Search results for: information gain
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12046

Search results for: information gain

10486 BER of the Leaky Feeder under Rayleigh Fading Multichannel Reception with Imperfect Phase Estimation

Authors: Hasan Farahneh, Xavier Fernando

Abstract:

Leaky Feeder (LF) has been a proven technology for many decades and its promises broadband wireless access in short range but being overlooked until now. The LF is a natural MIMO transceiver ideal for micro and pico cells. In this work, the LF is considered as a linear antenna array MultiInput-Single-Output (MISO) and derive the average bit error rate (BER) in Rayleigh fading channel considering ideal and independent paths (iid) which consider there is no correlation and mutual coupling between transmit antennas (slots) or receiver antenna considering QPSK modulation with imperfect phase estimation. We consider maximal ratio transmission (MRT) at the transmit end and maximal ratio combining (MRC) at the receiving end. Analytical expressions are derived for the BER with radiating cable transmitters. The effects of slot spacing and carrier frequency on the BER are also studied. Numerical evaluations show the radiating cable transmitter offer much lower BER than a single antenna transmitter with same SNR.

Keywords: leaky feeder, BER, QPSK, rayleigh fading, channel gain, phase mismatch

Procedia PDF Downloads 365
10485 Disaster Management in Indonesia: A Study on Indonesian Law No. 24 Year 2007

Authors: Eva Fadhilah, Ummi Sholihah Pertiwi Abidin

Abstract:

One common problem in Indonesia is a matter of disaster and its management. Therefore, Indonesia is recognized as ones of disaster-prone nations. The serious problem of a high number of disasters and victims in Indonesia is the lack of attention from various parties related to aid which is given to victims in the evacuation areas. In Indonesia, it is estimated that 25 percents of disaster victims are fertile women, 4 percents of them are pregnants, and 15-20 percents among them encountered complication of pregnancy. Unfortunately, disaster management is frequently viewed as ethnicity, so that, the way to treat them is also done in the same way either to treat men or women, toddler or adult, young or aged. This matter then caused the imbalance in helping distribution which caused an inappropriateness towards help distribution. Whereas if we look in depth, the needs of every human are totally different. Sometimes susceptible groups such as women need to gain priority help compared with man. This is caused such as in the certain times that women could be in menstruation period, pregnancy, suckling period which never be experienced by men. This paper aims to study Indonesian Law No. 24 Year 2007 about Disaster management. This study was done by qualitative study which emphasizes on literature study to discuss the study.

Keywords: disaster management, Indonesian law, disaster victims’ needs, women’s needs

Procedia PDF Downloads 335
10484 Towards a Framework for Embedded Weight Comparison Algorithm with Business Intelligence in the Plantation Domain

Authors: M. Pushparani, A. Sagaya

Abstract:

Embedded systems have emerged as important elements in various domains with extensive applications in automotive, commercial, consumer, healthcare and transportation markets, as there is emphasis on intelligent devices. On the other hand, Business Intelligence (BI) has also been extensively used in a range of applications, especially in the agriculture domain which is the area of this research. The aim of this research is to create a framework for Embedded Weight Comparison Algorithm with Business Intelligence (EWCA-BI). The weight comparison algorithm will be embedded within the plantation management system and the weighbridge system. This algorithm will be used to estimate the weight at the site and will be compared with the actual weight at the plantation. The algorithm will be used to build the necessary alerts when there is a discrepancy in the weight, thus enabling better decision making. In the current practice, data are collected from various locations in various forms. It is a challenge to consolidate data to obtain timely and accurate information for effective decision making. Adding to this, the unstable network connection leads to difficulty in getting timely accurate information. To overcome the challenges embedding is done on a portable device that will have the embedded weight comparison algorithm to also assist in data capture and synchronize data at various locations overcoming the network short comings at collection points. The EWCA-BI will provide real-time information at any given point of time, thus enabling non-latent BI reports that will provide crucial information to enable efficient operational decision making. This research has a high potential in bringing embedded system into the agriculture industry. EWCA-BI will provide BI reports with accurate information with uncompromised data using an embedded system and provide alerts, therefore, enabling effective operation management decision-making at the site.

Keywords: embedded business intelligence, weight comparison algorithm, oil palm plantation, embedded systems

Procedia PDF Downloads 270
10483 Enacting Educational Technology Affordances as Mechanisms Responsible for Gaining Epistemological Access: A Case of Underprivileged Students at Higher Institutions in Northern Nigeria

Authors: Bukhari Badamasi, Chidi G. Ononiwu

Abstract:

Globally, educational technology (EdTech) has become a known catalyst for gaining access to education, job creation, and national development of a nation. Howbeit, it is common understanding that higher institutions continue to deploy digital technologies, to help provide access to education, but in most case, it is somehow institutional access not epistemological access especially in sub Saharan African higher institutions. Some scholars, however, lament the fact that studies on educational technology affordances are mostly fragmented because they focus on specific theme or sub aspect of access (i.e., institutional access). Thus, drawing from the Archer Morphogenetic approach, and Gibson Affordance theory, and applying critical realist based Danermark model for explanatory research, the study seeks to conduct a realist case study on underprivileged students in Higher institutions on how they gain epistemological access by enacting educational technology (EdTech) affordances.

Keywords: affordance, epistemological access, educational technology, underprivileged students

Procedia PDF Downloads 68
10482 Expanded Access through Open and Distance Learning in Nigeria

Authors: Okoro Ngozi Priscilla

Abstract:

Education is the bedrock of development in every nation of the world, and it is very useful in ensuring quality of life for every individual and a better world for the people. Education, therefore, is the basic instrument of economic growth and technological advancement in any society. It is in recognition of this fact that the Nigerian government commits immense resources to ensuring that its citizens acquire education and also policies are being made to ensure the accessibility of education, qualitative higher education is highly recognized as a vital driving force for the socio-economic growth and technological development of nations yet the problem of access to University education in the country persists and therefore brought about the introduction of Open and Distance Learning (ODL) which has as its main objective, the attainment of mass literacy and providing opportunities for those who could not gain admission through designated entrance examination agencies as well as those who could not afford to leave their job to attend a full-time educational programme. Open and distance learning seeks to improve skilled manpower and also improve the skills for those already at work.

Keywords: accessibility, open and distant learning programme, fulltime educational programme, distance learning

Procedia PDF Downloads 441
10481 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 285
10480 Threshold Concepts in TESOL: A Thematic Analysis of Disciplinary Guiding Principles

Authors: Neil Morgan

Abstract:

The notion of Threshold Concepts has offered a fertile new perspective on the transformative effects of mastery of particular concepts on student understanding of subject matter and their developing identities as inductees into disciplinary discourse communities. Only by successfully traversing key knowledge thresholds, it is claimed, can neophytes gain access to the more sophisticated understandings of subject matter possessed by mature members of a discipline. This paper uses thematic analysis of disciplinary guiding principles to identify nine candidate Threshold Concepts that appear to underpin effective TESOL practice. The relationship between these candidate TESOL Threshold Concepts, TESOL principles, and TESOL instructional techniques appears to be amenable to a schematic representation based on superordinate categories of TESOL practitioner concern and, as such, offers an alternative to the view of Threshold Concepts as a privileged subset of disciplinary core concepts. The paper concludes by exploring the potential of a Threshold Concepts framework to productively inform TESOL initial teacher education (ITE) and in-service education and training (INSET).

Keywords: TESOL, threshold concepts, TESOL principles, TESOL ITE/INSET, community of practice

Procedia PDF Downloads 131
10479 “I” on the Web: Social Penetration Theory Revised

Authors: Dr. Dionysis Panos Dpt. Communication, Internet Studies Cyprus University of Technology

Abstract:

The widespread use of New Media and particularly Social Media, through fixed or mobile devices, has changed in a staggering way our perception about what is “intimate" and "safe" and what is not, in interpersonal communication and social relationships. The distribution of self and identity-related information in communication now evolves under new and different conditions and contexts. Consequently, this new framework forces us to rethink processes and mechanisms, such as what "exposure" means in interpersonal communication contexts, how the distinction between the "private" and the "public" nature of information is being negotiated online, how the "audiences" we interact with are understood and constructed. Drawing from an interdisciplinary perspective that combines sociology, communication psychology, media theory, new media and social networks research, as well as from the empirical findings of a longitudinal comparative research, this work proposes an integrative model for comprehending mechanisms of personal information management in interpersonal communication, which can be applied to both types of online (Computer-Mediated) and offline (Face-To-Face) communication. The presentation is based on conclusions drawn from a longitudinal qualitative research study with 458 new media users from 24 countries for almost over a decade. Some of these main conclusions include: (1) There is a clear and evidenced shift in users’ perception about the degree of "security" and "familiarity" of the Web, between the pre- and the post- Web 2.0 era. The role of Social Media in this shift was catalytic. (2) Basic Web 2.0 applications changed dramatically the nature of the Internet itself, transforming it from a place reserved for “elite users / technical knowledge keepers" into a place of "open sociability” for anyone. (3) Web 2.0 and Social Media brought about a significant change in the concept of “audience” we address in interpersonal communication. The previous "general and unknown audience" of personal home pages, converted into an "individual & personal" audience chosen by the user under various criteria. (4) The way we negotiate the nature of 'private' and 'public' of the Personal Information, has changed in a fundamental way. (5) The different features of the mediated environment of online communication and the critical changes occurred since the Web 2.0 advance, lead to the need of reconsideration and updating the theoretical models and analysis tools we use in our effort to comprehend the mechanisms of interpersonal communication and personal information management. Therefore, is proposed here a new model for understanding the way interpersonal communication evolves, based on a revision of social penetration theory.

Keywords: new media, interpersonal communication, social penetration theory, communication exposure, private information, public information

Procedia PDF Downloads 350
10478 The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure

Authors: Jiri Barta, Jiří F. Urbanek

Abstract:

This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.

Keywords: interoperability, communication systems, controlling proces, critical infrastructure, crisis workplaces, continuity

Procedia PDF Downloads 283
10477 A Comparative Study of the Athlete Health Records' Minimum Data Set in Selected Countries and Presenting a Model for Iran

Authors: Robab Abdolkhani, Farzin Halabchi, Reza Safdari, Goli Arji

Abstract:

Background and purpose: The quality of health record depends on the quality of its content and proper documentation. Minimum data set makes a standard method for collecting key data elements that make them easy to understand and enable comparison. The aim of this study was to determine the minimum data set for Iranian athletes’ health records. Methods: This study is an applied research of a descriptive comparative type which was carried out in 2013. By using internal and external forms of documentation, a checklist was created that included data elements of athletes health record and was subjected to debate in Delphi method by experts in the field of sports medicine and health information management. Results: From 97 elements which were subjected to discussion, 85 elements by more than 75 percent of the participants (as the main elements) and 12 elements by 50 to 75 percent of the participants (as the proposed elements) were agreed upon. In about 97 elements of the case, there was no significant difference between responses of alumni groups of sport pathology and sports medicine specialists with medical record, medical informatics and information management professionals. Conclusion: Minimum data set of Iranian athletes’ health record with four information categories including demographic information, health history, assessment and treatment plan was presented. The proposed model is available for manual and electronic medical records.

Keywords: Documentation, Health record, Minimum data set, Sports medicine

Procedia PDF Downloads 456
10476 Biofeedback-Driven Sound and Image Generation

Authors: Claudio Burguez, María Castelló, Mikaela Pisani, Marcos Umpiérrez

Abstract:

BIOFEEDBACK exhibition offers a unique experience for each visitor, combining art, neuroscience, and technology in an interactive way. Using a headband that captures the bioelectric activity of the brain, the visitors are able to generate sound and images in a sequence loop, making them an integral part of the artwork. Through this interactive exhibit, visitors gain a deeper appreciation of the beauty and complexity of the brain. As a special takeaway, visitors will receive an NFT as a present, allowing them to continue their engagement with the exhibition beyond the physical space. We used the EEG Biofeedback technique following a closed-loop neuroscience approach, transforming EEG data captured by a Muse S headband in real-time into audiovisual stimulation. PureData is used for sound generation and Generative Adversarial Networks (GANs) for image generation. Thirty participants have experienced the exhibition. For some individuals, it was easier to focus than others. Participants who said they could focus during the exhibit stated that at one point, they felt that they could control the sound, while images were more abstract, and they did not feel that they were able to control them.

Keywords: art, audiovisual, biofeedback, EEG, NFT, neuroscience, technology

Procedia PDF Downloads 58
10475 Transparency Obligations under the AI Act Proposal: A Critical Legal Analysis

Authors: Michael Lognoul

Abstract:

In April 2021, the European Commission released its AI Act Proposal, which is the first policy proposal at the European Union level to target AI systems comprehensively, in a horizontal manner. This Proposal notably aims to achieve an ecosystem of trust in the European Union, based on the respect of fundamental rights, regarding AI. Among many other requirements, the AI Act Proposal aims to impose several generic transparency obligationson all AI systems to the benefit of natural persons facing those systems (e.g. information on the AI nature of systems, in case of an interaction with a human). The Proposal also provides for more stringent transparency obligations, specific to AI systems that qualify as high-risk, to the benefit of their users, notably on the characteristics, capabilities, and limitations of the AI systems they use. Against that background, this research firstly presents all such transparency requirements in turn, as well as related obligations, such asthe proposed obligations on record keeping. Secondly, it focuses on a legal analysis of their scope of application, of the content of the obligations, and on their practical implications. On the scope of transparency obligations tailored for high-risk AI systems, the research notably notes that it seems relatively narrow, given the proposed legal definition of the notion of users of AI systems. Hence, where end-users do not qualify as users, they may only receive very limited information. This element might potentially raise concern regarding the objective of the Proposal. On the content of the transparency obligations, the research highlights that the information that should benefit users of high-risk AI systems is both very broad and specific, from a technical perspective. Therefore, the information required under those obligations seems to create, prima facie, an adequate framework to ensure trust for users of high-risk AI systems. However, on the practical implications of these transparency obligations, the research notes that concern arises due to potential illiteracy of high-risk AI systems users. They might not benefit from sufficient technical expertise to fully understand the information provided to them, despite the wording of the Proposal, which requires that information should be comprehensible to its recipients (i.e. users).On this matter, the research points that there could be, more broadly, an important divergence between the level of detail of the information required by the Proposal and the level of expertise of users of high-risk AI systems. As a conclusion, the research provides policy recommendations to tackle (part of) the issues highlighted. It notably recommends to broaden the scope of transparency requirements for high-risk AI systems to encompass end-users. It also suggests that principles of explanation, as they were put forward in the Guidelines for Trustworthy AI of the High Level Expert Group, should be included in the Proposal in addition to transparency obligations.

Keywords: aI act proposal, explainability of aI, high-risk aI systems, transparency requirements

Procedia PDF Downloads 277
10474 Rumour Containment Using Monitor Placement and Truth Propagation

Authors: Amrah Maryam

Abstract:

The emergence of online social networks (OSNs) has transformed the way we pursue and share information. On the one hand, OSNs provide great ease for the spreading of positive information while, on the other hand, they may also become a channel for the spreading of malicious rumors and misinformation throughout the social network. Thus, to assure the trustworthiness of OSNs to its users, it is of vital importance to detect the misinformation propagation in the network by placing network monitors. In this paper, we aim to place monitors near the suspected nodes with the intent to limit the diffusion of misinformation in the social network, and then we also detect the most significant nodes in the network for propagating true information in order to minimize the effect of already diffused misinformation. Thus, we initiate two heuristic monitor placement using articulation points and truth propagation using eigenvector centrality. Furthermore, to provide real-time workings of the system, we integrate both the monitor placement and truth propagation entities as well. To signify the effectiveness of the approaches, we have carried out the experiment and evaluation of Stanford datasets of online social networks.

Keywords: online social networks, monitor placement, independent cascade model, spread of misinformation

Procedia PDF Downloads 145
10473 Auditing of Building Information Modeling Application in Decoration Engineering Projects in China

Authors: Lan Luo

Abstract:

In China’s construction industry, it is a normal practice to separately subcontract the decoration engineering part from construction engineering, and Building Information Modeling (BIM) is also done separately. Application of BIM in decoration engineering should be integrated with other disciplines, but Chinese current practice makes this very difficult and complicated. Currently, there are three barriers in the auditing of BIM application in decoration engineering in China: heavy workload; scarcity of qualified professionals; and lack of literature concerning audit contents, standards, and methods. Therefore, it is significant to perform research on what (contents) should be evaluated, in which phase, and by whom (professional qualifications) in BIM application in decoration construction so that the application of BIM can be promoted in a better manner. Based on this consideration, four principles of BIM auditing are proposed: Comprehensiveness of information, accuracy of data, aesthetic attractiveness of appearance, and scheme optimization. In the model audit, three methods should be used: Collision, observation, and contrast. In addition, BIM auditing at six stages is discussed and a checklist for work items and results to be submitted is proposed. This checklist can be used for reference by decoration project participants.

Keywords: audit, evaluation, dimensions, methods, standards, BIM application in decoration engineering projects

Procedia PDF Downloads 330
10472 The Effect of Global Solar Radiation on the Thermal and Thermohydraulic Performance of Double Flow Corrugated Absorber Solar Air Heater

Authors: Suresh Prasad Sharma, Som Nath Saha

Abstract:

This paper deals with the effect of Global Solar Radiation (GSR) on the performance of double flow solar air heater having corrugated plate as an absorber. An analytical model of a double flow solar air heater has been presented, and a computer program in C++ language has been developed to calculate the outlet air temperature, heat gain, pressure drop for estimating the thermal and thermohydraulic efficiencies. The performance of double flow corrugated absorber is compared with double flow flat plate and conventional solar air heaters. It is found that the double flow arrangement effectively increases the air temperature rise and efficiencies in comparison to a conventional collector. However, corrugated absorber is more superior to that of flat plate double flow solar air heater. The results indicate that increasing the solar radiation leads to achieve higher air temperature rise and efficiencies.

Keywords: corrugated absorber, double flow, flat plate, solar air heater

Procedia PDF Downloads 265
10471 Data Collection in Protected Agriculture for Subsequent Big Data Analysis: Methodological Evaluation in Venezuela

Authors: Maria Antonieta Erna Castillo Holly

Abstract:

During the last decade, data analysis, strategic decision making, and the use of artificial intelligence (AI) tools in Latin American agriculture have been a challenge. In some countries, the availability, quality, and reliability of historical data, in addition to the current data recording methodology in the field, makes it difficult to use information systems, complete data analysis, and their support for making the right strategic decisions. This is something essential in Agriculture 4.0. where the increase in the global demand for fresh agricultural products of tropical origin, during all the seasons of the year requires a change in the production model and greater agility in the responses to the consumer market demands of quality, quantity, traceability, and sustainability –that means extensive data-. Having quality information available and updated in real-time on what, how much, how, when, where, at what cost, and the compliance with production quality standards represents the greatest challenge for sustainable and profitable agriculture in the region. The objective of this work is to present a methodological proposal for the collection of georeferenced data from the protected agriculture sector, specifically in production units (UP) with tall structures (Greenhouses), initially for Venezuela, taking the state of Mérida as the geographical framework, and horticultural products as target crops. The document presents some background information and explains the methodology and tools used in the 3 phases of the work: diagnosis, data collection, and analysis. As a result, an evaluation of the process is carried out, relevant data and dashboards are displayed, and the first satellite maps integrated with layers of information in a geographic information system are presented. Finally, some improvement proposals and tentatively recommended applications are added to the process, understanding that their objective is to provide better qualified and traceable georeferenced data for subsequent analysis of the information and more agile and accurate strategic decision making. One of the main points of this study is the lack of quality data treatment in the Latin America area and especially in the Caribbean basin, being one of the most important points how to manage the lack of complete official data. The methodology has been tested with horticultural products, but it can be extended to other tropical crops.

Keywords: greenhouses, protected agriculture, data analysis, geographic information systems, Venezuela

Procedia PDF Downloads 117
10470 Children’s (re)actions in the Scaffolding Process Using Digital Technologies

Authors: Davoud Masoumi, Maryam Bourbour

Abstract:

By characterizing children’s actions in the scaffolding process, which is often undermined and ignored in the studies reviewed, this study aimed to examine children’s different (re)actions in relation to the teachers’ actions in a context where digital technologies are used. Over five months, 22 children aged 4-6 with five preschool teachers were video observed. The study brought in rich details of the children’s actions in relation to the teacher’s actions in the scaffolding process. The findings of the study reveal thirteen (re)actions, including Giving short response; Explaining; Participating in the activities; Examining; Smiling and laughing; Pointing and showing; Working together; Challenging each other; Problem-solving skills; Developing vocabulary; Choosing the activity; Expressing of the emotions; and Identifying the similarities and differences. Our findings expanded and deepened the understanding of the scaffolding process, which can contribute to the notion of scaffolding and help us to gain further understanding about scaffolding of children’s learning. Characterizing the children’s (re)action in relation to teacher’s scaffolding actions further can contribute to ongoing discussions about how teachers can scaffold children’s learning using digital technologies in the learning process.

Keywords: children’ (re)actions, scaffolding process, technologies, preschools

Procedia PDF Downloads 67
10469 Unveiling the Chaura Thrust: Insights into a Blind Out-of-Sequence Thrust in Himachal Pradesh, India

Authors: Rajkumar Ghosh

Abstract:

The Chaura Thrust, located in Himachal Pradesh, India, is a prominent geological feature that exhibits characteristics of an out-of-sequence thrust fault. This paper explores the geological setting of Himachal Pradesh, focusing on the Chaura Thrust's unique characteristics, its classification as an out-of-sequence thrust, and the implications of its presence in the region. The introduction provides background information on thrust faults and out-of-sequence thrusts, emphasizing their significance in understanding the tectonic history and deformation patterns of an area. It also outlines the objectives of the paper, which include examining the Chaura Thrust's geological features, discussing its classification as an out-of-sequence thrust, and assessing its implications for the region. The paper delves into the geological setting of Himachal Pradesh, describing the tectonic framework and providing insights into the formation of thrust faults in the region. Special attention is given to the Chaura Thrust, including its location, extent, and geometry, along with an overview of the associated rock formations and structural characteristics. The concept of out-of-sequence thrusts is introduced, defining their distinctive behavior and highlighting their importance in the understanding of geological processes. The Chaura Thrust is then analyzed in the context of an out-of-sequence thrust, examining the evidence and characteristics that support this classification. Factors contributing to the out-of-sequence behavior of the Chaura Thrust, such as stress interactions and fault interactions, are discussed. The geological implications and significance of the Chaura Thrust are explored, addressing its impact on the regional geology, tectonic evolution, and seismic hazard assessment. The paper also discusses the potential geological hazards associated with the Chaura Thrust and the need for effective mitigation strategies in the region. Future research directions and recommendations are provided, highlighting areas that warrant further investigation, such as detailed structural analyses, geodetic measurements, and geophysical surveys. The importance of continued research in understanding and managing geological hazards related to the Chaura Thrust is emphasized. In conclusion, the Chaura Thrust in Himachal Pradesh represents an out-of-sequence thrust fault that has significant implications for the region's geology and tectonic evolution. By studying the unique characteristics and behavior of the Chaura Thrust, researchers can gain valuable insights into the geological processes occurring in Himachal Pradesh and contribute to a better understanding and mitigation of seismic hazards in the area.

Keywords: chaura thrust, out-of-sequence thrust, himachal pradesh, geological setting, tectonic framework, rock formations, structural characteristics, stress interactions, fault interactions, geological implications, seismic hazard assessment, geological hazards, future research, mitigation strategies.

Procedia PDF Downloads 65
10468 Cyber-Softbook: A Platform for Collaborative Content Development and Delivery for Cybersecurity Education

Authors: Eniye Tebekaemi, Martin Zhao

Abstract:

The dichotomy between the skills set of newly minted college graduates and the skills required by cybersecurity employers is on the rise. Colleges are struggling to cope with the rapid pace of technology evolution using outdated tools and practices. Industries are getting frustrated due to the need to retrain fresh college graduates on skills they should have acquired. There is a dire need for academic institutions to develop new tools and systems to deliver cybersecurity education to meet the ever-evolving technology demands of the industry. The Cyber-Softbook project’s goal is to bridge the tech industry and tech education gap by providing educators a framework to collaboratively design, manage, and deliver cybersecurity academic courses that meet the needs of the tech industry. The Cyber-Softbook framework, when developed, will provide a platform for academic institutions and tech industries to collaborate on tech education and for students to learn about cybersecurity with all the resources they need to understand concepts and gain valuable skills available on a single platform.

Keywords: cybersecurity, education, skills, labs, curriculum

Procedia PDF Downloads 70
10467 The Aftermath of Insurgency on Educational Attainment in Nigeria: A Peril on National Development

Authors: David Chapola Nggada

Abstract:

This is a survey designed to find out the impact of the ongoing insurgency in north eastern Nigeria on educational attainment. It is a mixture of both qualitative and quantitative research work on a sample size of 71 secondary school students currently displaced from Baga Biu and Monguno areas of Borno State, now residing as internally displaced persons(IDPs) in Gombe and Yola IDP camps. This was done through both semi structured interview and questionnaire administration. Statistical methods used include percentage and cross tables to gain specific insight into different dimensions of what this implies. Two major aspects of the impact covered were impact on individual student and impact on societal development. These two dimensions were measured against national development variables and analyzed against reviewed literature and findings across the globe. A combination of theories from different fields led to a deeper and better insight. The results confirm a significant relationship between educational attainment and the development of the north east region and Nigeria as a whole. Recommendations were made on ways of reintegrating this group back to the educational system.

Keywords: education, insurgency, national development, threat

Procedia PDF Downloads 229
10466 Effectuation in Production: How Production Managers Can Apply Decision-Making Techniques of Successful Entrepreneurs

Authors: Malte Brettel, David Bendig, Michael Keller, Marius Rosenberg

Abstract:

What are the core competences necessary in order to sustain manufacturing in high-wage countries? Aspiring countries all over the world gain market share in manufacturing and rapidly close the productivity and quality gap that has until now protected some parts of the industry in Europe and the United States from dislocation. However, causal production planning and manufacturing, the basis for productivity and quality, is challenged by the ever-greater need for flexibility and customized products in an uncertain business environment. This article uses a case-study-based approach to assess how production managers in high-wage countries can apply decision-making principals from successful entrepreneurs. 'Effectuation' instead of causal decision making can be applied to handle uncertainty of mass customization, to seek the right partners in alliances and to advance towards virtual production. The findings help managers to use their resources more efficiently and contribute to bridge the gap between production research and entrepreneurship.

Keywords: case studies, decision-making behavior, effectuation, production planning

Procedia PDF Downloads 330
10465 Comparison Learning Vocabulary Implicitly and Explicitly

Authors: Akram Hashemi

Abstract:

This study provided an empirical evidence for learners of elementary level of language proficiency to investigate the potential role of contextualization in vocabulary learning. Prior to the main study, pilot study was performed to determine the reliability and validity of the researcher-made pretest and posttest. After manifesting the homogeneity of the participants, the participants (n = 90) were randomly assigned into three equal groups, i.e., two experimental groups and a control group. They were pretested by a vocabulary test, in order to test participants' pre-knowledge of vocabulary. Then, vocabulary instruction was provided through three methods of visual instruction, the use of context and the use of conventional techniques. At the end of the study, all participants took the same posttest in order to assess their vocabulary gain. The results of independent sample t-test indicated that there is a significant difference between learning vocabulary visually and learning vocabulary contextually. The results of paired sample t-test showed that different teaching strategies have significantly different impacts on learners’ vocabulary gains. Also, the contextual strategy was significantly more effective than visual strategy in improving students’ performance in vocabulary test.

Keywords: vocabulary instruction, explicit instruction, implicit instruction, strategy

Procedia PDF Downloads 319
10464 Examination of the Satisfaction Levels of Pre-Service Teachers Concerning E-Learning Process in Terms of Different Variables

Authors: Agah Tugrul Korucu

Abstract:

Significant changes have taken place for the better in the bulk of information and in the use of technology available in the field of education induced by technological changes in the 21st century. It is mainly the job of the teachers and pre-service teachers to integrate information and communication technologies into education by means of conveying the use of technology to individuals. While the pre-service teachers are conducting lessons by using technology, the methods they have developed are important factors for the requirements of the lesson and for the satisfaction levels of the students. The study of this study is to examine the satisfaction levels of pre-service teachers as regards e-learning in a technological environment in which there are lesson activities conducted through an online learning environment in terms of various variables. The study group of the research is composed of 156 pre-service teachers that were students in the departments of Computer and Teaching Technologies, Art Teaching and Pre-school Teaching in the academic year of 2014 - 2015. The qualitative research method was adopted for this study; the scanning model was employed in collecting the data. “The Satisfaction Scale regarding the E-learning Process”, developed by Gülbahar, and the personal information form, which was developed by the researcher, were used as means of collecting the data. Cronbach α reliability coefficient, which is the internal consistency coefficient of the scale, is 0.91. SPSS computerized statistical package program and the techniques of medium, standard deviation, percentage, correlation, t-test and variance analysis were used in the analysis of the data.

Keywords: online learning environment, integration of information technologies, e-learning, e-learning satisfaction, pre-service teachers

Procedia PDF Downloads 338
10463 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 78
10462 Gamification Using Stochastic Processes: Engage Children to Have Healthy Habits

Authors: Andre M. Carvalho, Pedro Sebastiao

Abstract:

This article is based on a dissertation that intends to analyze and make a model, intelligently, algorithms based on stochastic processes of a gamification application applied to marketing. Gamification is used in our daily lives to engage us to perform certain actions in order to achieve goals and gain rewards. This strategy is an increasingly adopted way to encourage and retain customers through game elements. The application of gamification aims to encourage children between 6 and 10 years of age to have healthy habits and the purpose of serving as a model for use in marketing. This application was developed in unity; we implemented intelligent algorithms based on stochastic processes, web services to respond to all requests of the application, a back-office website to manage the application and the database. The behavioral analysis of the use of game elements and stochastic processes in children’s motivation was done. The application of algorithms based on stochastic processes in-game elements is very important to promote cooperation and to ensure fair and friendly competition between users which consequently stimulates the user’s interest and their involvement in the application and organization.

Keywords: engage, games, gamification, randomness, stochastic processes

Procedia PDF Downloads 314
10461 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 205
10460 Production of Cement-Free Construction Materials via Fly Ash Carbonation

Authors: Zhenhua Wei, Gabriel Falzone, Bu Wang, Laurent Pilon, Gaurav Sant

Abstract:

The production of ordinary Portland cement (OPC) is a CO₂ intensive process. Specifically, cement clinkering reactions require not only substantial energy in the form of heat, but also result in the release of CO₂, from limestone decarbonation and the combustion of fuel. To overcome this CO₂ intensive process, clinkering-free cementation is demonstrated by the carbonation of fly ash; i.e., a by-product of coal combustion. It is shown that in moist environments and at sub-boiling temperatures, calcium-rich fly ashes readily react with gas-phase CO₂ to provide cementation. After seven days of CO₂ exposure at 75°C, such formulations achieve a compressive strength on the order of 35 MPa and take-up 9% CO₂ (by mass of the solid). On the other hand, calcium-deficient fly ashes, due to their lack of alkalinity (i.e., abundance of mobile Ca or Mg), show little if any potential for CO₂ uptake and strength gain. The role of the CO₂ concentration and processing temperature are discussed and linked to the progress of reactions, and the development of microstructure. The outcomes demonstrate a means for enabling clinkering-free cementation while enabling beneficial utilization of CO₂ and fly ash; i.e., two abundant but underutilized industrial by-products.

Keywords: fly ash, carbonation, concrete, strength

Procedia PDF Downloads 235
10459 Internet as a Marketing Tool for Tourism Promotion

Authors: Emeka Okonkwo

Abstract:

The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.

Keywords: internet, marketing, tourism, tourism management

Procedia PDF Downloads 402
10458 Information Technology Impacts on the Supply Chain Performance: Case Study Approach

Authors: Kajal Zarei

Abstract:

Supply chain management is becoming an increasingly important issue in many businesses today. In such circumstances, a number of reasons such as management deficiency in different segments of the supply chain, lack of streamlined processes, resistance to change the current systems and technologies, and lack of advanced information system have paved the ground to ask for innovative research studies. To this end, information technology (IT) is becoming a major driver to overcome the supply chain limitations and deficiencies. The emergence of IT has provided an excellent opportunity for redefining the supply chain to be more effective and competitive. This paper has investigated the IT impact on two-digit industry codes in the International Standard Industrial Classification (ISIC) that are operating in four groups of the supply chains. Firstly, the primary fields of the supply chain were investigated, and then paired comparisons of different industry parts were accomplished. Using experts' ideas and Analytical Hierarchy Process (AHP), the status of industrial activities in Kurdistan Province in Iran was determined. The results revealed that manufacturing and inventory fields have been more important compared to other fields of the supply chain. In addition, IT has had greater impact on food and beverage industry, chemical industry, wood industry, wood products, and production of basic metals. The results indicated the need to IT awareness in supply chain management; in other words, IT applications needed to be developed for the identified industries.

Keywords: supply chain, information technology, analytical hierarchy process, two-digit codes, international standard industrial classification

Procedia PDF Downloads 269
10457 Measuring Banks’ Antifragility via Fuzzy Logic

Authors: Danielle Sandler dos Passos, Helder Coelho, Flávia Mori Sarti

Abstract:

Analysing the world banking sector, we realize that traditional risk measurement methodologies no longer reflect the actual scenario with uncertainty and leave out events that can change the dynamics of markets. Considering this, regulators and financial institutions began to search more realistic models. The aim is to include external influences and interdependencies between agents, to describe and measure the operationalization of these complex systems and their risks in a more coherent and credible way. Within this context, X-Events are more frequent than assumed and, with uncertainties and constant changes, the concept of antifragility starts to gain great prominence in comparison to others methodologies of risk management. It is very useful to analyse whether a system succumbs (fragile), resists (robust) or gets benefits (antifragile) from disorder and stress. Thus, this work proposes the creation of the Banking Antifragility Index (BAI), which is based on the calculation of a triangular fuzzy number – to "quantify" qualitative criteria linked to antifragility.

Keywords: adaptive complex systems, X-Events, risk management, antifragility, banking antifragility index, triangular fuzzy number

Procedia PDF Downloads 164