Search results for: additional information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12508

Search results for: additional information

11038 The Architecture, Engineering and Construction(AEC)New Paradigm Shift: Building Information Modelling Trend in the United Arab Emirates

Authors: Salem B. Abdalla

Abstract:

This study investigated the current Building Information Modelling (BIM) trends and practices in the UAE, particularly to shed light on a recently circulated Dubai BIM mandate. Two sets of surveys were mailed to the AEC industry and the corresponding academic sector within the UAE to collect up-to-date data on BIM awareness and utilization. The surveys showed startling results concerning the academic sector in the UAE where almost 70% of respondents were not aware of the BIM mandate. Among the rest, even when aware, the majority of mechanical and electrical engineering schools felt that BIM is not pertinent to their discipline. Therefore, the response to offering BIM in their curriculum was substantially low (35%). On the other hand, the industrial survey identified a large majority (76.5%) of the AEC industry in the UAE are using BIM. The results clearly indicate that the academia should include BIM in their curriculum to produce qualified graduates to support the market. However, the academia is also faced with several obstacles to implement BIM in their curriculum, where the main pretext is that there is “no room for new courses in existing curriculum”.

Keywords: building information modeling, BIM adoption, UAE BIM industry survey, UAE BIM academia survey, Dubai BIM mandate, UK BIM mandate, BIM education, architecture education, engineering schools, BIM implementation, BIM curriculum

Procedia PDF Downloads 397
11037 An Authentication Protocol for Quantum Enabled Mobile Devices

Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel

Abstract:

The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.

Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party

Procedia PDF Downloads 161
11036 Positive Affect, Negative Affect, Organizational and Motivational Factor on the Acceptance of Big Data Technologies

Authors: Sook Ching Yee, Angela Siew Hoong Lee

Abstract:

Big data technologies have become a trend to exploit business opportunities and provide valuable business insights through the analysis of big data. However, there are still many organizations that have yet to adopt big data technologies especially small and medium organizations (SME). This study uses the technology acceptance model (TAM) to look into several constructs in the TAM and other additional constructs which are positive affect, negative affect, organizational factor and motivational factor. The conceptual model proposed in the study will be tested on the relationship and influence of positive affect, negative affect, organizational factor and motivational factor towards the intention to use big data technologies to produce an outcome. Empirical research is used in this study by conducting a survey to collect data.

Keywords: big data technologies, motivational factor, negative affect, organizational factor, positive affect, technology acceptance model (TAM)

Procedia PDF Downloads 347
11035 Information Technology Governance Implementation and Its Determinants in the Egyptian Market

Authors: Nariman O. Kandil, Ehab K. Abou-Elkheir, Amr M. Kotb

Abstract:

Effective IT governance guarantees the strategic alignment of IT and business goals, risk mitigation control, and better IT and business performance. This study seeks to examine empirically the extent of IT governance implementation within the firms listed on the Egyptian stock exchange (EGX30) and its determinants. Accordingly, 18 semi-structured interviews face to face, phone, and video-conferencing interviews using various tools (e.g., WebEx, Zoom, and Microsoft Teams) were undertaken at the interviewees’ offices in Egypt between the end of November 2019 and the end of August 2020. Results suggest that there are variances in the extent of IT Governance (ITG) implementation within the firms listed on the Egyptian stock exchange (EGX30), mainly caused by the industry type and internal and external triggers. The results also suggest that the organization size, the type of auditor, the criticality of the industry, the effective processes & KPIs, and the information intensity expertise of the CIO have a significant impact on IT governance implementation within the firms.

Keywords: effective IT governance, Egyptian market, information security, risk controls

Procedia PDF Downloads 150
11034 Collision Theory Based Sentiment Detection Using Discourse Analysis in Hadoop

Authors: Anuta Mukherjee, Saswati Mukherjee

Abstract:

Data is growing everyday. Social networking sites such as Twitter are becoming an integral part of our daily lives, contributing a large increase in the growth of data. It is a rich source especially for sentiment detection or mining since people often express honest opinion through tweets. However, although sentiment analysis is a well-researched topic in text, this analysis using Twitter data poses additional challenges since these are unstructured data with abbreviations and without a strict grammatical correctness. We have employed collision theory to achieve sentiment analysis in Twitter data. We have also incorporated discourse analysis in the collision theory based model to detect accurate sentiment from tweets. We have also used the retweet field to assign weights to certain tweets and obtained the overall weightage of a topic provided in the form of a query. Hadoop has been exploited for speed. Our experiments show effective results.

Keywords: sentiment analysis, twitter, collision theory, discourse analysis

Procedia PDF Downloads 518
11033 The Relationship between Market Orientation, Human Resource Management, Adoption of Information Communication Technology, Performance of Small and Medium Enterprises and Mediating Cash Management

Authors: Azizah Hashim, Rohana Ngah

Abstract:

Transformation of Economic Development is aimed to transform Malaysia to become a high-income developed nation with a knowledge-based economy by 2020. To achieve this national agenda, the country needs to further strengthen its economic development, growth and well-being. Therefore, this study aspires to examine the relationship between market orientation, human resource management and adoption of information communication technology and SMEs performance and cash management as a mediator. This study will employ quantitative approaches. Questionnaires will be distributed to managers and owners in service sectors. The data collected will be analyzed using SPSS and Structural Equation Modelling. Resource Based Theory (RBT) adopts as an integral part of management literature that explains the performance of organizations through building resources and implement of their strategies.

Keywords: small medium enterprises (SMEs), market orientation, human resource management, adoption of information communication technology

Procedia PDF Downloads 268
11032 Methodological Support for Teacher Training in English Language

Authors: Comfort Aina

Abstract:

Modern English, as we all know it to be a foreign language to many, will require training and re-training on the path of the teacher and learners alike. As a teacher, you cannot give that which you do not have. Teachers, many of whom are non-native speakers, are required to be competent in solving problems occurring in the teaching and learning processes. They should be conscious of up to date information about new approaches, methods, techniques as well as they should be capable in the use of information and communication technology (ICT) and, of course, should work on the improvement of their language components and competence. For teachers to be successful in these goals, they need to be encouraged and motivated. So, for EFL teachers to be successful, they are enrolled to in-service teacher training, ICT training, some of the training they undergo and the benefits accrued to it will be the focus of the paper.

Keywords: training, management, method, english language, EFL teachers

Procedia PDF Downloads 88
11031 Essential Oil Contents of Endemic Species Astragalus monspessulanus L. ssp. illyricus (Bernhardt) Chater

Authors: Nada Bezić, Valerija Dunkić, Rušćić Mirko

Abstract:

Astragalus monspessulanus L. ssp. illyricus (Bernhardt) Chater is endemic species of Fabaceae family and belongs to hemicryptophyte. This plant grows wild in the sub-Mediterranean area. We analyzed the composition of the essential oil of stems and leaves of A. monspessulanus L. ssp. Illyricus, collected in Tijarica, near Split, Croatia. Water distilled essential oils from aerial parts of investigation plant have been analysed by GC and GC/MS using VF-5ms capillary column. The total yield of oil was 0.08%, based on dry weight of samples. Thirty-eight compounds were representing 88.5% of the total oil. This essential oil was characterized by a high concentration of cis-myrtanol (20.5%), geranyl acetate (9.6%) and phytone (6.6%). Previous research in the species A. monspessulanus have included flavoalkaloids and flavonoids composition. The present study gives additional knowledge about secondary metabolites contents on the genus Astragalus.

Keywords: essential oil, isovaleric acid, Valeriana tuberosa, geranyl acetate, phytone

Procedia PDF Downloads 161
11030 Mindfulness and Motivational Based Intervention for Pregnant Women with Tobacco Dependency: Pilot Study

Authors: Ilona Krone

Abstract:

Maternal smoking during pregnancy increases the risk of perinatal/postnatal negative health outcomes; however, only 1 in 5 pregnant smokers quit smoking. That is a clinical and public health problem. Pregnant smokers have negative paternal support, and higher levels of perceived stress than non-smokers and quitters return to smoking in a stressful situation. A crisis like the COVID-19 outbreak causes significant uncertainty and stress. For pregnant women, additional stress may increase due to concerns for their fetus. Strategies targeting maternal stress and isolation may be particularly useful to prevent negative outcomes for women and their fetuses. Within the post-doctoral study, cooperating with leading specialists, an innovative program for pregnant smokers will be developed. Feasibility for reducing craving, distress intolerance, Covid 19 related stress, and fear in pregnant women in Latvia will be assessed.

Keywords: COVID 19, mindfulness, motivation, pregnancy, smoking cessation

Procedia PDF Downloads 205
11029 Research on Contract's Explicit Incentive and Reputation's Implicit Incentive Mechanism towards Construction Contractors

Authors: Li Ma, Meishuang Ma, Mengying Huang

Abstract:

The quality of construction projects reflects the credit and responsibilities of construction contractors for the owners and the whole society. Because the construction contractors master more relevant information about the entrusted engineering project under construction while the owners are in unfavorable position of gaining information, asymmetric information may lead the contractors act against the owners in order to pursue their own interests. Building a powerful motivation mechanism is the key to guarantee investor economic interests and the life and property of users in construction projects. Based on principal-agent theory and game theory, the authors develop relevant mathematical models to analyze and compare the contractor’s utility functions under different combinations of contracts’ explicit incentive mechanism and reputation’s implicit incentive mechanism aiming at finding out the conditions for incentive validity. The research concludes that the most rational motivation way is to combine the explicit and implicit incentive effects of both contracts and reputation mechanism, and puts forth some measures for problems on account of China’s current situation.

Keywords: construction contractors, contract, reputation, incentive mechanism

Procedia PDF Downloads 497
11028 A Multi Sensor Monochrome Video Fusion Using Image Quality Assessment

Authors: M. Prema Kumar, P. Rajesh Kumar

Abstract:

The increasing interest in image fusion (combining images of two or more modalities such as infrared and visible light radiation) has led to a need for accurate and reliable image assessment methods. This paper gives a novel approach of merging the information content from several videos taken from the same scene in order to rack up a combined video that contains the finest information coming from different source videos. This process is known as video fusion which helps in providing superior quality (The term quality, connote measurement on the particular application.) image than the source images. In this technique different sensors (whose redundant information can be reduced) are used for various cameras that are imperative for capturing the required images and also help in reducing. In this paper Image fusion technique based on multi-resolution singular value decomposition (MSVD) has been used. The image fusion by MSVD is almost similar to that of wavelets. The idea behind MSVD is to replace the FIR filters in wavelet transform with singular value decomposition (SVD). It is computationally very simple and is well suited for real time applications like in remote sensing and in astronomy.

Keywords: multi sensor image fusion, MSVD, image processing, monochrome video

Procedia PDF Downloads 559
11027 Organic Rankine Cycles (ORC) for Mobile Applications: Economic Feasibility in Different Transportation Sectors

Authors: Roberto Pili, Alessandro Romagnoli, Hartmut Spliethoff, Christoph Wieland

Abstract:

Internal combustion engines (ICE) are today the most common energy system to drive vehicles and transportation systems. Numerous studies state that 50-60% of the fuel energy content is lost to the ambient as sensible heat. ORC offers a valuable alternative to recover such waste heat from ICE, leading to fuel energy savings and reduced emissions. In contrast, the additional weight of the ORC affects the net energy balance of the overall system and the ORC occupies additional volume that competes with vehicle transportation capacity. Consequently, a lower income from delivered freight or passenger tickets can be achieved. The economic feasibility of integrating an ORC into an ICE and the resulting economic impact of weight and volume have not been analyzed in open literature yet. This work intends to define such a benchmark for ORC applications in the transportation sector and investigates the current situation on the market. The applied methodology refers to the freight market, but it can be extended to passenger transportation as well. The economic parameter X is defined as the ratio between the variation of the freight revenues and the variation of fuel costs when an ORC is installed as a bottoming cycle for an ICE with respect to a reference case without ORC. A good economic situation is obtained when the reduction in fuel costs is higher than the reduction of revenues for the delivered freight, i.e. X<1. Through this constraint, a maximum allowable change of transport capacity for a given relative reduction in fuel consumption is determined. The specific fuel consumption is influenced by the ORC in two ways. Firstly because the transportable freight is reduced and secondly because the total weight of the vehicle is increased. Note, that the generated electricity of the ORC influences the size of the ICE and the fuel consumption as well. Taking the above dependencies into account, the limiting condition X = 1 results in a second order equation for the relative change in transported cargo. The described procedure is carried out for a typical city bus, a truck of 24-40 t of payload capacity, a middle-size freight train (1000 t), an inland water vessel (Va RoRo, 2500 t) and handysize-like vessel (25000 t). The maximum allowable mass and volume of the ORC are calculated in dependence of its efficiency in order to satisfy X < 1. Subsequently, these values are compared with weight and volume of commercial ORC products. For ships of any size, the situation appears already highly favorable. A different result is obtained for road and rail vehicles. For trains, the mass and the volume of common ORC products have to be reduced at least by 50%. For trucks and buses, the situation looks even worse. The findings of the present study show a theoretical and practical approach for the economic application of ORC in the transportation sector. In future works, the potential for volume and mass reduction of the ORC will be addressed, together with the integration of an economic assessment for the ORC.

Keywords: ORC, transportation, volume, weight

Procedia PDF Downloads 220
11026 Effects of MBSR on Self-Esteem and Well-Being: The Key Role of Contingent Self-Esteem in Predicting Well-Being Compared to Explicit Self-Esteem

Authors: Sergio Luna, Raquel Rodríguez-Carvajal

Abstract:

This research examines the effectiveness of a mindfulness-based intervention in optimizing psychological well-being, with a particular focus on self-esteem, due to the rapid growth and consolidation of social network use and the increased frequency and intensity of upward comparisons of the self. The study aims to assess the potential of a mindfulness-based intervention to improve self-esteem and, in particular, to contribute to its greater stability by reducing levels of contingent self-esteem. Results show that an 8-week mindfulness-based stress reduction program was effective in increasing participants' (n=206) trait mindfulness, explicit self-esteem, and well-being, while decreasing contingent self-esteem. Furthermore, the study found that improvements in both explicit and contingent self-esteem were significantly correlated with increases in psychological well-being, but that contingent self-esteem had a stronger effect on well-being than explicit self-esteem. These findings highlight the importance of considering additional dimensions of self-esteem beyond levels, and suggest that mindfulness-based interventions may be a valuable tool for promoting a healthier form of self-esteem that contributes to personal well-being.

Keywords: MBSR, contingent self-esteem, explicit self-esteem, well-being

Procedia PDF Downloads 69
11025 Mitigation of Seismic Forces Effect on Highway Bridge Using Aseismic Bearings

Authors: Kaoutar Zellat, Tahar Kadri

Abstract:

The purpose of new aseismic techniques is to provide an additional means of energy dissipation, thereby reducing the transmitted acceleration into the superstructure. In order to demonstrate the effectiveness of aseismic bearings technique and understand the behavior of seismically isolated bridges by such devices a three-span continuous deck bridge made of reinforced concrete is considered. The bridge is modeled as a discrete model and the relative displacements of the isolation bearing are crucial from the design point of view of isolation system and separation joints at the abutment level. The systems presented here are passive control systems and the results of some important experimental tests are also included. The results show that the base shear in the piers is significantly reduced for the isolated system as compared to the non isolated system in the both directions of the bridge. This indicates that the use of aseismic systems is effective in reducing the earthquake response of the bridge.

Keywords: aseismic bearings, bridge isolation, bridge, seismic response

Procedia PDF Downloads 351
11024 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 377
11023 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications

Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani

Abstract:

In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.

Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks

Procedia PDF Downloads 82
11022 Healthcare Providers’ Perception Towards Utilization of Health Information Applications and Its Associated Factors in Healthcare Delivery in Health Facilities in Cape Coast Metropolis, Ghana

Authors: Richard Okyere Boadu, Godwin Adzakpah, Nathan Kumasenu Mensah, Kwame Adu Okyere Boadu, Jonathan Kissi, Christiana Dziyaba, Rosemary Bermaa Abrefa

Abstract:

Information and communication technology (ICT) has significantly advanced global healthcare, with electronic health (e-Health) applications improving health records and delivery. These innovations, including electronic health records, strengthen healthcare systems. The study investigates healthcare professionals' perceptions of health information applications and their associated factors in the Cape Coast Metropolis of Ghana's health facilities. Methods: We used a descriptive cross-sectional study design to collect data from 632 healthcare professionals (HCPs), in the three purposively selected health facilities in the Cape Coast municipality of Ghana in July 2022. Shapiro-Wilk test was used to check the normality of dependent variables. Descriptive statistics were used to report means with corresponding standard deviations for continuous variables. Proportions were also reported for categorical variables. Bivariate regression analysis was conducted to determine the factors influencing the Benefits of Information Technology (BoIT); Barriers to Information Technology Use (BITU); and Motives of Information Technology Use (MoITU) in healthcare delivery. Stata SE version 15 was used for the analysis. A p-value of less than 0.05 served as the basis for considering a statistically significant accepting hypothesis. Results: Healthcare professionals (HCPs) generally perceived moderate benefits (Mean score (M)=5.67) from information technology (IT) in healthcare. However, they slightly agreed that barriers like insufficient computers (M=5.11), frequent system downtime (M=5.09), low system performance (M=5.04), and inadequate staff training (M=4.88) hindered IT utilization. Respondents slightly agreed that training (M=5.56), technical support (M=5.46), and changes in work procedures (M=5.10) motivated their IT use. Bivariate regression analysis revealed significant influences of education, working experience, healthcare profession, and IT training on attitudes towards IT utilization in healthcare delivery (BoIT, BITU, and MoITU). Additionally, the age of healthcare providers, education, and working experience significantly influenced BITU. Ultimately, age, education, working experience, healthcare profession, and IT training significantly influenced MoITU in healthcare delivery. Conclusions: Healthcare professionals acknowledge moderate benefits of IT in healthcare but encounter barriers like inadequate resources and training. Motives for IT use include staff training and support. Bivariate regression analysis shows education, working experience, profession, and IT training significantly influence attitudes toward IT adoption. Targeted interventions and policies can enhance IT utilization in the Cape Coast Metropolis, Ghana.

Keywords: health information application, utilization of information application, information technology use, healthcare

Procedia PDF Downloads 49
11021 Governance of Inter-Organizational Research Cooperation

Authors: Guenther Schuh, Sebastian Woelk

Abstract:

Companies face increasing challenges in research due to higher costs and risks. The intensifying technology complexity and interdisciplinarity require unique know-how. Therefore, companies need to decide whether research shall be conducted internally or externally with partners. On the other hand, research institutes meet increasing efforts to achieve good financing and to maintain high research reputation. Therefore, relevant research topics need to be identified and specialization of competency is necessary. However, additional competences for solving interdisciplinary research projects are also often required. Secured financing can be achieved by bonding industry partners as well as public fundings. The realization of faster and better research drives companies and research institutes to cooperate in organized research networks, which are managed by an administrative organization. For an effective and efficient cooperation, necessary processes, roles, tools and a set of rules need to be determined. The goal of this paper is to show the state-of-art research and to propose a governance framework for organized research networks.

Keywords: interorganizational cooperation, design of network governance, research network

Procedia PDF Downloads 357
11020 Virtual Metrology for Copper Clad Laminate Manufacturing

Authors: Misuk Kim, Seokho Kang, Jehyuk Lee, Hyunchang Cho, Sungzoon Cho

Abstract:

In semiconductor manufacturing, virtual metrology (VM) refers to methods to predict properties of a wafer based on machine parameters and sensor data of the production equipment, without performing the (costly) physical measurement of the wafer properties (Wikipedia). Additional benefits include avoidance of human bias and identification of important factors affecting the quality of the process which allow improving the process quality in the future. It is however rare to find VM applied to other areas of manufacturing. In this work, we propose to use VM to copper clad laminate (CCL) manufacturing. CCL is a core element of a printed circuit board (PCB) which is used in smartphones, tablets, digital cameras, and laptop computers. The manufacturing of CCL consists of three processes: Treating, lay-up, and pressing. Treating, the most important process among the three, puts resin on glass cloth, heat up in a drying oven, then produces prepreg for lay-up process. In this process, three important quality factors are inspected: Treated weight (T/W), Minimum Viscosity (M/V), and Gel Time (G/T). They are manually inspected, incurring heavy cost in terms of time and money, which makes it a good candidate for VM application. We developed prediction models of the three quality factors T/W, M/V, and G/T, respectively, with process variables, raw material, and environment variables. The actual process data was obtained from a CCL manufacturer. A variety of variable selection methods and learning algorithms were employed to find the best prediction model. We obtained prediction models of M/V and G/T with a high enough accuracy. They also provided us with information on “important” predictor variables, some of which the process engineers had been already aware and the rest of which they had not. They were quite excited to find new insights that the model revealed and set out to do further analysis on them to gain process control implications. T/W did not turn out to be possible to predict with a reasonable accuracy with given factors. The very fact indicates that the factors currently monitored may not affect T/W, thus an effort has to be made to find other factors which are not currently monitored in order to understand the process better and improve the quality of it. In conclusion, VM application to CCL’s treating process was quite successful. The newly built quality prediction model allowed one to reduce the cost associated with actual metrology as well as reveal some insights on the factors affecting the important quality factors and on the level of our less than perfect understanding of the treating process.

Keywords: copper clad laminate, predictive modeling, quality control, virtual metrology

Procedia PDF Downloads 345
11019 Towards a Framework for Embedded Weight Comparison Algorithm with Business Intelligence in the Plantation Domain

Authors: M. Pushparani, A. Sagaya

Abstract:

Embedded systems have emerged as important elements in various domains with extensive applications in automotive, commercial, consumer, healthcare and transportation markets, as there is emphasis on intelligent devices. On the other hand, Business Intelligence (BI) has also been extensively used in a range of applications, especially in the agriculture domain which is the area of this research. The aim of this research is to create a framework for Embedded Weight Comparison Algorithm with Business Intelligence (EWCA-BI). The weight comparison algorithm will be embedded within the plantation management system and the weighbridge system. This algorithm will be used to estimate the weight at the site and will be compared with the actual weight at the plantation. The algorithm will be used to build the necessary alerts when there is a discrepancy in the weight, thus enabling better decision making. In the current practice, data are collected from various locations in various forms. It is a challenge to consolidate data to obtain timely and accurate information for effective decision making. Adding to this, the unstable network connection leads to difficulty in getting timely accurate information. To overcome the challenges embedding is done on a portable device that will have the embedded weight comparison algorithm to also assist in data capture and synchronize data at various locations overcoming the network short comings at collection points. The EWCA-BI will provide real-time information at any given point of time, thus enabling non-latent BI reports that will provide crucial information to enable efficient operational decision making. This research has a high potential in bringing embedded system into the agriculture industry. EWCA-BI will provide BI reports with accurate information with uncompromised data using an embedded system and provide alerts, therefore, enabling effective operation management decision-making at the site.

Keywords: embedded business intelligence, weight comparison algorithm, oil palm plantation, embedded systems

Procedia PDF Downloads 274
11018 Plasma-Induced Modification of Biomolecules: A Tool for Analysis of Protein Structures

Authors: Yuting Wu, Faraz Choudhury, Daniel Benjamin, James Whalin, Joshua Blatz, Leon Shohet, Michael Sussman, Mark Richards

Abstract:

Plasma-Induced Modification of Biomolecules (PLIMB) has been developed as a technology, which, together with mass spectrometry, measures three-dimensional structural characteristics of proteins. This technique uses hydroxyl radicals generated by atmospheric-pressure plasma discharge to react with the solvent-accessible side chains of protein in an aqueous solution. In this work, we investigate the three-dimensional structure of hemoglobin and myoglobin using PLIMB. Additional modifications to these proteins, such as oxidation, fragmentations, and conformational changes caused by PLIMB are also explored. These results show that PLIMB, coupled with mass spectrometry, is an effective way to determine solvent access to hemoproteins. Furthermore, we show that many factors, including pH and the electrical parameters used to generate the plasma, have a significant influence on solvent accessibility.

Keywords: plasma, hemoglobin, myoglobin, solvent access

Procedia PDF Downloads 176
11017 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 293
11016 “I” on the Web: Social Penetration Theory Revised

Authors: Dr. Dionysis Panos Dpt. Communication, Internet Studies Cyprus University of Technology

Abstract:

The widespread use of New Media and particularly Social Media, through fixed or mobile devices, has changed in a staggering way our perception about what is “intimate" and "safe" and what is not, in interpersonal communication and social relationships. The distribution of self and identity-related information in communication now evolves under new and different conditions and contexts. Consequently, this new framework forces us to rethink processes and mechanisms, such as what "exposure" means in interpersonal communication contexts, how the distinction between the "private" and the "public" nature of information is being negotiated online, how the "audiences" we interact with are understood and constructed. Drawing from an interdisciplinary perspective that combines sociology, communication psychology, media theory, new media and social networks research, as well as from the empirical findings of a longitudinal comparative research, this work proposes an integrative model for comprehending mechanisms of personal information management in interpersonal communication, which can be applied to both types of online (Computer-Mediated) and offline (Face-To-Face) communication. The presentation is based on conclusions drawn from a longitudinal qualitative research study with 458 new media users from 24 countries for almost over a decade. Some of these main conclusions include: (1) There is a clear and evidenced shift in users’ perception about the degree of "security" and "familiarity" of the Web, between the pre- and the post- Web 2.0 era. The role of Social Media in this shift was catalytic. (2) Basic Web 2.0 applications changed dramatically the nature of the Internet itself, transforming it from a place reserved for “elite users / technical knowledge keepers" into a place of "open sociability” for anyone. (3) Web 2.0 and Social Media brought about a significant change in the concept of “audience” we address in interpersonal communication. The previous "general and unknown audience" of personal home pages, converted into an "individual & personal" audience chosen by the user under various criteria. (4) The way we negotiate the nature of 'private' and 'public' of the Personal Information, has changed in a fundamental way. (5) The different features of the mediated environment of online communication and the critical changes occurred since the Web 2.0 advance, lead to the need of reconsideration and updating the theoretical models and analysis tools we use in our effort to comprehend the mechanisms of interpersonal communication and personal information management. Therefore, is proposed here a new model for understanding the way interpersonal communication evolves, based on a revision of social penetration theory.

Keywords: new media, interpersonal communication, social penetration theory, communication exposure, private information, public information

Procedia PDF Downloads 353
11015 The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure

Authors: Jiri Barta, Jiří F. Urbanek

Abstract:

This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.

Keywords: interoperability, communication systems, controlling proces, critical infrastructure, crisis workplaces, continuity

Procedia PDF Downloads 288
11014 Ho-Doped Lithium Niobate Thin Films: Raman Spectroscopy, Structure and Luminescence

Authors: Edvard Kokanyan, Narine Babajanyan, Ninel Kokanyan, Marco Bazzan

Abstract:

Lithium niobate (LN) crystals, renowned for their exceptional nonlinear optical, electro-optical, piezoelectric, and photorefractive properties, stand as foundational materials in diverse fields of study and application. While they have long been utilized in frequency converters of laser radiation, electro-optical modulators, and holographic information recording media, LN crystals doped with rare earth ions represent a compelling frontier for modern compact devices. These materials exhibit immense potential as key components in infrared lasers, optical sensors, self-cooling systems, and radiation balanced laser setups. In this study, we present the successful synthesis of Ho-doped lithium niobate (LN:Ho) thin films on sapphire substrates employing the Sol-Gel technique. The films exhibit a strong crystallographic orientation along the perpendicular direction to the substrate surface, with X-ray diffraction analysis confirming the predominant alignment of the film's "c" axis, notably evidenced by the intense (006) reflection peak. Further characterization through Raman spectroscopy, employing a confocal Raman microscope (LabRAM HR Evolution) with exciting wavelengths of 532 nm and 785 nm, unraveled intriguing insights. Under excitation with a 785 nm laser, Raman scattering obeyed selection rules, while employing a 532 nm laser unveiled additional forbidden lines reminiscent of behaviors observed in bulk LN:Ho crystals. These supplementary lines were attributed to luminescence induced by excitation at 532 nm. Leveraging data from anti-Stokes Raman lines facilitated the disentanglement of luminescence spectra from the investigated samples. Surface scanning affirmed the uniformity of both structure and luminescence across the thin films. Notably, despite the robust orientation of the "c" axis perpendicular to the substrate surface, Raman signals indicated a stochastic distribution of "a" and "b" axes, validating the mosaic structure of the films along the mentioned axis. This study offers valuable insights into the structural properties of Ho-doped lithium niobate thin films, with the observed luminescence behavior holding significant promise for potential applications in optoelectronic devices.

Keywords: lithium niobate, Sol-Gel, luminescence, Raman spectroscopy

Procedia PDF Downloads 43
11013 Properties of Composite Materials Made from Surface Treated Particles from Annual Plants

Authors: Štěpán Hýsek, Petra Gajdačová, Milan Podlena

Abstract:

Annual plants are becoming more and more popular source of lignin and cellulose. In those days a lot of research is carried out in order to evaluate the possibility of utilization of fibres and particles from these plants in composite materials production. These lingo-cellulosic materials seem to be a great alternative to wood, however, due to waxy and silica layers on the surface of these stalks, one additional technological step is needed–erosion of the layers for the purpose of achieving better adhesion between particle and adhesive. In this research, we used several kinds of particle pre-treatment, in order to modify surface properties of these particles. Further, an adhesive was applied to the particles using laboratory blender and board were produced using laboratory press. Both physical and mechanical properties of boards were observed. It was found out that the surface modification of particles had statistically significant effect on properties of produced boards.

Keywords: annual plant, composites, mechanical properties, particleboard

Procedia PDF Downloads 187
11012 A Comparative Study of the Athlete Health Records' Minimum Data Set in Selected Countries and Presenting a Model for Iran

Authors: Robab Abdolkhani, Farzin Halabchi, Reza Safdari, Goli Arji

Abstract:

Background and purpose: The quality of health record depends on the quality of its content and proper documentation. Minimum data set makes a standard method for collecting key data elements that make them easy to understand and enable comparison. The aim of this study was to determine the minimum data set for Iranian athletes’ health records. Methods: This study is an applied research of a descriptive comparative type which was carried out in 2013. By using internal and external forms of documentation, a checklist was created that included data elements of athletes health record and was subjected to debate in Delphi method by experts in the field of sports medicine and health information management. Results: From 97 elements which were subjected to discussion, 85 elements by more than 75 percent of the participants (as the main elements) and 12 elements by 50 to 75 percent of the participants (as the proposed elements) were agreed upon. In about 97 elements of the case, there was no significant difference between responses of alumni groups of sport pathology and sports medicine specialists with medical record, medical informatics and information management professionals. Conclusion: Minimum data set of Iranian athletes’ health record with four information categories including demographic information, health history, assessment and treatment plan was presented. The proposed model is available for manual and electronic medical records.

Keywords: Documentation, Health record, Minimum data set, Sports medicine

Procedia PDF Downloads 462
11011 Transparency Obligations under the AI Act Proposal: A Critical Legal Analysis

Authors: Michael Lognoul

Abstract:

In April 2021, the European Commission released its AI Act Proposal, which is the first policy proposal at the European Union level to target AI systems comprehensively, in a horizontal manner. This Proposal notably aims to achieve an ecosystem of trust in the European Union, based on the respect of fundamental rights, regarding AI. Among many other requirements, the AI Act Proposal aims to impose several generic transparency obligationson all AI systems to the benefit of natural persons facing those systems (e.g. information on the AI nature of systems, in case of an interaction with a human). The Proposal also provides for more stringent transparency obligations, specific to AI systems that qualify as high-risk, to the benefit of their users, notably on the characteristics, capabilities, and limitations of the AI systems they use. Against that background, this research firstly presents all such transparency requirements in turn, as well as related obligations, such asthe proposed obligations on record keeping. Secondly, it focuses on a legal analysis of their scope of application, of the content of the obligations, and on their practical implications. On the scope of transparency obligations tailored for high-risk AI systems, the research notably notes that it seems relatively narrow, given the proposed legal definition of the notion of users of AI systems. Hence, where end-users do not qualify as users, they may only receive very limited information. This element might potentially raise concern regarding the objective of the Proposal. On the content of the transparency obligations, the research highlights that the information that should benefit users of high-risk AI systems is both very broad and specific, from a technical perspective. Therefore, the information required under those obligations seems to create, prima facie, an adequate framework to ensure trust for users of high-risk AI systems. However, on the practical implications of these transparency obligations, the research notes that concern arises due to potential illiteracy of high-risk AI systems users. They might not benefit from sufficient technical expertise to fully understand the information provided to them, despite the wording of the Proposal, which requires that information should be comprehensible to its recipients (i.e. users).On this matter, the research points that there could be, more broadly, an important divergence between the level of detail of the information required by the Proposal and the level of expertise of users of high-risk AI systems. As a conclusion, the research provides policy recommendations to tackle (part of) the issues highlighted. It notably recommends to broaden the scope of transparency requirements for high-risk AI systems to encompass end-users. It also suggests that principles of explanation, as they were put forward in the Guidelines for Trustworthy AI of the High Level Expert Group, should be included in the Proposal in addition to transparency obligations.

Keywords: aI act proposal, explainability of aI, high-risk aI systems, transparency requirements

Procedia PDF Downloads 284
11010 The Potentials of Online Learning and the Challenges towards Its Adoption in Nigeria's Higher Institutions of Learning

Authors: Kuliya Muhammed

Abstract:

This paper examines the potentials of online learning and the challenges to its adoption in Nigeria’s higher institutions of learning. The research would assist in tackling the challenges of online learning adoption and enlighten institutions on the numerous benefits of online learning in Nigeria. The researcher used survey method for the study and questionnaires were used to obtain the needed data from 230 respondents cut across 20 higher institutions in the country. The findings revealed that online learning has the prospect to boost access to learning tools, assist students’ to learn from the comfort of their offices or homes, reduce the cost of learning, and enable individuals to gain self-knowledge. The major challenges in the adoption of e-learning are poor Information and Communication Technology infrastructures, poor internet connectivity where available, lack of Information and Communication Technology background, problem of power supply, lack of commitment by institutions, poor maintenance of Information and Communication Technology tools, inadequate facilities, lack of government funding and fraud. Recommendations were also made at the end of the research work.

Keywords: electronic, ICT, institution, internet, learning, technology

Procedia PDF Downloads 375
11009 Rumour Containment Using Monitor Placement and Truth Propagation

Authors: Amrah Maryam

Abstract:

The emergence of online social networks (OSNs) has transformed the way we pursue and share information. On the one hand, OSNs provide great ease for the spreading of positive information while, on the other hand, they may also become a channel for the spreading of malicious rumors and misinformation throughout the social network. Thus, to assure the trustworthiness of OSNs to its users, it is of vital importance to detect the misinformation propagation in the network by placing network monitors. In this paper, we aim to place monitors near the suspected nodes with the intent to limit the diffusion of misinformation in the social network, and then we also detect the most significant nodes in the network for propagating true information in order to minimize the effect of already diffused misinformation. Thus, we initiate two heuristic monitor placement using articulation points and truth propagation using eigenvector centrality. Furthermore, to provide real-time workings of the system, we integrate both the monitor placement and truth propagation entities as well. To signify the effectiveness of the approaches, we have carried out the experiment and evaluation of Stanford datasets of online social networks.

Keywords: online social networks, monitor placement, independent cascade model, spread of misinformation

Procedia PDF Downloads 148