Search results for: gathering
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 430

Search results for: gathering

310 Cost Analysis of Hybrid Wind Energy Generating System Considering CO2 Emissions

Authors: M. A. Badr, M. N. El Kordy, A. N. Mohib, M. M. Ibrahim

Abstract:

The basic objective of the research is to study the effect of hybrid wind energy on the cost of generated electricity considering the cost of reduction CO2 emissions. The system consists of small wind turbine(s), storage battery bank and a diesel generator (W/D/B). Using an optimization software package, different system configurations are investigated to reach optimum configuration based on the net present cost (NPC) and cost of energy (COE) as economic optimization criteria. The cost of avoided CO2 is taken into consideration. The system is intended to supply the electrical load of a small community (gathering six families) in a remote Egyptian area. The investigated system is not connected to the electricity grid and may replace an existing conventional diesel powered electric supply system to reduce fuel consumption and CO2 emissions. The simulation results showed that W/D energy system is more economic than diesel alone. The estimated COE is 0.308$/kWh and extracting the cost of avoided CO2, the COE reached 0.226 $/kWh which is an external benefit of wind turbine, as there are no pollutant emissions through operational phase.

Keywords: hybrid wind turbine systems, remote areas electrification, simulation of hybrid energy systems, techno-economic study

Procedia PDF Downloads 379
309 Maintaining the Formal Type of West Java's Heritage Language with Sundanese Language Lesson in Senior High School

Authors: Dinda N. Lestari

Abstract:

Sundanese language is one of heritage language in Indonesia that must be maintained especially the formal type of it because teenagers nowadays do not speak Sundanese language formally in their daily lives. To maintain it, Cultural and Education Ministry of Indonesia has input Sundanese language lesson at senior high school in West Java area. The aim of this study was to observe whether the existence of Sundanese language lesson in senior high school in the big town of Karawang, West Java - Indonesia give the contribution to the formal type of Sundanese language maintenance or not. For gathering the data, the researcher interviewed the senior high school students who have learned Sundanese language to observe their acquisition of it. As a result of the interview, the data was presented in qualitative research by using the interviewing method. Then, the finding indicated that the existence of Sundanese language in Senior High School also the educational program which is related to it, for instance, Kemis Nyunda seemed to do not effective enough in maintaining the formal type of Sundanese language. Therefore, West Java government must revise the learning strategy of it, including the role of the Sundanese language teacher.

Keywords: heritage language, language maintenance and shift, senior high school, Sundanese language, Sundanese language lesson

Procedia PDF Downloads 127
308 Waste Management and Education: The Case of York, UK

Authors: Ruijie Fan, Hao Xu

Abstract:

Due to the increasing demand for resources, solid waste disposal is becoming an increasingly important issue to be addressed. Solid waste is not only hazardous to human health but also has a negative impact on the environment. The main sources of solid waste are metals, glass, food, plastics, paper, and electrical waste. Different types of waste may require different treatments. The UK currently lags behind other countries, such as Japan and Germany, in terms of waste management. Although the UK is catching up through various incentives, waste management education in the UK still faces challenges. Education requires a lot of work before the UK can achieve a circular economy. This paper first presents the latest information on the five main types of solid waste in the UK today. It delves into the current state of waste paper management in the UK, in addition to gathering information from the literature on the current state of waste management education in the UK as a whole. Potential barriers to the disposal of each waste type in the UK are identified, along with potential barriers to education in the UK. This study was based on a pragmatic philosophy to find possible solutions for these barriers, including questionnaires to conduct an in-depth investigation. In addition, the questionnaire analysis reveals a correlation between educational attainment and individual waste management behaviour and attitudes. This research guides inspiration on the current problems of waste management in the UK.

Keywords: circular economy, education, solid waste, waste management

Procedia PDF Downloads 154
307 Human Kinetics Education and the Computer Operations, Effects and Merits

Authors: Kehinde Adeyeye Adelabu

Abstract:

Computer applications has completely revolutionized the way of life of people which does not exclude the field of sport education. There are computer technologies which help to enhance teaching in every field of education. Invention of computers has done great to the field of education. This study was therefore carried out to examine the effects and merits of computer operations in Human Kinetics Education and Sports. The study was able to identify the component of computer, uses of computer in Human Kinetics education (sports), computer applications in some branches of human kinetics education. A qualitative research method was employed by the author in gathering experts’ views and used to analyze the effects and merits of computer applications in the field of human kinetics education. No experiment was performed in the cause of carrying out the study. The source of information for the study was text-books, journal, articles, past project reports, internet i.e. Google search engine. Computer has significantly helped to improve Education (Human Kinetic), it has complemented the basic physical fitness testing and gave a more scientific basis to the testing. The use of the software and packages has made cost projections, database applications, inventory control, management of events, word processing, electronic mailing and record keeping easier than the pasts.

Keywords: application, computer operation, education, human kinetics

Procedia PDF Downloads 156
306 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 256
305 Factors Motivating Experienced Secondary Teachers to Remain in the Teaching Profession

Authors: Joselito Castro Gutierrez, Herbert Orteza, Jervie Boligon, Kenneth Esteves, Edrick Kevin Ferrer, Mark Kevin Torres, Patrick Vergara

Abstract:

Teaching is a noble profession that involves an effective imparting of holistic learning. Consequently, it requires a driving force called motivation. This research aims to determine the motivating factors, problems encountered, solutions made by experienced secondary school teachers to remain in the teaching profession. A mixed unstructured/structured questionnaire was used for gathering data among public secondary school teachers. The researchers have arrived to a conclusion that the dominant motivating factors of teachers to stay in the profession are altruism, extrinsic factors, and self-efficacy. Meanwhile, the prevalent problems these experienced secondary teachers experienced are mutual dilemma, work overload, and personal issues. Teachers have varied methods on solving the problem which are: a) Direct Solution; b) Indirect Solution; and c) Pseudo-Solutions. Lastly, the factors, problems, and solutions, have influential effects on how long a teacher would sustain in teaching which would manifest as positive, negative and neutral effects.

Keywords: motivation, common problems of teachers, strategies in solving problems, teaching profession

Procedia PDF Downloads 415
304 Genetic Association of SIX6 Gene with Pathogenesis of Glaucoma

Authors: Riffat Iqbal, Sidra Ihsan, Andleeb Batool, Maryam Mukhtar

Abstract:

Glaucoma is a gathering of optic neuropathies described by dynamic degeneration of retinal ganglionic cells. It is clinically and innately heterogenous illness containing a couple of particular forms each with various causes and severities. Primary open-angle glaucoma (POAG) is the most generally perceived kind of glaucoma. This study investigated the genetic association of single nucleotide polymorphisms (SNPs; rs10483727 and rs33912345) at the SIX1/SIX6 locus with primary open-angle glaucoma (POAG) in the Pakistani population. The SIX6 gene plays an important role in ocular development and has been associated with morphology of the optic nerve. A total of 100 patients clinically diagnosed with glaucoma and 100 control individuals of age over 40 were enrolled in the study. Genomic DNA was extracted by organic extraction method. The SNP genotyping was done by (i) PCR based restriction fragment length polymorphism (RFLP) and sequencing method. Significant genetic associations were observed for rs10483727 (risk allele T) and rs33912345 (risk allele C) with POAG. Hence, it was concluded that Six6 gene is genetically associated with pathogenesis of Glaucoma in Pakistan.

Keywords: genotyping, Pakistani population, primary open-angle glaucoma, SIX6 gene

Procedia PDF Downloads 161
303 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 432
302 Analyse of User Interface Design in Mobile Teaching Apps

Authors: Asma Ashoul

Abstract:

Nowadays, smartphones are playing a major role in our lives, by communicating with family, friends or using them to learn different things in life. Using smartphones to learn and teach today is something common to see in places like schools or colleges. Therefore, thinking about developing an app that teaches Arabic language may help some categories in society to learn a second language. For example, kids under the age of five or older would learn fast by using smartphones. The problem is based on the Arabic language, which is most like to be not used anymore. The developer assumed to develop an app that would help the younger generation on their learning the Arabic language. A research was completed about user interface design to help the developer choose appropriate layouts and designs. Developing the artefact contained different stages. First, analyzing the requirements with the client, which is needed to be developed. Secondly, designing the user interface design based on the literature review. Thirdly, developing and testing the application after it is completed contacting all the tools that have been used. Lastly, evaluation and future recommendation, which contained the overall view about the application followed by the client’s feedback. Gathering the requirements after having client meetings based on the interface design. The project was done following an agile development methodology. Therefore, this methodology helped the developer to manage to finish the work on time.

Keywords: developer, application, interface design, layout, Agile, client

Procedia PDF Downloads 92
301 What It Means to Be an Internally Displaced Person: The Story of the Abu-Shouk Camp

Authors: Mawa Abdelbagi Mohamed Mohamed, Eslam Alaa Elbahlawan

Abstract:

This study examines the complex social fabric woven within the Abu-Shouk internally displaced persons camp, shaped by the chaotic waves of armed conflict and displacement in the early 2000s. The impact of war, economic constraints, and altered living conditions have fundamentally reshaped families and traditions, presenting both challenges and opportunities. In this exploration, we navigate the resilience of a community thrust into adversity, spotlighting how it emerged as essential in rebuilding social bonds. Exchanges of culture, intertribal marriages, and communal gathering spots have become essential tools in fostering cohesion and understanding amidst diversity. However, this resilience has been tested by the intrusion of politics, leading to shifts in governance structures and community dynamics. As we conclude, it is evident that while the scars of displacement and political disruptions are present, the community's enduring spirit and adaptability shine through. Empowering the community to rebuild their social tapestry, bridging the gaps, and restoring unity amid evolving political realities remain the beacon guiding their journey toward a shared, purposeful future.

Keywords: darfur, internally displaced person, social fabric, conflict

Procedia PDF Downloads 36
300 Vegetative Materia Medica for the Women Illness in mss2999 Kitab Tibb: A Modern Medical Interpretation of a Malay Medical Manuscript

Authors: Wan Aminah Hasbullah

Abstract:

The knowledge of medicine in Malay society stemmed out from the need to remedy disease process. Such knowledge came from observations by looking at the signs on the plants which signify it uses, the doctrine of signature, and also observing what kind of animal and its parts that can be used to treat the disease. Prayers (jampi and doa’) play a very important role in the therapeutic processes addressing the ethereal part of the body. In Malay medicine, prayers were said in the heart of the Malay bomoh (medicine man) when they are first approaching the diseased person, seeking the help of Allah in accurately directing his mind into making the right diagnosis and subsequently the right choice of treatment. In the making of medicine, similar rituals were religiously followed, starting from gathering the materia medica to the final concoction of the medicine. Thus, all the materia medica and the prayers in Malay medicine were gathered and documented in the medical manuscript known as MSS 2999 Kitab Tibb. For this study, a collection of vegetative materia medica which is specialized for the women illness from this manuscript will be gathered and analysed. A medical and cultural interpretation will be highlighted to see the relationship between efficacy in traditional Malay medicine as practiced in the past and the recent practice of the modern medicine.

Keywords: vegetative, materia medica, woman illness, Malay medical manuscript

Procedia PDF Downloads 225
299 Requirement Analysis for Emergency Management Software

Authors: Tomáš Ludík, Jiří Barta, Sabina Chytilová, Josef Navrátil

Abstract:

Emergency management is a discipline of dealing with and avoiding risks. Appropriate emergency management software allows better management of these risks and has a direct influence on reducing potential negative impacts. Although there are several emergency management software products in the Czech Republic, they cover user requirements from the emergency management field only partially. Therefore, the paper focuses on the issues of requirement analysis within development of emergency management software. Analysis of the current state describes the basic features and properties of user requirements for software development as well as basic methods and approaches for gathering these requirements. Then, the paper presents more specific mechanisms for requirement analysis based on chosen software development approach: structured, object-oriented or agile. Based on these experiences it is designed new methodology for requirement analysis. Methodology describes how to map user requirements comprehensively in the field of emergency management and thus reduce misunderstanding between software analyst and emergency manager. Proposed methodology was consulted with department of fire brigade and also has been applied in the requirements analysis for their current emergency management software. The proposed methodology has general character and can be used also in other specific areas during requirement analysis.

Keywords: emergency software, methodology, requirement analysis, stakeholders, use case diagram, user stories

Procedia PDF Downloads 515
298 Entrepreneurial Practice and Corruption in Tourism Sector: A Study of Entrepreneurial Orientation and Organizational Corruption in Nepali Star Hotels

Authors: Prabin Raj Gautam

Abstract:

Entrepreneurship in tourism sectors, particularly hotel entrepreneurship has contributed to Nepalese Gross Domestic Production (GDP). The tourist standard and star hotels in developing countries have not only been generating revenues but also providing international hospitality to the guest in the local areas. For doing so, these hotel enterprises must need to implement different business strategies to enhance and maintain their international business benchmark. The Entrepreneurial Orientation (EO) is core for making business strategies. Meanwhile, the corruption is labeled as negative factor for economic development. This paper presents the relationship between EO of Nepalese star hotels and organizational corruption. The study employed questionnaire survey as data collection tool under the quantitative methodology. Five hypotheses are developed and tested. After gathering the data form 216 questionnaire distributed to CEOs/Managers of the sample hotels, the findings show that out of five dimensions of EO, only autonomy, pro-activeness, and innovativeness are not significant to organizational corruption; however, risk-taking and competitive aggressiveness are found significant contributor. The descriptive statistics and structural equation modeling are employed to describe the data and fit the model.

Keywords: entrepreneurship, entrepreneurial orientation, organizational corruption, dimensions

Procedia PDF Downloads 296
297 Determinants for Transportation Services in Addis Ababa City

Authors: Yared Yitagesu Tilahun

Abstract:

Every nation, developed or developing, relies on transportation, but Addis Abeba City's transportation service is impacted by a number of variables. The current study's objectives are to determine the factors that influence transportation and gauge consumer satisfaction with such services in Addis Abeba. Customers and employees of Addis Ababa's transportation service authority would be the study's target group. 40 workers of the authority would be counted as part of the 310 000 clients that make up the population of the searcher service. Using a straightforward random selection technique, the researcher only chose 99 customers and 28 staff from this enormous group due to the considerable cost and time involved. Data gathering and analysis options included both quantitative and qualitative approaches. The results of this poll show that young people between the ages of 18 and 25 make up the majority of respondents (51.6%). The majority of employees and customers indicated that they are not satisfied with Addis Ababa's overall transportation system. The Addis Abeba Transportation Authority prioritizes client happiness by providing fair service. The company should have a system in place for managing time, resources, and people effectively. It should also provide employees the opportunity to contribute to client handling policies.

Keywords: customer satisfaction, transportation, services, determinants

Procedia PDF Downloads 56
296 Impact of Endogenous Risk Factors on Risk Cost in KSA PPP Projects

Authors: Saleh Alzahrani, Halim Boussabaine

Abstract:

The Public Private Partnership (PPP) contracts are produced taking into account the reason that the configuration, development, operation, and financing of an open undertaking is to be recompensed to a private gathering inside a solitary contractual structure. PPP venture dangers are ordinarily connected with the improvement and development of another resource and in addition its operation for a considerable length of time. Without a doubt, the most genuine outcomes of dangers amid the development period are value and time overwhelms. These occasions are amongst the most extensively utilized situations as a part of worth for cash investigation dangers. The wellsprings of danger change over the life cycle of a PPP venture. In customary acquirement, the general population segment ordinarily needs to cover all value trouble from these dangers. At any rate there is bounty confirmation to recommend that cost pain is a standard in a percentage of the tasks that are conveyed under customary obtainment. This paper means to research the effect of endogenous dangers on expense overwhelm in KSA PPP ventures. The paper displays a brief writing survey on PPP danger evaluating systems, and after that presents an affiliation model between danger occasions and expense invade in KSA. The paper finishes up with considerations for future examination.

Keywords: PPP, risk pricing, impact of risk, Endogenous risks

Procedia PDF Downloads 430
295 Sustainability of High-Rise Affordable Housing: Critical Issues in Applying Green Building Rating Tools

Authors: Poh Im. Lim, Hillary Yee Qin. Tan

Abstract:

Nowadays, going green has become a trend, and being emphasized in the construction industry. In Malaysia, there are several green rating tools available in the industry and among these, GBI and GreenRE are considered as the most common tools adopted for residential buildings. However, being green is not equal to or making something sustainable. Being sustainable is to take economic, environmental and social aspects into consideration. This is particularly essential in the affordable housing sector as the end-users belong to lower-income and places importance on many socio-economic needs beyond the environmental criteria. This paper discusses the arguments in proposing a sustainability framework that is tailor-made for high-rise affordable housing. In-depth interviews and observation mapping methods were used in gathering inputs from the end-users, non-governmental organisations (NGOs) as well as the professionals. ‘Bottom-up’ approach was applied in this research to show the significance of participation from the local community in the decision-making process. The proposed sustainability framework illustrates the discrepancies between user priorities and what the industry is providing. The outcome of this research suggests that integrating sustainability into high-rise affordable housing is achievable and beneficial to the industry, society, and the environment.

Keywords: green building rating tools, high-rise affordable housing, sustainability framework, sustainable development

Procedia PDF Downloads 113
294 Factors Affecting Transportation Services in Addis Ababa City

Authors: Yared Yitagesu Tilahun

Abstract:

Every nation, developed or developing, relies on transportation, but Addis Abeba City's transportation service is impacted by a number of variables. The current study's objectives are to determine the factors that influence transportation and gauge consumer satisfaction with such services in Addis Abeba. Customers and employees of Addis Ababa's transportation service authority would be the study's target group. 40 workers of the authority would be counted as part of the 310 000 clients that make up the population of the searcher service. Using a straightforward random selection technique, the researcher only chose 99 customers and 28 staff from this enormous group due to the considerable cost and time involved. Data gathering and analysis options included both quantitative and qualitative approaches. The results of this poll show that young people between the ages of 18 and 25 make up the majority of respondents (51.6%). The majority of employees and customers indicated that they are not satisfied with Addis Ababa's overall transportation system. The Addis Abeba Transportation Authority prioritizes client happiness by providing fair service. The company should have a system in place for managing time, resources, and people effectively. It should also provide employees the opportunity to contribute to client handling policies.

Keywords: transportation, customer satisfaction, services, determinants

Procedia PDF Downloads 91
293 Factors Effecting the Success and Failure of Social Enterprise in Thailand

Authors: Jatuporn Juyjingam, Pitak Siriwong

Abstract:

This paper presents a study of factors effecting the success and failure of social enterprise in Thailand identifying communication as one of the criteria for measuring the social impact of social enterprise. The study focused on the communication driver of the SCALERS model. The research examines how communication is viewed in Thailand social enterprise. The research aims to determine how selected social enterprise uses communication in their operations. More specifically, the study aims to 1) describe the profile of social enterprise in Thailand, 2) identify the different roles of communication in the operation of social enterprise in Thailand, 3) determine Thailand social enterprise concept of communication. The study made use of the case study and cross case study research designs. For the profiling of the social enterprises, the case study was used. The researchers made use of the cross-case research design in identifying trends across the ten social enterprises and in determining the social entrepreneurs’ concept of communication. Key informant interviews were conducted with the heads or representatives of selected social enterprises, a three-part interview schedule was used to facilitate data gathering. The three parts included are 1) Profile of social enterprise in Thailand 2) How social enterprises apply communication in their operations 3) What is the key success in using communication among social enterprise in Thailand. This study is an exploratory research.

Keywords: communication, social entrepreneurship, social enterprise, sustainability development

Procedia PDF Downloads 474
292 A Review of Serious Games Characteristics: Common and Specific Aspects

Authors: B. Ben Amara, H. Mhiri Sellami

Abstract:

Serious games adoption is increasing in multiple fields, including health, education, and business. In the same way, many research studied serious games (SGs) for various purposes such as classification, positive impacts, or learning outcomes. Although most of these research examine SG characteristics (SGCs) for conducting their studies, to author’s best knowledge, there is no consensus about features neither in number not in the description. In this paper, we conduct a literature review to collect essential game attributes regardless of the application areas and the study objectives. Firstly, we aimed to define Common SGCs (CSGCs) that characterize the game aspect, by gathering features having the same meanings. Secondly, we tried to identify specific features related to the application area or to the study purpose as a serious aspect. The findings suggest that any type of SG can be defined by a number of CSGCs depicting the gaming side, such as adaptability and rules. In addition, we outlined a number of specific SGCs describing the 'serious' aspect, including specific needs of the domain and indented outcomes. In conclusion, our review showed that it is possible to bridge the research gap due to the lack of consensus by using CSGCs. Moreover, these features facilitate the design and development of successful serious games in any domain and provide a foundation for further research in this area.

Keywords: serious game characteristics, serious games common aspects, serious games features, serious games outcomes

Procedia PDF Downloads 108
291 One-Shot Text Classification with Multilingual-BERT

Authors: Hsin-Yang Wang, K. M. A. Salam, Ying-Jia Lin, Daniel Tan, Tzu-Hsuan Chou, Hung-Yu Kao

Abstract:

Detecting user intent from natural language expression has a wide variety of use cases in different natural language processing applications. Recently few-shot training has a spike of usage on commercial domains. Due to the lack of significant sample features, the downstream task performance has been limited or leads to an unstable result across different domains. As a state-of-the-art method, the pre-trained BERT model gathering the sentence-level information from a large text corpus shows improvement on several NLP benchmarks. In this research, we are proposing a method to change multi-class classification tasks into binary classification tasks, then use the confidence score to rank the results. As a language model, BERT performs well on sequence data. In our experiment, we change the objective from predicting labels into finding the relations between words in sequence data. Our proposed method achieved 71.0% accuracy in the internal intent detection dataset and 63.9% accuracy in the HuffPost dataset. Acknowledgment: This work was supported by NCKU-B109-K003, which is the collaboration between National Cheng Kung University, Taiwan, and SoftBank Corp., Tokyo.

Keywords: OSML, BERT, text classification, one shot

Procedia PDF Downloads 81
290 Computer Based Model for Collaborative Research as a Panacea for National Development in Third World Countries

Authors: M. A. Rahman, A. O. Enikuomehin

Abstract:

Sharing commitment to reach a common goal in research by harnessing available resources from two or more parties can simply be referred to as collaborative research. Asides from avoiding duplication of research, the benefits often accrued from such research alliances include time economy as well as expenses reduction in completing such studies. Likewise, it provides an avenue to produce a wider horizon of scientific knowledge sequel to gathering of skills, knowledge and resources. In institutions of higher learning and research institutes, it often gives scholars an opportunity to strengthen the teaching and research capacity of their various institutions. Between industries and institutions, collaborative research breeds promising relationship that could be geared towards addressing different research problems such as producing and enhancing industrial-based products and services, including technological transfer. For Nigeria to take advantage of this collaboration, different issues like licensing of technology, intellectual property right, confidentiality, and funding among others, which could arise during this collaborative research programme, are identified in this paper. An important tool required to achieve this height in developing economy is the use of appropriate computer model. The paper highlights the costs of the collaborations and likewise stresses the need for evaluating the effectiveness and efficiency of such collaborative research activities and proposes an appropriate computer model to assist in this regard.

Keywords: collaborative research, developing country, computerization, model

Procedia PDF Downloads 312
289 Uncertainty and Optimization Analysis Using PETREL RE

Authors: Ankur Sachan

Abstract:

The ability to make quick yet intelligent and value-added decisions to develop new fields has always been of great significance. In situations where the capital expenses and subsurface risk are high, carefully analyzing the inherent uncertainties in the reservoir and how they impact the predicted hydrocarbon accumulation and production becomes a daunting task. The problem is compounded in offshore environments, especially in the presence of heavy oils and disconnected sands where the margin for error is small. Uncertainty refers to the degree to which the data set may be in error or stray from the predicted values. To understand and quantify the uncertainties in reservoir model is important when estimating the reserves. Uncertainty parameters can be geophysical, geological, petrophysical etc. Identification of these parameters is necessary to carry out the uncertainty analysis. With so many uncertainties working at different scales, it becomes essential to have a consistent and efficient way of incorporating them into our analysis. Ranking the uncertainties based on their impact on reserves helps to prioritize/ guide future data gathering and uncertainty reduction efforts. Assigning probabilistic ranges to key uncertainties also enables the computation of probabilistic reserves. With this in mind, this paper, with the help the uncertainty and optimization process in petrel RE shows how the most influential uncertainties can be determined efficiently and how much impact so they have on the reservoir model thus helping in determining a cost effective and accurate model of the reservoir.

Keywords: uncertainty, reservoir model, parameters, optimization analysis

Procedia PDF Downloads 580
288 Iranian Sexual Health Needs in Viewpoint of Policy Makers: A Qualitative Study

Authors: Mahnaz Motamedi, Mohammad Shahbazi, Shahrzad Rahimi-Naghani, Mehrdad Salehi

Abstract:

Introduction: Identifying sexual health needs, developing appropriate plans, and delivering services to meet those needs is an essential component of health programs for women, men, and children all over the world, especially in poor countries. Main Subject: The aim of this study was to describe the needs of sexual health from the viewpoint of health policymakers in Iran. Methods: A qualitative study using thematic content analysis was designed and conducted. Data gathering was conducted through semi-structured, in-depth interviews with 25 key informants within the healthcare system. Key informants were selected through both purposive and snowball sampling. MAXQUDA software (version 10) was used to facilitate transcription, classification of codes, and conversion of data into meaningful units, by the process of reduction and compression. Results: The analysis of narratives and information categorized sexual health needs into five categories: culturalization of sexual health discourse, sexual health care services, sexual health educational needs, sexual health research needs, and organizational needs. Conclusion: Identifying and explaining sexual health needs is an important factor in determining the priority of sexual health programs and identification of barriers to meet these needs. This can help other policymakers and health planners to develop appropriate programs to promote sexual and reproductive health.

Keywords: sexual health, sexual health needs, policy makers, health system, qualitative study

Procedia PDF Downloads 200
287 Prospects for an Integrated Public Transport System (IPTS) in Harare: An Institutional and Policy Analysis

Authors: Abdon O. Makore

Abstract:

The study analyses policy and institutional implications with regard to the successful implementation of IPTS in Harare. IPTS has widely been recommended as a rich solution to chaotic public transport operations, yet studies to determine the suitability or applicability of this concept have not been done in light of the existing transport institutions and policy framework in Harare. A predominantly qualitative research approach was employed backed by a deep scrutiny of the NTP and other subsidiary legislations and plans in place so as to ascertain the views and perceptions of various stakeholders regarding the proposed concept. As such, key informant interviews, unstructured interviews, and questionnaires were vital tools in gathering data and these were effectively buttressed by observations, photography, and documentary analysis. The study revealed from a policy perspective that there are high prospects for the implementation of IPTS in Harare as the existing NTP, subsidiary legislations and plans do have provisions for the concept backed by keen interest of all responsible urban public transport authorities. However, there is lack of coherent and systematic approach among other responsible institutions, as such recommendations formulated advocated for institutional integration and strong political will for the ultimate success of the concept.

Keywords: integrated public transport system, policy, legislation, institutions

Procedia PDF Downloads 361
286 Analysis of Noodle Production Process at Yan Hu Food Manufacturing: Basis for Production Improvement

Authors: Rhadinia Tayag-Relanes, Felina C. Young

Abstract:

This study was conducted to analyze the noodle production process at Yan Hu Food Manufacturing for the basis of production improvement. The study utilized the PDCA approach and record review in the gathering of data for the calendar year 2019 from August to October data of the noodle products miki, canton, and misua. Causal-comparative research was used in this study; it attempts to establish cause-effect relationships among the variables such as descriptive statistics and correlation, both were used to compute the data gathered. The study found that miki, canton, and misua production has different cycle time sets for each production and has different production outputs in every set of its production process and a different number of wastages. The company has not yet established its allowable rejection rate/ wastage; instead, this paper used a 1% wastage limit. The researcher recommended the following: machines used for each process of the noodle product must be consistently maintained and monitored; an assessment of all the production operators by checking their performance statistically based on the output and the machine performance; a root cause analysis for finding the solution must be conducted; and an improvement on the recording system of the input and output of the production process of noodle product should be established to eliminate the poor recording of data.

Keywords: production, continuous improvement, process, operations, PDCA

Procedia PDF Downloads 37
285 Valuation of Entrepreneurship Education (EE) Curriculum and Self-Employment Generation among Graduates of Tertiary Institutions in Edo State, Nigeria

Authors: Angela Obose Oriazowanlan

Abstract:

Despite the introduction of Entrepreneurship education into the Nigerian University curriculum to prepare graduates for self-employment roles in order to abate employment challenges, their unemployment rate still soars high. The study, therefore, examined the relevance of the curriculum contents and its delivery mechanism to equip graduates with appropriate entrepreneurial skills prior to graduation. Four research questions and two hypotheses guided the study. The survey research design was adopted for the study. An infinite population of graduates of a period of five years with 200 sample representatives using the simple random sampling technique was adopted. A 45-item structured questionnaire was used for data gathering. The gathered data thereof was anlysed using the descriptive statistics of mean and standard deviation, while the formulated hypotheses were tested with Z-score at 0.5 level of significance. The findings revealed, among others, that graduates acquisition of appropriate entrepreneurial skills for self-employment generation is low due to curriculum deficiencies, insufficient time allotment, and the delivery mechanism. It was recommended, among others, that the curriculum should be reviewed to improve its relevancy and that sufficient time should be allotted to enable adequate teaching and learning process.

Keywords: evaluation of entrepreneurship education (EE) curriculum, self-employment generation, graduates of tertiary institutions, Edo state, Nigeria

Procedia PDF Downloads 72
284 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 332
283 Assessment of the Impact of CSR on the Business Performance of Australian Banks

Authors: Montoya C.A., Erina J., Erina I.

Abstract:

The purpose of this research is to assess the performance and impact of CSR on business in the banking sector in Australia by applying the financial indicators of 20 ASX banks for the period from 2016-2017. The authors carried out CSR assessment in several stages of research: 1) gathering the nonfinancial and financial indicators of 20 ASX listed banks (available were only 16) from the annual reports of Australian banks for 2016 and 2017; 2) calculation of bank performance indicators using such financial indicators as return on assets (ROA), return on equity (ROE), efficiency ratio and net interest margin; 3) analysis of financial data using cross-sectional regression and answers to the research questions. Based on the obtained research results, the authors obtained answers to the initially raised research questions and came to a conclusion that Q1 - Insignificant positive coefficient result - slight positive relationship between CSR disclosure and business performance 2016; Q2 - Insignificant negative coefficient result - slight negative relationship between CSR disclosure and business performance 2017; Q3 - Insignificant positive coefficient result - slight positive relationship between CSR disclosure and business performance.

Keywords: Australia, banks, business performance, CSR

Procedia PDF Downloads 54
282 CVOIP-FRU: Comprehensive VoIP Forensics Report Utility

Authors: Alejandro Villegas, Cihan Varol

Abstract:

Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU.

Keywords: betamax, digital forensics, report utility, VoIP, VoIPBuster, VoIPWise

Procedia PDF Downloads 273
281 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 376