Search results for: popular radio music
1124 Urban Agriculture among Households of Makurdi Metropolis of Benue State, Nigeria: Key Challenges
Authors: Evangeline Mbah, Margret Okeke, Agbo Joseph
Abstract:
Agriculture was primarily a rural activity in Nigeria, but due to increasing demand for food and jobs for many urban dwellers, it became necessary for urban households to embark on farming as a means of improving household food security and additional income for economic empowerment. Urban agriculture serves as a veritable tool for poverty reduction among people living in urban areas mostly low-income earners and unemployed. The survey was conducted to identify key challenges encountered by households in Makurdi metropolis of Benue state, Nigeria who are engaged in urban agriculture. A well-structured questionnaire was used to collect data from a sample of respondents used for the study. Data were analyzed using frequency, percentage, mean score and standard deviation. Results show that a greater percentage (46.0%) of the respondents engaged in cultivation of leafy vegetable, 22.0% cultivated cassava, 21.0% planted sweet potato, 18.0% cultivated tomato while 56.0% reared poultry, 23.0% kept goat, among others. Sources of agricultural information indicated by the respondents were family members/relations (85.0%), friends/neighbours (73.0%), radio (68.0%), extension agents (57.0%), etc. Major challenges encountered by the respondents in urban agriculture include inadequate size of farmland (M= 2.72), lack of access to credit facilities (M= 2.63), lack of funds (M= 2.50), high cost of labour (M= 2.49), insecurity of lands (M= 2.46), theft of crops at maturity (M= 2.38), lack of farm inputs such as improved varieties of seeds, fertilizer and exotic breeds of livestock (M= 2.23), destruction of crops by stray farm animals (M= 1.96), among others. The study recommends that there is a need for adequate provision of farm inputs by the government at all levels at a subsidized rate in order to reduce the cost of production and enhance optimum productivity.Keywords: urban, agriculture, household, challenges, Makurdi, Nigeria
Procedia PDF Downloads 1341123 Microarray Data Visualization and Preprocessing Using R and Bioconductor
Authors: Ruchi Yadav, Shivani Pandey, Prachi Srivastava
Abstract:
Microarrays provide a rich source of data on the molecular working of cells. Each microarray reports on the abundance of tens of thousands of mRNAs. Virtually every human disease is being studied using microarrays with the hope of finding the molecular mechanisms of disease. Bioinformatics analysis plays an important part of processing the information embedded in large-scale expression profiling studies and for laying the foundation for biological interpretation. A basic, yet challenging task in the analysis of microarray gene expression data is the identification of changes in gene expression that are associated with particular biological conditions. Careful statistical design and analysis are essential to improve the efficiency and reliability of microarray experiments throughout the data acquisition and analysis process. One of the most popular platforms for microarray analysis is Bioconductor, an open source and open development software project based on the R programming language. This paper describes specific procedures for conducting quality assessment, visualization and preprocessing of Affymetrix Gene Chip and also details the different bioconductor packages used to analyze affymetrix microarray data and describe the analysis and outcome of each plots.Keywords: microarray analysis, R language, affymetrix visualization, bioconductor
Procedia PDF Downloads 4801122 Effect of Damping on Performance of Magnetostrictive Vibration Energy Harvester
Authors: Mojtaba Ghodsi, Hamidreza Ziaifar, Morteza Mohammadzaheri, Payam Soltani
Abstract:
This article presents an analytical model to estimate the harvested power from a Magnetostrictive cantilevered beam with tip excitation. Furthermore, the effects of internal and external damping on harvested power are investigated. The magnetostrictive material in this harvester is Galfenol. In comparison to other popular smart materials like Terfenol-D, Galfenol has higher strength and machinability. In this article, first, a mechanical model of the Euler-Bernoulli beam is employed to calculate the deflection of the harvester. Then, the magneto-mechanical equation of Galfenol is combined with Faraday's law to calculate the generated voltage of the Magnetostrictive cantilevered beam harvester. Finally, the beam model is incorporated in the aforementioned combination. The results show that a 30×8.5×1 mm Galfenol cantilever beam harvester with 80 turn pickup coil can generate up to 3.7 mV and 9 mW. Furthermore, sensitivity analysis made by Response Surface Method (RSM) shows that the harvested power is only sensitive to the internal damping coefficient.Keywords: internal damping coefficient, external damping coefficient, euler-bernoulli, energy harvester, galfenol, magnetostrictive, response surface method
Procedia PDF Downloads 1131121 Morphometric Study of the Eggs of Pheasant Eggs Phasianus colchicus (Aves, Phasianidae)
Authors: S. Zenia, A. Menasseria, A. E. Kheidous, F. Larinouna, A. Smai, H. Saadi, F. Haddadj, A. Milla, F. Marniche
Abstract:
Pheasant, is a bird of great ornamental value through the beauty of its form and colors, it is among the most popular birds. The present study was conducted in an experimental breeding. The objective of this work is to know the quality of the eggs of this bird. A total of 938 eggs were collected. To deepen the knowledge about the characteristics of external shell quality, biometric parameters were studied, among them we find the weight with a mean value of 29.2± 2, 24 g. Egg length (mm) and egg width (mm) mean value are respectively 43.01 ± 1,84 cm and 34.05 ± 1,44cm. The volume and shape index of eggs obtained are respectively 25,63±2,88cm3 and 79.00 ± 3%, shell index which recorded an average of 68%. Water loss recorded is 13%. Note that all these parameters and others may influence hatching. The analysis of variance applied for the comparison of egg weight shows that there is no significant difference in the same form factor (P> 0.05). Otherwise, the comparison test used shows a significant difference with P <0.05 for length, width, volume, density, indices of shell and water loss of eggs between the different. Indeed, several factors may explain the difference as the absence of sorting eggs during incubation and other factors that will be exposing later.Keywords: analysis of variance, egg, hatching, morphometry of eggs Phaisan (Phasianus colchicus.L.)
Procedia PDF Downloads 6091120 Biosurfactant-Mediated Nanoparticle Synthesis by Bacillus subtilis
Authors: Satya Eswari Jujjavarapu, Swasti Dhagat, Lata Upadhyay, Reecha Sahu
Abstract:
Silver nanoparticles have a broad range of antimicrobial and antifungal properties ranging from soaps, pastes to sterilization and drug delivery systems. These can be synthesized by physical, chemical and biological methods; biological methods being the most popular owing to their non-toxic nature and reduced energy requirements. Microbial surfactants, produced on the microbial cell surface or excreted extracellularly are an alternative to synthetic surfactants for the production of silver nanoparticles. Hence, they are also called as green molecules. Microbial lipopeptide surfactants (biosurfactant) exhibit anti-tumor and anti-microbial properties and can be used as drug delivery agents. In this study, biosurfactant was synthesized by using a strain of acillus subtilis. The biosurfactant thus produced was analysed by emulsification assay, oil spilling test, and haemolytic test. Biosurfactant-mediated silver nanoparticles were synthesised by microwave irradiation of the culture supernatant and further characterized by UV–vis spectroscopy for a range of 400-600 nm. The UV–vis spectra showed a surface plasmon resonance vibration band at 410 nm corresponding to the peak of silver nanoparticles.Keywords: biosurfactant, Bacillus subtilis, silver nano particle, lipopeptide
Procedia PDF Downloads 2401119 Impact of Web 2.0 on Digital Divide in Azad Jammu and Kashmir
Authors: Sana Shokat, Rabia Riaz, Raja Shoaib Hussain, Saba Shabir
Abstract:
Digital divide is usually measured in terms of gap between those who can efficiently use new technological tools, such as Internet, and those who cannot. It is also hypothesized that web 2.0 tools motivate people to use technology i.e. Social networking sites can play an important role in bridging digital gap. This study was to determine the presence of digital divide in urban and rural areas of district Muzaffrabad, Azad Jammu & Kashmir taking internet usage as the key element. A cross-sectional community based survey was conducted involving 384 respondents from city Muzaffrabad and village Garhi Doppta. The existence of digital divide was accessed on the basis of the questionnaires given. Chi- square test was used to find the association of different demographic and ICT related factors with internet usage. Age based and area based divide still exist among the targeted population but gender based digital divide is vanishing from the intended area of study. Outcomes of the survey also revealed that web 2.0-based web sites are also becoming popular and attracting people to use internet. Trend of using internet and communication technologies can be increased by solving the highlighted problems.Keywords: Azad Jammu and Kashmir, digital divide, ICT, information and communication technology, Web2.0
Procedia PDF Downloads 3671118 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems
Authors: Borhan Marzougui
Abstract:
Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.Keywords: IoT, DDoS, attacks, botnet, security, agents
Procedia PDF Downloads 1431117 Deep Learning for Recommender System: Principles, Methods and Evaluation
Authors: Basiliyos Tilahun Betru, Charles Awono Onana, Bernabe Batchakui
Abstract:
Recommender systems have become increasingly popular in recent years, and are utilized in numerous areas. Nowadays many web services provide several information for users and recommender systems have been developed as critical element of these web applications to predict choice of preference and provide significant recommendations. With the help of the advantage of deep learning in modeling different types of data and due to the dynamic change of user preference, building a deep model can better understand users demand and further improve quality of recommendation. In this paper, deep neural network models for recommender system are evaluated. Most of deep neural network models in recommender system focus on the classical collaborative filtering user-item setting. Deep learning models demonstrated high level features of complex data can be learned instead of using metadata which can significantly improve accuracy of recommendation. Even though deep learning poses a great impact in various areas, applying the model to a recommender system have not been fully exploited and still a lot of improvements can be done both in collaborative and content-based approach while considering different contextual factors.Keywords: big data, decision making, deep learning, recommender system
Procedia PDF Downloads 4781116 Applying Augmented Reality Technology for an E-Learning System
Authors: Fetoon K. Algarawi, Wejdan A. Alslamah, Ahlam A. Alhabib, Afnan S. Alfehaid, Dina M. Ibrahim
Abstract:
Over the past 20 years, technology was rapidly developed and no one expected what will come next. Advancements in technology open new opportunities for immersive learning environments. There is a need to transmit education to a level that makes it more effective for the student. Augmented reality is one of the most popular technologies these days. This paper is an experience of applying Augmented Reality (AR) technology using a marker-based approach in E-learning system to transmitting virtual objects into the real-world scenes. We present a marker-based approach for transmitting virtual objects into real-world scenes to explain information in a better way after we developed a mobile phone application. The mobile phone application was then tested on students to determine the extent to which it encouraged them to learn and understand the subjects. In this paper, we talk about how the beginnings of AR, the fields using AR, how AR is effective in education, the spread of AR these days and the architecture of our work. Therefore, the aim of this paper is to prove how creating an interactive e-learning system using AR technology will encourage students to learn more.Keywords: augmented reality, e-learning, marker-based, monitor-based
Procedia PDF Downloads 2231115 The Capacity of Mel Frequency Cepstral Coefficients for Speech Recognition
Authors: Fawaz S. Al-Anzi, Dia AbuZeina
Abstract:
Speech recognition is of an important contribution in promoting new technologies in human computer interaction. Today, there is a growing need to employ speech technology in daily life and business activities. However, speech recognition is a challenging task that requires different stages before obtaining the desired output. Among automatic speech recognition (ASR) components is the feature extraction process, which parameterizes the speech signal to produce the corresponding feature vectors. Feature extraction process aims at approximating the linguistic content that is conveyed by the input speech signal. In speech processing field, there are several methods to extract speech features, however, Mel Frequency Cepstral Coefficients (MFCC) is the popular technique. It has been long observed that the MFCC is dominantly used in the well-known recognizers such as the Carnegie Mellon University (CMU) Sphinx and the Markov Model Toolkit (HTK). Hence, this paper focuses on the MFCC method as the standard choice to identify the different speech segments in order to obtain the language phonemes for further training and decoding steps. Due to MFCC good performance, the previous studies show that the MFCC dominates the Arabic ASR research. In this paper, we demonstrate MFCC as well as the intermediate steps that are performed to get these coefficients using the HTK toolkit.Keywords: speech recognition, acoustic features, mel frequency, cepstral coefficients
Procedia PDF Downloads 2591114 Shifted Window Based Self-Attention via Swin Transformer for Zero-Shot Learning
Authors: Yasaswi Palagummi, Sareh Rowlands
Abstract:
Generalised Zero-Shot Learning, often known as GZSL, is an advanced variant of zero-shot learning in which the samples in the unseen category may be either seen or unseen. GZSL methods typically have a bias towards the seen classes because they learn a model to perform recognition for both the seen and unseen classes using data samples from the seen classes. This frequently leads to the misclassification of data from the unseen classes into the seen classes, making the task of GZSL more challenging. In this work of ours, to solve the GZSL problem, we propose an approach leveraging the Shifted Window based Self-Attention in the Swin Transformer (Swin-GZSL) to work in the inductive GSZL problem setting. We run experiments on three popular benchmark datasets: CUB, SUN, and AWA2, which are specifically used for ZSL and its other variants. The results show that our model based on Swin Transformer has achieved state-of-the-art harmonic mean for two datasets -AWA2 and SUN and near-state-of-the-art for the other dataset - CUB. More importantly, this technique has a linear computational complexity, which reduces training time significantly. We have also observed less bias than most of the existing GZSL models.Keywords: generalised, zero-shot learning, inductive learning, shifted-window attention, Swin transformer, vision transformer
Procedia PDF Downloads 711113 Perspective and Challenge of Tidal Power in Bangladesh
Authors: Md. Alamgir Hossain, Md. Zakir Hossain, Md. Atiqur Rahman
Abstract:
Tidal power can play a vital role in integrating as new source of renewable energy to the off-grid power connection in isolated areas, namely Sandwip, in Bangladesh. It can reduce the present energy crisis and improve the social, environmental and economic perspective of Bangladesh. Tidal energy is becoming popular around the world due to its own facilities. The development of any country largely depends on energy sector improvement. Lack of energy sector is because of hampering progress of any country development, and the energy sector will be stable by only depend on sustainable energy sources. Renewable energy having environmental friendly is the only sustainable solution of secure energy system. Bangladesh has a huge potential of tidal power at different locations, but effective measures on this issue have not been considered sincerely. This paper summarizes the current energy scenario, and Bangladesh can produce power approximately 53.19 MW across the country to reduce the growing energy demand utilizing tidal energy as well as it is shown that Sandwip is highly potential place to produce tidal power, which is estimated approximately 16.49 MW by investing only US $10.37 million. Besides this, cost management for tidal power plant has been also discussed.Keywords: sustainable energy, tidal power, cost analysis, power demand, gas crisis
Procedia PDF Downloads 4941112 How Addictive Are They: Effects of E-Cigarette Vapor on Intracranial Self-Stimulation Compared to Nicotine Alone
Authors: Annika Skansberg
Abstract:
Electronic cigarettes (e-cigarettes) use vapor to deliver nicotine, have recently become popular, especially amongst adolescents. Because of this, the FDA has decided to regulate e-cigarettes, and therefore would like to determine the abuse liability of the products compared to traditional nicotine products. This will allow them to determine the impact of regulating them on public health and shape the decisions they make when creating new laws. This study assessed the abuse liability of Aroma E-juice Dark Honey Tobacco compared to nicotine using an animal model. This e-liquid contains minor alkaloids that may increase abuse liability compared to nicotine alone. The abuse liability of nicotine alone and e-juice liquid were compared in rats using intracranial self-stimulation (ICSS) thresholds. E-liquid had less aversive effects at high nicotine doses in the ICSS model, suggesting that the minor alkaloids in the e-liquid allow users to use higher doses without experiencing the negative effects felt when using high doses of nicotine alone. This finding could mean that e-cigarettes have a higher abuse liability than nicotine alone, but more research is needed before this can be concluded. These findings are useful in observing the abuse liability of e-cigarettes and will help inform the FDA while regulating these products.Keywords: electronic cigarettes, intra-cranial self stimulation, abuse liability, anhedonia
Procedia PDF Downloads 3111111 Effect of Bentonite on Shear Strength of Bushehr Calcareous Sand
Authors: Arash Poordana, Reza Ziaie Moayed
Abstract:
Calcareous sands are found most commonly in areas adjacent to crude oil and gas, and particularly around water. These types of soil have high compressibility due to high inter-granular porosity, irregularity, fragility, and especially crushing. Also, based on experience, it has been shown that the behavior of these types of soil is not similar to silica sand in loading. Since the destructive effects of cement on the environment are obvious, other alternatives such as bentonite are popular to be used. Bentonite has always been used commercially in civil engineering projects and according to its low hydraulic conductivity, it is used for landfills, cut-off walls, and nuclear wastelands. In the present study, unconfined compression tests in five ageing periods (1, 3, 7, 14, and 28 days) after mixing different percentages of bentonite (5%, 7.5% and 10%) with Bushehr calcareous sand were performed. The relative density considered for the specimens is 50%. Optimum water content was then added to each specimen accordingly (19%, 18.5%, and 17.5%). The sample preparation method was wet tamping and the specimens were compacted in five layers. It can be concluded from the results that as the bentonite content increases, the unconfined compression strength of the soil increases. Based on the obtained results, 3-day and 7-day ageing periods showed 30% and 50% increase in the shear strength of soil, respectively.Keywords: unconfined compression test, bentonite, Bushehr, calcareous sand
Procedia PDF Downloads 1291110 Reliability Analysis of Computer Centre at Yobe State University Using LRU Algorithm
Authors: V. V. Singh, Yusuf Ibrahim Gwanda, Rajesh Prasad
Abstract:
In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as a local server). Observing the different possibilities of the functioning of the CC, the analysis has been done to evaluate the various popular measures of reliability such as availability, reliability, mean time to failure (MTTF), profit analysis due to the operation of the system. The system can ultimately fail due to the failure of router, redundant server before repairing the mail server and switch failure. The system can also partially fail when a local server fails. The failed devices have restored according to Least Recently Used (LRU) techniques. The system can also fail entirely due to a cooling failure of the server, electricity failure or some natural calamity like earthquake, fire tsunami, etc. All the failure rates are assumed to be constant and follow exponential time distribution, while the repair follows two types of distributions: i.e. general and Gumbel-Hougaard family copula distribution.Keywords: reliability, availability Gumbel-Hougaard family copula, MTTF, internet data centre
Procedia PDF Downloads 5301109 The Term of Intellectual Property and Artificial Intelligence
Authors: Yusuf Turan
Abstract:
Definition of Intellectual Property Rights according to the World Intellectual Property Organization: " Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce." It states as follows. There are 2 important points in the definition; we can say that it is the result of intellectual activities that occur by one or more than one PERSON and as INNOVATION. When the history and development of the relevant definitions are briefly examined, it is realized that these two points have remained constant and Intellectual Property law and rights have been shaped around these two points. With the expansion of the scope of the term Intellectual Property as a result of the development of technology, especially in the field of artificial intelligence, questions such as "Can "Artificial Intelligence" be an inventor?" need to be resolved within the expanding scope. In the past years, it was ruled that the artificial intelligence named DABUS seen in the USA did not meet the definition of "individual" and therefore would be an inventor/inventor. With the developing technology, it is obvious that we will encounter such situations much more frequently in the field of intellectual property. While expanding the scope, we should definitely determine the boundaries of how we should decide who performs the mental activity or creativity that we call indispensable on the inventor/inventor according to these problems. As a result of all these problems and innovative situations, it is clearly realized that not only Intellectual Property Law and Rights but also their definitions need to be updated and improved. Ignoring the situations that are outside the scope of the current Intellectual Property Term is not enough to solve the problem and brings uncertainty. The fact that laws and definitions that have been operating on the same theories for years exclude today's innovative technologies from the scope contradicts intellectual property, which is expressed as a new and innovative field. Today, as a result of the innovative creation of poetry, painting, animation, music and even theater works with artificial intelligence, it must be recognized that the definition of Intellectual Property must be revised.Keywords: artificial intelligence, innovation, the term of intellectual property, right
Procedia PDF Downloads 701108 Language Development and Learning about Violence
Authors: Karen V. Lee
Abstract:
The background and significance of this study involves research about a music teacher discovering how language development and learning can help her overcome harmful and lasting consequences from sexual violence. Education about intervention resources from language development that helps her cope with consequences influencing her career as teacher. Basic methodology involves the qualitative method of research as theoretical framework where the author is drawn into a deep storied reflection about political issues surrounding teachers who need to overcome social, psychological, and health risk behaviors from violence. Sub-themes involve available education from learning resources to ensure teachers receive social, emotional, physical, spiritual, and intervention resources that evoke visceral, emotional responses from the audience. Major findings share how language development and learning provide helpful resources to victims of violence. It is hoped the research dramatizes an episodic yet incomplete story that highlights the circumstances surrounding the protagonist’s life. In conclusion, the research has a reflexive storied framework that embraces harmful and lasting consequences from sexual violence. The reflexive story of the sensory experience critically seeks verisimilitude by evoking lifelike and believable feelings from others. Thus, the scholarly importance of using language development and learning for intervention resources can provide transformative aspects that contribute to social change. Overall, the circumstance surrounding the story about sexual violence is not uncommon in society. Language development and learning supports the moral mission to help teachers overcome sexual violence that socially impacts their professional lives as victims.Keywords: intervention, language development and learning, sexual violence, story
Procedia PDF Downloads 3311107 Sharing Experience in Authentic Learning for Mobile Security
Abstract:
Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.Keywords: mobile computing, Android, network, security, labware
Procedia PDF Downloads 4061106 Problems of Innovation Development of Wireless Data Transfer Branch in the Cellular Market of Kazakhstan
Authors: Yessengeldy Kuanyshpayev
Abstract:
Now in some countries of the world the cellular market is on the point of saturation, in others - positive dynamics of development kept on. The reasons for it are also different, but there are united by their general susceptibility to innovation changes, if they are really innovative. If to take as an example the cellular market of Kazakhstan it is defined by the low percent of smart phones at consumers, the low population density, undercapacity of the 3G channel, and absence of universal access to the LTE technology that limits dynamical growth of this branch. These moments are aggravated by failures of starting commercial projects by private companies which prevent to be implemented and widely adopted to a new product among consumers. The object of the research is possible integration of wireless and program technologies at which introduction the idea can regenerate in an innovation. The analysis of existing projects in the market and the possible union of the technologies through a prism of theoretical bases of innovative activity shows that efficiency of the company by development and introduction of innovations is possible only thanks to strict observance of all terms and conditions of the innovative process which main term is profit. Despite that fact that on a global scale the innovativeness issue of companies is very popular, there are no research about possibility of innovative breaks in the field of wireless access to the Internet in the cellular market of Kazakhstan.Keywords: innovation, the effectiveness of company, commercialization, cellular market
Procedia PDF Downloads 3941105 Methods of Improving Production Processes Based on Deming Cycle
Authors: Daniel Tochwin
Abstract:
Continuous improvement is an essential part of effective process performance management. In order to achieve continuous quality improvement, each organization must use the appropriate selection of tools and techniques. The basic condition for success is a proper understanding of the business need faced by the company and the selection of appropriate methods to improve a given production process. The main aim of this article is to analyze the methods of conduct which are popular in practice when implementing process improvements and then to determine whether the tested methods include repetitive systematics of the approach, i.e., a similar sequence of the same or similar actions. Based on an extensive literature review, 4 methods of continuous improvement of production processes were selected: A3 report, Gemba Kaizen, PDCA cycle, and Deming cycle. The research shows that all frequently used improvement methods are generally based on the PDCA cycle, and the differences are due to "(re)interpretation" and the need to adapt the continuous improvement approach to the specific business process. The research shows that all the frequently used improvement methods are generally based on the PDCA cycle, and the differences are due to "(re) interpretation" and the need to adapt the continuous improvement approach to the specific business process.Keywords: continuous improvement, lean methods, process improvement, PDCA
Procedia PDF Downloads 801104 Predatory Rule and the Rise of Military Coups: Insights From the 2020 Malian Case
Authors: Deretha Bester
Abstract:
This research employs a theoretical framework to investigate the interplay between factors that lead from predatory governance and predatory rule to military coups, utilizing the frustration-aggression theory as its guiding lens. It adopts a case-oriented approach and employs thematic analysis to examine the socio-economic, governance, and political environment that precipitated the August 2020 Malian military coup. Presenting seven key themes, it reveals how predatory rule and its manifestation in the Malian context was a critical factor in paving the way for the military coup. The study provides critical reflections into the historical, regional, and political dynamics reshaping Africa’s changing political landscape. It presents a conceptual model to comprehend how predatory governance fosters conditions favorable for military coups. Insights from the Malian case study offer valuable perspectives for analyzing events in comparable contexts. This understanding is crucial for grasping the precursors and impact of predatory rule and popular frustrations in contexts where military coups emerge.Keywords: predatory rule, military coups, socio-political analysis, frustration-aggression theory, Mali
Procedia PDF Downloads 721103 The Influence of Fashion Bloggers on the Pre-Purchase Decision for Online Fashion Products among Generation Y Female Malaysian Consumers
Authors: Mohd Zaimmudin Mohd Zain, Patsy Perry, Lee Quinn
Abstract:
This study explores how fashion consumers are influenced by fashion bloggers towards pre-purchase decision for online fashion products in a non-Western context. Malaysians rank among the world’s most avid online shoppers, with apparel the third most popular purchase category. However, extant research on fashion blogging focuses on the developed Western market context. Numerous international fashion retailers have entered the Malaysian market from luxury to fast fashion segments of the market; however Malaysian fashion consumers must balance religious and social norms for modesty with their dress style and adoption of fashion trends. Consumers increasingly mix and match Islamic and Western elements of dress to create new styles enabling them to follow Western fashion trends whilst paying respect to social and religious norms. Social media have revolutionised the way that consumers can search for and find information about fashion products. For online fashion brands with no physical presence, social media provide a means of discovery for consumers. By allowing the creation and exchange of user-generated content (UGC) online, they provide a public forum that gives individual consumers their own voices, as well as access to product information that facilitates their purchase decisions. Social media empower consumers and brands have important roles in facilitating conversations among consumers and themselves, to help consumers connect with them and one another. Fashion blogs have become an important fashion information sources. By sharing their personal style and inspiring their followers with what they wear on popular social media platforms such as Instagram, fashion bloggers have become fashion opinion leaders. By creating UGC to spread useful information to their followers, they influence the pre-purchase decision. Hence, successful Western fashion bloggers such as Chiara Ferragni may earn millions of US dollars every year, and some have created their own fashion ranges and beauty products, become judges in fashion reality shows, won awards, and collaborated with high street and luxury brands. As fashion blogging has become more established worldwide, increasing numbers of fashion bloggers have emerged from non-Western backgrounds to promote Islamic fashion styles, such as Hassanah El-Yacoubi and Dian Pelangi. This study adopts a qualitative approach using netnographic content analysis of consumer comments on two famous Malaysian fashion bloggers’ Instagram accounts during January-March 2016 and qualitative interviews with 16 Malaysian Generation Y fashion consumers during September-October 2016. Netnography adapts ethnographic techniques to the study of online communities or computer-mediated communications. Template analysis of the data involved coding comments according to the theoretical framework, which was developed from the literature review. Initial data analysis shows the strong influence of Malaysian fashion bloggers on their followers in terms of lifestyle and morals as well as fashion style. Followers were guided towards the mix and match trend of dress with Western and Islamic elements, for example, showing how vivid colours or accessories could be worked into an outfit whilst still respecting social and religious norms. The blogger’s Instagram account is a form of online community where followers can communicate and gain guidance and support from other followers, as well as from the blogger.Keywords: fashion bloggers, Malaysia, qualitative, social media
Procedia PDF Downloads 2181102 Assessing an Instrument Usability: Response Interpolation and Scale Sensitivity
Authors: Betsy Ng, Seng Chee Tan, Choon Lang Quek, Peter Looker, Jaime Koh
Abstract:
The purpose of the present study was to determine the particular scale rating that stands out for an instrument. The instrument was designed to assess student perceptions of various learning environments, namely face-to-face, online and blended. The original instrument had a 5-point Likert items (1 = strongly disagree and 5 = strongly agree). Alternate versions were modified with a 6-point Likert scale and a bar scale rating. Participants consisted of undergraduates in a local university were involved in the usability testing of the instrument in an electronic setting. They were presented with the 5-point, 6-point and percentage-bar (100-point) scale ratings, in response to their perceptions of learning environments. The 5-point and 6-point Likert scales were presented in the form of radio button controls for each number, while the percentage-bar scale was presented with a sliding selection. Among these responses, 6-point Likert scale emerged to be the best overall. When participants were confronted with the 5-point items, they either chose 3 or 4, suggesting that data loss could occur due to the insensitivity of instrument. The insensitivity of instrument could be due to the discreet options, as evidenced by response interpolation. To avoid the constraint of discreet options, the percentage-bar scale rating was tested, but the participant responses were not well-interpolated. The bar scale might have provided a variety of responses without a constraint of a set of categorical options, but it seemed to reflect a lack of perceived and objective accuracy. The 6-point Likert scale was more likely to reflect a respondent’s perceived and objective accuracy as well as higher sensitivity. This finding supported the conclusion that 6-point Likert items provided a more accurate measure of the participant’s evaluation. The 5-point and bar scale ratings might not be accurately measuring the participants’ responses. This study highlighted the importance of the respondent’s perception of accuracy, respondent’s true evaluation, and the scale’s ease of use. Implications and limitations of this study were also discussed.Keywords: usability, interpolation, sensitivity, Likert scales, accuracy
Procedia PDF Downloads 4061101 Acute Effect of Street Dance Exercise on Blood Pressure, Heart Rate, Oxygen Saturation and Physical Fitness in Sedentary Subjects: A Pilot Study
Authors: Taweesak Janyacharoen, Lalita Pradubgool, Lalita Wongsorn, Pitchayapa Janyacharoen
Abstract:
Street dance is a form of exercise that is classified as aerobic and is very suitable for teenagers. Street dance is a dance that can create new dance moves all the time. It often incorporates elements from gymnastics and is accompanied by fast-paced music that emphasizes excitement and energy. It is a combination of high-intensity and low-intensity activities. Few studies have looked at the effects of street dance on cardiovascular endurance, and previous studies have long-term effects. However, no research study in Thailand has studied acute effects before. This study was to investigate the acute effect of street dance exercise on blood pressure, heart rate, oxygen saturation and physical fitness in sedentary subjects. Subjects were divided into 2 groups: the control group (n=15) received health education and rest, and the experimental group (n=15) received street dance exercise. Both groups will measure their blood pressure (BP), mean arterial pressure (MAP), heart rate (HR), oxygen saturation (SpO₂) and six-minute walk test (6MWT) before and after completing the program. The results found that both groups had significantly different HR when comparing before and after the program (p<0.05). MAP, HR and SpO₂ had significantly different (p<0.05) when compared between groups. This study concluded that the acute effect of street dance exercise could be increased in HR while the SpO₂ decreased. In clinical, it was seen that the values that were changed are still within the range that is considered normal. Therefore, street dance exercises can be used as one choice of alternative exercise.Keywords: street dance, exercise, blood pressure, heart rate, oxygen saturation
Procedia PDF Downloads 391100 Ultrasound Markers in Evaluation of Hernias
Authors: Aniruddha Kulkarni
Abstract:
In very few cases of external hernias we require imaging modalities as on most occasions clinical examination tests are good enough. Ultrasound will help in chronic abdominal or groin pain, equivocal clinical results & complicated hernias. Ultrasound is useful in assessment of cause of raised intrabdominal pressure. In certain cases will comment about etiology, complications and chronicicty of lesion. Screening of rest of abdominal organs too is important advantage being real time modality. Cost effectiveness, no radiation allows modality be used repeatedly in indicated cases. Sonography is better accepted by patients too as it is cost effective. Best advanced tissue harmonic equipment and increasing expertise making it popular. Ultrasound can define surgical anatomy, rent size, contents, etiological /recurrence factors in great detail and with authority hence accidental findings in a planned surgical procedure can be easily avoided. Clinical dynamic valselva and reducibility test can better documented by real time ultrasound study. In case of recurrence, Sonography will help in assessing the hernia details better as being dynamic real time investigation. Ultrasound signs in case of internal hernias are well comparable with CT findings.Keywords: laparoscopic repair, Hernia, CT findings, chronic pain
Procedia PDF Downloads 4971099 Exploration of RFID in Healthcare: A Data Mining Approach
Authors: Shilpa Balan
Abstract:
Radio Frequency Identification, also popularly known as RFID is used to automatically identify and track tags attached to items. This study focuses on the application of RFID in healthcare. The adoption of RFID in healthcare is a crucial technology to patient safety and inventory management. Data from RFID tags are used to identify the locations of patients and inventory in real time. Medical errors are thought to be a prominent cause of loss of life and injury. The major advantage of RFID application in healthcare industry is the reduction of medical errors. The healthcare industry has generated huge amounts of data. By discovering patterns and trends within the data, big data analytics can help improve patient care and lower healthcare costs. The number of increasing research publications leading to innovations in RFID applications shows the importance of this technology. This study explores the current state of research of RFID in healthcare using a text mining approach. No study has been performed yet on examining the current state of RFID research in healthcare using a data mining approach. In this study, related articles were collected on RFID from healthcare journal and news articles. Articles collected were from the year 2000 to 2015. Significant keywords on the topic of focus are identified and analyzed using open source data analytics software such as Rapid Miner. These analytical tools help extract pertinent information from massive volumes of data. It is seen that the main benefits of adopting RFID technology in healthcare include tracking medicines and equipment, upholding patient safety, and security improvement. The real-time tracking features of RFID allows for enhanced supply chain management. By productively using big data, healthcare organizations can gain significant benefits. Big data analytics in healthcare enables improved decisions by extracting insights from large volumes of data.Keywords: RFID, data mining, data analysis, healthcare
Procedia PDF Downloads 2331098 Formulation and Evaluation of Silver Nanoparticles as Drug Carrier for Cancer Therapy
Authors: Abdelhadi Adam Salih Denei
Abstract:
Silver nanoparticles (AgNPs) have been used in cancer therapy, and the area of nanomedicine has made unheard-of strides in recent years. A thorough summary of the development and assessment of AgNPs for their possible use in the fight against cancer is the goal of this review. Targeted delivery methods have been designed to optimise therapeutic efficacy by using AgNPs' distinct physicochemical features, such as their size, shape, and surface chemistry. Firstly, the study provides an overview of the several synthesis routes—both chemical and green—that are used to create AgNPs. Natural extracts and biomolecules are used in green synthesis techniques, which are becoming more and more popular since they are biocompatible and environmentally benign. It is next described how synthesis factors affect the physicochemical properties of AgNPs, emphasising how crucial it is to modify these parameters for particular therapeutic uses. An extensive analysis is conducted on the anticancer potential of AgNPs, emphasising their capacity to trigger apoptosis, impede angiogenesis, and alter cellular signalling pathways. The analysis also investigates the potential benefits of combining AgNPs with currently used cancer treatment techniques, including radiation and chemotherapy. AgNPs' safety profile for use in clinical settings is clarified by a comprehensive evaluation of their cytotoxicity and biocompatibility.Keywords: silver nanoparticles, cancer, nanocarrier system, targeted delivery
Procedia PDF Downloads 661097 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress
Authors: Kavitha Thamadharan, Nurazean Maarop
Abstract:
The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology
Procedia PDF Downloads 4591096 Species Distribution Model for Zanthoxylum Rhetsa Genus in Thailand
Authors: Yosiya Chanta, Jantrararuk Tovaranont
Abstract:
Species distribution model (SDMs) is one of the powerful tools used to create a suitability map used to predict and address ecology and conservation approaches. MaxEnt is a tool used among SDMs that is highly popular because it only uses presence data. Zanthoxylum rhetsa has more than 200 species distributed in the tropics. Most commonly found in cooler forest environments, there are 8-9 species found in Thailand. In northern Thailand, 3 varieties are commonly grown: Zanthoxylum myriacanthum, Zanthoxylum rhetsa and Zanthoxylum armatum. In the northern regions, these varieties are mainly used as a spice and as a cooking ingredient. MaxEnt has been used in this study to predict potential habitats for these Zanthoxylums in current and future times (2041and 2060). Suitable habitats are predicted using data from the EC-Earth3-Veg general circulation model with 19 climatic variables. The results indicate that the suitability of future habitats of Zanthoxylum rhetsa may expand into the lower northern part of Thailand. The habitat suitability map obtained from the MaxEnt tool shows that the Precipitation of Wettest Quarter (Bio16) is the most important climatic variable influencing the current and future spread of Zanthoxylum rhetsa.Keywords: MaxEnt, Zanthoxylum rhets, species distribution modelling, climate change
Procedia PDF Downloads 981095 The Shrinking of the Pink Wave and the Rise of the Right-Wing in Latin America
Authors: B. M. Moda, L. F. Secco
Abstract:
Through free and fair elections and others less democratic processes, Latin America has been gradually turning into a right-wing political region. In order to understand these recent changes, this paper aims to discuss the origin and the traits of the pink wave in the subcontinent, the reasons for its current rollback and future projections for left-wing in the region. The methodology used in this paper will be descriptive and analytical combined with secondary sources mainly from the social and political sciences fields. The canons of the Washington Consensus was implemented by the majority of the Latin American governments in the 80s and 90s under the social democratic and right-wing parties. The neoliberal agenda caused political, social and economic dissatisfaction bursting into a new political configuration for the region. It started in 1998 when Hugo Chávez took the office in Venezuela through the Fifth Republic Movement under the socialist flag. From there on, Latin America was swiped by the so-called ‘pink wave’, term adopted to define the rising of self-designated left-wing or center-left parties with a progressive agenda. After Venezuela, countries like Chile, Brazil, Argentina, Uruguay, Bolivia, Equator, Nicaragua, Paraguay, El Salvador and Peru got into the pink wave. The success of these governments was due a post-neoliberal agenda focused on cash transfers programs, increasing of public spending, and the straightening of national market. The discontinuation of the preference for the left-wing started in 2012 with the coup against Fernando Lugo in Paraguay. In 2015, the chavismo in Venezuela lost the majority of the legislative seats. In 2016, an impeachment removed the Brazilian president Dilma Rousself from office who was replaced by the center-right vice-president Michel Temer. In the same year, Mauricio Macri representing the right-wing party Proposta Republicana was elected in Argentina. In 2016 center-right and liberal, Pedro Pablo Kuczynski was elected in Peru. In 2017, Sebastián Piñera was elected in Chile through the center-right party Renovación Nacional. The pink wave current rollback points towards some findings that can be arranged in two fields. Economically, the 2008 financial crisis affected the majority of the Latin American countries and the left-wing economic policies along with the end of the raw materials boom and the subsequent shrinking of economic performance opened a flank for popular dissatisfaction. In Venezuela, the 2014 oil crisis reduced the revenues for the State in more than 50% dropping social spending, creating an inflationary spiral, and consequently loss of popular support. Politically, the death of Hugo Chavez in 2013 weakened the ‘socialism of the twenty first century’ ideal, which was followed by the death of Fidel Castro, the last bastion of communism in the subcontinent. In addition, several cases of corruption revealed during the pink wave governments made the traditional politics unpopular. These issues challenge the left-wing to develop a future agenda based on innovation of its economic program, improve its legal and political compliance practices, and to regroup its electoral forces amid the social movements that supported its ascension back in the early 2000s.Keywords: Latin America, political parties, left-wing, right-wing, pink wave
Procedia PDF Downloads 240