Search results for: emerging technologies
3969 Self-Regulated Learning: A Required Skill for Web 2.0 Internet-Based Learning
Authors: Pieter Conradie, M. Marina Moller
Abstract:
Web 2.0 Internet-based technologies have intruded all aspects of human life. Presently, this phenomenon is especially evident in the educational context, with increased disruptive Web 2.0 technology infusions dramatically changing educational practice. The most prominent of these Web 2.0 intrusions can be identified as Massive Open Online Courses (Coursera, EdX), video and photo sharing sites (Youtube, Flickr, Instagram), and Web 2.0 online tools utilize to create Personal Learning Environments (PLEs) (Symbaloo (aggregator), Delicious (social bookmarking), PBWorks (collaboration), Google+ (social networks), Wordspress (blogs), Wikispaces (wiki)). These Web 2.0 technologies have supported the realignment from a teacher-based pedagogy (didactic presentation) to a learner-based pedagogy (problem-based learning, project-based learning, blended learning), allowing greater learner autonomy. No longer is the educator the source of knowledge. Instead the educator has become the facilitator and mediator of the learner, involved in developing learner competencies to support life-long learning (continuous learning) in the 21st century. In this study, the self-regulated learning skills of thirty first-year university learners were explored by utilizing the Online Self-regulated Learning Questionnaire. Implementing an action research method, an intervention was affected towards improving the self-regulation skill set of the participants. Statistical significant results were obtained with increased self-regulated learning proficiency, positively impacting learner performance. Goal setting, time management, environment structuring, help seeking, task (learning) strategies and self-evaluation skills were confirmed as determinants of improved learner success.Keywords: andragogy, online self-regulated learning questionnaire, self-regulated learning, web 2.0
Procedia PDF Downloads 4173968 A Methodology to Integrate Data in the Company Based on the Semantic Standard in the Context of Industry 4.0
Authors: Chang Qin, Daham Mustafa, Abderrahmane Khiat, Pierre Bienert, Paulo Zanini
Abstract:
Nowadays, companies are facing lots of challenges in the process of digital transformation, which can be a complex and costly undertaking. Digital transformation involves the collection and analysis of large amounts of data, which can create challenges around data management and governance. Furthermore, it is also challenged to integrate data from multiple systems and technologies. Although with these pains, companies are still pursuing digitalization because by embracing advanced technologies, companies can improve efficiency, quality, decision-making, and customer experience while also creating different business models and revenue streams. In this paper, the issue that data is stored in data silos with different schema and structures is focused. The conventional approaches to addressing this issue involve utilizing data warehousing, data integration tools, data standardization, and business intelligence tools. However, these approaches primarily focus on the grammar and structure of the data and neglect the importance of semantic modeling and semantic standardization, which are essential for achieving data interoperability. In this session, the challenge of data silos in Industry 4.0 is addressed by developing a semantic modeling approach compliant with Asset Administration Shell (AAS) models as an efficient standard for communication in Industry 4.0. The paper highlights how our approach can facilitate the data mapping process and semantic lifting according to existing industry standards such as ECLASS and other industrial dictionaries. It also incorporates the Asset Administration Shell technology to model and map the company’s data and utilize a knowledge graph for data storage and exploration.Keywords: data interoperability in industry 4.0, digital integration, industrial dictionary, semantic modeling
Procedia PDF Downloads 943967 Technology Adoption Models: A Study on Brick Kiln Firms in Punjab
Authors: Ajay Kumar, Shamily Jaggi
Abstract:
In developing countries like India development of modern technologies has been a key determinant in accelerating industrialization and urbanization. But in the pursuit of rapid economic growth, development is considered a top priority, while environmental protection is not given the same importance. Thus, a number of industries sited haphazardly have been established, leading to a deterioration of natural resources like water, soil and air. As a result, environmental pollution is tremendously increasing due to industrialization and mechanization that are serving to fulfill the demands of the population. With the increasing population, demand for bricks for construction work is also increasing, establishing the brick industry as a growing industry. Brick production requires two main resources; water as a source of life, and soil, as a living environment. Water and soil conservation is a critical issue in areas facing scarcity of water and soil resources. The purpose of this review paper is to provide a brief overview of the theoretical frameworks used in the analysis of the adoption and/or acceptance of soil and water conservation practices in the brick industry. Different frameworks and models have been used in the analysis of the adoption and/or acceptance of new technologies and practices; these include the technology acceptance model, motivational model, theory of reasoned action, innovation diffusion theory, theory of planned behavior, and the unified theory of acceptance and use of technology. However, every model has some limitations, such as not considering environmental/contextual and economic factors that may affect the individual’s intention to perform a behavior. The paper concludes that in comparing other models, the UTAUT seems a better model for understanding the dynamics of acceptance and adoption of water and soil conservation practices.Keywords: brick kiln, water conservation, soil conservation, unified theory of acceptance and use of technology, technology adoption
Procedia PDF Downloads 1043966 Gathering Space after Disaster: Understanding the Communicative and Collective Dimensions of Resilience through Field Research across Time in Hurricane Impacted Regions of the United States
Authors: Jack L. Harris, Marya L. Doerfel, Hyunsook Youn, Minkyung Kim, Kautuki Sunil Jariwala
Abstract:
Organizational resilience refers to the ability to sustain business or general work functioning despite wide-scale interruptions. We focus on organization and businesses as a pillar of their communities and how they attempt to sustain work when a natural disaster impacts their surrounding regions and economies. While it may be more common to think of resilience as a trait possessed by an organization, an emerging area of research recognizes that for organizations and businesses, resilience is a set of processes that are constituted through communication, social networks, and organizing. Indeed, five processes, robustness, rapidity, resourcefulness, redundancy, and external availability through social media have been identified as critical to organizational resilience. These organizing mechanisms involve multi-level coordination, where individuals intersect with groups, organizations, and communities. Because the nature of such interactions are often networks of people and organizations coordinating material resources, information, and support, they necessarily require some way to coordinate despite being displaced. Little is known, however, if physical and digital spaces can substitute one for the other. We thus are guided by the question, is digital space sufficient when disaster creates a scarcity of physical space? This study presents a cross-case comparison based on field research from four different regions of the United States that were impacted by Hurricanes Katrina (2005), Sandy (2012), Maria (2017), and Harvey (2017). These four cases are used to extend the science of resilience by examining multi-level processes enacted by individuals, communities, and organizations that together, contribute to the resilience of disaster-struck organizations, businesses, and their communities. Using field research about organizations and businesses impacted by the four hurricanes, we code data from interviews, participant observations, field notes, and document analysis drawn from New Orleans (post-Katrina), coastal New Jersey (post-Sandy), Houston Texas (post-Harvey), and the lower keys of Florida (post-Maria). This paper identifies an additional organizing mechanism, networked gathering spaces, where citizens and organizations, alike, coordinate and facilitate information sharing, material resource distribution, and social support. Findings show that digital space, alone, is not a sufficient substitute to effectively sustain organizational resilience during a disaster. Because the data are qualitative, we expand on this finding with specific ways in which organizations and the people who lead them worked around the problem of scarce space. We propose that gatherings after disaster are a sixth mechanism that contributes to organizational resilience.Keywords: communication, coordination, disaster management, information and communication technologies, interorganizational relationships, resilience, work
Procedia PDF Downloads 1713965 Usability Evaluation of Rice Doctor as a Diagnostic Tool for Agricultural Extension Workers in Selected Areas in the Philippines
Authors: Jerome Cayton Barradas, Rowely Parico, Lauro Atienza, Poornima Shankar
Abstract:
The effective agricultural extension is essential in facilitating improvements in various agricultural areas. One way of doing this is through Information and communication technologies (ICTs) like Rice Doctor (RD), an app-based diagnostic tool that provides accurate and timely diagnosis and management recommendations for more than 80 crop problems. This study aims to evaluate the RD usability by determining the effectiveness, efficiency, and user satisfaction of RD in making an accurate and timely diagnosis. It also aims to identify other factors that affect RD usability. This will be done by comparing RD with two other diagnostic methods: visual identification-based diagnosis and reference-guided diagnosis. The study was implemented in three rice-producing areas and has involved 96 extension workers. Respondents accomplished a self-administered survey and participated in group discussions. Data collected was then subjected to qualitative and quantitative analysis. Most of the respondents were satisfied with RD and believed that references are needed in assuring the accuracy of diagnosis. The majority found it efficient and easy to use. Some found it confusing and complicated, but this is because of their unfamiliarity with RD. Most users were also able to achieve accurate diagnosis proving effectiveness. Lastly, although users have reservations, they are satisfied and open to using RD. The study also found out the importance of visual identification skills in using RD and the need for capacity development and improvement of access to RD devices. From these results, the following are recommended to improve RD usability: review and upgrade diagnostic keys, expand further RD content, initiate capacity development for AEWs, and prepare and implement an RD communication plan.Keywords: agricultural extension, crop protection, information and communication technologies, rice doctor
Procedia PDF Downloads 2533964 An Approach to Building a Recommendation Engine for Travel Applications Using Genetic Algorithms and Neural Networks
Authors: Adrian Ionita, Ana-Maria Ghimes
Abstract:
The lack of features, design and the lack of promoting an integrated booking application are some of the reasons why most online travel platforms only offer automation of old booking processes, being limited to the integration of a smaller number of services without addressing the user experience. This paper represents a practical study on how to improve travel applications creating user-profiles through data-mining based on neural networks and genetic algorithms. Choices made by users and their ‘friends’ in the ‘social’ network context can be considered input data for a recommendation engine. The purpose of using these algorithms and this design is to improve user experience and to deliver more features to the users. The paper aims to highlight a broader range of improvements that could be applied to travel applications in terms of design and service integration, while the main scientific approach remains the technical implementation of the neural network solution. The motivation of the technologies used is also related to the initiative of some online booking providers that have made the fact that they use some ‘neural network’ related designs public. These companies use similar Big-Data technologies to provide recommendations for hotels, restaurants, and cinemas with a neural network based recommendation engine for building a user ‘DNA profile’. This implementation of the ‘profile’ a collection of neural networks trained from previous user choices, can improve the usability and design of any type of application.Keywords: artificial intelligence, big data, cloud computing, DNA profile, genetic algorithms, machine learning, neural networks, optimization, recommendation system, user profiling
Procedia PDF Downloads 1633963 Review of Strategies for Hybrid Energy Storage Management System in Electric Vehicle Application
Authors: Kayode A. Olaniyi, Adeola A. Ogunleye, Tola M. Osifeko
Abstract:
Electric Vehicles (EV) appear to be gaining increasing patronage as a feasible alternative to Internal Combustion Engine Vehicles (ICEVs) for having low emission and high operation efficiency. The EV energy storage systems are required to handle high energy and power density capacity constrained by limited space, operating temperature, weight and cost. The choice of strategies for energy storage evaluation, monitoring and control remains a challenging task. This paper presents review of various energy storage technologies and recent researches in battery evaluation techniques used in EV applications. It also underscores strategies for the hybrid energy storage management and control schemes for the improvement of EV stability and reliability. The study reveals that despite the advances recorded in battery technologies there is still no cell which possess both the optimum power and energy densities among other requirements, for EV application. However combination of two or more energy storages as hybrid and allowing the advantageous attributes from each device to be utilized is a promising solution. The review also reveals that State-of-Charge (SoC) is the most crucial method for battery estimation. The conventional method of SoC measurement is however questioned in the literature and adaptive algorithms that include all model of disturbances are being proposed. The review further suggests that heuristic-based approach is commonly adopted in the development of strategies for hybrid energy storage system management. The alternative approach which is optimization-based is found to be more accurate but is memory and computational intensive and as such not recommended in most real-time applications.Keywords: battery state estimation, hybrid electric vehicle, hybrid energy storage, state of charge, state of health
Procedia PDF Downloads 2423962 Debating the Ethical Questions of the Super Soldier
Authors: Jean-François Caron
Abstract:
The current attempts to develop what we can call 'super soldiers' are problematic in many regards. This is what this text will try to explore by concentrating primarily on the repercussions of this technology and medical research on the physical and psychological integrity of soldiers. It argues that medicines or technologies may affect soldiers’ psychological and mental features and deprive them of their capacity to reflect upon their actions as autonomous subjects and that such a possibility entails serious moral as well as judicial consequences.Keywords: military research, super soldiers, involuntary intoxication, criminal responsibility
Procedia PDF Downloads 3533961 Antibiotic Susceptibility Pattern of the Pathogens Isolated from Hospital Acquired Acute Bacterial Meningitis in a Tertiary Health Care Centre in North India
Authors: M. S. Raza, A. Kapil, Sonu Tyagi, H. Gautam, S. Mohapatra, R. Chaudhry, S. Sood, V. Goyal, R. Lodha, V. Sreenivas, B. K. Das
Abstract:
Background: Acute bacterial meningitis remains the major cause of mortality and morbidity. More than half of the survivors develop the significant lifelong neurological abnormalities. Diagnosis of the hospital acquired acute bacterial meningitis (HAABM) is challenging as it appears either in the post operative patients or patients acquire the organisms from the hospital environment. In both the situations, pathogens are exposed to high dose of antibiotics. Chances of getting multidrug resistance organism are very high. We have performed this experiment to find out the etiological agents of HAABM and its antibiotics susceptibility pattern. Methodology: A perspective study was conducted at the Department of Microbiology, All India Institute of Medical Sciences, New Delhi. From March 2015 to April 2018 total 400 Cerebro spinal fluid samples were collected aseptically. Samples were processed for cell count, Gram staining, and culture. Culture plates were incubated at 37°C for 18-24 hours. Organism grown on blood and MacConkey agar were identified by MALDI-TOF Vitek MS (BioMerieux, France) and antibiotic susceptibility tests were performed by Kirby Bauer disc diffusion method as per CLSI 2015 guideline. Results: Of the 400 CSF samples processed, 43 (10.75%) were culture positive for different bacteria. Out of 43 isolates, the most prevalent Gram-positive organisms were S. aureus 4 (9.30%) followed by E. faecium 3 (6.97%) & CONS 2 (4.65%). Similarly, E. coli 13 (30.23%) was the commonest Gram-negative isolates followed by A. baumannii 12 (27.90%), K. pneumonia 5 (11.62%) and P. aeruginosa 4(9.30%). Most of the antibiotics tested against the Gram-negative isolates were resistance to them. Colistin was most effective followed by Meropenem and Imepenim for all Gram-negative HAABM isolates. Similarly, most of antibiotics tested were susceptible to S. aureus and CONS. However, E. faecium (100%) were only susceptible to vancomycin and teicoplanin. Conclusion: Hospital acquired acute bacterial meningitis (HAABM) is becoming the emerging challenge as most of isolates are showing resistance to commonly used antibiotics. Gram-negative organisms are emerging as the major player of HAABM. Great care needs to be taken especially in tertiary care hospitals. Similarly, antibiotic stewardship should be followed and antibiotic susceptibility test (AST) should be performed regularly to update the antibiotic patter and to prevent from the emergence of resistance. Updated information of the AST will be helpful for the better management of the meningitis patient.Keywords: CSF, MALDI-TOF, hospital acquired acute bacterial meningitis, AST
Procedia PDF Downloads 1603960 Understanding the Impact of Ephemerality and Mobility on Social Media News: A Content Analysis of News on Snapchat
Authors: Chelsea Peterson-Salahuddin
Abstract:
Over the past decade, news outlets have increasingly used social media as a means to create and distribute news content to audiences. Ephemerality, the transitory nature of media, and mobility, media viewing on mobile technologies, are two increasingly salient attributes of social media content; yet little is known about how these features influence news selection practices of news outlets when distributing news via social media. To account for this gap, this study examines the influences of ephemerality and mobility on social media news content on the social media application Snapchat, in order to understand how these qualities of digital media influence and shape news content. Findings from this study suggest that understandings of ephemerality and mobility play a key role in influencing social media news. This paper suggests that as these factors become increasingly salient in our dominant news viewing environments, being able to understand how they manifest themselves in online news reporting practices is critical for both scholars and practitioners of news as they aim to understand what 'newsworthiness' means in the current, digital age. Findings from this study also enhance our current understandings of how the technological affordances of online and digital media platforms play a key role in shaping the kinds being produced and what information is being prioritized and highlighted in our contemporary news media environment. This is especially important in our current era where new mediums and technologies for news dissemination are continuously arising, and reorienting our understandings of what is considered ‘news'. As a key site of mass communication, discourse, and stories highlighted in the news do critical work in defining culture and ideology. Thus, better understanding the contours of news in our contemporary moment is critical in understanding cultural norms and meaning-making.Keywords: content analysis, ephemerality, mobile communication, social media news
Procedia PDF Downloads 1363959 Development of a Catalogs System for Augmented Reality Applications
Authors: J. Ierache, N. A. Mangiarua, S. A. Bevacqua, N. N. Verdicchio, M. E. Becerra, D. R. Sanz, M. E. Sena, F. M. Ortiz, N. D. Duarte, S. Igarza
Abstract:
Augmented Reality is a technology that involves the overlay of virtual content, which is context or environment sensitive, on images of the physical world in real time. This paper presents the development of a catalog system that facilitates and allows the creation, publishing, management and exploitation of augmented multimedia contents and Augmented Reality applications, creating an own space for anyone that wants to provide information to real objects in order to edit and share it then online with others. These spaces would be built for different domains without the initial need of expert users. Its operation focuses on the context of Web 2.0 or Social Web, with its various applications, developing contents to enrich the real context in which human beings act permitting the evolution of catalog’s contents in an emerging way.Keywords: augmented reality, catalog system, computer graphics, mobile application
Procedia PDF Downloads 3523958 Investigating the Effects of Hydrogen on Wet Cement for Underground Hydrogen Storage Applications in Oil and Gas Wells
Authors: Hamoud Al-Hadrami, Hossein Emadi, Athar Hussain
Abstract:
Green hydrogen is quickly emerging as a new source of renewable energy for the world. Hydrogen production using water electrolysis is deemed as an environmentally friendly and safe source of energy for transportation and other industries. However, storing a high volume of hydrogen seems to be a significant challenge. Abandoned hydrocarbon reservoirs are considered as viable hydrogen storage options because of the availability of the required infrastructure such as wells and surface facilities. However, long-term wellbore integrity in these wells could be a serious challenge. Hydrogen reduces the compressive strength of a set cement if it gets in contact with the cement slurry. Also, mixing hydrogen with cement slurry slightly increases its density and rheological properties, which need to be considered to have a successful primary cementing operation.Keywords: hydrogen, well bore integrity, clean energy, cementing
Procedia PDF Downloads 2133957 The Potential in the Use of Building Information Modelling and Life-Cycle Assessment for Retrofitting Buildings: A Study Based on Interviews with Experts in Both Fields
Authors: Alex Gonzalez Caceres, Jan Karlshøj, Tor Arvid Vik
Abstract:
Life cycle of residential buildings are expected to be several decades, 40% of European residential buildings have inefficient energy conservation measure. The existing building represents 20-40% of the energy use and the CO₂ emission. Since net zero energy buildings are a short-term goal, (should be achieved by EU countries after 2020), is necessary to plan the next logical step, which is to prepare the existing outdated stack of building to retrofit them into an energy efficiency buildings. In order to accomplish this, two specialize and widespread tool can be used Building Information Modelling (BIM) and life-cycle assessment (LCA). BIM and LCA are tools used by a variety of disciplines; both are able to represent and analyze the constructions in different stages. The combination of these technologies could improve greatly the retrofitting techniques. The incorporation of the carbon footprint, introducing a single database source for different material analysis. To this is added the possibility of considering different analysis approaches such as costs and energy saving. Is expected with these measures, enrich the decision-making. The methodology is based on two main activities; the first task involved the collection of data this is accomplished by literature review and interview with experts in the retrofitting field and BIM technologies. The results of this task are presented as an evaluation checklist of BIM ability to manage data and improve decision-making in retrofitting projects. The last activity involves an evaluation using the results of the previous tasks, to check how far the IFC format can support the requirements by each specialist, and its uses by third party software. The result indicates that BIM/LCA have a great potential to improve the retrofitting process in existing buildings, but some modification must be done in order to meet the requirements of the specialists for both, retrofitting and LCA evaluators.Keywords: retrofitting, BIM, LCA, energy efficiency
Procedia PDF Downloads 2193956 Financial Literacy and Stock Market Participation: Does Gender Matter?
Authors: Irfan Ullah Munir, Shen Yue, Muhammad Shahzad Ijaz, Saad Hussain, Syeda Yumna Zaidi
Abstract:
Financial literacy is fundamental to every decision-making process and has received attention from researchers, regulatory bodies and policy makers in the recent past. This study is an attempt to evaluate financial literacy in an emerging economy, particularly Pakistan, and its influence on people's stock market participation. Data of this study was collected through a structured questionnaire from a sample of 300 respondents. EFA is used to check the convergent and discriminant validity. Data is analyzed using Hayes (2013) approach. A set of demographic control variables that have passed the mean difference test is used. We demonstrate that participants with financial literacy tend to invest more in the stock market. We also find that association among financial literacy and participation in stock market gets moderated by gender.Keywords: Financial literacy, Stock market participation, Gender, PSX
Procedia PDF Downloads 1993955 Memetic Marketing: An Emerging Online Marketing Trend and the Case with #TFWGucci Meme Campaign
Authors: Vehbi Gorgulu
Abstract:
The primary objective of the current study is to explore how brand managers can employ Internet memes as a marketing tool. Internet memes are marked for their sarcastic and entertaining content and their amateur/DIY natures. The current study focuses on #TFWGucci, a collaborative marketing project enacted by Gucci, which is marked for being one of the first structured collaborative memetic marketing campaigns in the world. By embracing a qualitative approach, the study will explore production and meaning making processes of #TFWGucci campaign via analysis of sample campaign contents. The study will provide hints and insights for digital marketers on how to employ memetic marketing strategies in successful ways.Keywords: meme, internet meme, online marketing, memetic marketing, #TFWGucci
Procedia PDF Downloads 2343954 Artificial Intelligence and Governance in Relevance to Satellites in Space
Authors: Anwesha Pathak
Abstract:
With the increasing number of satellites and space debris, space traffic management (STM) becomes crucial. AI can aid in STM by predicting and preventing potential collisions, optimizing satellite trajectories, and managing orbital slots. Governance frameworks need to address the integration of AI algorithms in STM to ensure safe and sustainable satellite activities. AI and governance play significant roles in the context of satellite activities in space. Artificial intelligence (AI) technologies, such as machine learning and computer vision, can be utilized to process vast amounts of data received from satellites. AI algorithms can analyse satellite imagery, detect patterns, and extract valuable information for applications like weather forecasting, urban planning, agriculture, disaster management, and environmental monitoring. AI can assist in automating and optimizing satellite operations. Autonomous decision-making systems can be developed using AI to handle routine tasks like orbit control, collision avoidance, and antenna pointing. These systems can improve efficiency, reduce human error, and enable real-time responsiveness in satellite operations. AI technologies can be leveraged to enhance the security of satellite systems. AI algorithms can analyze satellite telemetry data to detect anomalies, identify potential cyber threats, and mitigate vulnerabilities. Governance frameworks should encompass regulations and standards for securing satellite systems against cyberattacks and ensuring data privacy. AI can optimize resource allocation and utilization in satellite constellations. By analyzing user demands, traffic patterns, and satellite performance data, AI algorithms can dynamically adjust the deployment and routing of satellites to maximize coverage and minimize latency. Governance frameworks need to address fair and efficient resource allocation among satellite operators to avoid monopolistic practices. Satellite activities involve multiple countries and organizations. Governance frameworks should encourage international cooperation, information sharing, and standardization to address common challenges, ensure interoperability, and prevent conflicts. AI can facilitate cross-border collaborations by providing data analytics and decision support tools for shared satellite missions and data sharing initiatives. AI and governance are critical aspects of satellite activities in space. They enable efficient and secure operations, ensure responsible and ethical use of AI technologies, and promote international cooperation for the benefit of all stakeholders involved in the satellite industry.Keywords: satellite, space debris, traffic, threats, cyber security.
Procedia PDF Downloads 763953 The Role Of Digital Technology In Crime Prevention
Authors: Muhammad Ashfaq
Abstract:
Main theme: This prime focus of this study is on the role of digital technology in crime prevention, with special focus on Cellular Forensic Unit, Capital City Police Peshawar-Khyber Pakhtunkhwa-Pakistan. Objective(s) of the study: The prime objective of this study is to provide statistics, strategies and pattern of analysis used for crime prevention in Cellular Forensic Unit of Capital City Police Peshawar, Khyber Pakhtunkhwa-Pakistan. Research Method and Procedure: Qualitative method of research has been used in the study for obtaining secondary data from research wing and Information Technology (IT) section of Peshawar police. Content analysis was the method used for the conduction of the study. This study is delimited to Capital City Police and Cellular Forensic Unit Peshawar-KP, Pakistan. information technologies. Major finding(s): It is evident that the old traditional approach will never provide solutions for better management in controlling crimes. The best way to control crimes and promotion of proactive policing is to adopt new technologies. The study reveals that technology have transformed police more effective and vigilant as compared to traditional policing. The heinous crimes like abduction, missing of an individual, snatching, burglaries and blind murder cases are now traceable with the help of technology. Recommendation(s): From the analysis of the data, it is reflected that Information Technology (IT) expert should be recruited along with research analyst to timely assist and facilitate operational as well as investigation units of police.A mobile locator should be Provided to Cellular Forensic Unit to timely apprehend the criminals .Latest digital analysis software should be provided to equip the Cellular Forensic Unit.Keywords: crime prevention, digital technology, pakistan, police
Procedia PDF Downloads 653952 Approximation Algorithms for Peak-Demand Reduction
Authors: Zaid Jamal Saeed Almahmoud
Abstract:
Smart grid is emerging as the future power grid, with smart techniques to optimize power consumption and electricity generation. Minimizing peak power consumption under a fixed delay requirement is a significant problem in the smart grid.For this problem, all appliances must be scheduled within a given finite time duration. We consider the problem of minimizing the peak demand under appliances constraints by scheduling power jobs with uniform release dates and deadlines. As the problem is known to be NP-hard, we analyze the performance of a version of the natural greedy heuristic for solving this problem. Our theoretical analysis and experimental results show that the proposed heuristic outperforms existing methods by providing a better approximation to the optimal solution.Keywords: peak demand scheduling, approximation algorithms, smart grid, heuristics
Procedia PDF Downloads 943951 A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting
Authors: Yanmin Zhao, Siu Ming Yiu
Abstract:
To claim the ownership for an executable program is a non-trivial task. An emerging direction is to add a watermark to the program such that the watermarked program preserves the original program’s functionality and removing the watermark would heavily destroy the functionality of the watermarked program. In this paper, the first watermarking signature scheme with the watermark and the constraint function hidden in the symmetric key setting is constructed. The scheme uses well-known techniques of lattice trapdoors and a lattice evaluation. The watermarking signature scheme is unforgeable under the Short Integer Solution (SIS) assumption and satisfies other security requirements such as the unremovability security property.Keywords: short integer solution (SIS) problem, symmetric-key setting, watermarking schemes, watermarked signatures
Procedia PDF Downloads 1333950 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia
Authors: Clara Voyvodic
Abstract:
Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences
Procedia PDF Downloads 1323949 Close-Range Remote Sensing Techniques for Analyzing Rock Discontinuity Properties
Authors: Sina Fatolahzadeh, Sergio A. Sepúlveda
Abstract:
This paper presents advanced developments in close-range, terrestrial remote sensing techniques to enhance the characterization of rock masses. The study integrates two state-of-the-art laser-scanning technologies, the HandySCAN and GeoSLAM laser scanners, to extract high-resolution geospatial data for rock mass analysis. These instruments offer high accuracy, precision, low acquisition time, and high efficiency in capturing intricate geological features in small to medium size outcrops and slope cuts. Using the HandySCAN and GeoSLAM laser scanners facilitates real-time, three-dimensional mapping of rock surfaces, enabling comprehensive assessments of rock mass characteristics. The collected data provide valuable insights into structural complexities, surface roughness, and discontinuity patterns, which are essential for geological and geotechnical analyses. The synergy of these advanced remote sensing technologies contributes to a more precise and straightforward understanding of rock mass behavior. In this case, the main parameters of RQD, joint spacing, persistence, aperture, roughness, infill, weathering, water condition, and joint orientation in a slope cut along the Sea-to-Sky Highway, BC, were remotely analyzed to calculate and evaluate the Rock Mass Rating (RMR) and Geological Strength Index (GSI) classification systems. Automatic and manual analyses of the acquired data are then compared with field measurements. The results show the usefulness of the proposed remote sensing methods and their appropriate conformity with the actual field data.Keywords: remote sensing, rock mechanics, rock engineering, slope stability, discontinuity properties
Procedia PDF Downloads 663948 Social Business: Opportunities and Challenges
Authors: Muhammad Mustafizur Rahaman
Abstract:
Social business is a new concept in the field of Business Economics and Capitalist Economy. It has increased the importance in economic and social development in emerging economies. Professor Muhammad Yunus is the founding father of the notion. While conventional business underscores profit maximization as a core business principle, social business calls for addressing social problems at the expense of profit. This underlying principle gives social business advantageous position over conventional businesses to serve those who live at the bottom of the pyramid. It also poses grave challenges to the social business because social business sacrifices profit at one hand and seeks financial sustainability on the other. For the sake of its financial sustainability, the social business might increase the price of its product or service which might lower its social impact, thus, makes the business self-defeating. Therefore, social business should be more innovative in every business process including production, marketing, and management. Otherwise, the business is unlikely to be driven out from the society.Keywords: innovativeness, self-defeat, social business, social problem
Procedia PDF Downloads 6193947 Diminishing Constitutional Hyper-Rigidity by Means of Digital Technologies: A Case Study on E-Consultations in Canada
Authors: Amy Buckley
Abstract:
The purpose of this article is to assess the problem of constitutional hyper-rigidity to consider how it and the associated tensions with democratic constitutionalism can be diminished by means of using digital democratic technologies. In other words, this article examines how digital technologies can assist us in ensuring fidelity to the will of the constituent power without paying the price of hyper-rigidity. In doing so, it is impossible to ignore that digital strategies can also harm democracy through, for example, manipulation, hacking, ‘fake news,’ and the like. This article considers the tension between constitutional hyper-rigidity and democratic constitutionalism and the relevant strengths and weaknesses of digital democratic strategies before undertaking a case study on Canadian e-consultations and drawing its conclusions. This article observes democratic constitutionalism through the lens of the theory of deliberative democracy to suggest that the application of digital strategies can, notwithstanding their pitfalls, improve a constituency’s amendment culture and, thus, diminish constitutional hyper-rigidity. Constitutional hyper-rigidity is not a new or underexplored concept. At a high level, a constitution can be said to be ‘hyper-rigid’ when its formal amendment procedure is so difficult to enact that it does not take place or is limited in its application. This article claims that hyper-rigidity is one problem with ordinary constitutionalism that fails to satisfy the principled requirements of democratic constitutionalism. Given the rise and development of technology that has taken place since the Digital Revolution, there has been a significant expansion in the possibility for digital democratic strategies to overcome the democratic constitutionalism failures resulting from constitutional hyper-rigidity. Typically, these strategies have included, inter alia, e- consultations, e-voting systems, and online polling forums, all of which significantly improve the ability of politicians and judges to directly obtain the opinion of constituents on any number of matters. This article expands on the application of these strategies through its Canadian e-consultation case study and presents them as a solution to poor amendment culture and, consequently, constitutional hyper-rigidity. Hyper-rigidity is a common descriptor of many written and unwritten constitutions, including the United States, Australian, and Canadian constitutions as just some examples. This article undertakes a case study on Canada, in particular, as it is a jurisdiction less commonly cited in academic literature generally concerned with hyper-rigidity and because Canada has to some extent, championed the use of e-consultations. In Part I of this article, I identify the problem, being that the consequence of constitutional hyper-rigidity is in tension with the principles of democratic constitutionalism. In Part II, I identify and explore a potential solution, the implementation of digital democratic strategies as a means of reducing constitutional hyper-rigidity. In Part III, I explore Canada’s e-consultations as a case study for assessing whether digital democratic strategies do, in fact, improve a constituency’s amendment culture thus reducing constitutional hyper-rigidity and the associated tension that arises with the principles of democratic constitutionalism. The idea is to run a case study and then assess whether I can generalise the conclusions.Keywords: constitutional hyper-rigidity, digital democracy, deliberative democracy, democratic constitutionalism
Procedia PDF Downloads 763946 Aperiodic and Asymmetric Fibonacci Quasicrystals: Next Big Future in Quantum Computation
Authors: Jatindranath Gain, Madhumita DasSarkar, Sudakshina Kundu
Abstract:
Quantum information is stored in states with multiple quasiparticles, which have a topological degeneracy. Topological quantum computation is concerned with two-dimensional many body systems that support excitations. Anyons are elementary building block of quantum computations. When anyons tunneling in a double-layer system can transition to an exotic non-Abelian state and produce Fibonacci anyons, which are powerful enough for universal topological quantum computation (TQC).Here the exotic behavior of Fibonacci Superlattice is studied by using analytical transfer matrix methods and hence Fibonacci anyons. This Fibonacci anyons can build a quantum computer which is very emerging and exciting field today’s in Nanophotonics and quantum computation.Keywords: quantum computing, quasicrystals, Multiple Quantum wells (MQWs), transfer matrix method, fibonacci anyons, quantum hall effect, nanophotonics
Procedia PDF Downloads 3903945 Optimizing University Administration in a Globalized World: Leveraging AI and ICT for Enhanced Governance and Sustainability in Higher Education
Authors: Ikechukwu Ogeze Ukeje, Chinyere Ori Elom, Chukwudum Collins Umoke
Abstract:
This study explores the challenges in the integration of Artificial Intelligence (AI) and Information and Communication Technology (ICT) practices in enhancing governance and sustainable solution modeling in higher education, focusing on Alex Ekwueme Federal University Ndufu-Alike (AE-FUNAI), Nigeria. In the context of a developing country like Nigeria, leveraging AI and ICT tools presents a unique opportunity to improve teaching, learning, administrative processes, and governance. The research aims to evaluate how AI and ICT technologies can contribute to sustainable educational practices, enhance decision-making processes, and improve engagement among key stakeholders: students, lecturers, and administrative staff. Students are involved to provide insights into their interactions with AI and ICT tools, particularly in learning and participation in governance. Lecturers’ perspectives will offer a view into how these technologies influence teaching, research, and curriculum development. Administrative staff will provide a crucial understanding of how AI and ICT tools can streamline operations, support data-driven governance, and enhance institutional efficiency. This study will use a mixed-method approach to collect both qualitative and quantitative data. The finding of this study is geared towards shaping the future of education in Nigeria and beyond by developing an Inclusive AI-governance Integration Framework (I-AIGiF) for enhanced performance in the system. Examining the roles of these stakeholder groups, this research could guide the development of policies for more effective AI and ICT integration, leading to sustainable educational innovation and governance.Keywords: university administration, AI, higher education governance, education sustainability, ICT challenges
Procedia PDF Downloads 193944 Alternative Systems of Drinking Water Supply Using Rainwater Harvesting for Small Rural Communities with Zero Greenhouse Emissions
Authors: Martin Mundo-Molina
Abstract:
In Mexico, there are many small rural communities with serious water supply deficiencies. In Chiapas, Mexico, there are 19,972 poor rural communities, 15,712 of which have fewer than 100 inhabitants. The lack of a constant water supply is most severe in the highlands of Chiapas where the population is made up mainly of indigenous groups. The communities are on mountainous terrain with a widely dispersed population. These characteristics combine to make the provision of public utilities, such as water, electricity and sewerage, difficult with conventional means. The introduction of alternative, low-cost technologies represents means of supplying water such as through fog and rain catchment with zero greenhouse emissions. In this paper is presented the rainwater harvesting system (RWS) constructed in Yalentay, Chiapas Mexico. The RWS is able to store 1.2 M liters of water to provide drinking water to small rural indigenous communities of 500 people in the drought stage. Inside the system of rainwater harvesting there isn't photosynthesis in order to conserve water for long periods. The natural filters of the system of rainwater harvesting guarantee the drinking water for using to the community. The combination of potability and low cost makes rain collection a viable alternative for rural areas, weather permitting. The Mexican Institute of Water Technology and Chiapas University constructed a rainwater harvesting system in Yalentay Chiapas, it consists of four parts: 1. Roof of aluminum, for collecting rainwater, 2. Underground-cistern, divided in two tanks, 3. Filters, to improve the water quality and 4. The system of rainwater harvesting dignified the lives of people in Yalentay, saves energy, prevents the emission of greenhouse gases into the atmosphere, conserves natural resources such as water and air.Keywords: appropriate technologies, climate change, greenhouse gases, rainwater harvesting
Procedia PDF Downloads 4043943 Bacteriological Spectrum and Resistance Patterns of Common Clinical Isolates from Infections in Cancer Patients
Authors: Vivek Bhat, Rohini Kelkar, Sanjay Biswas
Abstract:
Introduction: Cancer patients are at increased risk of bacterial infections. This may due to the disease process itself, the effect of chemotherapeutic drugs or invasive procedures such as catheterization. A wide variety of bacteria including some emerging pathogens are increasingly being reported from these patients. The incidence of multidrug-resistant organisms particularly in the Gram negative group is also increasing, with higher resistance rates seen to cephalosporins, β-lactam/β-lactam inhibitor combinations, and the carbapenems. This study documents the bacteriological spectrum of infections and their resistance patterns in cancer patients. Methods: This study includes all bacterial isolates recovered from infections cancer patients over a period of 18 months. Samples included Blood cultures, Pus/wound swabs, urine, tissue biopsies, body fluids, catheter tips and respiratory specimens such as sputum and bronchoalveolar lavage (BAL). All samples were processed in the microbiology laboratory as per standard laboratory protocols. Organisms were identified to species level and antimicrobial susceptibility testing was performed manually by the disc diffusion technique or in the Vitek-2 (Biomereux, France) instrument. Interpretations were as per Clinical laboratory Standards Institute (CLSI) guidelines. Results: A total of 1150 bacterial isolates were cultured from 884 test samples during the study period. Of these 227 were Gram-positive and 923 were Gram-negative organisms. Staphylococcus aureus (99 isolates) was the commonest Gram-positive isolate followed by Enterococcus (79) and Gr A Streptococcus (30). Among the Gram negatives, E. coli (304), Pseudomonas aeruginosa (201) and Klebsiella pneumoniae (190) were the most common. Of the Staphylococcus aureus isolates 27.2% were methicillin resistant. Only 5.06% enterococci were vancomycin resistant. High rates of resistance to cefotaxime and ciprofloxacin were seen amongst E. coli (84.8% & 83.55%) and Klebsiella pneumoniae (71 & 62.1%) respectively. Resistance to carbapenems (meropenem) was high at 70% in Acinetobacter spp.; however all isolates were sensitive to colistin. Among the aminoglycosides, amikacin retained good efficacy against Escherichia coli (82.9%) and Pseudomonas aeruginosa (78.1%). Occasional isolates of emerging pathogens such as Chryseobacterium indologens, Roseomonas, and Achromobacter xyloxidans were also recovered. Conclusion: The common infections in cancer patients include respiratory, wound, tract infections and sepsis. The commonest isolates include Staphylococcus aureus, Enterococci, Escherichia coli, Klebsiella pneumoniae and Pseudomonas aeruginosa. There is a high level of resistance to the commonly used antibiotics among Gram-negative organisms.Keywords: bacteria, resistance, infection, cancer
Procedia PDF Downloads 2993942 Internet of Things, Edge and Cloud Computing in Rock Mechanical Investigation for Underground Surveys
Authors: Esmael Makarian, Ayub Elyasi, Fatemeh Saberi, Olusegun Stanley Tomomewo
Abstract:
Rock mechanical investigation is one of the most crucial activities in underground operations, especially in surveys related to hydrocarbon exploration and production, geothermal reservoirs, energy storage, mining, and geotechnics. There is a wide range of traditional methods for driving, collecting, and analyzing rock mechanics data. However, these approaches may not be suitable or work perfectly in some situations, such as fractured zones. Cutting-edge technologies have been provided to solve and optimize the mentioned issues. Internet of Things (IoT), Edge, and Cloud Computing technologies (ECt & CCt, respectively) are among the most widely used and new artificial intelligence methods employed for geomechanical studies. IoT devices act as sensors and cameras for real-time monitoring and mechanical-geological data collection of rocks, such as temperature, movement, pressure, or stress levels. Structural integrity, especially for cap rocks within hydrocarbon systems, and rock mass behavior assessment, to further activities such as enhanced oil recovery (EOR) and underground gas storage (UGS), or to improve safety risk management (SRM) and potential hazards identification (P.H.I), are other benefits from IoT technologies. EC techniques can process, aggregate, and analyze data immediately collected by IoT on a real-time scale, providing detailed insights into the behavior of rocks in various situations (e.g., stress, temperature, and pressure), establishing patterns quickly, and detecting trends. Therefore, this state-of-the-art and useful technology can adopt autonomous systems in rock mechanical surveys, such as drilling and production (in hydrocarbon wells) or excavation (in mining and geotechnics industries). Besides, ECt allows all rock-related operations to be controlled remotely and enables operators to apply changes or make adjustments. It must be mentioned that this feature is very important in environmental goals. More often than not, rock mechanical studies consist of different data, such as laboratory tests, field operations, and indirect information like seismic or well-logging data. CCt provides a useful platform for storing and managing a great deal of volume and different information, which can be very useful in fractured zones. Additionally, CCt supplies powerful tools for predicting, modeling, and simulating rock mechanical information, especially in fractured zones within vast areas. Also, it is a suitable source for sharing extensive information on rock mechanics, such as the direction and size of fractures in a large oil field or mine. The comprehensive review findings demonstrate that digital transformation through integrated IoT, Edge, and Cloud solutions is revolutionizing traditional rock mechanical investigation. These advanced technologies have empowered real-time monitoring, predictive analysis, and data-driven decision-making, culminating in noteworthy enhancements in safety, efficiency, and sustainability. Therefore, by employing IoT, CCt, and ECt, underground operations have experienced a significant boost, allowing for timely and informed actions using real-time data insights. The successful implementation of IoT, CCt, and ECt has led to optimized and safer operations, optimized processes, and environmentally conscious approaches in underground geological endeavors.Keywords: rock mechanical studies, internet of things, edge computing, cloud computing, underground surveys, geological operations
Procedia PDF Downloads 623941 Complicity of Religion in Legalizing Corruption: Perspective from an Emerging Economy
Authors: S. Opadere Olaolu
Abstract:
Religion, as a belief-system, has been with humanity for a long time. It has been recognised to impact the lives of individuals, groups, and communities that hold it dear. Whether the impact is regarded as positive or not depends on the assessor. Thus, for reasons of likely subjectiveness, possible irrationality, and even outright deliberate abuse, most emerging economies seek to follow the pattern of separating the State from religion; yet it is certain that the influence of religion on the State is incontrovertible. Corruption, on the other hand, though difficult to define in precise terms, is clearly perceptible. It could manifest in very diverse ways, including the abuse of a position of trust for the gain of an individual, or of a group with shared ulterior motive. Religion has been perceived, among others, as a means to societal stability, marital stability, infusion of moral rectitude, and conscience with regards to right and wrong. In time past, credible and dependable characters reposed largely and almost exclusively with those bearing deep religious conviction. Even in the political circle, it was thought that the involvement of those committed to religion would bring about positive changes, for the benefit of the society at large. On the contrary, in recent times, religion has failed in these lofty expectations. The level of corruption in most developing economies, and the increase of religion seem to be advancing pari passu. For instance, religion has encroached into political space, and vice versa, without any differentiable posture to the issue of corruption. Worse still, religion appears to be aiding and abetting corruption, overtly and/or covertly. Therefore, this discourse examined from the Nigerian perspective—as a developing economy—, and from a multidisciplinary stand-point of Law and Religion, the issue of religion; secularism; corruption; romance of religion and politics; inability of religion to exemplify moral rectitude; indulgence of corruption by religion; and the need to keep religion in private sphere, with proper checks. The study employed primary and secondary sources of information. The primary sources included the Constitutions of the Federal Republic of Nigeria 1999, as amended; judicial decisions; and the Bible. The secondary sources comprised of information from books, journals, newspapers, magazines and Internet documents. Data obtained from these sources were subjected to content analysis. Findings of this study include the breach of constitutional provisions to keep religion out of State affairs; failure of religion to curb corruption; outright indulgence of corruption by religion; and religion having become a political tool. In conclusion, it is considered apposite still to keep the State out of religion, and to seek enforcement of the constitutional provisions in this respect. The stamp of legality placed on overt and covert corruption by religion should be removed by all means.Keywords: corruption, complicity, legalizing, religion
Procedia PDF Downloads 4103940 Electronic Government around the World: Key Information and Communication Technology Indicators
Authors: Isaac Kofi Mensah
Abstract:
Governments around the world are adopting Information and Communication Technologies (ICTs) because of the important opportunities it provides through E-government (EG) to modernize government public administration processes and delivery of quality and efficient public services. Almost every country in the world is adopting ICT in its public sector administration (EG) to modernize and change the traditional process of government, increase citizen engagement and participation in governance, as well as the provision of timely information to citizens. This paper, therefore, seeks to present the adoption, development and implementation of EG in regions globally, as well as the ICT indicators around the world, which are making EG initiatives successful. Europe leads the world in its EG adoption and development index, followed by the Americas, Asia, Oceania and Africa. There is a gradual growth in ICT indicators in terms of the increase in Internet access and usage, increase in broadband penetration, an increase of individuals using the Internet at home and a decline in fixed telephone use, while the mobile cellular phone has been on the increase year-on-year. Though the lack of ICT infrastructure is a major challenge to EG adoption and implementation around the world, in Africa it is very pervasive, hampering the expansion of Internet access and provision of broadband, and hence is a barrier to the successful adoption, development, and implementation of EG initiatives in countries on the continent. But with the general improvement and increase in ICT indicators around the world, it provides countries in Europe, Americas, Asia, Arab States, Oceania and Africa with the huge opportunity to enhance public service delivery through the adoption of EG. Countries within these regions cannot fail their citizens who desire to enjoy an enhanced and efficient public service delivery from government and its many state institutions.Keywords: e-government development index, e-government, indicators, information and communication technologies (ICTs)
Procedia PDF Downloads 302