Search results for: digital age
967 Perceptions of Educators on the Learners’ Youngest Age for the Introduction of ICTs in Schools: A Personality Theory Approach
Authors: Kayode E. Oyetade, Seraphin D. Eyono Obono
Abstract:
Age ratings are very helpful in providing parents with relevant information for the purchase and use of digital technologies by the children; this is why the non-definition of age ratings for the use of ICT's by children in schools is a major concern; and this problem serves as a motivation for this study whose aim is to examine the factors affecting the perceptions of educators on the learners’ youngest age for the introduction of ICT's in schools. This aim is achieved through two types of research objectives: the identification and design of theories and models on age ratings, and the empirical testing of such theories and models in a survey of educators from the Camperdown district of the South African KwaZulu-Natal province. A questionnaire is used for the collection of the data of this survey whose validity and reliability is checked in SPSS prior to its descriptive and correlative quantitative analysis. The main hypothesis supporting this research is the association between the demographics of educators, their personality, and their perceptions on the learners’ youngest age for the introduction of ICT's in schools; as claimed by existing research; except that the present study looks at personality from three dimensions: self-actualized personalities, fully functioning personalities, and healthy personalities. This hypothesis was fully confirmed by the empirical study conducted by this research except for the demographic factor where only the educators’ grade or class was found to be associated with the personality of educators.Keywords: age ratings, educators, e-learning, personality theories
Procedia PDF Downloads 237966 Study of Aerosol Deposition and Shielding Effects on Fluorescent Imaging Quantitative Evaluation in Protective Equipment Validation
Authors: Shinhao Yang, Hsiao-Chien Huang, Chin-Hsiang Luo
Abstract:
The leakage of protective clothing is an important issue in the occupational health field. There is no quantitative method for measuring the leakage of personal protective equipment. This work aims to measure the quantitative leakage of the personal protective equipment by using the fluorochrome aerosol tracer. The fluorescent aerosols were employed as airborne particulates in a controlled chamber with ultraviolet (UV) light-detectable stickers. After an exposure-and-leakage test, the protective equipment was removed and photographed with UV-scanning to evaluate areas, color depth ratio, and aerosol deposition and shielding effects of the areas where fluorescent aerosols had adhered to the body through the protective equipment. Thus, this work built a calculation software for quantitative leakage ratio of protective clothing based on fluorescent illumination depth/aerosol concentration ratio, illumination/Fa ratio, aerosol deposition and shielding effects, and the leakage area ratio on the segmentation. The results indicated that the two-repetition total leakage rate of the X, Y, and Z type protective clothing for subject T were about 3.05, 4.21, and 3.52 (mg/m2). For five-repetition, the leakage rate of T were about 4.12, 4.52, and 5.11 (mg/m2).Keywords: fluorochrome, deposition, shielding effects, digital image processing, leakage ratio, personal protective equipment
Procedia PDF Downloads 323965 Sporting Events among the Disabled between Excellence and Ideal in Motor Performance: Analytical Descriptive Study in Some Paralympic Sports
Authors: Guebli Abdelkader, Reguieg Madani, Belkadi Adel, Sbaa Bouabdellah
Abstract:
The identification of mechanical variables in the motor performance trajectory has a prominent role in improving skill performance, error-exceeding, it contributes seriously to solving some problems of learning and training. The study aims to highlight the indicators of motor performance for Paralympic athletes during the practicing sports between modelling and between excellence in motor performance, this by taking into account the distinction of athlete practicing with special behavioral skills for the Paralympic athletes. In the study, we relied on the analysis of some previous research of biomechanical performance indicators during some of the events sports (shooting activities in the Paralympic athletics, shooting skill in the wheelchair basketball). The results of the study highlight the distinction of disabled practitioners of sporting events identified in motor performance during practice, by overcoming some physics indicators in human movement, as a lower center of body weight, increase in offset distance, such resistance which requires them to redouble their efforts. However, the results of the study highlighted the strength of the correlation between biomechanical variables of motor performance and the digital level achievement similar to the other practitioners normal.Keywords: sports, the disabled, motor performance, Paralympic
Procedia PDF Downloads 283964 Analysis of Vocal Fold Vibrations from High-Speed Digital Images Based on Dynamic Time Warping
Authors: A. I. A. Rahman, Sh-Hussain Salleh, K. Ahmad, K. Anuar
Abstract:
Analysis of vocal fold vibration is essential for understanding the mechanism of voice production and for improving clinical assessment of voice disorders. This paper presents a Dynamic Time Warping (DTW) based approach to analyze and objectively classify vocal fold vibration patterns. The proposed technique was designed and implemented on a Glottal Area Waveform (GAW) extracted from high-speed laryngeal images by delineating the glottal edges for each image frame. Feature extraction from the GAW was performed using Linear Predictive Coding (LPC). Several types of voice reference templates from simulations of clear, breathy, fry, pressed and hyperfunctional voice productions were used. The patterns of the reference templates were first verified using the analytical signal generated through Hilbert transformation of the GAW. Samples from normal speakers’ voice recordings were then used to evaluate and test the effectiveness of this approach. The classification of the voice patterns using the technique of LPC and DTW gave the accuracy of 81%.Keywords: dynamic time warping, glottal area waveform, linear predictive coding, high-speed laryngeal images, Hilbert transform
Procedia PDF Downloads 239963 Leakage Current Analysis of FinFET Based 7T SRAM at 32nm Technology
Authors: Chhavi Saxena
Abstract:
FinFETs can be a replacement for bulk-CMOS transistors in many different designs. Its low leakage/standby power property makes FinFETs a desirable option for memory sub-systems. Memory modules are widely used in most digital and computer systems. Leakage power is very important in memory cells since most memory applications access only one or very few memory rows at a given time. As technology scales down, the importance of leakage current and power analysis for memory design is increasing. In this paper, we discover an option for low power interconnect synthesis at the 32nm node and beyond, using Fin-type Field-Effect Transistors (FinFETs) which are a promising substitute for bulk CMOS at the considered gate lengths. We consider a mechanism for improving FinFETs efficiency, called variable supply voltage schemes. In this paper, we’ve illustrated the design and implementation of FinFET based 4x4 SRAM cell array by means of one bit 7T SRAM. FinFET based 7T SRAM has been designed and analysis have been carried out for leakage current, dynamic power and delay. For the validation of our design approach, the output of FinFET SRAM array have been compared with standard CMOS SRAM and significant improvements are obtained in proposed model.Keywords: FinFET, 7T SRAM cell, leakage current, delay
Procedia PDF Downloads 455962 Identifying the Structural Components of Old Buildings from Floor Plans
Authors: Shi-Yu Xu
Abstract:
The top three risk factors that have contributed to building collapses during past earthquake events in Taiwan are: "irregular floor plans or elevations," "insufficient columns in single-bay buildings," and the "weak-story problem." Fortunately, these unsound structural characteristics can be directly identified from the floor plans. However, due to the vast number of old buildings, conducting manual inspections to identify these compromised structural features in all existing structures would be time-consuming and prone to human errors. This study aims to develop an algorithm that utilizes artificial intelligence techniques to automatically pinpoint the structural components within a building's floor plans. The obtained spatial information will be utilized to construct a digital structural model of the building. This information, particularly regarding the distribution of columns in the floor plan, can then be used to conduct preliminary seismic assessments of the building. The study employs various image processing and pattern recognition techniques to enhance detection efficiency and accuracy. The study enables a large-scale evaluation of structural vulnerability for numerous old buildings, providing ample time to arrange for structural retrofitting in those buildings that are at risk of significant damage or collapse during earthquakes.Keywords: structural vulnerability detection, object recognition, seismic capacity assessment, old buildings, artificial intelligence
Procedia PDF Downloads 89961 Translingual English: New languages and new identities
Authors: Sender Dovchin
Abstract:
The recent bi/multilingual scholarship shows that the knowledge of ‘translingual English’ is understood in terms of transcultural flows of linguistic, semiotic and cultural resources, where these resources re-transform and are recontextualised to form new specific languages and perform new identities in diverse societal contexts. Drawing on linguistic ethnographic data from contemporary popular music artist in Mongolia, this paper addresses two main critical questions: (1) how new forms of specific languages are created when English becomes translingual English in local contexts; and (2) how new varieties of local identities are constructed and performed when English transforms into translingual English. The paper argues that popular music artists in post-socialist Mongolia should better be understood as active cultural producers, contrary to those dominant discourses which position artists in the periphery as passive recipients of popular culture. Positioned within the creative nature of the global digital resources and the increasing transcultural spread of linguistic and cultural modes and features, these young Mongolian popular music artists produce not only new forms of linguistic practices in the local contexts but also create varied new forms of identities of what it means to be a young Mongolian person in the modern society.Keywords: multilingualism, translingualism, mongolia, english
Procedia PDF Downloads 62960 Cyber Security Situational Awareness among Students: A Case Study in Malaysia
Authors: Yunos Zahri, Ab Hamid R. Susanty, Ahmad Mustaffa
Abstract:
This paper explores the need for a national baseline study on understanding the level of cyber security situational awareness among primary and secondary school students in Malaysia. The online survey method was deployed to administer the data collection exercise. The target groups were divided into three categories: Group 1 (primary school aged 7-9 years old), Group 2 (primary school aged 10-12 years old), and Group 3 (secondary school aged 13-17 years old). A different questionnaire set was designed for each group. The survey topics/areas included Internet and digital citizenship knowledge. Respondents were randomly selected from rural and urban areas throughout all 14 states in Malaysia. A total of 9,158 respondents participated in the survey, with most states meeting the minimum sample size requirement to represent the country’s demographics. The findings and recommendations from this baseline study are fundamental to develop teaching modules required for children to understand the security risks and threats associated with the Internet throughout their years in school. Early exposure and education will help ensure healthy cyber habits among millennials in Malaysia.Keywords: cyber security awareness, cyber security education, cyber security, school students
Procedia PDF Downloads 302959 Role of Geomatics in Architectural and Cultural Conservation
Authors: Shweta Lall
Abstract:
The intent of this paper is to demonstrate the role of computerized auxiliary science in advancing the desired and necessary alliance of historians, surveyors, topographers, and analysts of architectural conservation and management. The digital era practice of recording architectural and cultural heritage in view of its preservation, dissemination, and planning developments are discussed in this paper. Geomatics include practices like remote sensing, photogrammetry, surveying, Geographic Information System (GIS), laser scanning technology, etc. These all resources help in architectural and conservation applications which will be identified through various case studies analysed in this paper. The standardised outcomes and the methodologies using relevant case studies are listed and described. The main component of geomatics methodology adapted in conservation is data acquisition, processing, and presentation. Geomatics is used in a wide range of activities involved in architectural and cultural heritage – damage and risk assessment analysis, documentation, 3-D model construction, virtual reconstruction, spatial and structural decision – making analysis and monitoring. This paper will project the summary answers of the capabilities and limitations of the geomatics field in architectural and cultural conservation. Policy-makers, urban planners, architects, and conservationist not only need answers to these questions but also need to practice them in a predictable, transparent, spatially explicit and inexpensive manner.Keywords: architectural and cultural conservation, geomatics, GIS, remote sensing
Procedia PDF Downloads 148958 Analyzing Speech Acts in Reddit Posts of Formerly Incarcerated Youths
Authors: Yusra Ibrahim
Abstract:
This study explores the online discourse of justice-involved youth on Reddit, focusing on how anonymity and asynchronicity influence their ability to share and reflect on their incarceration experiences within the "Ask Me Anything" (AMA) community. The study utilizes a quantitative analysis of speech acts to examine the varied communication patterns exhibited by youths and commenters across two AMA threads. The results indicate that, although Reddit is not specifically designed for formerly incarcerated youths, its features provide a supportive environment for them to share their incarceration experiences with non-incarcerated individuals. The level of empathy and support from the audience varies based on the audience’s perspectives on incarceration and related traumatic experiences. Additionally, the study identifies a reciprocal relationship where youths benefit from community support while offering insights into the juvenile justice system and helping the audience understand the experience of incarceration. The study also reveals cultural shocks in physical and digital environments that youth experience after release and when using social media platforms and the internet. The study has implications for juvenile justice personnel, policymakers, and researchers in the juvenile justice system.Keywords: juvenile justice, online discourse, reddit AMA, anonymity, speech acts taxonomy, reintegration, online community support
Procedia PDF Downloads 43957 Indicators for Success of Obesity Reduction Programs in Adolescents; Body Composition and Body Mass Index: Evaluating a School-Based Health Promotion Project in Iran after 12 Weeks of Intervention
Authors: Saeid Doaei
Abstract:
Background: Obesity in adolescence is a primary risk factor for obesity in adulthood. The objective of this study was the assessment of the effect of a comprehensive lifestyle intervention on different anthropometric indices in 12 to 16 years old boy adolescents. Methods: 96 adolescent boys of two schools of District 5 of Tehran have participated in this study. The schools were randomly assigned as intervention school (n=53) and control school (n=43). The height and weight of students were measured with a calibrated tape line and digital scale respectively and their BMI were calculated. The amounts of body fat percent (BF) and body muscle (BM) percent were determined by Bio Impedance Analyzer (BIA) considering the age, gender and height of students at baseline and after intervention. The intervention was implemented in the intervention school, according to the Ottawa charter principles. Results: 12 weeks of intervention decreased body fat percent in the intervention group in comparison with the control group (decreased by 1.81 % in the intervention group and increased by .39 % in the control group, P < .01). However, weight, BMI and BM did not change significantly. Conclusion: The result of this study showed that the implementation of comprehensive intervention in obese adolescents may improve the body composition, although these changes may not be reflected in BMI. It is possible that BMI is not a good indicator in assessment of the success of obesity management intervention.Keywords: obesity, childhood, BMI, nutrition
Procedia PDF Downloads 271956 An Immune-Inspired Web Defense Architecture
Authors: Islam Khalil, Amr El-Kadi
Abstract:
With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.Keywords: containers, human immunity, intrusion detection, security, web services
Procedia PDF Downloads 96955 Comparing Image Processing and AI Techniques for Disease Detection in Plants
Authors: Luiz Daniel Garay Trindade, Antonio De Freitas Valle Neto, Fabio Paulo Basso, Elder De Macedo Rodrigues, Maicon Bernardino, Daniel Welfer, Daniel Muller
Abstract:
Agriculture plays an important role in society since it is one of the main sources of food in the world. To help the production and yield of crops, precision agriculture makes use of technologies aiming at improving productivity and quality of agricultural commodities. One of the problems hampering quality of agricultural production is the disease affecting crops. Failure in detecting diseases in a short period of time can result in small or big damages to production, causing financial losses to farmers. In order to provide a map of the contributions destined to the early detection of plant diseases and a comparison of the accuracy of the selected studies, a systematic literature review of the literature was performed, showing techniques for digital image processing and neural networks. We found 35 interesting tool support alternatives to detect disease in 19 plants. Our comparison of these studies resulted in an overall average accuracy of 87.45%, with two studies very closer to obtain 100%.Keywords: pattern recognition, image processing, deep learning, precision agriculture, smart farming, agricultural automation
Procedia PDF Downloads 379954 Streamline Marketing Strategies for Survival of Librarianship in Developing Countries in the 21st Century: A Study Related to Sri Lanka
Authors: Wilfred Jeyatheese Jeyaraj
Abstract:
Considering the current digital age, Library Marketing, in its entirety, has evolved to elucidate the importance of falling back to the roots of searching for tangible and intangible resources, traversing through pages and references to acquire the required knowledge needs with proper guidance. With the turn of the century, the present generation has deeply entrenched their virtual presence, browsing via search engines for all their information needs. Not fully realizing the adverse effects of the materials available digitally, the authenticity of such resources cannot be verified. So a user might be led to believe false misdirected data. This paper tends to elucidate the prominent strategies to market Sri Lankan libraries in a proper manner so as to captivate a large user base making them aware that all resources and materials that they access without guidance outside the libraries are also available within the libraries with added guidance towards accessing the right data. The main contemplation here is to focus on getting more users to visit libraries in person to copiously apprehend the importance of browsing for materials with the proper direction. The current library marketing strategies in Sri Lankan libraries need to be streamlined to align with the best interest of acquiring the present generations to visit libraries in person to reap its benefits.Keywords: accessibility, librarianship, marketing, Sri Lanka
Procedia PDF Downloads 284953 An Image Enhancement Method Based on Curvelet Transform for CBCT-Images
Authors: Shahriar Farzam, Maryam Rastgarpour
Abstract:
Image denoising plays extremely important role in digital image processing. Enhancement of clinical image research based on Curvelet has been developed rapidly in recent years. In this paper, we present a method for image contrast enhancement for cone beam CT (CBCT) images based on fast discrete curvelet transforms (FDCT) that work through Unequally Spaced Fast Fourier Transform (USFFT). These transforms return a table of Curvelet transform coefficients indexed by a scale parameter, an orientation and a spatial location. Accordingly, the coefficients obtained from FDCT-USFFT can be modified in order to enhance contrast in an image. Our proposed method first uses a two-dimensional mathematical transform, namely the FDCT through unequal-space fast Fourier transform on input image and then applies thresholding on coefficients of Curvelet to enhance the CBCT images. Consequently, applying unequal-space fast Fourier Transform leads to an accurate reconstruction of the image with high resolution. The experimental results indicate the performance of the proposed method is superior to the existing ones in terms of Peak Signal to Noise Ratio (PSNR) and Effective Measure of Enhancement (EME).Keywords: curvelet transform, CBCT, image enhancement, image denoising
Procedia PDF Downloads 300952 Media Literacy: Information and Communication Technology Impact on Teaching and Learning Methods in Albanian Education System
Authors: Loreta Axhami
Abstract:
Media literacy in the digital age emerges not only as a set of skills to generate true knowledge and information but also as a pedagogy methodology, as a kind of educational philosophy. In addition to such innovations as information integration and communication technologies, media infrastructures, and web usage in the educational system, media literacy enables the change in the learning methods, pedagogy, teaching programs, and school curriculum itself. In this framework, this study focuses on ICT's impact on teaching and learning methods and the degree they are reflected in the Albanian education system. The study is based on a combination of quantitative and qualitative methods of scientific research. Referring to the study findings, it results that student’s limited access to the internet in school, focus on the hardcopy textbooks and the role of the teacher as the only or main source of knowledge and information are some of the main factors contributing to the implementation of authoritarian pedagogical methods in the Albanian education system. In these circumstances, the implementation of media literacy is recommended as an apt educational process for the 21st century, which requires a reconceptualization of textbooks as well as the application of modern teaching and learning methods by integrating information and communication technologies.Keywords: authoritarian pedagogic model, education system, ICT, media literacy
Procedia PDF Downloads 140951 CVOIP-FRU: Comprehensive VoIP Forensics Report Utility
Authors: Alejandro Villegas, Cihan Varol
Abstract:
Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU.Keywords: betamax, digital forensics, report utility, VoIP, VoIPBuster, VoIPWise
Procedia PDF Downloads 297950 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 405949 An Acoustical Diagnosis of a Shaft-Wood Phyto-Pathogenic Damage of Sequoiadendron giganteum (Lindl.) Buccholz
Authors: Yuri V. Plugatar, Vladimir P. Koba, Vladimir V. Papelbu, Vladimir N. Gerasimchuk, Tatjana M. Sakhno
Abstract:
Using a supersonic shaft–wood tomography, the evaluation of a shaft-wood phyto-pathogenic damage level of Sequoiadendron giganteum (Lindl.) Buccholz was prosecuted. The digital bivariate reflections of the shaft tissue damage were obtained, the characteristics of comparative parameters of the wood-decay degree were given. The investigation results allowed to show up the role of some edaphic factors in their affection on a vital condition and the level of destructive processes while shaft tissue damaging of S.giganteum. It was pinned up that soil consolidation, and hydro-morphication equally make for a phyto-pathogenic damage of plants. While soil consolidation negative acting the shaft-wood damage is located in an underneath of a shaft. In the conditions of an enlarged hydro-morphication a tissue degradation runs less intensively, the destructive processes more active spread in a vertical section of a shaft. The use of a supersonic tomography method gives wide possibilities to diagnose a shaft-wood phyto-pathogenic damage.Keywords: Sequoiadendron giganteum (Lindl.) Buccholz, supersonic tomography, diagnosis, phyto-pathogenic damage, a vital condition
Procedia PDF Downloads 213948 Design and Realization of Double-Delay Line Canceller (DDLC) Using Fpga
Authors: A. E. El-Henawey, A. A. El-Kouny, M. M. Abd –El-Halim
Abstract:
Moving target indication (MTI) which is an anti-clutter technique that limits the display of clutter echoes. It uses the radar received information primarily to display moving targets only. The purpose of MTI is to discriminate moving targets from a background of clutter or slowly-moving chaff particles as shown in this paper. Processing system in these radars is so massive and complex; since it is supposed to perform a great amount of processing in very short time, in most radar applications the response of a single canceler is not acceptable since it does not have a wide notch in the stop-band. A double-delay canceler is an MTI delay-line canceler employing the two-delay-line configuration to improve the performance by widening the clutter-rejection notches, as compared with single-delay cancelers. This canceler is also called a double canceler, dual-delay canceler, or three-pulse canceler. In this paper, a double delay line canceler is chosen for study due to its simplicity in both concept and implementation. Discussing the implementation of a simple digital moving target indicator (DMTI) using FPGA which has distinct advantages compared to other application specific integrated circuit (ASIC) for the purposes of this work. The FPGA provides flexibility and stability which are important factors in the radar application.Keywords: FPGA, MTI, double delay line canceler, Doppler Shift
Procedia PDF Downloads 644947 Simulation and Experimental Research on Pocketing Operation for Toolpath Optimization in CNC Milling
Authors: Rakesh Prajapati, Purvik Patel, Avadhoot Rajurkar
Abstract:
Nowadays, manufacturing industries augment their production lines with modern machining centers backed by CAM software. Several attempts are being made to cut down the programming time for machining complex geometries. Special programs/software have been developed to generate the digital numerical data and to prepare NC programs by using suitable post-processors for different machines. By selecting the tools and manufacturing process then applying tool paths and NC program are generated. More and more complex mechanical parts that earlier were being cast and assembled/manufactured by other processes are now being machined. Majority of these parts require lots of pocketing operations and find their applications in die and mold, turbo machinery, aircraft, nuclear, defense etc. Pocketing operations involve removal of large quantity of material from the metal surface. The modeling of warm cast and clamping a piece of food processing parts which the used of Pro-E and MasterCAM® software. Pocketing operation has been specifically chosen for toolpath optimization. Then after apply Pocketing toolpath, Multi Tool Selection and Reduce Air Time give the results of software simulation time and experimental machining time.Keywords: toolpath, part program, optimization, pocket
Procedia PDF Downloads 288946 European Drug Serialization: Securing the Pharmaceutical Drug Supply Chain from Counterfeiters
Authors: Vikram Chowdhary, Marek Vins
Abstract:
The profitability of the pharmaceutical drug business has attracted considerable interest, but it also faces significant challenges. Counterfeiters take advantage of the industry's vulnerabilities, which are further exacerbated by the globalization of the market, online trading, and complex supply chains. Governments and organizations worldwide are dedicated to creating a secure environment that ensures a consistent and genuine supply of pharmaceutical products. In 2019, the European authorities implemented regulation EU 2016/161 to strengthen traceability and transparency throughout the entire drug supply chain. This regulation requires the addition of enhanced security features, such as serializing items to the saleable unit level or individual packs. Despite these efforts, the incidents of pharmaceutical counterfeiting continue to rise globally, with regulated territories being particularly affected. This paper examines the effectiveness of the drug serialization system implemented by European authorities. By conducting a systematic literature review, we assess the implementation of drug serialization and explore the potential benefits of integrating emerging digital technologies, such as RFID and Blockchain, to improve traceability and management. The objective is to fortify pharmaceutical supply chains against counterfeiters and manipulators and ensure their security.Keywords: blockchain, counterfeit drugs, EU drug serialization, pharmaceutical industry, RFID
Procedia PDF Downloads 111945 Results of the Field-and-Scientific Study in the Water Area of the Estuaries of the Major Rivers of the Black Sea and Sea Ports on the Territory of Georgia
Authors: Ana Gavardashvili
Abstract:
The field-and-scientific studies to evaluate the modern ecological state in the water area of the estuaries of the major water-abundant rivers in the coastal line of the Black Sea (Chorokhi, Kintrishi, Natanebi, Supsa, Khobistskali, Rioni and Enguri) and sea ports (Batumi, Poti) and sea terminals of the oil pipeline (Baku-Tbilisi-Supsa, Kulevi) were accomplished in the months of June and July of 2015. GPS coordinates and GIS programs were used to fix the areas of the estuaries of the above-listed rivers on a digital map, with their values varying within the limits of 0,861 and 20,390 km2. Water samples from the Black Sea were taken from the river estuaries and sea ports during the field works, with their statistical series of 125 points. The temperatures of air (t2) and water in the Black Sea (t1) were measured locally, and their relative value is (t1 /t2 ) = 0,69 – 0,92. 125 water samples taken from the study object in the Black Sea coastal line were subject to laboratory analysis, and it was established that the Black Sea acidity (pH) changes within the limits of 7,71 – 8,22 in the river estuaries and within 8,42 - 8,65 in the port water areas and at oil terminals. As for the Sea water salinity index (TDS), it changes within the limits of 6,15 – 12,67 in the river estuaries, and (TDS) = 11,80 – 13,67 in the port water areas and at oil terminals. By taking the gained data and climatic changes into account, by using the theories of reliability and risk at the following stage, the nature of the changes of the function of the Black Sea ecological parameters will be established.Keywords: acidity, estuary, salinity, sea
Procedia PDF Downloads 288944 Usage of “Flowchart of Diagnosis and Treatment” Software in Medical Education
Authors: Boy Subirosa Sabarguna, Aria Kekalih, Irzan Nurman
Abstract:
Introduction: Software in the form of Clinical Decision Support System could help students in understanding the mind set of decision-making in diagnosis and treatment at the stage of general practitioners. This could accelerate and ease the learning process which previously took place by using books and experience. Method: Gather 1000 members of the National Medical Multimedia Digital Community (NM2DC) who use the “flowchart of diagnosis and treatment” software, and analyse factors related to: display, speed in learning, convenience in learning, helpfulness and usefulness in the learning process, by using the Likert Scale through online questionnaire which will further be processed using percentage. Results and Discussions: Out of the 1000 members of NM2DC, apparently: 97.0% of the members use the software and 87.5% of them are students. In terms of the analysed factors related to: display, speed in learning, convenience in learning, helpfulness and usefulness of the software’s usage, the results indicate a 90.7% of fairly good performance. Therefore, the “Flowchart of Diagnosis and Treatment” software has helped students in understanding the decision-making of diagnosis and treatment. Conclusion: the use of “Flowchart of Diagnosis and Treatment” software indicates a positive role in helping students understand decision-making of diagnosis and treatment.Keywords: usage, software, diagnosis and treatment, medical education
Procedia PDF Downloads 359943 Detailed Depositional Resolutions in Upper Miocene Sands of HT-3X Well, Nam Con Son Basin, Vietnam
Authors: Vo Thi Hai Quan
Abstract:
Nam Con Son sedimentary basin is one of the very important oil and gas basins in offshore Vietnam. Hai Thach field of block 05-2 contains mostly gas accumulations in fine-grained, sand/mud-rich turbidite system, which was deposited in a turbidite channel and fan environment. Major Upper Miocene reservoir of HT-3X lies above a well-developed unconformity. The main objectives of this study are to reconstruct depositional environment and to assess the reservoir quality using data from 14 meters of core samples and digital wireline data of the well HT-3X. The wireline log and core data showed that the vertical sequences of representative facies of the well mainly range from Tb to Te divisions of Bouma sequences with predominance of Tb and Tc compared to Td and Te divisions. Sediments in this well were deposited in a submarine fan association with very fine to fine-grained, homogeneous sandstones that have high porosity and permeability, high- density turbidity currents with longer transport route from the sediment source to the basin, indicating good quality of reservoir. Sediments are comprised mainly of the following sedimentary structures: massive, laminated sandstones, convoluted bedding, laminated ripples, cross-laminated ripples, deformed sandstones, contorted bedding.Keywords: Hai Thach field, Miocene sand, turbidite, wireline data
Procedia PDF Downloads 292942 Using Closed Frequent Itemsets for Hierarchical Document Clustering
Authors: Cheng-Jhe Lee, Chiun-Chieh Hsu
Abstract:
Due to the rapid development of the Internet and the increased availability of digital documents, the excessive information on the Internet has led to information overflow problem. In order to solve these problems for effective information retrieval, document clustering in text mining becomes a popular research topic. Clustering is the unsupervised classification of data items into groups without the need of training data. Many conventional document clustering methods perform inefficiently for large document collections because they were originally designed for relational database. Therefore they are impractical in real-world document clustering and require special handling for high dimensionality and high volume. We propose the FIHC (Frequent Itemset-based Hierarchical Clustering) method, which is a hierarchical clustering method developed for document clustering, where the intuition of FIHC is that there exist some common words for each cluster. FIHC uses such words to cluster documents and builds hierarchical topic tree. In this paper, we combine FIHC algorithm with ontology to solve the semantic problem and mine the meaning behind the words in documents. Furthermore, we use the closed frequent itemsets instead of only use frequent itemsets, which increases efficiency and scalability. The experimental results show that our method is more accurate than those of well-known document clustering algorithms.Keywords: FIHC, documents clustering, ontology, closed frequent itemset
Procedia PDF Downloads 399941 Transnational Educators in Japan, Russia, and America: Historical Trends in Global Education in the 1990’s and Early 2000’s
Authors: Peter J. Glinos
Abstract:
The Alternative Education Resource Organization (AERO), one of the largest international hubs for alternative educators led by Jerry Mintz, has had a major impact on the global alternative education movement. The organization’s publications, like the AERO-Gramme Newsletter and its successor, the Education Revolution Magazine, allowed members across the globe to discuss issues, share support, and submit writings on policies and reforms. Stored on AERO's online digital archive, this work uses these publications from 1989 to 2011 to investigate the network's entanglements with America, Canada, Russia, Ukraine, Israel, Palestine, Japan, India, and Guatemala. Inspired by Reinhart Koselleck, this historical analysis will trace AERO’s entanglements within the United States, Japan, and Russia, contextualizing each of these multiple temporalities within the history of each nation’s education system, the developments within AERO, and the global geo-political climate at the time of AERO’s expansion. To help remedy the lack of attention paid by global historians to the role state organizations play supporting global networks, as noted in What is Global History? by Sebastian Conrad, this work will focus on the relationship between AERO and state actors.Keywords: global history, history of education, neoliberalism, transnational history, alternative education
Procedia PDF Downloads 28940 Review of the Legislative and Policy Issues in Promoting Infrastructure Development to Promote Automation in Telecom Industry
Authors: Marvin Ricardo Awarab
Abstract:
There has never been a greater need for telecom services. The Internet of Things (IoT), 5G networking, and edge computing are the driving forces behind this increased demand. The fierce demand offers communications service providers significant income opportunities. The telecom sector is centered on automation, and realizing a digital operation that functions as a real-time business will be crucial for the industry as a whole. Automation in telecom refers to the application of technology to create a more effective, quick, and scalable alternative to the conventional method of operating the telecom industry. With the promotion of 5G and the Internet of Things (IoT), telecom companies will continue to invest extensively in telecom automation technology. Automation offers benefits in the telecom industry; developing countries such as Namibia may not fully tap into such benefits because of the lack of funds and infrastructural resources to invest in automation. This paper fully investigates the benefits of automation in the telecom industry. Furthermore, the paper identifies hiccups that developing countries such as Namibia face in their quest to fully introduce automation in the telecom industry. Additionally, the paper proposes possible avenues that Namibia, as a developing country, adopt investing in automation infrastructural resources with the aim of reaping the full benefits of automation in the telecom industry.Keywords: automation, development, internet, internet of things, network, telecom, telecommunications policy, 5G
Procedia PDF Downloads 63939 Use of Information and Communication Technology (ICT) Among Nigerian Colleges of Education Lecturers: A Gender Analysis Approach
Authors: Rasheed A. Saliu, Sunday E. Ogundipe, Oluwaseun A. Adefila
Abstract:
Information and Communication Technology (ICT) in recent time has transformed the means by which we inform ourselves, with world events and areas of personal interests, and further our learning. Today, for many, books and journals are no longer the first or primary source of information or learning. We now regularly rely on images, video, animations and sound to acquire information and to learn. Increased and improved access to the internet has accelerated this phenomenon. We now acquire and access information in ways fundamentally different from the pre-ICT era. But to what extent is academic staff in colleges of education, having access to and the utilising of ICT devices in their lecture deliveries especially in School of Science and Vocational and Technical? The main focus of this paper is to proffer solution to this salient question. It is essentially an empirical study carried out in five colleges of education in south-west zone of Nigeria. The target population was the academic staff in the selected institution. A total number of 150 male and female lecturers were contacted for the study. The main instrument was questionnaire. The finding reveals that male lecturers are much more ICT inclined than women folk in the academics. Some recommendations were made to endear academics to utilizing ICT at their disposal to foster qualitative delivery in this digital era.Keywords: education, gender, ICT, Nigeria
Procedia PDF Downloads 297938 Patient Perspectives on Telehealth During the Pandemic in the United States
Authors: Manal Sultan Alhussein, Xiang Michelle Liu
Abstract:
Telehealth is an advanced technology using digital information and telecommunication facilities that provide access to health services from a distance. It slows the transmission factor of COVID-19, especially for elderly patients and patients with chronic diseases during the pandemic. Therefore, understanding patient perspectives on telehealth services and the factors impacting their option of telehealth service will shed light on the measures that healthcare providers can take to improve the quality of telehealth services. This study aimed to evaluate perceptions of telehealth services among different patient groups and explore various aspects of telehealth utilization in the United States during the COVID-19 pandemic. An online survey distributed via social media platforms was used to collect research data. In addition to the descriptive statistics, both correlation and regression analyses were conducted to test research hypotheses. The empirical results highlighted that the factors such as accessibility to telehealth services and the type of specialty clinics that the patients required play important roles in the effectiveness of telehealth services they received. However, the results found that patients’ waiting time to receive telehealth services and their annual income did not significantly influence their desire to select receiving healthcare services via telehealth. The limitations of the study and future research directions are discussed.Keywords: telehealth, patient satisfaction, pandemic, healthcare, survey
Procedia PDF Downloads 112