Search results for: information literacy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11152

Search results for: information literacy

9562 Data Mining Spatial: Unsupervised Classification of Geographic Data

Authors: Chahrazed Zouaoui

Abstract:

In recent years, the volume of geospatial information is increasing due to the evolution of communication technologies and information, this information is presented often by geographic information systems (GIS) and stored on of spatial databases (BDS). The classical data mining revealed a weakness in knowledge extraction at these enormous amounts of data due to the particularity of these spatial entities, which are characterized by the interdependence between them (1st law of geography). This gave rise to spatial data mining. Spatial data mining is a process of analyzing geographic data, which allows the extraction of knowledge and spatial relationships from geospatial data, including methods of this process we distinguish the monothematic and thematic, geo- Clustering is one of the main tasks of spatial data mining, which is registered in the part of the monothematic method. It includes geo-spatial entities similar in the same class and it affects more dissimilar to the different classes. In other words, maximize intra-class similarity and minimize inter similarity classes. Taking account of the particularity of geo-spatial data. Two approaches to geo-clustering exist, the dynamic processing of data involves applying algorithms designed for the direct treatment of spatial data, and the approach based on the spatial data pre-processing, which consists of applying clustering algorithms classic pre-processed data (by integration of spatial relationships). This approach (based on pre-treatment) is quite complex in different cases, so the search for approximate solutions involves the use of approximation algorithms, including the algorithms we are interested in dedicated approaches (clustering methods for partitioning and methods for density) and approaching bees (biomimetic approach), our study is proposed to design very significant to this problem, using different algorithms for automatically detecting geo-spatial neighborhood in order to implement the method of geo- clustering by pre-treatment, and the application of the bees algorithm to this problem for the first time in the field of geo-spatial.

Keywords: mining, GIS, geo-clustering, neighborhood

Procedia PDF Downloads 375
9561 The Use of a Geographical Information System in the Field of Irrigation (Moyen-Chéliff)

Authors: Benhenni Abdellaziz

Abstract:

Irrigation is a limiting factor for agricultural production and socioeconomic development of many countries in the arid and semi-arid world. However, the sustainability of irrigation systems requires rational management of the water resource, which is becoming increasingly rare in these regions. The objective of this work is to apply a geographic information system (GIS) coupled with a model for calculating crop water requirements (CROPWATER) for the management of irrigation water in irrigated areas and offer managers an effective tool to better manage water resources in these areas. The application area of GIS is the irrigated perimeter of Western Middle Cheliff, which is located in a semi-arid region (Middle Cheliff). The scope in question is considerable agrarian dynamics and an increased need for irrigation of most crops.

Keywords: GIS, CROPWAT, irrigation, water management, middle cheliff

Procedia PDF Downloads 70
9560 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 116
9559 Analysing Tertiary Lecturers’ Teaching Practices and Their English Major Students’ Learning Practices with Information and Communication Technology (ICT) Utilization in Promoting Higher-Order Thinking Skills (HOTs)

Authors: Malini Ganapathy, Sarjit Kaur

Abstract:

Maximising learning with higher-order thinking skills with Information and Communications Technology (ICT) has been deep-rooted and emphasised in various developed countries such as the United Kingdom, the United States of America and Singapore. The transformation of the education curriculum in the Malaysia Education Development Plan (PPPM) 2013-2025 focuses on the concept of Higher Order Thinking (HOT) skills which aim to produce knowledgeable students who are critical and creative in their thinking and can compete at the international level. HOT skills encourage students to apply, analyse, evaluate and think creatively in and outside the classroom. In this regard, the National Education Blueprint (2013-2025) is grounded based on high-performing systems which promote a transformation of the Malaysian education system in line with the vision of Malaysia’s National Philosophy in achieving educational outcomes which are of world class status. This study was designed to investigate ESL students’ learning practices on the emphasis of promoting HOTs while using ICT in their curricula. Data were collected using a stratified random sampling where 100 participants were selected to take part in the study. These respondents were a group of undergraduate students who undertook ESL courses in a public university in Malaysia. A three-part questionnaire consisting of demographic information, students’ learning experience and ICT utilization practices was administered in the data collection process. Findings from this study provide several important insights on students’ learning experiences and ICT utilization in developing HOT skills.

Keywords: English as a second language students, critical and creative thinking, learning, information and communication technology and higher order thinking skills

Procedia PDF Downloads 490
9558 An Application-Driven Procedure for Optimal Signal Digitization of Automotive-Grade Ultrasonic Sensors

Authors: Mohamed Shawki Elamir, Heinrich Gotzig, Raoul Zoellner, Patrick Maeder

Abstract:

In this work, a methodology is presented for identifying the optimal digitization parameters for the analog signal of ultrasonic sensors. These digitization parameters are the resolution of the analog to digital conversion and the sampling rate. This is accomplished through the derivation of characteristic curves based on Fano inequality and the calculation of the mutual information content over a given dataset. The mutual information is calculated between the examples in the dataset and the corresponding variation in the feature that needs to be estimated. The optimal parameters are identified in a manner that ensures optimal estimation performance while preventing inefficiency in using unnecessarily powerful analog to digital converters.

Keywords: analog to digital conversion, digitization, sampling rate, ultrasonic

Procedia PDF Downloads 207
9557 Citation Analysis on the Articles published in Bayero Journal of Pure and Applied Sciences (BAJOPAS), from 2008-2020: An International Journal in Bayero University, Kano, Nigeria

Authors: G. A. Babalola, Yusuf Muhammad

Abstract:

An analysis was carried out on 19,759 citations appended to the References Section of 881 research articles published in Bayero Journal of Pure and Applied Sciences. It was found that journals publications were the most cited source of information among pure and applied sciences scientists with 12,090 (61.2%). The study also revealed that researchers in the field of pure and applied sciences used very current and up to date information sources in writing theirs articles with 10,091 (51.1%) citations and an average mean 11.1 per article in the journal.

Keywords: citation analysis, BAJOPAS, journal article, Bayero University Kano, Nigeria

Procedia PDF Downloads 165
9556 Detecting of Crime Hot Spots for Crime Mapping

Authors: Somayeh Nezami

Abstract:

The management of financial and human resources of police in metropolitans requires many information and exact plans to reduce a rate of crime and increase the safety of the society. Geographical Information Systems have an important role in providing crime maps and their analysis. By using them and identification of crime hot spots along with spatial presentation of the results, it is possible to allocate optimum resources while presenting effective methods for decision making and preventive solutions. In this paper, we try to explain and compare between some of the methods of hot spots analysis such as Mode, Fuzzy Mode and Nearest Neighbour Hierarchical spatial clustering (NNH). Then the spots with the highest crime rates of drug smuggling for one province in Iran with borderline with Afghanistan are obtained. We will show that among these three methods NNH leads to the best result.

Keywords: GIS, Hot spots, nearest neighbor hierarchical spatial clustering, NNH, spatial analysis of crime

Procedia PDF Downloads 329
9555 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages

Authors: Okike Benjamin, E. J. D. Garba

Abstract:

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.

Keywords: information security, message splitting, pattern, sequence

Procedia PDF Downloads 287
9554 Effect of Information and Communication Intervention on Stable Economic Growth in Ethiopia

Authors: Medhin Haftom Hailu

Abstract:

The advancement of information technology has significantly impacted Ethiopia's economy, driving innovation, productivity, job creation, and global connectivity. This research examined the impact of contemporary information and communication technologies on Ethiopian economic progress. The study examined eight variables, including mobile, internet, and fixed-line penetration rates, and five macroeconomic control variables. The results showed a positive and strong effect of ICT on economic growth in Ethiopia, with 1% increase in mobile, internet, and fixed line services penetration indexes resulting in an 8.03, 10.05, and 30.06% increase in real GDP. The Granger causality test showed that all ICT variables Granger caused economic growth, but economic growth Granger caused mobile penetration rate only. The study suggests that coordinated ICT infrastructure development, increased telecom service accessibility, and increased competition in the telecom market are crucial for Ethiopia's economic growth. Ethiopia is attempting to establish a digital economy through massive investment in ensuring ICT quality and accessibility. Thus, the research could enhance in understanding of the economic impact of ICT expansion for successful ICT policy interventions for future research.

Keywords: economic growth, cointegration and error correction, ICT expansion, granger causality, penetration

Procedia PDF Downloads 79
9553 A Good Start for Digital Transformation of the Companies: A Literature and Experience-Based Predefined Roadmap

Authors: Batuhan Kocaoglu

Abstract:

Nowadays digital transformation is a hot topic both in service and production business. For the companies who want to stay alive in the following years, they should change how they do their business. Industry leaders started to improve their ERP (Enterprise Resource Planning) like backbone technologies to digital advances such as analytics, mobility, sensor-embedded smart devices, AI (Artificial Intelligence) and more. Selecting the appropriate technology for the related business problem also is a hot topic. Besides this, to operate in the modern environment and fulfill rapidly changing customer expectations, a digital transformation of the business is required and change the way the business runs, affect how they do their business. Even the digital transformation term is trendy the literature is limited and covers just the philosophy instead of a solid implementation plan. Current studies urge firms to start their digital transformation, but few tell us how to do. The huge investments scare companies with blur definitions and concepts. The aim of this paper to solidify the steps of the digital transformation and offer a roadmap for the companies and academicians. The proposed roadmap is developed based upon insights from the literature review, semi-structured interviews, and expert views to explore and identify crucial steps. We introduced our roadmap in the form of 8 main steps: Awareness; Planning; Operations; Implementation; Go-live; Optimization; Autonomation; Business Transformation; including a total of 11 sub-steps with examples. This study also emphasizes four dimensions of the digital transformation mainly: Readiness assessment; Building organizational infrastructure; Building technical infrastructure; Maturity assessment. Finally, roadmap corresponds the steps with three main terms used in digital transformation literacy as Digitization; Digitalization; and Digital Transformation. The resulted model shows that 'business process' and 'organizational issues' should be resolved before technology decisions and 'digitization'. Companies can start their journey with the solid steps, using the proposed roadmap to increase the success of their project implementation. Our roadmap is also adaptable for relevant Industry 4.0 and enterprise application projects. This roadmap will be useful for companies to persuade their top management for investments. Our results can be used as a baseline for further researches related to readiness assessment and maturity assessment studies.

Keywords: digital transformation, digital business, ERP, roadmap

Procedia PDF Downloads 170
9552 A New Approach to Increase Consumer Understanding of Meal’s Quality – Food Focus Instead of Nutrient Focus

Authors: Elsa Lamy, Marília Prada, Ada Rocha, Cláudia Viegas

Abstract:

The traditional and widely used nutrition-focused approach to communicate with consumers is reductionist and makes it difficult for consumers to assess their food intake. Without sufficient nutrition knowledge and understanding, it would be difficult to choose a healthful diet based only on nutritional recommendations. This study aimed to evaluate the understanding of how food/nutritional information is presented in menus to Portuguese consumers, comparing the nutrient-focused approach (currently used Nutrition Declaration) and the new food-focused approach (the infographic). For data collection, a questionnaire was distributed online using social media channels. A main effect of format on ratings of meal balance and completeness (Fbalance(1,79) = 18.26, p < .001, ηp2 = .188; Fcompleteness(1,67) = 27.18, p < .001, ηp2 = .289). Overall, dishes paired with the nutritional information were rated as more balanced (Mbalance= 3.70, SE = .11; Mcompleteness = 4.00, SE = .14) than meals with the infographic representation (Mbalance = 3.14, SE = .11; Mcompleteness = 3.29, SE = .13). We also observed a main effect of the meal, F(3,237) = 48.90, p < .001, ηp2 = .382, such that M1 and M2 were perceived as less balanced than the M3 and M4, all p < .001. The use of a food-focused approach (infographic) helped participants identify the lack of balance in the less healthful meals (dishes M1 and M2), allowing for a better understanding of meals' compliance with recommendations contributing to better food choices and a healthier lifestyle.

Keywords: food labelling, food and nutritional recommendations, infographics, portions based information

Procedia PDF Downloads 79
9551 Role of Natural Language Processing in Information Retrieval; Challenges and Opportunities

Authors: Khaled M. Alhawiti

Abstract:

This paper aims to analyze the role of natural language processing (NLP). The paper will discuss the role in the context of automated data retrieval, automated question answer, and text structuring. NLP techniques are gaining wider acceptance in real life applications and industrial concerns. There are various complexities involved in processing the text of natural language that could satisfy the need of decision makers. This paper begins with the description of the qualities of NLP practices. The paper then focuses on the challenges in natural language processing. The paper also discusses major techniques of NLP. The last section describes opportunities and challenges for future research.

Keywords: data retrieval, information retrieval, natural language processing, text structuring

Procedia PDF Downloads 340
9550 Teachers' Views on Mother Tongue Language Curriculum Development

Authors: Wai Ha Leung

Abstract:

Mother tongue language (MTL) curriculum is core to school education in most countries/regions' school curriculum. Through mother tongue language learning, students are expected to enhance their understanding of the nation's culture and foster the sense of cultural and ethnic identity. However, MTL education in Hong Kong is complicated by the colonial history. This study examines Hong Kong Chinese language teachers' perceptions of MTL education, and the implication on MTL curriculum development. The questionnaire was administrated to 97 teachers, and interviews were carried out on 17 teachers. Usually, MTL is both the tool with which knowledge and skills are taught and learned and the vehicle for students to learn about the traditions of the countries' literature and culture. In Hong Kong, 95% of the population is of Chinese descent. Traditionally, education in China was a mixture of philosophy, history, politics and literacy. Chinese as an MTL subject in pre-colonial Hong Kong has always been assigned the mission of developing students' cultural identity in addition to the development of linguistic proficiency. During the colonial period, the Chinese Language curriculum shifted to be more language skills based with less emphasis on Chinese culture and moral education. After the sovereignty of Hong Kong was returned to China in 1997, although a new curriculum was implemented in 2002, teaching and learning in school as well as public examinations seem to be remaining language skills oriented instead of culturally based. This deviation from the trend of both Chinese traditional education and global mother tongue language education makes some Chinese language teachers feel confused. In addition, there is comment that in general Hong Kong students' Chinese language proficiency is becoming weaker and weaker in recent years. Thus, effectiveness of the skills oriented language curriculum has come under question. How a language teacher views the aims and objectives of the language subject he or she is teaching has a direct effect on the curriculum delivery and pedagogies used. It is, therefore, important to investigate what is the language teachers' perception of MTL education, and whether the current school curriculum can meet the teachers' expectation as well as achieve the aims of MTL education. Given this context, this study explored the views of Hong Kong Chinese language teachers on MTL education. The data indicate that teachers showed a strong resentment towards the current curriculum. Results may have implications on mother tongue language curriculum development.

Keywords: Chinese language education, curriculum development, mother tongue language education, teachers' perception

Procedia PDF Downloads 489
9549 21st Century Business Dynamics: Acting Local and Thinking Global through Extensive Business Reporting Language (XBRL)

Authors: Samuel Faboyede, Obiamaka Nwobu, Samuel Fakile, Dickson Mukoro

Abstract:

In the present dynamic business environment of corporate governance and regulations, financial reporting is an inevitable and extremely significant process for every business enterprise. Several financial elements such as Annual Reports, Quarterly Reports, ad-hoc filing, and other statutory/regulatory reports provide vital information to the investors and regulators, and establish trust and rapport between the internal and external stakeholders of an organization. Investors today are very demanding, and emphasize greatly on authenticity, accuracy, and reliability of financial data. For many companies, the Internet plays a key role in communicating business information, internally to management and externally to stakeholders. Despite high prominence being attached to external reporting, it is disconnected in most companies, who generate their external financial documents manually, resulting in high degree of errors and prolonged cycle times. Chief Executive Officers and Chief Financial Officers are increasingly susceptible to endorsing error-laden reports, late filing of reports, and non-compliance with regulatory acts. There is a lack of common platform to manage the sensitive information – internally and externally – in financial reports. The Internet financial reporting language known as eXtensible Business Reporting Language (XBRL) continues to develop in the face of challenges and has now reached the point where much of its promised benefits are available. This paper looks at the emergence of this revolutionary twenty-first century language of digital reporting. It posits that today, the world is on the brink of an Internet revolution that will redefine the ‘business reporting’ paradigm. The new Internet technology, eXtensible Business Reporting Language (XBRL), is already being deployed and used across the world. It finds that XBRL is an eXtensible Markup Language (XML) based information format that places self-describing tags around discrete pieces of business information. Once tags are assigned, it is possible to extract only desired information, rather than having to download or print an entire document. XBRL is platform-independent and it will work on any current or recent-year operating system, or any computer and interface with virtually any software. The paper concludes that corporate stakeholders and the government cannot afford to ignore the XBRL. It therefore recommends that all must act locally and think globally now via the adoption of XBRL that is changing the face of worldwide business reporting.

Keywords: XBRL, financial reporting, internet, internal and external reports

Procedia PDF Downloads 286
9548 Customer Behavior and Satisfaction of Domestic Low Cost Carrier in Chiang Mai, Thailand

Authors: Thiraporn Chumphuming, Nuttida Boonmathi, Supattra Thanomsiang, Tawatchai Noree, Suthee Boonchaloem, Rinyaphat Kecharananta

Abstract:

This research aims to study about the formats of low-cost airlines’ services in domestic route by surveying customers’ requirements and satisfactions in choosing low-cost airlines to travel domestically. Chiang Mai International Airport and other regions in Chiang Mai are the bases where the information is quantitatively collected. Passengers and questionnaires of 400 are the data base in which the researchers collected information from. Statistic units used are Percentage, Weighted Average, and Standard Deviation. The result of the study reveals that the group of 400 representative samples chooses Air Asia the most from overall six low-cost airlines that provide domestic services. Most of the representative samples book plane tickets for their traveling and they book tickets during the promotion time that provides cheap-priced tickets. Averagely, the price for a seat in one flight is around 501-1,000 Thai baht. The result of the satisfaction’s survey analyzed by the Marketing Mix Factors (7Ps) of low-cost airlines, which is divided into 4 parts including services before ticket reservations, services before boarding/purchasing tickets (ground), In-flight services, and Services after boarding they are satisfied with the baggage claim point informing, also gives the information that the passengers are highly satisfied with every process or the services.

Keywords: low-cost airline, service, satisfaction, customers' behavior

Procedia PDF Downloads 225
9547 Understanding the Selectional Preferences of the Twitter Mentions Network

Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das

Abstract:

Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.

Keywords: information diffusion, personality and values, social network analysis, twitter mentions network

Procedia PDF Downloads 374
9546 Strategy, Intellectual Capital Disclosure, Competition, and Market Performance

Authors: Agnes Utari Widyaningdyah

Abstract:

This study investigates the relationship between strategy, intellectual capital (IC) disclosure, and the firm’s performance by considering business competition as a moderating variable. The secondary sectors manufacturing firms in the Jakarta Stock Industrial Classification as sample because this group represents a knowledge-intensive firm according to the OECD (Organization for Economic Cooperation and Development) criteria. Using path analysis, this study reveals that there is a significant influence of strategy toward IC disclosure. Firms with differentiation strategy tend to withhold its strategic information included IC because of afraid in losing their competitive advantage. The results also indicate that firms are more likely to withhold information about IC if they perceive that current or potential competition is strong. However, firms should consider that IC disclosure is a positive signal to the investor.

Keywords: strategy, IC disclosure, market performance, business competition

Procedia PDF Downloads 295
9545 The Asymmetric Proximal Support Vector Machine Based on Multitask Learning for Classification

Authors: Qing Wu, Fei-Yan Li, Heng-Chang Zhang

Abstract:

Multitask learning support vector machines (SVMs) have recently attracted increasing research attention. Given several related tasks, the single-task learning methods trains each task separately and ignore the inner cross-relationship among tasks. However, multitask learning can capture the correlation information among tasks and achieve better performance by training all tasks simultaneously. In addition, the asymmetric squared loss function can better improve the generalization ability of the models on the most asymmetric distributed data. In this paper, we first make two assumptions on the relatedness among tasks and propose two multitask learning proximal support vector machine algorithms, named MTL-a-PSVM and EMTL-a-PSVM, respectively. MTL-a-PSVM seeks a trade-off between the maximum expectile distance for each task model and the closeness of each task model to the general model. As an extension of the MTL-a-PSVM, EMTL-a-PSVM can select appropriate kernel functions for shared information and private information. Besides, two corresponding special cases named MTL-PSVM and EMTLPSVM are proposed by analyzing the asymmetric squared loss function, which can be easily implemented by solving linear systems. Experimental analysis of three classification datasets demonstrates the effectiveness and superiority of our proposed multitask learning algorithms.

Keywords: multitask learning, asymmetric squared loss, EMTL-a-PSVM, classification

Procedia PDF Downloads 133
9544 Application of Improved Semantic Communication Technology in Remote Sensing Data Transmission

Authors: Tingwei Shu, Dong Zhou, Chengjun Guo

Abstract:

Semantic communication is an emerging form of communication that realize intelligent communication by extracting semantic information of data at the source and transmitting it, and recovering the data at the receiving end. It can effectively solve the problem of data transmission under the situation of large data volume, low SNR and restricted bandwidth. With the development of Deep Learning, semantic communication further matures and is gradually applied in the fields of the Internet of Things, Uumanned Air Vehicle cluster communication, remote sensing scenarios, etc. We propose an improved semantic communication system for the situation where the data volume is huge and the spectrum resources are limited during the transmission of remote sensing images. At the transmitting, we need to extract the semantic information of remote sensing images, but there are some problems. The traditional semantic communication system based on Convolutional Neural Network cannot take into account the global semantic information and local semantic information of the image, which results in less-than-ideal image recovery at the receiving end. Therefore, we adopt the improved vision-Transformer-based structure as the semantic encoder instead of the mainstream one using CNN to extract the image semantic features. In this paper, we first perform pre-processing operations on remote sensing images to improve the resolution of the images in order to obtain images with more semantic information. We use wavelet transform to decompose the image into high-frequency and low-frequency components, perform bilinear interpolation on the high-frequency components and bicubic interpolation on the low-frequency components, and finally perform wavelet inverse transform to obtain the preprocessed image. We adopt the improved Vision-Transformer structure as the semantic coder to extract and transmit the semantic information of remote sensing images. The Vision-Transformer structure can better train the huge data volume and extract better image semantic features, and adopt the multi-layer self-attention mechanism to better capture the correlation between semantic features and reduce redundant features. Secondly, to improve the coding efficiency, we reduce the quadratic complexity of the self-attentive mechanism itself to linear so as to improve the image data processing speed of the model. We conducted experimental simulations on the RSOD dataset and compared the designed system with a semantic communication system based on CNN and image coding methods such as BGP and JPEG to verify that the method can effectively alleviate the problem of excessive data volume and improve the performance of image data communication.

Keywords: semantic communication, transformer, wavelet transform, data processing

Procedia PDF Downloads 78
9543 MapReduce Algorithm for Geometric and Topological Information Extraction from 3D CAD Models

Authors: Ahmed Fradi

Abstract:

In a digital world in perpetual evolution and acceleration, data more and more voluminous, rich and varied, the new software solutions emerged with the Big Data phenomenon offer new opportunities to the company enabling it not only to optimize its business and to evolve its production model, but also to reorganize itself to increase competitiveness and to identify new strategic axes. Design and manufacturing industrial companies, like the others, face these challenges, data represent a major asset, provided that they know how to capture, refine, combine and analyze them. The objective of our paper is to propose a solution allowing geometric and topological information extraction from 3D CAD model (precisely STEP files) databases, with specific algorithm based on the programming paradigm MapReduce. Our proposal is the first step of our future approach to 3D CAD object retrieval.

Keywords: Big Data, MapReduce, 3D object retrieval, CAD, STEP format

Procedia PDF Downloads 540
9542 The Power of Public Opinion in the Xinhai Revolution: Media, Public Sentiment, and Social Mobilization

Authors: Yu Yaochuan

Abstract:

This paper explores the pivotal role of public opinion during the Xinhai Revolution. Examining the dynamics of public sentiment in Chinese society in 1911 shows how information dissemination, ideological propaganda, and public mobilization worked together to drive the revolution to success. The study highlights the indispensable role of revolutionary newspapers, assemblies, and speeches in spreading revolutionary ideas, mobilizing the public, and shaping policy perceptions. By analyzing these historical events, the paper provides a deeper insight into the Xinhai Revolution and offers theoretical and empirical support for understanding the application of public opinion in modern social and political transformations.

Keywords: Xinhai Revolution, public opinion, social mobilization, information dissemination, ideology, political transformation

Procedia PDF Downloads 43
9541 Use of GIS and Remote Sensing for Calculating the Installable Photovoltaic and Thermal Power on All the Roofs of the City of Aix-en-Provence, France

Authors: Sofiane Bourchak, Sébastien Bridier

Abstract:

The objective of this study is to show how to calculate and map solar energy’s quantity (instantaneous and accumulated global solar radiation during the year) available on roofs in the city Aix-en-Provence which has a population of 140,000 inhabitants. The result is a geographic information system (GIS) layer, which represents hourly and monthly the production of solar energy on roofs throughout the year. Solar energy professionals can use it to optimize implementations and to size energy production systems. The results are presented as a set of maps, tables and histograms in order to determine the most effective costs in Aix-en-Provence in terms of photovoltaic power (electricity) and thermal power (hot water).

Keywords: geographic information system, photovoltaic, thermal, solar potential, solar radiation

Procedia PDF Downloads 436
9540 Building Information Management Advantages, Adaptation, and Challenges of Implementation in Kabul Metropolitan Area

Authors: Mohammad Rahim Rahimi, Yuji Hoshino

Abstract:

Building Information Management (BIM) at recent years has widespread consideration on the Architecture, Engineering and Construction (AEC). BIM has been bringing innovation in AEC industry and has the ability to improve the construction industry with high quality, reduction time and budget of project. Meanwhile, BIM support model and process in AEC industry, the process include the project time cycle, estimating, delivery and generally the way of management of project but not limited to those. This research carried the BIM advantages, adaptation and challenges of implementation in Kabul region. Capital Region Independence Development Authority (CRIDA) have responsibilities to implement the development projects in Kabul region. The method of study were considers on advantages and reasons of BIM performance in Afghanistan based on online survey and data. Besides that, five projects were studied, the reason of consideration were many times design revises and changes. Although, most of the projects had problems regard to designing and implementation stage, hence in canal project was discussed in detail with the main reason of problems. Which were many time changes and revises due to the lack of information, planning, and management. In addition, two projects based on BIM utilization in Japan were also discussed. The Shinsuizenji Station and Oita River dam projects. Those are implemented and implementing consequently according to the BIM requirements. The investigation focused on BIM usage, project implementation process. Eventually, the projects were the comparison with CRIDA and BIM utilization in Japan. The comparison will focus on the using of the model and the way of solving the problems based upon on the BIM. In conclusion, that BIM had the capacity to prevent many times design changes and revises. On behalf of achieving those objectives are required to focus on data management and sharing, BIM training and using new technology.

Keywords: construction information management, implementation and adaptation of BIM, project management, developing countries

Procedia PDF Downloads 129
9539 Enhanced Traffic Light Detection Method Using Geometry Information

Authors: Changhwan Choi, Yongwan Park

Abstract:

In this paper, we propose a method that allows faster and more accurate detection of traffic lights by a vision sensor during driving, DGPS is used to obtain physical location of a traffic light, extract from the image information of the vision sensor only the traffic light area at this location and ascertain if the sign is in operation and determine its form. This method can solve the problem in existing research where low visibility at night or reflection under bright light makes it difficult to recognize the form of traffic light, thus making driving unstable. We compared our success rate of traffic light recognition in day and night road environments. Compared to previous researches, it showed similar performance during the day but 50% improvement at night.

Keywords: traffic light, intelligent vehicle, night, detection, DGPS

Procedia PDF Downloads 325
9538 Data Hiding in Gray Image Using ASCII Value and Scanning Technique

Authors: R. K. Pateriya, Jyoti Bharti

Abstract:

This paper presents an approach for data hiding methods which provides a secret communication between sender and receiver. The data is hidden in gray-scale images and the boundary of gray-scale image is used to store the mapping information. In this an approach data is in ASCII format and the mapping is in between ASCII value of hidden message and pixel value of cover image, since pixel value of an image as well as ASCII value is in range of 0 to 255 and this mapping information is occupying only 1 bit per character of hidden message as compared to 8 bit per character thus maintaining good quality of stego image.

Keywords: ASCII value, cover image, PSNR, pixel value, stego image, secret message

Procedia PDF Downloads 413
9537 Artificial Intelligence Approach to Manage Human Resources Information System Process in the Construction Industry

Authors: Ahmed Emad Ahmed

Abstract:

This paper aims to address the concept of human resources information systems (HRIS) and how to link it to new technologies such as artificial intelligence (AI) to be implemented in two human resources processes. A literature view has been collected to cover the main points related to HRIS, AI, and BC. A study case has been presented by generating a random HRIS to apply some AI operations to it. Then, an algorithm was applied to the database to complete some human resources processes, including training and performance appraisal, using a pre-trained AI model. After that, outputs and results have been presented and discussed briefly. Finally, a conclusion has been introduced to show the ability of new technologies such as AI and ML to be applied to the human resources management processes.

Keywords: human resources new technologies, HR artificial intelligence, HRIS AI models, construction AI HRIS

Procedia PDF Downloads 170
9536 Interoperable Platform for Internet of Things at Home Applications

Authors: Fabiano Amorim Vaz, Camila Gonzaga de Araujo

Abstract:

With the growing number of personal devices such as smartphones, tablets, smart watches, among others, in addition to recent devices designed for IoT, it is observed that residential environment has potential to generate important information about our daily lives. Therefore, this work is focused on showing and evaluating a system that integrates all these technologies considering the context of a smart house. To achieve this, we define an architecture capable of supporting the amount of data generated and consumed at a residence and, mainly, the variety of this data presents. We organize it in a particular cloud containing information about robots, recreational vehicles, weather, in addition to data from the house, such as lighting, energy, security, among others. The proposed architecture can be extrapolated to various scenarios and applications. Through the core of this work, we can define new functionality for residences integrating them with more resources.

Keywords: cloud computing, IoT, robotics, smart house

Procedia PDF Downloads 381
9535 Information and Communication Technologies-Based Urban Spaces: From Planning and Design to Implementation

Authors: Yountaik Leem, Kwang Woo Nam, Sang Ho Lee, Tae Heon Moon

Abstract:

As to the development of the capitalist economy, local governments put their focuses on economic growth and quality of life including the management of declined urban area. Together with the rapid advances in ICTs (information and communication technologies) Korean government tried to adapt ICTs to urban spaces to catch these two goals. Ubiquitous city, concept introduced by Mark Weiser in 1988, is a kind of ICTs based urban space which can provide IT services anytime and anywhere. This paper introduces the experience of developing ICTs-based urban planning and it’s implementation process and discusses the effect of the R&D based U-City test-bed project. For a community center of a residential zone in a newly developing city, spatial problems and citizen’s needs were identified to plan IT-based urban services. The paper also describes the structure and functions of Community O/S (COS) as an IT platform which controls data and urban devices such as media facades and U-poles. Not only one-way information but also Interactive services were included. Public creating activities using this platform also added –CO2 emission management and citizen making safety map, etc. The effects of the comprehensive U-City planning in S/W, H/W and human-ware were discussed on the case study of similar individual projects.

Keywords: ICTs-based urban planning, implementation, public IT service, U-City

Procedia PDF Downloads 325
9534 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 454
9533 Educating the Educators: Interdisciplinary Approaches to Enhance Science Teaching

Authors: Denise Levy, Anna Lucia C. H. Villavicencio

Abstract:

In a rapid-changing world, science teachers face considerable challenges. In addition to the basic curriculum, there must be included several transversal themes, which demand creative and innovative strategies to be arranged and integrated to traditional disciplines. In Brazil, nuclear science is still a controversial theme, and teachers themselves seem to be unaware of the issue, most often perpetuating prejudice, errors and misconceptions. This article presents the authors’ experience in the development of an interdisciplinary pedagogical proposal to include nuclear science in the basic curriculum, in a transversal and integrating way. The methodology applied was based on the analysis of several normative documents that define the requirements of essential learning, competences and skills of basic education for all schools in Brazil. The didactic materials and resources were developed according to the best practices to improve learning processes privileging constructivist educational techniques, with emphasis on active learning process, collaborative learning and learning through research. The material consists of an illustrated book for students, a book for teachers and a manual with activities that can articulate nuclear science to different disciplines: Portuguese, mathematics, science, art, English, history and geography. The content counts on high scientific rigor and articulate nuclear technology with topics of interest to society in the most diverse spheres, such as food supply, public health, food safety and foreign trade. Moreover, this pedagogical proposal takes advantage of the potential value of digital technologies, implementing QR codes that excite and challenge students of all ages, improving interaction and engagement. The expected results include the education of the educators for nuclear science communication in a transversal and integrating way, demystifying nuclear technology in a contextualized and significant approach. It is expected that the interdisciplinary pedagogical proposal contributes to improving attitudes towards knowledge construction, privileging reconstructive questioning, fostering a culture of systematic curiosity and encouraging critical thinking skills.

Keywords: science education, interdisciplinary learning, nuclear science, scientific literacy

Procedia PDF Downloads 133