Search results for: access to credit
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3624

Search results for: access to credit

1914 Lack of Regulation Leads to Complexity: A Case Study of the Free Range Chicken Meat Sector in the Western Cape, South Africa

Authors: A. Coetzee, C. F. Kelly, E. Even-Zahav

Abstract:

Dominant approaches to livestock production are harmful to the environment, human health and animal welfare, yet global meat consumption is rising. Sustainable alternative production approaches are therefore urgently required, and ‘free range’ is the main alternative for chicken meat offered in South Africa (and globally). Although the South African Poultry Association provides non-binding guidelines, there is a lack of formal definition and regulation of free range chicken production, meaning it is unclear what this alternative entails and if it is consistently practised (a trend observed globally). The objective of this exploratory qualitative case study is therefore to investigate who and what determines free range chicken. The case study, conducted from a social constructivist worldview, uses semi-structured interviews, photographs and document analysis to collect data. Interviews are conducted with those involved with bringing free range chicken to the market - farmers, chefs, retailers, and regulators. Data is analysed using thematic analysis to establish dominant patterns in the data. The five major themes identified (based on prevalence in data and on achieving the research objective) are: 1) free range means a bird reared with good animal welfare in mind, 2) free range means quality meat, 3) free range means a profitable business, 4) free range is determined by decision makers or by access to markets, and 5) free range is coupled with concerns about the lack of regulation. Unpacking the findings in the context of the literature reveals who and what determines free range. The research uncovers wide-ranging interpretations of ‘free range’, driven by the absence of formal regulation for free range chicken practices and the lack of independent private certification. This means that the term ‘free range’ is socially constructed, thus varied and complex. The case study also shows that whether chicken meat is free range is generally determined by those who have access to markets. Large retailers claim adherence to the internationally recognised Five Freedoms, also include in the South African Poultry Association Code of Good Practice, which others in the sector say are too broad to be meaningful. Producers describe animal welfare concerns as the main driver for how they practice/view free range production, yet these interpretations vary. An additional driver is a focus on human health, which participants achieve mainly through the use of antibiotic-free feed, resulting in what participants regard as higher quality meat. The participants are also strongly driven by business imperatives, with most stating that free range chicken should carry a higher price than conventionally-reared chicken due to increased production costs. Recommendations from this study focus on, inter alia, a need to understand consumers’ perspectives on free range chicken, given that those in the sector claim they are responding to consumer demand, and conducting environmental research such as life cycle assessment studies to establish the true (environmental) sustainability of free range production. At present, it seems the sector mostly responds to social sustainability: human health and animal welfare.

Keywords: chicken meat production, free range, socially constructed, sustainability

Procedia PDF Downloads 157
1913 Design and Construction of a Home-Based, Patient-Led, Therapeutic, Post-Stroke Recovery System Using Iterative Learning Control

Authors: Marco Frieslaar, Bing Chu, Eric Rogers

Abstract:

Stroke is a devastating illness that is the second biggest cause of death in the world (after heart disease). Where it does not kill, it leaves survivors with debilitating sensory and physical impairments that not only seriously harm their quality of life, but also cause a high incidence of severe depression. It is widely accepted that early intervention is essential for recovery, but current rehabilitation techniques largely favor hospital-based therapies which have restricted access, expensive and specialist equipment and tend to side-step the emotional challenges. In addition, there is insufficient funding available to provide the long-term assistance that is required. As a consequence, recovery rates are poor. The relatively unexplored solution is to develop therapies that can be harnessed in the home and are formulated from technologies that already exist in everyday life. This would empower individuals to take control of their own improvement and provide choice in terms of when and where they feel best able to undertake their own healing. This research seeks to identify how effective post-stroke, rehabilitation therapy can be applied to upper limb mobility, within the physical context of a home rather than a hospital. This is being achieved through the design and construction of an automation scheme, based on iterative learning control and the Riener muscle model, that has the ability to adapt to the user and react to their level of fatigue and provide tangible physical recovery. It utilizes a SMART Phone and laptop to construct an iterative learning control (ILC) system, that monitors upper arm movement in three dimensions, as a series of exercises are undertaken. The equipment generates functional electrical stimulation to assist in muscle activation and thus improve directional accuracy. In addition, it monitors speed, accuracy, areas of motion weakness and similar parameters to create a performance index that can be compared over time and extrapolated to establish an independent and objective assessment scheme, plus an approximate estimation of predicted final outcome. To further extend its assessment capabilities, nerve conduction velocity readings are taken by the software, between the shoulder and hand muscles. This is utilized to measure the speed of response of neuron signal transfer along the arm and over time, an online indication of regeneration levels can be obtained. This will prove whether or not sufficient training intensity is being achieved even before perceivable movement dexterity is observed. The device also provides the option to connect to other users, via the internet, so that the patient can avoid feelings of isolation and can undertake movement exercises together with others in a similar position. This should create benefits not only for the encouragement of rehabilitation participation, but also an emotional support network potential. It is intended that this approach will extend the availability of stroke recovery options, enable ease of access at a low cost, reduce susceptibility to depression and through these endeavors, enhance the overall recovery success rate.

Keywords: home-based therapy, iterative learning control, Riener muscle model, SMART phone, stroke rehabilitation

Procedia PDF Downloads 264
1912 Design and Analysis of Formula One Car Halo

Authors: Indira priyadarshini, B. Tulja Lal, K. Anusha, P. Sai Varun

Abstract:

Formula One cars are the fastest road course racing cars in the world, owing to very high cornering speeds achieved through the generation of large amounts of aerodynamic downforce. The main intentions and goals of this paper are to reduce the accidents and improving the safety without affecting the visibility of the driver by redesigning Halo that was developed by Mercedes in conjunction with the FIA to deflect flying debris, such as a loose wheel, away from a driver’s head while the hinged locking mechanism can quickly be removed for easy access. Halo design has been modified in order to reduce the weight without affecting the aerodynamics of the car. CFD simulation is carried out to observe the flow over the Halo. The velocity profile and pressure contours were analyzed. Halo is designed using SOLIDWORKS Furthermore, using the software ANSYS FLUENT 3D simulation of the airflow contour around the Halo in order to make changes in the geometry to improve the design by reducing air resistance and improving aerodynamics. According to our assumption, new 3D Halo model has better aerodynamic properties in order to analyse possible improvements compared to the initial design. Structural analysis is also done by using ANSYS by making an F1 tire colliding with Halo at 225 kmph in order to know the deflections in the structure.

Keywords: aerodynamics, Halo, safety, visibility

Procedia PDF Downloads 373
1911 Household Water Practices in a Rapidly Urbanizing City and Its Implications for the Future of Potable Water: A Case Study of Abuja Nigeria

Authors: Emmanuel Maiyanga

Abstract:

Access to sufficiently good quality freshwater has been a global challenge, but more notably in low-income countries, particularly in the Sub-Saharan countries, which Nigeria is one. Urban population is soaring, especially in many low-income countries, the existing centralised water supply infrastructures are ageing and inadequate, moreover in households peoples’ lifestyles have become more water-demanding. So, people mostly device coping strategies where municipal supply is perceived to have failed. This development threatens the futures of groundwater and calls for a review of management strategy and research approach. The various issues associated with water demand management in low-income countries and Nigeria, in particular, are well documented in the literature. However, the way people use water daily in households and the reasons they do so, and how the situation is constructing demand among the middle-class population in Abuja Nigeria is poorly understood. This is what this research aims to unpack. This is achieved by using the social practices research approach (which is based on the Theory of Practices) to understand how this situation impacts on the shared groundwater resource. A qualitative method was used for data gathering. This involved audio-recorded interviews of householders and water professionals in the private and public sectors. It also involved observation, note-taking, and document study. The data were analysed thematically using NVIVO software. The research reveals the major household practices that draw on the water on a domestic scale, and they include water sourcing, body hygiene and sanitation, laundry, kitchen, and outdoor practices (car washing, domestic livestock farming, and gardening). Among all the practices, water sourcing, body hygiene, kitchen, and laundry practices, are identified to impact most on groundwater, with impact scale varying with household peculiarities. Water sourcing practices involve people sourcing mostly from personal boreholes because the municipal water supply is perceived inadequate and unreliable in terms of service delivery and water quality, and people prefer easier and unlimited access and control using boreholes. Body hygiene practices reveal that every respondent prefers bucket bathing at least once daily, and the majority bathe twice or more every day. Frequency is determined by the feeling of hotness and dirt on the skin. Thus, people bathe to cool down, stay clean, and satisfy perceived social, religious, and hygiene demand. Kitchen practice consumes water significantly as people run the tap for vegetable washing in daily food preparation and dishwashing after each meal. Laundry practice reveals that most people wash clothes most frequently (twice in a week) during hot and dusty weather, and washing with hands in basins and buckets is the most prevalent and water wasting due to soap overdose. The research also reveals poor water governance as a major cause of current inadequate municipal water delivery. The implication poor governance and widespread use of boreholes is an uncontrolled abstraction of groundwater to satisfy desired household practices, thereby putting the future of the shared aquifer at great risk of total depletion with attendant multiplying effects on the people and the environment and population continues to soar.

Keywords: boreholes, groundwater, household water practices, self-supply

Procedia PDF Downloads 123
1910 Teaching English to Students with Hearing Impairments - A Preliminary Study

Authors: Jane O`Halloran

Abstract:

This research aims to identify the issues and challenges of teaching English as a Foreign Language to Japanese university students who have special learning needs. This study sought to investigate factors influencing the academic performance of students with special or additional needs in an inclusive education context. This study will focus on a consideration of the methods available to support those with hearing impairments. While the study population is limited, it is important to give classes to be inclusive places where all students receive equal access to content. Hearing impairments provide an obvious challenge to language learning and, therefore, second-language learning. However, strategies and technologies exist to support the instructor without specialist training. This paper aims to identify these and present them to other teachers of English as a second language who wish to provide the best possible learning experience for every student. Two case studies will be introduced to compare and contrast the experience of in-class teaching and the online option and to share the positives and negatives of the two approaches. While the study focuses on the situation in a university in Japan, the lessons learned by the author may have universal value to any classroom with a student with a hearing disability.

Keywords: inclusive learning, special needs, hearing impairments, teaching strategies

Procedia PDF Downloads 132
1909 Heterogeneity of Thinking: Religious Beliefs and Logical Concepts

Authors: Alisa Rekunova

Abstract:

According to the theory of word meaning structure developed by Lev Vygotsky (and later modified by Aaro Toomela), there are several levels of thought: sensory-based concepts, situation concepts, logical concepts, and structural-systemic concepts. There are differences between people who have relatively easy access to logical thought compared to those who mostly tend to think in everyday concepts. Religious beliefs are connected with unprovable concepts (Christian Jesus’s ascension or Pagan energy) that cannot be non-controversially related to scientific concepts. However, many scientists in the research are believers of some kinds. Religious views can be different: there are believers, non-believers (atheists), and undecided (we can call them agnostics). Some of the respondents say that scientific or professional and religious spheres do not overlap. Therefore, we can assume they do not see any conflict. Some of them, on the contrary, hesitate to answer and we can conclude they see the conflicts, but they do not want (or do not believe they are able to) to solve it. Finally, the third category of respondents says that religious beliefs and scientific concepts cannot coexist in the human mind. It can be expected that the third category of respondents should have higher education (or even work in the scientific field) but many scientists in the research answer that religious and scientific spheres do not overlap. Therefore, there are other things besides the level of education that is connected with resolving conflicts.

Keywords: conflicts in thinking, cultural-historical psychology, heterogeneity of thinking, religious thinking

Procedia PDF Downloads 150
1908 Moral Obligation as a Governor to Skeptical Theism's Relativism

Authors: Peter J. Morgan

Abstract:

In response to evidential arguments from evil, Stephen Wykstra presents CORNEA (Condition of Reasonable Epistemic Access) as a foundational principle for Skeptical Theism which urges one to think in terms of what can be expected in a given situation. The use of CORNEA results in skepticism regarding the ability of human ken to know divine levels of knowledge in instances of intense evil. However, William Rowe presents a critique of Skeptical Theism that questions its ability to argue successfully for theism. Rowe contends that siding with Skeptical Theism is akin to boarding a trolley car that does not stop. Contra Wykstra, Rowe observes that, for all that can be known, there could be greater amounts of evils than goods, and the goods that are seen may not be the best possible goods. This amounts to a mortally challenging critique of Skeptical Theism. However, there is a brake on Rowe’s Trolley. This paper makes the argument that the ubiquitous presence of Moral Obligation (MO) serves as a braking system for Rowe’s Trolley. When the rider begins to feel lost in an epistemic stalemate of good and evil it is MO that turns the tide: MO serves as evidence towards the good on a basic human level, and it is a reminder that God’s character will result in actions towards the good.

Keywords: CORNEA, moral obligation, problem of evil, skeptical theism

Procedia PDF Downloads 204
1907 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 279
1906 Blockchain Technology Security Evaluation: Voting System Based on Blockchain

Authors: Omid Amini

Abstract:

Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.

Keywords: blockchain, technology, security, information, voting system, transparency

Procedia PDF Downloads 132
1905 Customer Relations and Use of Online Shopping Sites

Authors: Bahar Urhan Torun, Havva Nur Tarakcı

Abstract:

At the present time, online marketing has become the common target of small and full-scale organizations. Today’s humanbeing who has to spend most of their time in front of the computer because of his job, prefers to socialize by internet due to the easy access to technology. So online marketing area expands day by day. All business organizations from the smallest to the biggest are in a race in order to get a cut from the virtual market share in an extreme competitive environment. However these organizations which use the internet to reach more consumers cannot determine their target group accurately, so this is the biggest handicap of online marketing sales nowadays. The aim of this study is to determine some significant elements about need for communicating efficiently with the consumer on the internet on online marketing. The strategies that can be used in order to increase sales and the limitations of virtual environment where cannot be communicated with the consumer face to face are argued in this study’s scope. As a consequence it is thought that to study on this subject because of lacking and also being limited efficiency of researches and outputs. Within this scope suggesting some proposals about how to communicate efficiently with the consumer and also offering the consumers’ demands efficiently is the essential objective of this study.

Keywords: online marketing, competition, consumer, communication

Procedia PDF Downloads 268
1904 Bibliometric Measures on Leveraging Technology to Mitigate the Impact of Covid-19 on Business

Authors: Olanrewaju Johnson Akinduntire

Abstract:

This paper investigates the statistical evaluation of books, citations, articles, journals and other publications in accounting and finance on leveraging technology to mitigate the impact of COVID-19 on business. The research proffers an appraisal of the impact of computerized accounting systems in pre and post pandemic era on activities of the formal and informal sectors, it analyzes the concept of computerized accounting systems, and it seeks to determine the impact of computerized of the overall activities of the informal sector. A special focus of this ICT strategy should be to demystify and promote the diffusion of ICT as a general-purpose technology to the informal sector. It is believed that the use of new technologies can be crucial to meeting the Millennium Development Goals (MDGs) in a timely and effective fashion. Consequent to these, there is a need to prevent the further marginalization of the informal sector by availing ICT services which are mixed appropriately and also properly located. By implication, this will help them access markets and other business information, which can enable or make their economic activities more vibrant and facilitate the availability of information about new opportunities. Conclusively, for one to understand the application of ICT and their locational dynamics in informal sector clusters, there is a need to comprehend and acknowledge the drivers and pressures leading to the adoption of new technology.

Keywords: COVID-19 , (MDGs) , ICT, bibliometric

Procedia PDF Downloads 188
1903 Media Regulation and Public Sphere in the Digital Age: An Analysis in the Light of Constructive Democracy

Authors: Carlos Marden Cabral Coutinho, Jose Luis Bolzan de Morais

Abstract:

The article proposed intends to analyze the possibility (and conditions) of a media regulation law in a democratic rule of law in the twenty-first century. To do so, will be presented initially the idea of the public sphere (by Jürgen Habermas), showing how it is presented as an interface between the citizen and the state (or the private and public) and how important is it in a deliberative democracy. Based on this paradigm, the traditional perception of the role of public information (such as system functional element) and on the possibility of media regulation will be exposed, due to the public nature of their activity. A critical argument will then be displayed from two different perspectives: a) the formal function of the current media information, considering that the digital age has fragmented the information access; b) the concept of a constructive democracy, which reduces the need for representation, changing the strategic importance of the public sphere. The question to be addressed (based on the comparative law) is if the regulation is justified in a polycentric democracy, especially when it operates under the digital age (with immediate and virtual communication). The proposal is to be presented in the sense that even in a twenty-first century the media in a democratic rule of law still has an extremely important role and may be subject to regulation, but this should be on terms very different (and narrower) from those usually defended.

Keywords: constructive democracy, media, digital age, public sphere

Procedia PDF Downloads 380
1902 Feasibility of Small Hydropower Plants Odisha

Authors: Sanoj Sahu, Ramakar Jha

Abstract:

Odisha (India) is in need of reliable, cost-effective power generation. A prolonged electricity crisis and increasing power demand have left over thousands of citizens without access to electricity, and much of the population suffers from sporadic outages. The purpose of this project is to build a methodology to evaluate small hydropower potential, which can be used to alleviate the Odisha’s energy problem among rural communities. This project has three major tasks: the design of a simple SHEP for a single location along a river in the Odisha; the development of water flow prediction equations through a linear regression analysis; and the design of an ArcGIS toolset to estimate the flow duration curves (FDCs) at locations where data do not exist. An explanation of the inputs to the tool, as well has how it produces a suitable output for SHEP evaluation will be presented. The paper also gives an explanation of hydroelectric power generation in the Odisha, SHEPs, and the technical and practical aspects of hydroelectric power. Till now, based on topographical and rainfall analysis we have located hundreds of sites. Further work on more number of site location and accuracy of location is to be done.

Keywords: small hydropower, ArcGIS, rainfall analysis, Odisha’s energy problem

Procedia PDF Downloads 448
1901 Implementation of Successive Interference Cancellation Algorithms in the 5g Downlink

Authors: Mokrani Mohamed Amine

Abstract:

In this paper, we have implemented successive interference cancellation algorithms in the 5G downlink. We have calculated the maximum throughput in Frequency Division Duplex (FDD) mode in the downlink, where we have obtained a value equal to 836932 b/ms. The transmitter is of type Multiple Input Multiple Output (MIMO) with eight transmitting and receiving antennas. Each antenna among eight transmits simultaneously a data rate of 104616 b/ms that contains the binary messages of the three users; in this case, the Cyclic Redundancy Check CRC is negligible, and the MIMO category is the spatial diversity. The technology used for this is called Non-Orthogonal Multiple Access (NOMA) with a Quadrature Phase Shift Keying (QPSK) modulation. The transmission is done in a Rayleigh fading channel with the presence of obstacles. The MIMO Successive Interference Cancellation (SIC) receiver with two transmitting and receiving antennas recovers its binary message without errors for certain values of transmission power such as 50 dBm, with 0.054485% errors when the transmitted power is 20dBm and with 0.00286763% errors for a transmitted power of 32 dBm(in the case of user 1) as well as with 0.0114705% errors when the transmitted power is 20 dBm also with 0.00286763% errors for a power of 24 dBm(in the case of user2) by applying the steps involved in SIC.

Keywords: 5G, NOMA, QPSK, TBS, LDPC, SIC, capacity

Procedia PDF Downloads 103
1900 Theoretical Exploration for the Impact of Accounting for Special Methods in Connectivity-Based Cohesion Measurement

Authors: Jehad Al Dallal

Abstract:

Class cohesion is a key object-oriented software quality attribute that is used to evaluate the degree of relatedness of class attributes and methods. Researchers have proposed several class cohesion measures. However, the effect of considering the special methods (i.e., constructors, destructors, and access and delegation methods) in cohesion calculation is not thoroughly theoretically studied for most of them. In this paper, we address this issue for three popular connectivity-based class cohesion measures. For each of the considered measures we theoretically study the impact of including or excluding special methods on the values that are obtained by applying the measure. This study is based on analyzing the definitions and formulas that are proposed for the measures. The results show that including/excluding special methods has a considerable effect on the obtained cohesion values and that this effect varies from one measure to another. For each of the three connectivity-based measures, the proposed theoretical study recommended excluding the special methods in cohesion measurement.

Keywords: object-oriented class, software quality, class cohesion measure, class cohesion, special methods

Procedia PDF Downloads 297
1899 Time and Wavelength Division Multiplexing Passive Optical Network Comparative Analysis: Modulation Formats and Channel Spacings

Authors: A. Fayad, Q. Alqhazaly, T. Cinkler

Abstract:

In light of the substantial increase in end-user requirements and the incessant need of network operators to upgrade the capabilities of access networks, in this paper, the performance of the different modulation formats on eight-channels Time and Wavelength Division Multiplexing Passive Optical Network (TWDM-PON) transmission system has been examined and compared. Limitations and features of modulation formats have been determined to outline the most suitable design to enhance the data rate and transmission reach to obtain the best performance of the network. The considered modulation formats are On-Off Keying Non-Return-to-Zero (NRZ-OOK), Carrier Suppressed Return to Zero (CSRZ), Duo Binary (DB), Modified Duo Binary (MODB), Quadrature Phase Shift Keying (QPSK), and Differential Quadrature Phase Shift Keying (DQPSK). The performance has been analyzed by varying transmission distances and bit rates under different channel spacing. Furthermore, the system is evaluated in terms of minimum Bit Error Rate (BER) and Quality factor (Qf) without applying any dispersion compensation technique, or any optical amplifier. Optisystem software was used for simulation purposes.

Keywords: BER, DuoBinary, NRZ-OOK, TWDM-PON

Procedia PDF Downloads 149
1898 Towards Value-Based Healthcare through a Nursing Sector Management Approach

Authors: Hadeer Hegazy, Wael Ewieda, Ranin Soliman, Samah Elway, Asmaa Tawfik, Ragaa Sayed, Sahar Mousa

Abstract:

The current healthcare system is facing major challenges in terms of cost, quality of care, and access to services. In response, the concept of value-based healthcare has emerged as a new approach to healthcare delivery. This concept puts the focus on patient values rather than on the traditional medical model of care. To achieve this, healthcare organizations must be agile and able to anticipate and respond quickly to changing needs. Agile management is essential for healthcare organizations to achieve value-based care, as it allows them to rapidly adjust their strategies to changing circumstances. Additionally, it is argued that agile management can help healthcare organizations gain a better understanding of the needs of their patients and develop better care delivery models. Besides, it can help healthcare organizations develop new services, innovate, and become more efficient. The authors provide evidence to support their argument, drawing on examples from successful value-based healthcare initiatives at children’s cancer hospital Egypt-57357. The paper offers insight into how agile management can be used to facilitate the shift towards value-based healthcare and how it can be used to maximize value in the healthcare system.

Keywords: value-based healthcare, agility in healthcare, nursing department, patients outcomes

Procedia PDF Downloads 768
1897 Data Mining Approach for Commercial Data Classification and Migration in Hybrid Storage Systems

Authors: Mais Haj Qasem, Maen M. Al Assaf, Ali Rodan

Abstract:

Parallel hybrid storage systems consist of a hierarchy of different storage devices that vary in terms of data reading speed performance. As we ascend in the hierarchy, data reading speed becomes faster. Thus, migrating the application’ important data that will be accessed in the near future to the uppermost level will reduce the application I/O waiting time; hence, reducing its execution elapsed time. In this research, we implement trace-driven two-levels parallel hybrid storage system prototype that consists of HDDs and SSDs. The prototype uses data mining techniques to classify application’ data in order to determine its near future data accesses in parallel with the its on-demand request. The important data (i.e. the data that the application will access in the near future) are continuously migrated to the uppermost level of the hierarchy. Our simulation results show that our data migration approach integrated with data mining techniques reduces the application execution elapsed time when using variety of traces in at least to 22%.

Keywords: hybrid storage system, data mining, recurrent neural network, support vector machine

Procedia PDF Downloads 308
1896 Collaborative Implementation of Master Plans in Afghanistan's Context Considering Land Readjustment as Case Study

Authors: Ahmad Javid Habib, Tetsuo Kidokoro

Abstract:

There is an increasing demand for developing urban land to provide better living conditions for all citizens in Afghanistan. Most of the development will involve the acquisition of land. And the current land acquisition method practiced by central government is expropriation, which is a cash-based transaction method that imposes heavy fiscal burden on local municipalities and central government, and it does not protect ownership rights and social equity of landowners besides it relocates the urban poor to remote areas with limited access to jobs and public services. The questionnaire analysis, backed by observations of different case studies in countries where land readjustment is used as a collaborative land development tool indicates that the method plays a key role in valuing landowners’ rights, giving other community members and stakeholders the opportunity to collaboratively implement urban development projects. The practice of the method is reducing the heavy fiscal burden on the local and central governments and is a better option to deal with the current development challenges in Afghanistan.

Keywords: collaboration, land readjustment, master plan, expropriation

Procedia PDF Downloads 295
1895 Enabling Exporting in Cameroon Using Export Promotion Programs

Authors: Morfaw Bernice Njinju

Abstract:

The contribution of exporting and small businesses to an economy cannot be overemphasized. However, small firms in developing economies are characterized by resource deficiencies, which hinders their exporting abilities. As a result, export promotion programs are designed by the government as external resources that small firms can access to overcome export barriers and improve their exporting. Nevertheless, doubts still exist as to whether firms are aware of these programs and the extent to which they are utilizing it. To analyse the level of awareness and usage of these programs, the questionnaire was developed from the review of the literature. A pilot study was conducted to determine the ease of completing the questionnaire by respondent before incorporating feedback to produce the final questionnaire. Data were collected from 200 small businesses in Cameroon in the manufacturing and agricultural sector through random sampling and analysed using regression analysis. The results indicated that different programs had different levels of awareness than others. Programs to provide training to improve product quality was found to have the highest level of awareness while those providing findings had low levels of awareness. Despite these different levels of awareness, usage was very low, as firms do not want to open up to government scrutiny of their business. Implications to policy, practice, and direction for further research are also discussed.

Keywords: export promotion programs, exporting, small businesses, Cameroon

Procedia PDF Downloads 111
1894 Intrabody Communication Using Different Ground Configurations in Digital Door Lock

Authors: Daewook Kim, Gilwon Yoon

Abstract:

Intrabody communication (IBC) is a new way of transferring data using human body as a medium. Minute current can travel though human body without any harm. IBC can remove electrical wires for human area network. IBC can be also a secure communication network system unlike wireless networks which can be accessed by anyone with bad intentions. One of the IBC systems is based on frequency shift keying modulation where individual data are transmitted to the external devices for the purpose of secure access such as digital door lock. It was found that the quality of IBC data transmission was heavily dependent on ground configurations of electronic circuits. Reliable IBC transmissions were not possible when both of the transmitter and receiver used batteries as circuit power source. Transmission was reliable when power supplies were used as power source for both transmitting and receiving sites because the common ground was established through the grounds of instruments such as power supply and oscilloscope. This was due to transmission dipole size and the ground effects of floor and AC power line. If one site used battery as power source and the other site used the AC power as circuit power source, transmission was possible.

Keywords: frequency shift keying, ground, intrabody, communication, door lock

Procedia PDF Downloads 418
1893 Short Text Classification for Saudi Tweets

Authors: Asma A. Alsufyani, Maram A. Alharthi, Maha J. Althobaiti, Manal S. Alharthi, Huda Rizq

Abstract:

Twitter is one of the most popular microblogging sites that allows users to publish short text messages called 'tweets'. Increasing the number of accounts to follow (followings) increases the number of tweets that will be displayed from different topics in an unclassified manner in the timeline of the user. Therefore, it can be a vital solution for many Twitter users to have their tweets in a timeline classified into general categories to save the user’s time and to provide easy and quick access to tweets based on topics. In this paper, we developed a classifier for timeline tweets trained on a dataset consisting of 3600 tweets in total, which were collected from Saudi Twitter and annotated manually. We experimented with the well-known Bag-of-Words approach to text classification, and we used support vector machines (SVM) in the training process. The trained classifier performed well on a test dataset, with an average F1-measure equal to 92.3%. The classifier has been integrated into an application, which practically proved the classifier’s ability to classify timeline tweets of the user.

Keywords: corpus creation, feature extraction, machine learning, short text classification, social media, support vector machine, Twitter

Procedia PDF Downloads 155
1892 Investigating Willingness to Pay for Water Services in a Newly Established Municipality in Malamulele, Vhembe District Municipality, South Africa

Authors: D. T. Chabalala

Abstract:

Currently South Africa is facing a triple challenge of poverty, unemployment and inequality. As such, communities have limited access to basic municipal services such as water, sanitation and electricity. Citizens such as those residing at Malamulele Township will be responsible to pay for the cost of water services that they consume instead of having the costs subsidised by the newly formed Municipality. The question on whether Malamulele residents would be willing to pay for water services provided for them need to be investigated. This study was conducted in Malamulele Township and surrounding villages. The article is based on a survey of 500 randomly selected households from township and villages surrounding Malamulele. The study uses the contingent valuation method to determine households’ willingness to pay for water services as well as the consequences they possibly will encounter in case their response is negative. The obtained results can be used by the Municipality and other Government Departments in order to better identify the affordable rates and the quantity of water service to be provided. Thus, it will make Municipality water supply services stable and sustainable. It will also be used as a tool to provide inform decisions about a range of infrastructure to enhance water supply systems.

Keywords: willingness to pay, contingent valuation method, water supply systems, Malamulele

Procedia PDF Downloads 228
1891 Study on the OTP Authentication Method and Security for User Mobility in the Cloud

Authors: Jong-Won Lee

Abstract:

Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.

Keywords: cloud, OTP, mobility, security, authentication

Procedia PDF Downloads 350
1890 RE:SOUNDING a 2000-Year-Old Vietnamese Dong Son Bronze Drum; Artist-Led Collaborations outside the Museum to Challenge the Impasse of Repatriating and Rematriating Cultural Instruments

Authors: H. A. J. Nguyen, V. A. Pham

Abstract:

RE:SOUNDING is an ongoing research project and artwork seeking to return the sound and knowledge of Dong Son bronze drums back to contemporary musicians. Colonial collections of ethnographic instruments are problematic in how they commit acts of conceptual, cultural, and acoustic silencing. The collection (or more honestly), the plagiarism, and pillaging of these instruments have systemically separated them from living and breathing cultures. This includes diasporic communities, who have come to resettle in close proximity - but still have little access - to the museums and galleries that display their cultural objects. Despite recent attempts to 'open up' and 'recognise' the tensions and violence of these ethnographic collections, many museums continue to structurally organize and reproduce knowledge with the same procedural distance and limitations of imperial condescension. Impatient with the slowness of these museums, our diaspora led collaborations participated in the opaque economy of the auction market to gain access and begin the process of digitally recording and archiving the actual sounds of the ancient Dong Son drum. This self-directed, self-initiated artwork not only acoustically reinvigorated an ancient instrument but redistributed these sonic materials back to contemporary musicians, composers, and their diasporic communities throughout Vietnam, South East Asia, and Australia. Our methodologies not only highlight the persistent inflexibility of museum infrastructures but demand that museums refrain from their paternalistic practice of risk-averse ownership, to seriously engage with new technologies and political formations that require all public institutions to be held accountable for the ethical and intellectual viability of their colonial collections. The integrated and practical resolve of diasporic artists and their communities are more than capable of working with new technologies to reclaim and reinvigorate what is culturally and spiritually theirs. The motivation to rematriate – as opposed to merely repatriate – the acoustic legacies of these instruments to contemporary musicians and artists is a new model for decolonial and restorative practices. Exposing the inadequacies of western scholarship that continues to treat these instruments as discreet, disembodied, and detached artifacts, these collaborative strategies have thus far produced a wealth of new knowledge – new to the west perhaps – but not that new to these, our own communities. This includes the little-acknowledged fact that the Dong Son drum were political instruments of war and technology, rather than their simplistic description in the museum and western academia as agrarian instruments of fertility and harvest. Through the collective and continued sharing of knowledge and sound materials produced from this research, these drums are gaining a contemporary relevance beyond the cultural silencing of the museum display cabinet. Acknowledgement: We acknowledge the Wurundjeri and Boon Wurrung of the Kulin Nation and the Gadigal of the Eora Nation where we began this project. We pay our respects to the Peoples, Lands, Traditional Custodians, Practices, and Creator Ancestors of these Great Nations, as well as those First Nations peoples throughout Australia, Vietnam, and Indonesia, where this research continues, and upon whose stolen lands and waterways were never ceded.

Keywords: acoustic archaeology, decolonisation, museum collections, rematriation, repatriation, Dong Son, experimental music, digital recording

Procedia PDF Downloads 151
1889 A Novel Dual Band-pass filter Based On Coupling of Composite Right/Left Hand CPW and (CSRRs) Uses Ferrite Components

Authors: Mohammed Berka, Khaled Merit

Abstract:

Recent works on microwave filters show that the constituent materials such filters are very important in the design and realization. Several solutions have been proposed to improve the qualities of filtering. In this paper, we propose a new dual band-pass filter based on the coupling of a composite (CRLH) coplanar waveguide with complementary split ring resonators (CSRRs). The (CRLH) CPW is composed of two resonators, each one has an interdigital capacitor (CID) and two short-circuited stubs parallel to top ground plane. On the lower ground plane, we use defected ground structure technology (DGS) to engrave two (CSRRs) offered with different shapes and dimensions. Between the top ground plane and the substrate, we place a ferrite layer to control the electromagnetic coupling between (CRLH) CPW and (CSRRs). The global filter that has coplanar access will have a dual band-pass behavior around the magnetic resonances of (CSRRs). Since there’s no scientific or experimental result in the literature for this kind of complicated structure, it was necessary to perform simulation using HFSS Ansoft designer.

Keywords: complementary split ring resonators, coplanar waveguide, ferrite, filter, stub.

Procedia PDF Downloads 403
1888 A QoE-driven Cross-layer Resource Allocation Scheme for High Traffic Service over Open Wireless Network Downlink

Authors: Liya Shan, Qing Liao, Qinyue Hu, Shantao Jiang, Tao Wang

Abstract:

In this paper, a Quality of Experience (QoE)-driven cross-layer resource allocation scheme for high traffic service over Open Wireless Network (OWN) downlink is proposed, and the related problem about the users in the whole cell including the users in overlap region of different cells has been solved.A method, in which assess models of the BestEffort service and the no-reference assess algorithm for video service are adopted, to calculate the Mean Opinion Score (MOS) value for high traffic service has been introduced. The cross-layer architecture considers the parameters in application layer, media access control layer and physical layer jointly. Based on this architecture and the MOS value, the Binary Constrained Particle Swarm Optimization (B_CPSO) algorithm is used to solve the cross-layer resource allocation problem. In addition,simulationresults show that the proposed scheme significantly outperforms other schemes in terms of maximizing average users’ MOS value for the whole system as well as maintaining fairness among users.

Keywords: high traffic service, cross-layer resource allocation, QoE, B_CPSO, OWN

Procedia PDF Downloads 541
1887 Voices of Dissent: Case Study of a Digital Archive of Testimonies of Political Oppression

Authors: Andrea Scapolo, Zaya Rustamova, Arturo Matute Castro

Abstract:

The “Voices in Dissent” initiative aims at collecting and making available in a digital format, testimonies, letters, and other narratives produced by victims of political oppression from different geographical spaces across the Atlantic. By recovering silenced voices behind the official narratives, this open-access online database will provide indispensable tools for rewriting the history of authoritarian regimes from the margins as memory debates continue to provoke controversy among academic and popular transnational circles. In providing an extensive database of non-hegemonic discourses in a variety of political and social contexts, the project will complement the existing European and Latin-American studies, and invite further interdisciplinary and trans-national research. This digital resource will be available to academic communities and the general audience and will be organized geographically and chronologically. “Voices in Dissent” will offer a first comprehensive study of these personal accounts of persecution and repression against determined historical backgrounds and their impact on collective memory formation in contemporary societies. The digitalization of these texts will allow to run metadata analyses and adopt comparatist approaches for a broad range of research endeavors. Most of the testimonies included in our archive are testimonies of trauma: the trauma of exile, imprisonment, torture, humiliation, censorship. The research on trauma has now reached critical mass and offers a broad spectrum of critical perspectives. By putting together testimonies from different geographical and historical contexts, our project will provide readers and scholars with an extraordinary opportunity to investigate how culture shapes individual and collective memories and provides or denies resources to make sense and cope with the trauma. For scholars dealing with the epistemological and rhetorical analysis of testimonies, an online open-access archive will prove particularly beneficial to test theories on truth status and the formation of belief as well as to study the articulation of discourse. An important aspect of this project is also its pedagogical applications since it will contribute to the creation of Open Educational Resources (OER) to support students and educators worldwide. Through collaborations with our Library System, the archive will form part of the Digital Commons database. The texts collected in this online archive will be made available in the original languages as well as in English translation. They will be accompanied by a critical apparatus that will contextualize them historically by providing relevant background information and bibliographical references. All these materials can serve as a springboard for a broad variety of educational projects and classroom activities. They can also be used to design specific content courses or modules. In conclusion, the desirable outcomes of the “Voices in Dissent” project are: 1. the collections and digitalization of political dissent testimonies; 2. the building of a network of scholars, educators, and learners involved in the design, development, and sustainability of the digital archive; 3. the integration of the content of the archive in both research and teaching endeavors, such as publication of scholarly articles, design of new upper-level courses, and integration of the materials in existing courses.

Keywords: digital archive, dissent, open educational resources, testimonies, transatlantic studies

Procedia PDF Downloads 106
1886 An Innovative Auditory Impulsed EEG and Neural Network Based Biometric Identification System

Authors: Ritesh Kumar, Gitanjali Chhetri, Mandira Bhatia, Mohit Mishra, Abhijith Bailur, Abhinav

Abstract:

The prevalence of the internet and technology in our day to day lives is creating more security issues than ever. The need for protecting and providing a secure access to private and business data has led to the development of many security systems. One of the potential solutions is to employ the bio-metric authentication technique. In this paper we present an innovative biometric authentication method that utilizes a person’s EEG signal, which is acquired in response to an auditory stimulus,and transferred wirelessly to a computer that has the necessary ANN algorithm-Multi layer perceptrol neural network because of is its ability to differentiate between information which is not linearly separable.In order to determine the weights of the hidden layer we use Gaussian random weight initialization. MLP utilizes a supervised learning technique called Back propagation for training the network. The complex algorithm used for EEG classification reduces the chances of intrusion into the protected public or private data.

Keywords: EEG signal, auditory evoked potential, biometrics, multilayer perceptron neural network, back propagation rule, Gaussian random weight initialization

Procedia PDF Downloads 409
1885 Myers-Briggs Type Index Personality Type Classification Based on an Individual’s Spotify Playlists

Authors: Sefik Can Karakaya, Ibrahim Demir

Abstract:

In this study, the relationship between musical preferences and personality traits has been investigated in terms of Spotify audio analysis features. The aim of this paper is to build such a classifier capable of segmenting people into their Myers-Briggs Type Index (MBTI) personality type based on their Spotify playlists. Music takes an important place in the lives of people all over the world and online music streaming platforms make it easier to reach musical contents. In this context, the motivation to build such a classifier is allowing people to gain access to their MBTI personality type and perhaps for more reliably and more quickly. For this purpose, logistic regression and deep neural networks have been selected for classifier and their performances are compared. In conclusion, it has been found that musical preferences differ statistically between personality traits, and evaluated models are able to distinguish personality types based on given musical data structure with over %60 accuracy rate.

Keywords: myers-briggs type indicator, music psychology, Spotify, behavioural user profiling, deep neural networks, logistic regression

Procedia PDF Downloads 144