Search results for: face compare
3745 The Influence of Online Marketing Tactics in Tourist Destination Reputation: Egypt as a Case Study
Authors: Alyaa Darwish, Peter Burns, Sofia Reino
Abstract:
Online marketing has been the key focus of attention for the majority of destinations since the Internet became the primarily information tool for travel marketing. Tourism is a reputation-dependent industry; potential travelers who do not have previous experience with the destination face numerous risks during the process of decision-making. An accurate perception of the destination’s reputation helps to minimize risk against unsatisfying travel experiences. However, there has been limited investigation with regards to the reputation of tourist destination. Taking the importance of reputation to the tourism industry, this research aims to: 1) Develop a destination reputation model; 2) Assess the tourist destination approach towards online marketing tactics; 3) Evaluate the impact of differentiated online marketing tactics on reputation; and 4) Measure the potential for using online marketing tactics to manage the destination’s online reputation. This research follows an interpretivism epistemological research approach through using four research methods; interviews, questionnaire, content analysis, and experiment to achieve the research goals.Keywords: destination reputation, online marketing, reputation, tactics
Procedia PDF Downloads 3543744 Trends of Conservation and Development in Mexican Biosphere Reserves: Spatial Analysis and Linear Mixed Model
Authors: Cecilia Sosa, Fernanda Figueroa, Leonardo Calzada
Abstract:
Biosphere reserves (BR) are considered as the main strategy for biodiversity and ecosystems conservation. Mexican BR are mainly inhabited by rural communities who strongly depend on forests and their resources. Even though the dual objective of conservation and development has been sought in BR, land cover change is a common process in these areas, while most rural communities are highly marginalized, partly as a result of restrictions imposed by conservation to the access and use of resources. Achieving ecosystems conservation and social development face serious challenges. Factors such as financial support for development projects (public/private), environmental conditions, infrastructure and regional economic conditions might influence both land use change and wellbeing. Examining the temporal trends of conservation and development in BR is central for the evaluation of outcomes for these conservation strategies. In this study, we analyzed changes in primary vegetation cover (as a proxy for conservation) and the index of marginalization (as a proxy for development) in Mexican BR (2000-2015); we also explore the influence of various factors affecting these trends, such as conservation-development projects financial support (public or private), geographical distribution in ecoregions (as a proxy for shared environmental conditions) and in economic zones (as a proxy for regional economic conditions). We developed a spatial analysis at the municipal scale (2,458 municipalities nationwide) in ArcGIS, to obtain road densities, geographical distribution in ecoregions and economic zones, the financial support received, and the percent of municipality area under protection by protected areas and, particularly, by BR. Those municipalities with less than 25% of area under protection were regarded as part of the protected area. We obtained marginalization indexes for all municipalities and, using MODIS in Google Earth Engine, the number of pixels covered by primary vegetation. We used a linear mixed model in RStudio for the analysis. We found a positive correlation between the marginalization index and the percent of primary vegetation cover per year (r=0.49-0.5); i.e., municipalities with higher marginalization also show higher percent of primary vegetation cover. Also, those municipalities with higher area under protection have more development projects (r=0.46) and some environmental conditions were relevant for percent of vegetation cover. Time, economic zones and marginalization index were all important. Time was particularly, in 2005, when both marginalization and deforestation decreased. Road densities and financial support for conservation-development projects were irrelevant as factors in the general correlation. Marginalization is still being affected by the conservation strategies applied in BR, even though that this management category considers both conservation and development of local communities as its objectives. Our results suggest that roads densities and support for conservation-development projects have not been a factor of poverty alleviation. As better conservation is being attained in the most impoverished areas, we face the dilemma of how to improve wellbeing in rural communities under conservation, since current strategies have not been able to leave behind the conservation-development contraposition.Keywords: deforestation, local development, marginalization, protected areas
Procedia PDF Downloads 1343743 The Challenges of Teaching First Year Accounting with a Lecturer-Student Ratio of 1:1248
Authors: Hanli Joubert
Abstract:
In South Africa, teaching large classes is a reality that lecturers face in most higher institutions. When teaching a large group, literature normally refers to groups of about 50 to 500 students. At the University of the Free State, the first-year accounting group comprises around 1300 students. Apart from extremely large classes, the problem is exacerbated by the diversity of students’ previous schooling in accounting as well as their socio-economic backgrounds. The university scenario is further complicated by a lack of venues, compressed timetables, as well as lack of resources. This study aims to investigate the challenges and effectiveness of teaching a large and diverse group of first-year accounting students by drawing from personal experience, a literature study, interviews with other lecturers as well as students registered for first year accounting. The results reveal that teaching first-year accounting students in a large group is not the ideal situation but that it can be effective if it is managed correctly.Keywords: diverse backgrounds, large groups, limited resources, first-year accounting students
Procedia PDF Downloads 533742 Improving Coverage in Wireless Sensor Networks Using Particle Swarm Optimization Algorithm
Authors: Ehsan Abdolzadeh, Sanaz Nouri, Siamak Khalaj
Abstract:
Today WSNs have many applications in different fields like the environment, military operations, discoveries, monitoring operations, and so on. Coverage size and energy consumption are the important challenges that these networks need to face. This paper tries to solve the problem of coverage with a requirement of k-coverage and minimum energy consumption. In order to minimize energy consumption, visual sensor networks have been used that observe and process just those targets that are located in their view direction. As a result, sensor rotations have decreased, and subsequently, energy consumption has been minimized. To solve the problem of coverage particle swarm optimization, coverage optimization has been able to ensure coverage requirement together with minimizing sensor rotations while meeting the problem requirement of k≤14. So energy consumption has decreased, and this could extend the sensors’ lifetime subsequently.Keywords: K coverage, particle union optimization algorithm, wireless sensor networks, visual sensor networks
Procedia PDF Downloads 1153741 Joint Physical Custody: Lessons from the European Union
Authors: Katarzyna Kamińska
Abstract:
When thinking about custodial arrangements after divorce or separation, there has been a shift from sole custody, particularly maternal preference, to joint physical custody. In many Western countries, an increasing of children with separated parents have joint physical custody, which is believed to be in the best interests of the child, as children can maintain personal relations and direct contact with both parents on a regular basis. The aim of the article is to examine joint physical custody, both from the perspective of the binding legal instruments that are relevant to joint physical custody, the Principles of European Family Law drafted by the CEFL, as well as the international research on this matter. The thesis underlying this paper is that joint physical custody is in itself neither good nor bad, and it depends on how the arrangements are managed by the parents. The paper includes a reflection on joint physical custody in the face of the COVID-19 crisis. The results indicate that in normal circumstances, joint physical custody demands broad communication, and now it times of crisis, we need over-communication about children and plans. Only a very tight and coordinated co-parenting plan make the whole family safer.Keywords: joint physical custody, co-parenting, child welfare, COVID-19
Procedia PDF Downloads 2433740 Mergers and Acquisitions in the Banking Sector: The West African Experience
Authors: Sunday Odunaiya
Abstract:
The statistics of banks in operation in this current dispensation compared to some decades ago has brought about a lot of changes on the face of the financial system. The demand of customers, technological advancement, and government policies among others has therefore generated a lot of heat for financial sector’s growth, sustenance and survival. This paper discusses mergers and acquisitions (M&A) in banking sector using West Africa as a yardstick of evaluation. It explains rigorously the conditions that warrant mergers and acquisitions in the banking sector, its effect, and how to ensure mergers and acquisitions effectiveness in the banking sector. The conceptual and empirical review of the relevant literature were done systematically while value-increasing and value-decreasing theories were used to substantiate the discourse. Findings of this paper show that mergers and acquisitions is a practical and conscious activity in Nigeria, Ghana and Ivory Coast from earliest time till date with tremendous turnaround in the financial sector. It was found out that M&A is consensually arrived at by the targets and the acquirer on a value-based account. In other words, merger and acquisition is a deliberate decision reached by the management of such bank for a ‘just cause’.Keywords: acquisitions, merger, management, financial sector
Procedia PDF Downloads 2753739 Effect of Irrigation Interval on Jojoba Plants under Circumstance of Sinai
Authors: E. Khattab, S. Halla
Abstract:
Jojoba plants are characterized by a tolerance of water stress, but due to the conditions of the Sinai in which the water is less, an irrigation interval study was carried out the jojoba plant from water stress without affecting the yield of oil. The field experiment was carried out at Maghara Research Station at North Sinai, Desert Research Center, Ministry of Agriculture, Egypt, to study the effect of irrigation interval on five clones of jojoba plants S-L, S-610, S- 700, S-B and S-G on growth and yield characters. Results showed that the clone S-700 has increase of all growth and yield characters under all interval irrigation compare with other clones. All variable of studied confirmed that clones of jojoba had significant effect with irrigation interval at one week but decrease value with three weeks. Jojoba plants tolerance to water stress but irrigation interval every week increased seed yield.Keywords: interval irrigation, growth and yield characters, oil, jojoba, Sinai
Procedia PDF Downloads 1913738 Performance Comparison of Space-Time Block and Trellis Codes under Rayleigh Channels
Authors: Jing Qingfeng, Wu Jiajia
Abstract:
Due to the crowded orbits and shortage of frequency resources, utilizing of MIMO technology to improve spectrum efficiency and increase the capacity has become a necessary trend of broadband satellite communication. We analyze the main influenced factors and compare the BER performance of space-time block code (STBC) scheme and space-time trellis code (STTC) scheme. This paper emphatically studies the bit error rate (BER) performance of STTC and STBC under Rayleigh channel. The main emphasis is placed on the effects of the factors, such as terminal environment and elevation angles, on the BER performance of STBC and STTC schemes. Simulation results indicate that performance of STTC under Rayleigh channel is obviously improved with the increasing of transmitting and receiving antennas numbers, but the encoder state has little impact on the performance. Under Rayleigh channel, performance of Alamouti code is better than that of STTC.Keywords: MIMO, space time block code (STBC), space time trellis code (STTC), Rayleigh channel
Procedia PDF Downloads 3473737 Evaluation of the MCFLIRT Correction Algorithm in Head Motion from Resting State fMRI Data
Authors: V. Sacca, A. Sarica, F. Novellino, S. Barone, T. Tallarico, E. Filippelli, A. Granata, P. Valentino, A. Quattrone
Abstract:
In the last few years, resting-state functional MRI (rs-fMRI) was widely used to investigate the architecture of brain networks by investigating the Blood Oxygenation Level Dependent response. This technique represented an interesting, robust and reliable approach to compare pathologic and healthy subjects in order to investigate neurodegenerative diseases evolution. On the other hand, the elaboration of rs-fMRI data resulted to be very prone to noise due to confounding factors especially the head motion. Head motion has long been known to be a source of artefacts in task-based functional MRI studies, but it has become a particularly challenging problem in recent studies using rs-fMRI. The aim of this work was to evaluate in MS patients a well-known motion correction algorithm from the FMRIB's Software Library - MCFLIRT - that could be applied to minimize the head motion distortions, allowing to correctly interpret rs-fMRI results.Keywords: head motion correction, MCFLIRT algorithm, multiple sclerosis, resting state fMRI
Procedia PDF Downloads 2123736 Improving the Performance of Back-Propagation Training Algorithm by Using ANN
Authors: Vishnu Pratap Singh Kirar
Abstract:
Artificial Neural Network (ANN) can be trained using backpropagation (BP). It is the most widely used algorithm for supervised learning with multi-layered feed-forward networks. Efficient learning by the BP algorithm is required for many practical applications. The BP algorithm calculates the weight changes of artificial neural networks, and a common approach is to use a two-term algorithm consisting of a learning rate (LR) and a momentum factor (MF). The major drawbacks of the two-term BP learning algorithm are the problems of local minima and slow convergence speeds, which limit the scope for real-time applications. Recently the addition of an extra term, called a proportional factor (PF), to the two-term BP algorithm was proposed. The third increases the speed of the BP algorithm. However, the PF term also reduces the convergence of the BP algorithm, and criteria for evaluating convergence are required to facilitate the application of the three terms BP algorithm. Although these two seem to be closely related, as described later, we summarize various improvements to overcome the drawbacks. Here we compare the different methods of convergence of the new three-term BP algorithm.Keywords: neural network, backpropagation, local minima, fast convergence rate
Procedia PDF Downloads 4983735 A Comparative Study of Criminal Liability for Art Forgery in Poland and Selected European Countries
Authors: Olivia Rybak-Karkosz
Abstract:
Art forgery is a serious problem present in the art market in every country despite its scale and experience. In the Polish art market, this problem has existed since its beginnings. The market expansion in recent years attracted new buyers, which led to growing prices of polish art. And that attracted deceitful sellers who supply the market with forgeries. Moreover, there are many new types of buyers, many of whom are art non-specialists. But even the most experienced collectors must be cautious when purchasing a piece of art. In this paper, the author would like to discuss legal acts in Polish law that criminalize the forgery of a piece of art and compare them with similar regulations from four European countries - the Italian Republic, Kingdom of the Netherlands, French Republic, and the Federal Republic of Germany. The author wants to verify if any solutions could inspire Polish legislators to implement them in domestic law to help reduce this crime and improve the criminal procedure of art forgery. The paper contains a concluding statement to implement a similar solution used in one of the presented countries.Keywords: art forgery, comparative law, criminal law, criminal liability, protection of works of art
Procedia PDF Downloads 883734 Mechanical Properties of CNT Reinforced Composite Using Berkovich Nanoindentation Analysis
Authors: Khondaker Sakil Ahmed, Ang Kok Keng, Shah Md Muniruzzaman
Abstract:
Spherical and Berkovich indentation tests are carried out numerically using finite element method for uniformly dispersed Carbon Nanotube (CNT) in the polymer matrix in which perfectly bonded CNT/matrix interface is considered. The Large strain elasto-plastic analysis is performed to investigate the actual scenario of nanoindentation test. This study investigates how the addition of CNT in polymer matrix influences the mechanical properties like hardness, elastic modulus of the nanocomposite. Since the wall thickness to radius ratio (t/r) is significantly small for SWCNT there is a huge possibility of lateral buckling which is a function of the location of indentation tip as well as the mechanical properties of matrix. Separate finite element models are constructed to compare the result with Berkovich indentation. This study also investigates the buckling behavior of different nanotube in a different polymer matrix.Keywords: carbon nanotube, elasto-plastic, finite element model, nano-indentation
Procedia PDF Downloads 3883733 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya
Authors: Masese Chuma Benard, Martin Onsiro Ronald
Abstract:
Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)
Procedia PDF Downloads 833732 Investigating the Factors Affecting on One Time Passwords Technology Acceptance: A Case Study in Banking Environment
Authors: Sajad Shokohuyar, Mahsa Zomorrodi Anbaji, Saghar Pouyan Shad
Abstract:
According to fast technology growth, modern banking tries to decrease going to banks’ branches and increase customers’ consent. One of the problems which banks face is securing customer’s password. The banks’ solution is one time password creation system. In this research by adapting from acceptance of technology model theory, assesses factors that are effective on banking in Iran especially in using one time password machine by one of the private banks of Iran customers. The statistical population is all of this bank’s customers who use electronic banking service and one time password technology and the questionnaires were distributed among members of statistical population in 5 selected groups of north, south, center, east and west of Tehran. Findings show that confidential preservation, education, ease of utilization and advertising and informing has positive relations and distinct hardware and age has negative relations.Keywords: security, electronic banking, one time password, information technology
Procedia PDF Downloads 4523731 Hybrid Diagrid System for High-Rise Buildings
Authors: Seyed Saeid Tabaee, Mohammad Afshari, Bahador Ziaeemehr, Omid Bahar
Abstract:
Nowadays, using modern structural systems with specific capabilities, like Diagrid, is emerging around the world. In this paper, a new resisting system, a combination of both Diagrid axial behavior and proper seismic performance of regular moment frames in tall buildings, named 'Hybrid Diagrid' is presented. The scaled specimen of the suggested hybrid system was built and tested using IIEES shaking table. The natural frequency and structural response of the analytical model were updated with the real experimental results. In order to compare its performance with the traditional Diagrid and moment frame systems, time history analysis was carried out. Extensive analysis shows the efficient seismic responses and economical behavior of Hybrid Diagrid structure with respect to the other two systems.Keywords: hybrid diagrid system, moment frame, shaking table, tall buildings, time history analysis
Procedia PDF Downloads 2143730 Gear Wear Product Analysis as Applied for Tribological Maintenance Diagnostics
Authors: Surapol Raadnui
Abstract:
This paper describes an experimental investigation on a pair of gears in which wear and pitting were intentionally allowed to occur, namely, moisture corrosion pitting, acid-induced corrosion pitting, hard contaminant-related pitting and mechanical induced wear. A back-to-back spur gear test rig was used. The test samples of wear debris were collected and assessed through the utilization of an optical microscope in order to correlate and compare the debris morphology to pitting and wear degradation of the worn gears. In addition, weight loss from all test gear pairs was assessed with the utilization of the statistical design of the experiment. It can be deduced that wear debris characteristics exhibited a direct relationship with different pitting and wear modes. Thus, it should be possible to detect and diagnose gear pitting and wear utilization of worn surfaces, generated wear debris and quantitative measurement such as weight loss.Keywords: tribology, spur gear wear, predictive maintenance, wear particle analysis
Procedia PDF Downloads 2493729 Curbing of Excesses of Women in Politics: Islamic Law Perspective
Authors: Muhammad Jumat Dasuki
Abstract:
The curbing of excesses of women in politics is a topic that has been extensively studied in the field of Islamic law. This issue is complex and involves various cultural and religious factors, making it a highly debated topic. This paper examines the role of Islamic law in regulating the behavior of women in politics. In many Islamic societies, women face restrictions and limitations when it comes to their participation in the political sphere. This paper investigates the reasons behind these restrictions and analyzes how Islamic law can be used to curb any excesses that may arise from women's involvement in politics. By examining various case studies and analyzing the principles of Islamic law, this paper sheds light on the issue of women's participation in politics and provides potential solutions for balancing their rights and duties according to Islamic law. The methodology includes primary sources through in-depth oral interviews and secondary sources like textbooks and journals, aiming for a holistic understanding of the ethical dimensions of support initiatives within the context of Islamic Law to establish the fairness of Islam Law in its approach to women in politics. The paper concludes with suggestions and recommendations.Keywords: excess, Islamic law, principles, women
Procedia PDF Downloads 413728 Shield Tunnel Excavation Simulation of a Case Study Using a So-Called 'Stress Relaxation' Method
Authors: Shengwei Zhu, Alireza Afshani, Hirokazu Akagi
Abstract:
Ground surface settlement induced by shield tunneling is addressing increasing attention as shield tunneling becomes a popular construction technique for tunnels in urban areas. This paper discusses a 2D longitudinal FEM simulation of a tunneling case study in Japan (Tokyo Metro Yurakucho Line). Tunneling-induced field data was already collected and is used here for comparison and evaluating purposes. In this model, earth pressure, face pressure, backfilling grouting, elastic tunnel lining, and Mohr-Coulomb failure criterion for soil elements are considered. A method called ‘stress relaxation’ is also exploited to simulate the gradual tunneling excavation. Ground surface settlements obtained from numerical results using the introduced method are then compared with the measurement data.Keywords: 2D longitudinal FEM model, tunneling case study, stress relaxation, shield tunneling excavation
Procedia PDF Downloads 3283727 Effect of Hooked-End Steel Fibres Geometry on Pull-Out Behaviour of Ultra-High Performance Concrete
Authors: Sadoon Abdallah, Mizi Fan, Xiangming Zhou
Abstract:
In this study, a comprehensive approach has been adopted to examine in detail the effect of various hook geometries on bond-slip characteristics. Extensive single fibre pull-out tests on ultra-high performance matrix with three different W/B ratios and embedded lengths have been carried out. Test results showed that the mechanical deformation of fibre hook is the main mechanism governing the pull-out behaviour. Furthermore, the quantitative analyses have been completed to compare the hook design contribution of 3D, 4D and 5D fibres to assess overall pull-out behaviour. It was also revealed that there is a strong relationship between the magnitude of hook contribution and W/B ratio (i.e. matrix strength). Reducing the W/B ratio from 0.20 to 0.11 greatly optimizes the interfacial transition zone (ITZ) and enables better mobilization, straightening of the hook and results in bond-slip-hardening behaviour.Keywords: bobond mechanisms, fibre-matrix interface, hook geometry, pullout behaviour and water to binder ratio
Procedia PDF Downloads 3853726 Modelling of Composite Steel and Concrete Beam with the Lightweight Concrete Slab
Authors: Veronika Přivřelová
Abstract:
Well-designed composite steel and concrete structures highlight the good material properties and lower the deficiencies of steel and concrete, in particular they make use of high tensile strength of steel and high stiffness of concrete. The most common composite steel and concrete structure is a simply supported beam, which concrete slab transferring the slab load to a beam is connected to the steel cross-section. The aim of this paper is to find the most adequate numerical model of a simply supported composite beam with the cross-sectional and material parameters based on the results of a processed parametric study and numerical analysis. The paper also evaluates the suitability of using compact concrete with the lightweight aggregates for composite steel and concrete beams. The most adequate numerical model will be used in the resent future to compare the results of laboratory tests.Keywords: composite beams, high-performance concrete, high-strength steel, lightweight concrete slab, modeling
Procedia PDF Downloads 4063725 An Enhanced Floor Estimation Algorithm for Indoor Wireless Localization Systems Using Confidence Interval Approach
Authors: Kriangkrai Maneerat, Chutima Prommak
Abstract:
Indoor wireless localization systems have played an important role to enhance context-aware services. Determining the position of mobile objects in complex indoor environments, such as those in multi-floor buildings, is very challenging problems. This paper presents an effective floor estimation algorithm, which can accurately determine the floor where mobile objects located. The proposed algorithm is based on the confidence interval of the summation of online Received Signal Strength (RSS) obtained from the IEEE 802.15.4 Wireless Sensor Networks (WSN). We compare the performance of the proposed algorithm with those of other floor estimation algorithms in literature by conducting a real implementation of WSN in our facility. The experimental results and analysis showed that the proposed floor estimation algorithm outperformed the other algorithms and provided highest percentage of floor accuracy up to 100% with 95-percent confidence interval.Keywords: floor estimation algorithm, floor determination, multi-floor building, indoor wireless systems
Procedia PDF Downloads 4173724 Exploiting JPEG2000 into Reversible Information
Authors: Te-Jen Chang, I-Hui Pan, Kuang-Hsiung Tan, Shan-Jen Cheng, Chien-Wu Lan, Chih-Chan Hu
Abstract:
With the event of multimedia age in order to protect data not to be tampered, damaged, and faked, information hiding technologies are proposed. Information hiding means important secret information is hidden into cover multimedia and then camouflaged media is produced. This camouflaged media has the characteristic of natural protection. Under the undoubted situation, important secret information is transmitted out.Reversible information hiding technologies for high capacity is proposed in this paper. The gray images are as cover media in this technology. We compress gray images and compare with the original image to produce the estimated differences. By using the estimated differences, expression information hiding is used, and higher information capacity can be achieved. According to experimental results, the proposed technology can be approved. For these experiments, the whole capacity of information payload and image quality can be satisfied.Keywords: cover media, camouflaged media, reversible information hiding, gray image
Procedia PDF Downloads 3263723 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children
Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani
Abstract:
Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.Keywords: access control, cyber security, kids, parental monitoring
Procedia PDF Downloads 1373722 Contributions of Search and Rescue to the World Peace
Authors: Dursun Kalebaşi
Abstract:
When we examine the history of mankind (from the past up to the present), we see that millions of people died because of the wars. Especially, since the beginning of 19th century, the increase of the human death rate is caused mostly by the regional conflicts and natural disasters rather than the wars. From that point of view, the biggest threat humanity face today is temperature increase and climate change that started to emerge in recent years. When we take into account the natural disasters on one hand and refuges that flee from regional conflicts on the other, it stands out as a dramatic situation because of the huge human losses. In this context, most of the countries started to give more importance to Search and Rescue (SAR) operations to stop the loss of lives or decrease the death rate. This article will tell about the SAR activities in Turkey since 2000 and discuss the Turkey’s contributions to Rescue Missions after the natural disasters in different parts of the world. Moreover, there will be some new highlights to a more habitable and more peaceful world through the SAR missions.Keywords: search and rescue, natural disasters, migration and world peace, Turkish army forces
Procedia PDF Downloads 3763721 Using Wiki for Enhancing the Knowledge Transfer to Newcomers: An Experience Report
Authors: Hualter Oliveira Barbosa, Raquel Feitosa do Vale Cunha, Erika Muniz dos Santos, Fernanda Belmira Souza, Fabio Sousa, Luis Henrique Pascareli, Franciney de Oliveira Lima, Ana Cláudia Reis da Silva, Christiane Moreira de Almeida
Abstract:
Software development is intrinsic human-based knowledge-intensive. Due to globalization, software development has become a complex challenge and we usually face barriers related to knowledge management, team building, costly testing processes, especially in distributed settings. For this reason, several approaches have been proposed to minimize barriers caused by geographic distance. In this paper, we present as we use experimental studies to improve our knowledge management process using the Wiki system. According to the results, it was possible to identify learning preferences from our software projects leader team, organize and improve the learning experience of our Wiki and; facilitate collaboration by newcomers to improve Wiki with new contents available in the Wiki.Keywords: mobile product, knowledge transfer, knowledge management process, wiki, GSD
Procedia PDF Downloads 1733720 The Hyperbolic Smoothing Approach for Automatic Calibration of Rainfall-Runoff Models
Authors: Adilson Elias Xavier, Otto Corrêa Rotunno Filho, Paulo Canedo De Magalhães
Abstract:
This paper addresses the issue of automatic parameter estimation in conceptual rainfall-runoff (CRR) models. Due to threshold structures commonly occurring in CRR models, the associated mathematical optimization problems have the significant characteristic of being strongly non-differentiable. In order to face this enormous task, the resolution method proposed adopts a smoothing strategy using a special C∞ differentiable class function. The final estimation solution is obtained by solving a sequence of differentiable subproblems which gradually approach the original conceptual problem. The use of this technique, called Hyperbolic Smoothing Method (HSM), makes possible the application of the most powerful minimization algorithms, and also allows for the main difficulties presented by the original CRR problem to be overcome. A set of computational experiments is presented for the purpose of illustrating both the reliability and the efficiency of the proposed approach.Keywords: rainfall-runoff models, automatic calibration, hyperbolic smoothing method
Procedia PDF Downloads 1483719 Facilitating the Learning Environment as a Servant Leader: Empowering Self-Directed Student Learning
Authors: Thomas James Bell III
Abstract:
Pedagogy is thought of as one's philosophy, theory, or teaching method. This study examines the science of learning, considering the forced reconsideration of effective pedagogy brought on by the aftermath of the 2020 coronavirus pandemic. With the aid of various technologies, online education holds challenges and promises to enhance the learning environment if implemented to facilitate student learning. Behaviorism centers around the belief that the instructor is the sage on the classroom stage using repetition techniques as the primary learning instrument. This approach to pedagogy ascribes complete control of the learning environment and works best for students to learn by allowing students to answer questions with immediate feedback. Such structured learning reinforcement tends to guide students' learning without considering learners' independence and individual reasoning. And such activities may inadvertently stifle the student's ability to develop critical thinking and self-expression skills. Fundamentally liberationism pedagogy dismisses the concept that education is merely about students learning things and more about the way students learn. Alternatively, the liberationist approach democratizes the classroom by redefining the role of the teacher and student. The teacher is no longer viewed as the sage on the stage but as a guide on the side. Instead, this approach views students as creators of knowledge and not empty vessels to be filled with knowledge. Moreover, students are well suited to decide how best to learn and which areas improvements are needed. This study will explore the classroom instructor as a servant leader in the twenty-first century, which allows students to integrate technology that encapsulates more individual learning styles. The researcher will examine the Professional Scrum Master (PSM I) exam pass rate results of 124 students in six sections of an Agile scrum course. The students will be separated into two groups; the first group will follow a structured instructor-led course outlined by a course syllabus. The second group will consist of several small teams (ten or fewer) of self-led and self-empowered students. The teams will conduct several event meetings that include sprint planning meetings, daily scrums, sprint reviews, and retrospective meetings throughout the semester will the instructor facilitating the teams' activities as needed. The methodology for this study will use the compare means t-test to compare the mean of an exam pass rate in one group to the mean of the second group. A one-tailed test (i.e., less than or greater than) will be used with the null hypothesis, for the difference between the groups in the population will be set to zero. The major findings will expand the pedagogical approach that suggests pedagogy primarily exist in support of teacher-led learning, which has formed the pillars of traditional classroom teaching. But in light of the fourth industrial revolution, there is a fusion of learning platforms across the digital, physical, and biological worlds with disruptive technological advancements in areas such as the Internet of Things (IoT), artificial intelligence (AI), 3D printing, robotics, and others.Keywords: pedagogy, behaviorism, liberationism, flipping the classroom, servant leader instructor, agile scrum in education
Procedia PDF Downloads 1423718 The Impact of Illegal Firearms Possession, Limited Security Staff and Porosity of Border on Human Security in Ipokia Local Government Area, Ogun State
Authors: Ogunmefun Folorunsho Muyideen, Aluko Tolulope Evelyn
Abstract:
One of the trending menaces faced in the world today is centered on the porosity of borders and proliferation of illegal weapons among the state members without the state authorizations. The proliferation of weapons along porous borders remains a germane and unsolvable question among developed and developing nations due to crisis degenerated from the menace (loss of lives, properties, traumatization, civil unrest and retrogressive economic development). A mixed method was adopted while the survey method was used for communities’ selection (Oke-Odan, Ajilete, Illaise, Lanlate) at Ipokia Local Government as a sample frame. Multi-stage sampling was employed to break down the site into wards, streets, and different house numbers before randomizing administration of the questionnaires using face to face method, while purposive sampling was used for collecting verbal information through an in-depth interviews method. The population size for the site is 150.398, while 399 was the sample size derived from the use of Yamane sample size formula. After retrieval of structured questionnaires, 346 were found useful, while 10 percent (399) of the quantitative instruments was summed to 30 participants that were interviewed using the in-depth interviews technique. The result of the first hypothesis shows a composite relationship between the variables tested (independents and dependent). The result indicated that the porosity of the border, illegal possession of guns, and limited security staff jointly predispose insecurity among the residents of the selected study site. The result of the second hypothesis deciphers that the illegal gun possession (independent) variable predict business outcome among the residents of the study site because sporadic gun shoot will regress the business activities in the study area. The result of third result indicated that the independent (porosity of borders) variable predict social bonding network because a high level of insecurity will destroy the level of trust in the communication among the residents of the study area. The last questions give comprehensive meaning to one of the recommendations derived using content systematic analysis, which explains that out of 30 participants interviewed, 18 submitted individual involvement in monitoring communities will solve the problem, 7 out of 30 opines that governmental agents are to be trained for effective combat, 3 participants out 30 submits that the fight is for both government and the citizens while 2 participants out of 30 claimed that there must be an agreement between Nigerian and neighbouring countries on border security. International donors must totally control the sales of weapons to unauthorized personalities. Criminal cases must be treated with deterrence measures and target hardened procedures through decoying and blending, stakeout, and sting tactics.Keywords: human security, illegal weapons, porous borders, development
Procedia PDF Downloads 1773717 Iris Detection on RGB Image for Controlling Side Mirror
Authors: Norzalina Othman, Nurul Na’imy Wan, Azliza Mohd Rusli, Wan Noor Syahirah Meor Idris
Abstract:
Iris detection is a process where the position of the eyes is extracted from the face images. It is a current method used for many applications such as for security purpose and drowsiness detection. This paper proposes the use of eyes detection in controlling side mirror of motor vehicles. The eyes detection method aims to make driver easy to adjust the side mirrors automatically. The system will determine the midpoint coordinate of eyes detection on RGB (color) image and the input signal from y-coordinate will send it to controller in order to rotate the angle of side mirror on vehicle. The eye position was cropped and the coordinate of midpoint was successfully detected from the circle of iris detection using Viola Jones detection and circular Hough transform methods on RGB image. The coordinate of midpoint from the experiment are tested using controller to determine the angle of rotation on the side mirrors.Keywords: iris detection, midpoint coordinates, RGB images, side mirror
Procedia PDF Downloads 4213716 The Role of Youth Entrepreneurship in Developing the Algerian Economy
Authors: Benabdelaziz Soufyane
Abstract:
The process of developing the activity of small and medium-sized enterprises(SME), and increasing the entrepreneurial sense, is becoming at the current period as one of the main bets, where many countries around the world try to give it the great importance because of their positive role in improving the economic development indicators in these countries. As a result of the sequential changes that international economic environment lives, the biggest global economic entities has become threatened because of different secretions financial crises and economic disorders. For this lots of countries tended to search for a mechanism to help it for creating new jobs and to spur the economy in order to face the foreign competition, fot this, we find the process of creating innovative entrepreneurial activity comes at the forefront of solutions for the purpose of achieving that. For the purpose of highlighting the role of this process and its future in the economy, this study seeks to consolidate the innovation’s concept and innovative entrepreneurship, then the success’s conditions of these entrepreneurships, to conclude with recommendations , solutions and important results.Keywords: entrepreneurship, innovation, performance, vigilance, modernity, technology, business incubators
Procedia PDF Downloads 79