Search results for: internet of things (IOT)
727 Solving a Micromouse Maze Using an Ant-Inspired Algorithm
Authors: Rolando Barradas, Salviano Soares, António Valente, José Alberto Lencastre, Paulo Oliveira
Abstract:
This article reviews the Ant Colony Optimization, a nature-inspired algorithm, and its implementation in the Scratch/m-Block programming environment. The Ant Colony Optimization is a part of Swarm Intelligence-based algorithms and is a subset of biological-inspired algorithms. Starting with a problem in which one has a maze and needs to find its path to the center and return to the starting position. This is similar to an ant looking for a path to a food source and returning to its nest. Starting with the implementation of a simple wall follower simulator, the proposed solution uses a dynamic graphical interface that allows young students to observe the ants’ movement while the algorithm optimizes the routes to the maze’s center. Things like interface usability, Data structures, and the conversion of algorithmic language to Scratch syntax were some of the details addressed during this implementation. This gives young students an easier way to understand the computational concepts of sequences, loops, parallelism, data, events, and conditionals, as they are used through all the implemented algorithms. Future work includes the simulation results with real contest mazes and two different pheromone update methods and the comparison with the optimized results of the winners of each one of the editions of the contest. It will also include the creation of a Digital Twin relating the virtual simulator with a real micromouse in a full-size maze. The first test results show that the algorithm found the same optimized solutions that were found by the winners of each one of the editions of the Micromouse contest making this a good solution for maze pathfinding.Keywords: nature inspired algorithms, scratch, micromouse, problem-solving, computational thinking
Procedia PDF Downloads 126726 Provision of Afterschool Programs: Understanding the Educational Needs and Outcomes of Newcomer and Refugee Students in Canada
Authors: Edward Shizha, Edward Makwarimba
Abstract:
Newcomer and refugee youth feel excluded in the education system in Canada, and the formal education environment does not fully cater for their learning needs. The objective of this study was to build knowledge and understanding of the educational needs and experiences of these youth in Canada and how available afterschool programs can most effectively support their learning needs and academic outcomes. The Employment and Social Development Canada (ESDC), which funded this research, enables and empowers students to advance their educational experience through targeted investments in services that are delivered by youth-serving organizations outside the formal education system through afterschool initiatives. A literature review and a provincial/territorial internet scan were conducted to determine the availability of services and programs that serve the educational needs and academic outcomes of newcomer youth in 10 provinces and 3 territories in Canada. The goal was to identify intersectional factors (e.g., gender, sexuality, culture, social class, race, etc.) that influence educational outcomes of newcomer/refugee students and to recommend ways the ESDC could complement settlement services to enhance students’ educational success. First, data was collected through a literature search of various databases, including PubMed, Web of Science, Scopus, Google docs, ACADEMIA, and grey literature, including government documents, to inform our analysis. Second, a provincial/territorial internet scan was conducted using a template that was created by ESDC staff with the input of the researchers. The objective of the web-search scan was to identify afterschool programs, projects, and initiatives offered to newcomer/refugee youth by service provider organizations. The method for the scan included both qualitative and quantitative data gathering. Both the literature review and the provincial/territorial scan revealed that there are gender disparities in educational outcomes of newcomer and refugee youth. High school completion rates by gender show that boys are at higher risk of not graduating than girls and that girls are more likely than boys to have at least a high school diploma and more likely to proceed to postsecondary education. Findings from literature reveal that afterschool programs are required for refugee youth who experience mental health challenges and miss out on significant periods of schooling, which affect attendance, participation, and graduation from high school. However, some refugee youth use their resilience and ambition to succeed in their educational outcomes. Another finding showed that some immigrant/refugee students, through ethnic organizations and familial affiliation, maintain aspects of their cultural values, parental expectations and ambitious expectations for their own careers to succeed in both high school and postsecondary education. The study found a significant combination of afterschool programs that include academic support, scholarships, bursaries, homework support, career readiness, internships, mentorship, tutoring, non-clinical counselling, mental health and social well-being support, language skills, volunteering opportunities, community connections, peer networking, culturally relevant services etc. These programs assist newcomer youth to develop self-confidence and prepare for academic success and future career development. The study concluded that advantages of afterschool programs are greatest for youth at risk for poor educational outcomes, such as Latino and Black youth, including 2SLGBTQI+ immigrant youth.Keywords: afterschool programs, educational outcomes, newcomer youth, refugee youth, youth-serving organizations
Procedia PDF Downloads 74725 Spectrum Allocation Using Cognitive Radio in Wireless Mesh Networks
Authors: Ayoub Alsarhan, Ahmed Otoom, Yousef Kilani, Abdel-Rahman al-GHuwairi
Abstract:
Wireless mesh networks (WMNs) have emerged recently to improve internet access and other networking services. WMNs provide network access to the clients and other networking functions such as routing, and packet forwarding. Spectrum scarcity is the main challenge that limits the performance of WMNs. Cognitive radio is proposed to solve spectrum scarcity problem. In this paper, we consider a cognitive wireless mesh network where unlicensed users (secondary users, SUs) can access free spectrum that is allocated to spectrum owners (primary users, PUs). Although considerable research has been conducted on spectrum allocation, spectrum assignment is still considered an important challenging problem. This problem can be solved using cognitive radio technology that allows SUs to intelligently locate free bands and access them without interfering with PUs. Our scheme considers several heuristics for spectrum allocation. These heuristics include: channel error rate, PUs activities, channel capacity and channel switching time. Performance evaluation of the proposed scheme shows that the scheme is able to allocate the unused spectrum for SUs efficiently.Keywords: cognitive radio, dynamic spectrum access, spectrum management, spectrum sharing, wireless mesh networks
Procedia PDF Downloads 529724 Trend Analysis of Annual Total Precipitation Data in Konya
Authors: Naci Büyükkaracığan
Abstract:
Hydroclimatic observation values are used in the planning of the project of water resources. Climate variables are the first of the values used in planning projects. At the same time, the climate system is a complex and interactive system involving the atmosphere, land surfaces, snow and bubbles, the oceans and other water structures. The amount and distribution of precipitation, which is an important climate parameter, is a limiting environmental factor for dispersed living things. Trend analysis is applied to the detection of the presence of a pattern or trend in the data set. Many trends work in different parts of the world are usually made for the determination of climate change. The detection and attribution of past trends and variability in climatic variables is essential for explaining potential future alteration resulting from anthropogenic activities. Parametric and non-parametric tests are used for determining the trends in climatic variables. In this study, trend tests were applied to annual total precipitation data obtained in period of 1972 and 2012, in the Konya Basin. Non-parametric trend tests, (Sen’s T, Spearman’s Rho, Mann-Kendal, Sen’s T trend, Wald-Wolfowitz) and parametric test (mean square) were applied to annual total precipitations of 15 stations for trend analysis. The linear slopes (change per unit time) of trends are calculated by using a non-parametric estimator developed by Sen. The beginning of trends is determined by using the Mann-Kendall rank correlation test. In addition, homogeneities in precipitation trends are tested by using a method developed by Van Belle and Hughes. As a result of tests, negative linear slopes were found in annual total precipitations in Konya.Keywords: trend analysis, precipitation, hydroclimatology, Konya
Procedia PDF Downloads 219723 Political Discourse and Linguistic Manipulation in Nigerian Politics
Authors: Kunle Oparinde, Ernestina Maleshoane Rapeane-Mathonsi, Gift Mheta
Abstract:
Using Critical Discourse Analysis (CDA) and Multimodal Discourse Analysis (MDA), the research seeks to deconstruct politically-motivated discourse as observed from Nigerian politics. This is intended to be achieved by analysing linguistic (mis)representation and manipulation in Nigerian political settings, drawing from instances of language use as observed from different political campaigns. Since language in itself is generally meaningless without context, it is therefore paramount to analyse the (mis)representation and manipulation in Nigerian political sceneries within their contextual basis. The study focuses on political language used by Nigerian politicians emanating from printed and social media forms such as posters, pamphlets, speeches, billboards, and internet sources purposely selected across Nigeria. The research further aims at investigating the discursive strategies used by politicians to gain more audience, and, as a result, shape opinions that result in votes. The study employs a qualitative approach. Two parties are intentionally selected because they have been essentially strong at the national level namely: All Progressive Congress (APC) and the People’s Democratic Party (PDP). The study finds out that politicians in Nigeria, as in many parts of the world, use language to manipulate the electorate. Comprehensive discussion of these instances of political manipulation remains the thrust of this paper.Keywords: communication, discourse, manipulation, misrepresentation
Procedia PDF Downloads 251722 Arms and Light Weapons Flow in Nigerian/Chad Border: A Reflection on the How Insurgents Had Access to Their Target
Authors: Lawan Ja’afar Tahir
Abstract:
This research work centered on the problem of free Arms flow around the Nigeria and Chad Border. The whole of the northeastern Nigerian region has been devastated by the crisis of insecurity facilitated by more than a decade of insurgency. One of the major issues of concern to security experts and personnel in the country is how the insurgents are getting access to weapons, which gave them more strength to fight the war for this long period, which has become so difficult to overcome. Among the possible avenues that continue to strengthen the enemies is the easy access to the arms flow from the neighboring countries, especially the Republic of Chad, which borders Nigeria to the east, where Boko Haram gained firm roots. This paper, therefore, looked at the nature of the waterway of the Nigeria/Chad Border, which has become a source of strength to the insurgents as the flow of weapons is one of the cheapest things on the Border. The availability of such arms flow has also led to the People abandoning their lands and economic and commercial activities, especially those settlements between the Border of these two countries. For more than eight years now, they have suspended their livelihood activities, roads were blocked and chances of survival in the rural areas were minimal due to the frequent attacks carried out by the insurgents. However, this research looks at the causes of the arms flow along the Border of these neighboring countries, the extent of damage done as a result of the availability of the weapons, and how far the Nigerian government has gone in curtailing the menace of the flow of dangerous weapons into the country. The research looked at the ways arm dealers are conniving with settlers along the border as well as the various ways they followed to reach their target. The work provided suggestion as to how the fragile Border should be managed with the view to reduce the influx of arms without control, which, according to this research, is the central factor that continues to unleash and give terror groups the opportunity to destroy people for more than a decade.Keywords: border, insecurity, weapons, management
Procedia PDF Downloads 68721 Trinary Affinity—Mathematic Verification and Application (1): Construction of Formulas for the Composite and Prime Numbers
Authors: Liang Ming Zhong, Yu Zhong, Wen Zhong, Fei Fei Yin
Abstract:
Trinary affinity is a description of existence: every object exists as it is known and spoken of, in a system of 2 differences (denoted dif1, dif₂) and 1 similarity (Sim), equivalently expressed as dif₁ / Sim / dif₂ and kn / 0 / tkn (kn = the known, tkn = the 'to be known', 0 = the zero point of knowing). They are mathematically verified and illustrated in this paper by the arrangement of all integers onto 3 columns, where each number exists as a difference in relation to another number as another difference, and the 2 difs as arbitrated by a third number as the Sim, resulting in a trinary affinity or trinity of 3 numbers, of which one is the known, the other the 'to be known', and the third the zero (0) from which both the kn and tkn are measured and specified. Consequently, any number is horizontally specified either as 3n, or as '3n – 1' or '3n + 1', and vertically as 'Cn + c', so that any number seems to occur at the intersection of its X and Y axes and represented by its X and Y coordinates, as any point on Earth’s surface by its latitude and longitude. Technically, i) primes are viewed and treated as progenitors, and composites as descending from them, forming families of composites, each capable of being measured and specified from its own zero called in this paper the realistic zero (denoted 0r, as contrasted to the mathematic zero, 0m), which corresponds to the constant c, and the nature of which separates the composite and prime numbers, and ii) any number is considered as having a magnitude as well as a position, so that a number is verified as a prime first by referring to its descriptive formula and then by making sure that no composite number can possibly occur on its position, by dividing it with factors provided by the composite number formulas. The paper consists of 3 parts: 1) a brief explanation of the trinary affinity of things, 2) the 8 formulas that represent ALL the primes, and 3) families of composite numbers, each represented by a formula. A composite number family is described as 3n + f₁‧f₂. Since there are an infinitely large number of composite number families, to verify the primality of a great probable prime, we have to have it divided with several or many a f₁ from a range of composite number formulas, a procedure that is as laborious as it is the surest way to verifying a great number’s primality. (So, it is possible to substitute planned division for trial division.)Keywords: trinary affinity, difference, similarity, realistic zero
Procedia PDF Downloads 211720 Real Time Traffic Performance Study over MPLS VPNs with DiffServ
Authors: Naveed Ghani
Abstract:
With the arrival of higher speed communication links and mature application running over the internet, the requirement for reliable, efficient and robust network designs rising day by day. Multi-Protocol Label Switching technology (MPLS) Virtual Private Networks (VPNs) have committed to provide optimal network services. They are gaining popularity in industry day by day. Enterprise customers are moving to service providers that offer MPLS VPNs. The main reason for this shifting is the capability of MPLS VPN to provide built in security features and any-to-any connectivity. MPLS VPNs improved the network performance due to fast label switching as compare to traditional IP Forwarding but traffic classification and policing was still required on per hop basis to enhance the performance of real time traffic which is delay sensitive (particularly voice and video). QoS (Quality of service) is the most important factor to prioritize enterprise networks’ real time traffic such as voice and video. This thesis is focused on the study of QoS parameters (e.g. delay, jitter and MOS (Mean Opinion Score)) for the real time traffic over MPLS VPNs. DiffServ (Differentiated Services) QoS model will be used over MPLS VPN network to get end-to-end service quality.Keywords: network, MPLS, VPN, DiffServ, MPLS VPN, DiffServ QoS, QoS Model, GNS2
Procedia PDF Downloads 426719 Analyzing Speech Acts in Reddit Posts of Formerly Incarcerated Youths
Authors: Yusra Ibrahim
Abstract:
This study explores the online discourse of justice-involved youth on Reddit, focusing on how anonymity and asynchronicity influence their ability to share and reflect on their incarceration experiences within the "Ask Me Anything" (AMA) community. The study utilizes a quantitative analysis of speech acts to examine the varied communication patterns exhibited by youths and commenters across two AMA threads. The results indicate that, although Reddit is not specifically designed for formerly incarcerated youths, its features provide a supportive environment for them to share their incarceration experiences with non-incarcerated individuals. The level of empathy and support from the audience varies based on the audience’s perspectives on incarceration and related traumatic experiences. Additionally, the study identifies a reciprocal relationship where youths benefit from community support while offering insights into the juvenile justice system and helping the audience understand the experience of incarceration. The study also reveals cultural shocks in physical and digital environments that youth experience after release and when using social media platforms and the internet. The study has implications for juvenile justice personnel, policymakers, and researchers in the juvenile justice system.Keywords: juvenile justice, online discourse, reddit AMA, anonymity, speech acts taxonomy, reintegration, online community support
Procedia PDF Downloads 42718 A Critical Evaluation of the Factors that Influence Visitor Engagement with U.K. Slavery Heritage Museums: A Passive Symbolic Netnographic Study
Authors: Shemroy Roberts
Abstract:
Despite minor theoretical contributions in slavery heritage tourism research that have commented on the demand-side perspective, visitor behavior and engagement with slavery heritage attractions remain unexplored. Thus, there is a need for empirical studies and theoretical knowledge to understand visitor engagement with slavery heritage attractions, particularly U.K. slavery heritage museums. The purpose of this paper is to critically evaluate the factors that influence visitor engagement with U.K. slavery heritage museums. This qualitative research utilizes a passive symbolic ethnographic methodology. Seven U.K. slavery heritage museums will be used to collect data through unobtrusive internet-mediated observations of TripAdvisor reviews and online semi-structured interviews with managers and curators. Preliminary findings indicate that social media, prior knowledge, multiple motivations, cultural capital, and the design and layout of exhibits influence visitor engagement with slavery heritage museums. This research contributes to an understanding of visitor engagement with U.K. slavery heritage museums. The findings of this paper will provide insights into the factors that influence visitor engagement with U.K. slavery heritage museums to managers, curators, and decision-makers responsible for designing and managing those attractions. Therefore, the results of this paper will enable museum professionals to better manage visitor engagement with slavery heritage museums.Keywords: museums, netnography, slavery, visitor engagement
Procedia PDF Downloads 323717 Evaluation of Environmental and Social Management System of Green Climate Fund's Accredited Entities: A Qualitative Approach Applied to Environmental and Social System
Authors: Sima Majnooni
Abstract:
This paper discusses the Green Climate Fund's environmental and social management framework (GCF). The environmental and social management framework ensures the accredited entity considers the GCF's accreditation standards and effectively implements each of the GCF-funded projects. The GCF requires all accredited entities to meet basic transparency and accountability standards as well as environmental and social safeguards (ESMS). In doing so, the accredited entity sets up different independent units. One of these units is called the Grievance Mechanism. When allegations of environmental and social harms are raised in association with GCF-funded activities, affected parties can contact the entity’s grievance unit. One of the most challenging things about the accredited entity's grievance unit is the lack of available information and resources on the entities' websites. Many AEs have anti-corruption or anti-money laundering unit, but they do not have the environmental and social unit for affected people. This paper will argue the effectiveness of environmental and social grievance mechanisms of AEs by using a qualitative approach to indicate how many of AEs have a poor or an effective GRM. Some ESMSs seem highly effective. On the other hand, other mechanisms lack basic requirements such as a clear, transparent, uniform procedure and a definitive timetable. We have looked at each AE mechanism not only in light of how the website goes into detail regarding the process of grievance mechanism but also in light of their risk category. Many mechanisms appear inadequate for the lower level risk category entities (C) and, even surprisingly, for many higher-risk categories (A). We found; in most cases, the grievance mechanism of AEs seems vague.Keywords: grievance mechanism, vague environmental and social policies, green climate fund, international climate finance, lower and higher risk category
Procedia PDF Downloads 124716 Cas9-Assisted Direct Cloning and Refactoring of a Silent Biosynthetic Gene Cluster
Authors: Peng Hou
Abstract:
Natural products produced from marine bacteria serve as an immense reservoir for anti-infective drugs and therapeutic agents. Nowadays, heterologous expression of gene clusters of interests has been widely adopted as an effective strategy for natural product discovery. Briefly, the heterologous expression flowchart would be: biosynthetic gene cluster identification, pathway construction and expression, and product detection. However, gene cluster capture using traditional Transformation-associated recombination (TAR) protocol is low-efficient (0.5% positive colony rate). To make things worse, most of these putative new natural products are only predicted by bioinformatics analysis such as antiSMASH, and their corresponding natural products biosynthetic pathways are either not expressed or expressed at very low levels under laboratory conditions. Those setbacks have inspired us to focus on seeking new technologies to efficiently edit and refractor of biosynthetic gene clusters. Recently, two cutting-edge techniques have attracted our attention - the CRISPR-Cas9 and Gibson Assembly. By now, we have tried to pretreat Brevibacillus laterosporus strain genomic DNA with CRISPR-Cas9 nucleases that specifically generated breaks near the gene cluster of interest. This trial resulted in an increase in the efficiency of gene cluster capture (9%). Moreover, using Gibson Assembly by adding/deleting certain operon and tailoring enzymes regardless of end compatibility, the silent construct (~80kb) has been successfully refactored into an active one, yielded a series of analogs expected. With the appearances of the novel molecular tools, we are confident to believe that development of a high throughput mature pipeline for DNA assembly, transformation, product isolation and identification would no longer be a daydream for marine natural product discovery.Keywords: biosynthesis, CRISPR-Cas9, DNA assembly, refactor, TAR cloning
Procedia PDF Downloads 282715 Consumer Behaviour Model for Apparel E-Tailers Using Structural Equation Modelling
Authors: Halima Akhtar, Abhijeet Chandra
Abstract:
The paper attempts to analyze the factors that influence the Consumer Behavior to purchase apparel through the internet. The intentions to buy apparels online were based on in terms of user style, orientation, size and reputation of the merchant, social influence, perceived information utility, perceived ease of use, perceived pleasure and attractiveness and perceived trust and risk. The basic framework used was Technology acceptance model to explain apparels acceptance. A survey was conducted to gather the data from 200 people. The measures and hypotheses were analyzed using Correlation testing and would be further validated by the Structural Equation Modelling. The implications of the findings for theory and practice could be used by marketers of online apparel websites. Based on the values obtained, we can conclude that the factors such as social influence, Perceived information utility, attractiveness and trust influence the decision for a user to buy apparels online. The major factors which are found to influence an online apparel buying decision are ease of use, attractiveness that a website can offer and the trust factor which a user shares with the website.Keywords: E-tailers, consumer behaviour, technology acceptance model, structural modelling
Procedia PDF Downloads 186714 A Cloud Computing System Using Virtual Hyperbolic Coordinates for Services Distribution
Authors: Telesphore Tiendrebeogo, Oumarou Sié
Abstract:
Cloud computing technologies have attracted considerable interest in recent years. Thus, these latters have become more important for many existing database applications. It provides a new mode of use and of offer of IT resources in general. Such resources can be used “on demand” by anybody who has access to the internet. Particularly, the Cloud platform provides an ease to use interface between providers and users, allow providers to develop and provide software and databases for users over locations. Currently, there are many Cloud platform providers support large scale database services. However, most of these only support simple keyword-based queries and can’t response complex query efficiently due to lack of efficient in multi-attribute index techniques. Existing Cloud platform providers seek to improve performance of indexing techniques for complex queries. In this paper, we define a new cloud computing architecture based on a Distributed Hash Table (DHT) and design a prototype system. Next, we perform and evaluate our cloud computing indexing structure based on a hyperbolic tree using virtual coordinates taken in the hyperbolic plane. We show through our experimental results that we compare with others clouds systems to show our solution ensures consistence and scalability for Cloud platform.Keywords: virtual coordinates, cloud, hyperbolic plane, storage, scalability, consistency
Procedia PDF Downloads 425713 World Peace and Conflict Resolution: A Solution from a Buddhist Point of View
Authors: Samitharathana R. Wadigala
Abstract:
The peace will not be established until the self-consciousness would reveal in the human beings. In this nuclear age, the establishment of a lasting peace on the earth represents the primary condition for the preservation of human civilization and survival of human beings. Nothing perhaps is so important and indispensable as the achievement and maintenance of peace in the modern world today. Peace in today’s world implies much more than the mere absence of war and violence. In the interdependent world of today the United Nations needs to be representative of the modern world and democratic in its functioning because it came into existence to save the generations from the scourge of war and conflict. Buddhism is the religion of peaceful co-existence and philosophy of enlightenment. Violence and conflict from the perspective of the Buddhist theory of interdependent origination (Paṭiccasamuppāda) are same with everything else in the world a product of causes and conditions. Buddhism is totally compatible with the congenial and peaceful global order. The canonical literature, doctrines, and philosophy of Buddhism are the best suited for inter-faith dialogue, harmony, and universal peace. Even today Buddhism can resurrect the universal brotherhood, peaceful co-existence and harmonious surroundings in the comity of nations. With its increasing vitality in regions around the world, many people today turn to Buddhism for relief and guidance at the time when peace seems to be a deferred dream more than ever. From a Buddhist point of view the roots of all unwholesome actions (Conflict) i. e. greed, hatred and delusion are viewed as the root cause of all human conflicts. Conflict often emanates from attachment to material things: pleasures, property, territory, wealth, economic dominance or political superiority. Buddhism has some particularly rich resources for deployment in dissolving conflict. Buddhism addresses the Buddhist perspective on the causes of conflict and ways to resolve conflict to realize world peace. The world has enough to satisfy every body’s needs but not every body’s greed.Keywords: Buddhism, conflict-violence, peace, self-consciousness
Procedia PDF Downloads 208712 Media Literacy: Information and Communication Technology Impact on Teaching and Learning Methods in Albanian Education System
Authors: Loreta Axhami
Abstract:
Media literacy in the digital age emerges not only as a set of skills to generate true knowledge and information but also as a pedagogy methodology, as a kind of educational philosophy. In addition to such innovations as information integration and communication technologies, media infrastructures, and web usage in the educational system, media literacy enables the change in the learning methods, pedagogy, teaching programs, and school curriculum itself. In this framework, this study focuses on ICT's impact on teaching and learning methods and the degree they are reflected in the Albanian education system. The study is based on a combination of quantitative and qualitative methods of scientific research. Referring to the study findings, it results that student’s limited access to the internet in school, focus on the hardcopy textbooks and the role of the teacher as the only or main source of knowledge and information are some of the main factors contributing to the implementation of authoritarian pedagogical methods in the Albanian education system. In these circumstances, the implementation of media literacy is recommended as an apt educational process for the 21st century, which requires a reconceptualization of textbooks as well as the application of modern teaching and learning methods by integrating information and communication technologies.Keywords: authoritarian pedagogic model, education system, ICT, media literacy
Procedia PDF Downloads 140711 Entrepreneurship Education: The Impact in Today’s World
Authors: Oghenerume V. Edah, Damilola T. Aladejana
Abstract:
Entrepreneurship Education is the process of developing and acquiring entrepreneur skills on how to identify a new business and launching the business with the realization of yielding profit optimally. It’s the process of knowing how to take risk and handle challenges that accompanies a new business without the mindset of closing it when it fails. It includes steps to take when a business is recognized, combined with acquiring resources (e.g. finances, labor, land) in the face of risk and launching the new business. Additionally, Entrepreneurship is defined as the ability and willingness to set a business in the event of making profit. It is the act of starting up a business to solve big problems or present a new life-changing solution in the society to generate profit. It’s a process where a business opportunity is identified; planned, acquired and needful steps are taken to launch a business. This involves taking up financial risk, acquiring natural resources, combined with land, capital and building up a team of people who would individually contribute or add value in order to make the new business a success. Moreover, Education is the learning of new skills or value. It’s the acquiring of knowledge and capability of doing new things. It is been able to differentiate what you know and what you don’t know yet. In this modern world, the emergence of entrepreneurship education has been magnificent. An average of 60 percent humans wants to start a business or become an entrepreneur without knowing the steps on how to startup. Moreover, many of them are good starters and they end up failing when the business is not managed well. The introduction of Entrepreneur Education in our world today would change the face of business phenomenally. It would involve the acquisition of entrepreneur skills, knowledge and attitude towards initiating a business venture. The impact of Entrepreneurship Education in our world today would increase the chances of business success because it would generate better entrepreneurs. The skills, values, concept and processes acquired through learning have changed the face of business to a positive direction globally and the impact can be felt. Entrepreneurship can be taught and also can be learnt. Like any skills it can be known.Keywords: entrepreneurship, education, business, entrepreneur, skills
Procedia PDF Downloads 146710 A Study of Student Satisfaction of the Suan Sunandha Rajabhat University Radio Station
Authors: Prapoj Na Bangchang
Abstract:
The research aimed to study the satisfaction of Suan Sunandha Rajabhat University students towards the university radio station which broadcasts in both analog on FM 97.25 MHz and online via the university website. The sample used in this study consists of undergraduate students year 1 to year 4 from 6 faculties i.e. Faculty of Education, Faculty of Humanities and Social Sciences, Faculty of Management Science and Faculty of Industrial Technology, and Faculty of Fine and Applied Arts totaling 200 students. The tools used for data collection is survey. Data analysis applied statistics that are percentage, mean and standard deviation. The results showed that Suan Sunandha Rajabhat University students were satisfied to the place of listening service, followed by channels of broadcasting that cover both analog signals on 97.25 MHz FM and online via the Internet. However, the satisfaction level of the content offered was very low. Most of the students want the station to improve the content. Entertainment content was requested the most, followed by sports content. The lowest satisfaction level is with the broadcasting quality through analog signal. Most students asked the station to improve on the issue. However, overall, Suan Sunandha Rajabhat University students were satisfied with the university radio station broadcasted online via the university website.Keywords: satisfaction, students, radio station, Suan Sunandha Rajabhat University
Procedia PDF Downloads 272709 An Evaluation of the Impact of E-Banking on Operational Efficiency of Banks in Nigeria
Authors: Ibrahim Rabiu Darazo
Abstract:
The research has been conducted on the impact of E-banking on the operational efficiency of Banks in Nigeria, A case of some selected banks (Diamond Bank Plc, GTBankPlc, and Fidelity Bank Plc) in Nigeria. The research is a quantitative research which uses both primary and secondary sources of data collection. Questionnaire were used to obtained accurate data, where 150 Questionnaire were distributed among staff and customers of the three Banks , and the data collected where analysed using chi-square, whereas the secondary data where obtained from relevant text books, journals and relevant web sites. It is clear from the findings that, the use of e-banking by the banks has improved the efficiency of these banks, in terms of providing efficient services to customers electronically, using Internet Banking, Telephone Banking ATMs, reducing time taking to serve customers, e-banking allow new customers to open an account online, customers have access to their account at all the time 24/7.E-banking provide access to customers information from the data base and cost of check and postage were eliminated using e-banking. The recommendation at the end of the research include; the Banks should try to update their electronic gadgets, e-fraud(internal & external) should also be controlled, Banks shall employ qualified man power, Biometric ATMs shall be introduce to reduce fraud using ATM Cards, as it is use in other countries like USA.Keywords: banks, electronic banking, operational efficiency of banks, biometric ATMs
Procedia PDF Downloads 332708 CVOIP-FRU: Comprehensive VoIP Forensics Report Utility
Authors: Alejandro Villegas, Cihan Varol
Abstract:
Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU.Keywords: betamax, digital forensics, report utility, VoIP, VoIPBuster, VoIPWise
Procedia PDF Downloads 297707 Macroeconomic Policy Coordination and Economic Growth Uncertainty in Nigeria
Authors: Ephraim Ugwu, Christopher Ehinomen
Abstract:
Despite efforts by the Nigerian government to harmonize the macroeconomic policy implementations by establishing various committees to resolve disputes between the fiscal and monetary authorities, it is still evident that the federal government had continued its expansionary policy by increasing spending, thus creating huge budget deficit. This study evaluates the effect of macroeconomic policy coordination on economic growth uncertainty in Nigeria from 1980 to 2020. Employing the Auto regressive distributed lag (ARDL) bound testing procedures, the empirical results shows that the error correction term, ECM(-1), indicates a negative sign and is significant statistically with the t-statistic value of (-5.612882 ). Therefore, the gap between long run equilibrium value and the actual value of the dependent variable is corrected with speed of adjustment equal to 77% yearly. The long run coefficient results showed that the estimated coefficients of the intercept term indicates that other things remains the same (ceteris paribus), the economics growth uncertainty will continue reduce by 7.32%. The coefficient of the fiscal policy variable, PUBEXP, indicates a positive sign and significant statistically. This implies that as the government expenditure increases by 1%, economic growth uncertainty will increase by 1.67%. The coefficient of monetary policy variable MS also indicates a positive sign and insignificant statistically. The coefficients of merchandise trade variable, TRADE and exchange rate EXR show negative signs and significant statistically. This indicate that as the country’s merchandise trade and the rate of exchange increases by 1%, the economic growth uncertainty reduces by 0.38% and 0.06%, respectively. This study, therefore, advocate for proper coordination of monetary, fiscal and exchange rate policies in order to actualize the goal of achieving a stable economic growth.Keywords: macroeconomic, policy coordination, growth uncertainty, ARDL, Nigeria
Procedia PDF Downloads 130706 Developing House’s Model to Assess the Translation of Key Cultural Texts
Authors: Raja Al-Ghamdi
Abstract:
This paper aims to systematically assess the translation of key cultural texts. The paper, therefore, proposes a modification of the discourse analysis model for translation quality assessment introduced by the linguist Juliane House (1977, 1997, 2015). The data for analysis has been chosen from a religious text that has never been investigated before. It is an overt translation of the biography of Prophet Mohammad. The book is written originally in Arabic and translated into English. A soft copy of the translation, entitled The Sealed Nectar, is posted on numerous websites including the Internet Archive library which offers a free access to everyone. The text abounds with linguistic and cultural phenomena relevant to Islamic and Arab lingua-cultural context which make its translation a challenge, as well as its assessment. Interesting findings show that (1) culturemes are rich points and both the translator’s subjectivity and intervention are apparent in mediating them, (2) given the nature of historical narration, the source text reflects the author’s positive shading, whereas the target text reflects the translator’s axiological orientation as neutrally shaded, and, (3) linguistic gaps, metaphorical expressions and intertextuality are major stimuli to compensation strategies.Keywords: Arabic-English discourse analysis, key cultural texts, overt translation, quality assessment
Procedia PDF Downloads 282705 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network
Authors: Kamyar Fakhr, Roozbeh Salmani
Abstract:
Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.Keywords: biometric system, convolutional neural network, cyber-attack, secure
Procedia PDF Downloads 219704 Mobi Navi Tour for Rescue Operations
Authors: V. R. Sadasivam, M. Vipin, P. Vineeth, M. Sajith, G. Sathiskumar, R. Manikandan, N. Vijayarangan
Abstract:
Global positioning system technology is what leads to such things as navigation systems, GPS tracking devices, GPS surveying and GPS mapping. All that GPS does is provide a set of coordinates which represent the location of GPS units with respect to its latitude, longitude and elevation on planet Earth. It also provides time, which is accurate. The tracking devices themselves come in different flavors. They will contain a GPS receiver, and GPS software, along with some way of transmitting the resulting coordinates. GPS in mobile tend to use radio waves to transmit their location to another GPS device. The purpose of this prototype “Mobi Navi Tour for Rescue Operation” timely communication, and lightning fast decision-making with a group of people located in different places with a common goal. Timely communication and tracking the people are a critical issue in many situations, environments. Expedited can find missing person by sending the location and other related information to them through mobile. Information must be drawn from the caller and entered into the system by the administrator or a group leader and transferred to the group leader. This system will locate the closest available person, a group of people working in an organization/company or vehicle to determine availability and their position to track them. Misinformation cannot lead to the wrong decision in the rapidly paced environment in a normal and an abnormal situation. In “Mobi Navi Tour for Rescue Operation” we use Google Cloud Messaging for android (GCM) which is a service that helps developers send data from servers to their android applications on android devices. The service provides a simple, lightweight mechanism that servers can use to tell mobile applications to contact the server directly, to fetch updated application or user data.Keywords: android, gps, tour, communication, service
Procedia PDF Downloads 396703 Effective Governance through Mobile Phones: Cases Supporting the Introduction and Implementation
Authors: Mohd Mudasir Shafi, Zafrul Hasan, Talat Saleem
Abstract:
Information and communication Technology (ICT) services have been defined as a route to good governance. Introduction of ICT into Governance has given rise to the idea of e-governance which helps in enhancing transparency, generating accountability and responsiveness in the system in order to provide faster and quality service to the citizen. Advancement in ICT has provided governments all over the world to speed up the delivery of information and services to citizens and businesses and increase their participation in governance. There has been varying degree of success over the past decade into providing services to the citizens using internet and different web services. These e-government initiatives have been extensively researched. Our research is aimed at the transition from electronic government to mobile government (m-government) initiatives implementing the mobile services and concerned to understand the major factors which will aid to adoption and distribution of these services. There must be some amount of research done in the integration process between e-government and m-government. There must also be enough amount of investigation done all the factors that could affect the transition process. Such factors differ between different places and the advancement in information and technology available there. In this paper, we have discussed why mobile communication system can be used for effective e-governance and the areas where m-governance can be implemented. The paper will examine some of the reasons as well as the main opportunities for improving effective governance through mobile phones.Keywords: e-governance, mobile phones, information technology, m-government
Procedia PDF Downloads 443702 Application of the Critical Decision Method for Monitoring and Improving Safety in the Construction Industry
Authors: Juan Carlos Rubio Romero, Francico Salguero Caparros, Virginia Herrera-Pérez
Abstract:
No one is in the slightest doubt about the high levels of risk involved in work in the construction industry. They are even higher in structural construction work. The Critical Decision Method (CDM) is a semi-structured interview technique that uses cognitive tests to identify the different disturbances that workers have to deal with in their work activity. At present, the vision of safety focused on daily performance and things that go well for safety and health management is facing the new paradigm known as Resilience Engineering. The aim of this study has been to describe the variability in formwork labour on concrete structures in the construction industry and, from there, to find out the resilient attitude of workers to unexpected events that they have experienced during their working lives. For this purpose, a series of semi-structured interviews were carried out with construction employees with extensive experience in formwork labour in Spain by applying the Critical Decision Method. This work has been the first application of the Critical Decision Method in the field of construction and, more specifically, in the execution of structures. The results obtained show that situations categorised as unthought-of are identified to a greater extent than potentially unexpected situations. The identification during these interviews of both expected and unexpected events provides insight into the critical decisions made and actions taken to improve resilience in daily practice in this construction work. From this study, it is clear that it is essential to gain more knowledge about the nature of the human cognitive process in work situations within complex socio-technical systems such as construction sites. This could lead to a more effective design of workplaces in the search for improved human performance.Keywords: resilience engineering, construction industry, unthought-of situations, critical decision method
Procedia PDF Downloads 148701 Directors’ Liability for Losses Incurred in the Management of PT Merpati Nusantara Airlines, Persero
Authors: Eny Suastuti
Abstract:
This paper is about state’s capital equity in establishing State-owned Company (PT Merpati Persero). Under private law regime, PT Merpati Persero equity is a state asset allocated separately from the State Budget. Consequently, it is no longer a state asset; rather, it becomes a part of company assets. The adoption of Act No. 17 of 2003 on State Finance, Act No. 31 of 1999, which is amended by Act No. 20 of 2001 on Eradication of Corrupt Practices, Act No. 15 of 2004 on Auditing, Management, and Accountability of State Finance, and Act No. 15 of 2006 Audit Board raises legal issues of whether State-owned Company’s (PT Merpati Persero) loss may be deemed as loss on state finance made by the Directors of PT Merpati Persero, which implication leads to corrupt practices conducted by the Directors. The principle of civil law states that state assets are separated from the state budget is not a government asset. Therefore the case of a lease agreement 2 (two) units of Boeing 737-400 and Boeing 737-500 between PT Merpati Nusantara Airlines with companies Third Stone Aircraft Leasing Group (TALG) the United States cannot be prosecuted under Articles 2 and 3 of Act No. 31 of 1999 Jo Act No. 20 of 2001 on Eradication of Corrupt Practices (Law PTPK). From this paper, three things are found. First, state’s capital equity, which has been allocated separately from state assets in establishing the PT Merpati Perserois not state asset; rather, it is company’s asset. Second, in the case of mismanagement leading to company loss, the Directors of PT Merpati Persero may not be charged with committing corrupt practice as prescribed in Articles 2 and 3 of Corrupt Practices Eradication Law. Third, misperception has been made by judicial practices since the courts consider loss in certain transaction made by Directors of PT Merpati Persero to be loss of state finance whose implication is applicability of Articles 2 and 3 of Corrupt Practices Eradication Law.Keywords: corrupt practice, loss, state's capital equity, state finance (PT Merpati Persero)
Procedia PDF Downloads 261700 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria
Authors: Okike Benjamin
Abstract:
Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria
Procedia PDF Downloads 261699 Modelling of Filters CO2 (Carbondioxide) and CO (Carbonmonoxide) Portable in Motor Vehicle's Exhaust with Absorbent Chitosan
Authors: Yuandanis Wahyu Salam, Irfi Panrepi, Nuraeni
Abstract:
The increased of greenhouse gases, that is CO2 (carbondioxide) in atmosphere induce the rising of earth’s surface average temperature. One of the largest contributors to greenhouse gases is motor vehicles. Smoke which is emitted by motor’s exhaust containing gases such as CO2 (carbondioxide) and CO (carbon monoxide). Chemically, chitosan is cellulose like plant fiber that has the ability to bind like absorbant foam. Chitosan is a natural antacid (absorb toxins), when chitosan is spread over the surface of water, chitosan is able to absorb fats, oils, heavy metals, and other toxic substances. Judging from the nature of chitosan is able to absorb various toxic substances, it is expected that chitosan is also able to filter out gas emission from the motor vehicles. This study designing a carbondioxide filter in the exhaust of motor vehicles using chitosan as its absorbant. It aims to filter out gases in the exhaust so that CO2 and CO can be reducted before emitted by exhaust. Form of this reseach is study of literature and applied with experimental research of tool manufacture. Data collected through documentary studies by studying books, magazines, thesis, search on the internet as well as the relevant reference. This study will produce a filters which has main function to filter out CO2 and CO emissions that generated by vehicle’s exhaust and can be used as portable.Keywords: filter, carbon, carbondioxide, exhaust, chitosan
Procedia PDF Downloads 351698 Use of Information and Communication Technology (ICT) Among Nigerian Colleges of Education Lecturers: A Gender Analysis Approach
Authors: Rasheed A. Saliu, Sunday E. Ogundipe, Oluwaseun A. Adefila
Abstract:
Information and Communication Technology (ICT) in recent time has transformed the means by which we inform ourselves, with world events and areas of personal interests, and further our learning. Today, for many, books and journals are no longer the first or primary source of information or learning. We now regularly rely on images, video, animations and sound to acquire information and to learn. Increased and improved access to the internet has accelerated this phenomenon. We now acquire and access information in ways fundamentally different from the pre-ICT era. But to what extent is academic staff in colleges of education, having access to and the utilising of ICT devices in their lecture deliveries especially in School of Science and Vocational and Technical? The main focus of this paper is to proffer solution to this salient question. It is essentially an empirical study carried out in five colleges of education in south-west zone of Nigeria. The target population was the academic staff in the selected institution. A total number of 150 male and female lecturers were contacted for the study. The main instrument was questionnaire. The finding reveals that male lecturers are much more ICT inclined than women folk in the academics. Some recommendations were made to endear academics to utilizing ICT at their disposal to foster qualitative delivery in this digital era.Keywords: education, gender, ICT, Nigeria
Procedia PDF Downloads 297