object tracking and inter-frame differential mechanisms to address the partial overlapping and occlusion problems. Firstly, the detection algorithm effectively detects and extracts the moving object target by enhancing and post processing morphological operations. Secondly, the extracted object uses region based moving object tracking and inter-frame difference to improve the tracking speed of real-time moving objects in different video frames. Finally, the plotting method was applied to detect the moving objects effectively and describes the object’s motion being tracked. The experiment has been performed on image sequences acquired both indoor and outdoor environments and one stationary and web camera has been used.Keywords: background modeling, Gaussian mixture model, inter-frame difference, object detection and tracking, video surveillance
Procedia PDF Downloads 477