Search results for: internet usage
1521 Impact of Corn Gluten Hydrolysate on Seedling Growth
Authors: Jyotika Chopra, Dinesh Goyal
Abstract:
A study was initiated to examine the effects of corn gluten hydrolysate on seedlings growth and its development. Corn gluten is the byproduct of starch industry rich in proteins was hydrolysed by acid and alkali, and the impact of hydrolysate was studied on seed germination of Vigna radiata, Phaseolus vulagris (Fabaceae) and Triticum aestivum and Oryza sativa (Gramineae). For this, the optimum hydrolysis was obtained by 4NHCl and 4M NaOH where insoluble protein in gluten was broken down to glutamic acid, alanine, aspartic acid which was initially confirmed by biuret test, xanthoproteic, solubility and chromatographic tests. The seeds of above families were separately treated with different dilutions of corn gluten hydrolysate ranging from 1-100% to see effects produced by these dilutions on seed germination, plumule, and radical growth. The seedlings were put in the Petri plates and placed in the optimized conditions of temperature (37˚C) and photoperiod of 16:8 hours. The results indicate the plumule of all seeds shows the increase in growth pattern up to 25.75%. Whereas radical shows the increase in growth up to 25.88% till 10% of dilution of corn and wheat gluten hydrolysate with respect to water as blank. Further, there is decrease in growth from 30- 100% of dilutions of both, the hydrolysate indicates the inhibitory effects which unveil about the careful usage of gluten hydrolysate.Keywords: corn gluten, characterization, hydrolysis, seedling growth
Procedia PDF Downloads 1131520 Analytical Solution of Non–Autonomous Discrete Non-Linear Schrodinger Equation With Saturable Non-Linearity
Authors: Mishu Gupta, Rama Gupta
Abstract:
It has been elucidated here that non- autonomous discrete non-linear Schrödinger equation is associated with saturable non-linearity through photo-refractive media. We have investigated the localized solution of non-autonomous saturable discrete non-linear Schrödinger equations. The similarity transformation has been involved in converting non-autonomous saturable discrete non-linear Schrödinger equation to constant-coefficient saturable discrete non-linear Schrödinger equation (SDNLSE), whose exact solution is already known. By back substitution, the solution of the non-autonomous version has been obtained. We have analysed our solution for the hyperbolic and periodic form of gain/loss term, and interesting results have been obtained. The most important characteristic role is that it helps us to analyse the propagation of electromagnetic waves in glass fibres and other optical wave mediums. Also, the usage of SDNLSE has been seen in tight binding for Bose-Einstein condensates in optical mediums. Even the solutions are interrelated, and its properties are prominently used in various physical aspects like optical waveguides, Bose-Einstein (B-E) condensates in optical mediums, Non-linear optics in photonic crystals, and non-linear kerr–type non-linearity effect and photo refracting medium.Keywords: B-E-Bose-Einstein, DNLSE-Discrete non linear schrodinger equation, NLSE-non linear schrodinger equation, SDNLSE - saturable discrete non linear Schrodinger equation
Procedia PDF Downloads 1551519 Adequacy of Museums' Internet Resources to Infantile and Young Public
Authors: Myriam Ferreira
Abstract:
Websites and social networks allow museums to divulge their works by new and attractive means. Besides, these technologies provide tools to generate a new history of art’s contents and promote visits to their installations. At the same time, museums are proposing more and more activities to families, children and young people. However, these activities usually take place in the museum’s physical installations, while websites and social networks seem to be mainly targeted to adults. The problem is that being children and young people digital natives, they feel apart from museums, so they need a presence of museums in digital means to feel attracted to them. Some institutions are making efforts to fill this vacuum. In this paper, resources designed specifically for children and teenagers have been selected from websites and social networks of five Spanish Museums: Prado Museum, Thyssen Museum, Guggenheim Museum, America Museum and Cerralbo Museum. After that, we have carried out an investigation in a school with children and teenagers between 11 and 15 years old. Those young people have been asked about their valuation of those web pages and social networks, with quantitative-qualitative questions. The results show that the least rated resources were videos and social networks because they were considered ‘too serious’, while the most rated were games and augmented reality. These ratings confirm theoretical papers that affirm that the future of technologies applied to museums is edutainment and interaction.Keywords: children, museums, social networks, teenagers, websites
Procedia PDF Downloads 1501518 Side Effects of Dental Whitening: Published Data from the Literature
Authors: Ilma Robo, Saimir Heta, Emela Dalloshi, Nevila Alliu, Vera Ostreni
Abstract:
The dental whitening process, beyond the fact that it is a mini-invasive dental treatment, has effects on the dental structure, or on the pulp of the tooth, where it is applied. The electronic search was performed using keywords to find articles published within the last 10 years about side effects, assessed as such, of minimally invasive dental bleaching treatment. Methodology: In selected articles, the other aim of the study was to evaluate the side effects of bleaching based on the percentage and type of solution used, where the latter was evaluated on the basic solution used for bleaching. Results: The side effects of bleaching are evaluated in selected articles depending on the method of bleaching application, which means it is carried out with recommended solutions, or with mixtures of alternative solutions or substances based on Internet information. Short conclusion: The dental bleaching process has side effects which have not yet been definitively evaluated, experimentally in large samples of individuals or animals (mice or cattle) to arrive at accurate numerical conclusions. The trend of publications about this topic is increasing in recent years, as long as the trend for aesthetic facial treatments, including dental ones, is increasing.Keywords: teeth whitening, side effects, permanent teeth, formed dental apex
Procedia PDF Downloads 641517 Locomotion Effects of Redundant Degrees of Freedom in Multi-Legged Quadruped Robots
Authors: Hossein Keshavarz, Alejandro Ramirez-Serrano
Abstract:
Energy efficiency and locomotion speed are two key parameters for legged robots; thus, finding ways to improve them are important. This paper proposes a locomotion framework to analyze the energy usage and speed of quadruped robots via a Genetic Algorithm (GA) optimization process. For this, a quadruped robot platform with joint redundancy in its hind legs that we believe will help multi-legged robots improve their speed and energy consumption is used. ContinuO, the quadruped robot of interest, has 14 active degrees of freedom (DoFs), including three DoFs for each front leg, and unlike previously developed quadruped robots, four DoFs for each hind leg. ContinuO aims to realize a cost-effective quadruped robot for real-world scenarios with high speeds and the ability to overcome large obstructions. The proposed framework is used to locomote the robot and analyze its energy consumed at diverse stride lengths and locomotion speeds. The analysis is performed by comparing the obtained results in two modes, with and without the joint redundancy on the robot’s hind legs.Keywords: genetic algorithm optimization, locomotion path planning, quadruped robots, redundant legs
Procedia PDF Downloads 1041516 Mitigating Supply Chain Risk for Sustainability Using Big Data Knowledge: Evidence from the Manufacturing Supply Chain
Authors: Mani Venkatesh, Catarina Delgado, Purvishkumar Patel
Abstract:
The sustainable supply chain is gaining popularity among practitioners because of increased environmental degradation and stakeholder awareness. On the other hand supply chain, risk management is very crucial for the practitioners as it potentially disrupts supply chain operations. Prediction and addressing the risk caused by social issues in the supply chain is paramount importance to the sustainable enterprise. More recently, the usage of Big data analytics for forecasting business trends has been gaining momentum among professionals. The aim of the research is to explore the application of big data, predictive analytics in successfully mitigating supply chain social risk and demonstrate how such mitigation can help in achieving sustainability (environmental, economic & social). The method involves the identification and validation of social issues in the supply chain by an expert panel and survey. Later, we used a case study to illustrate the application of big data in the successful identification and mitigation of social issues in the supply chain. Our result shows that the company can predict various social issues through big data, predictive analytics and mitigate the social risk. We also discuss the implication of this research to the body of knowledge and practice.Keywords: big data, sustainability, supply chain social sustainability, social risk, case study
Procedia PDF Downloads 4081515 Proxisch: An Optimization Approach of Large-Scale Unstable Proxy Servers Scheduling
Authors: Xiaoming Jiang, Jinqiao Shi, Qingfeng Tan, Wentao Zhang, Xuebin Wang, Muqian Chen
Abstract:
Nowadays, big companies such as Google, Microsoft, which have adequate proxy servers, have perfectly implemented their web crawlers for a certain website in parallel. But due to lack of expensive proxy servers, it is still a puzzle for researchers to crawl large amounts of information from a single website in parallel. In this case, it is a good choice for researchers to use free public proxy servers which are crawled from the Internet. In order to improve efficiency of web crawler, the following two issues should be considered primarily: (1) Tasks may fail owing to the instability of free proxy servers; (2) A proxy server will be blocked if it visits a single website frequently. In this paper, we propose Proxisch, an optimization approach of large-scale unstable proxy servers scheduling, which allow anyone with extremely low cost to run a web crawler efficiently. Proxisch is designed to work efficiently by making maximum use of reliable proxy servers. To solve second problem, it establishes a frequency control mechanism which can ensure the visiting frequency of any chosen proxy server below the website’s limit. The results show that our approach performs better than the other scheduling algorithms.Keywords: proxy server, priority queue, optimization algorithm, distributed web crawling
Procedia PDF Downloads 2111514 Reclaiming Properties of Bituminous Concrete Using Cold Mix Design Technology
Authors: Pradeep Kumar, Shalinee Shukla
Abstract:
Pavement plays a vital role in the socio-economic development of a country. Bituminous roads construction with conventional paving grade bitumen obtained from hot mix plant creates pollution and involves emission of greenhouse gases, also the construction of pavements at very high temperature is not feasible or desirable for high rainfall and snowfall areas. This problem of overheating can be eliminated by the construction of pavements with the usage of emulsified cold mixes which will eliminate emissions and help in the reduction of fuel requirement at mixing plant, which leads to energy conservation. Cold mix is a mixture of unheated aggregate and emulsion or cutback and filler. The primary objective of this research is to assess the volumetric mix design parameters of recycled aggregates with cold mixing technology and also to assess the impact of additives on volumetric mix characteristics. In this present study, bituminous pavement materials are reclaimed using cold mix technology, and Marshall specimens are prepared with the help of slow setting type 2 (SS-2) cationic bitumen emulsion as a binder for recycled aggregates. This technique of road construction is more environmentally friendly and can be done in adverse weather conditions.Keywords: cold mixes, bitumen emulsion, recycled aggregates, volumetric properties
Procedia PDF Downloads 1371513 The Use Management of the Knowledge Management and the Information Technologies in the Competitive Strategy of a Self-Propelling Industry
Authors: Guerrero Ramírez Sandra, Ramos Salinas Norma Maricela, Muriel Amezcua Vanesa
Abstract:
This article presents the beginning of a wider study that intends to demonstrate how within organizations of the automotive industry from the city of Querétaro. Knowledge management and technological management are required, as well as people’s initiative and the interaction embedded at the interior of it, with the appropriate environment that facilitates information conversion with wide information technologies management (ITM) range. A company was identified for the pilot study of this research, where descriptive and inferential research information was obtained. The results of the pilot suggest that some respondents did noted entity the knowledge management topic, even if staffs have access to information technology (IT) that serve to enhance access to knowledge (through internet, email, databases, external and internal company personnel, suppliers, customers and competitors) data, this implicates that there are Knowledge Management (KM) problems. The data shows that academically well-prepared organizations normally do not recognize the importance of knowledge in the business, nor in the implementation of it, which at the end is a great influence on how to manage it, so that it should guide the company to greater in sight towards a competitive strategy search, given that the company has an excellent technological infrastructure and KM was not exploited. Cultural diversity is another factor that was observed by the staff.Keywords: Knowledge Management (KM), Technological Knowledge Management (TKM), Technology Information Management (TI), access to knowledge
Procedia PDF Downloads 5011512 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis
Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv
Abstract:
Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.Keywords: correlation analysis, hierarchical filtering, multisource data, network security
Procedia PDF Downloads 2011511 Contextualizing Policing in Local Communities: The Way Forward for Ghana Police Service
Authors: Bernard Owusu Asare
Abstract:
This study investigates the implementation and efficacy of community policing within the Ghana Police Service, with a focus on its impact on local communities. Emphasizing the goal of creating safer environments and improving the overall quality of life, the research engages opinion leaders from selected communities in Ghana, as well as members of the police force stationed within these communities. Employing a semi-structured interview guide as the primary research instrument, data collection involves face-to-face interviews conducted at respondents' residences and policing centers. The preliminary findings underscore the pivotal role of collaborative efforts between community elders and police personnel in the successful execution of community policing initiatives. Furthermore, the study identifies gainful employment for the youth as a key determinant of effective policing, highlighting the interconnectedness of socioeconomic factors with law enforcement outcomes. The study further reveals that access to the internet emerges as a factor influencing both policing practices and the overall quality of life within these communities. By contextualizing the dynamics of community policing in the local Ghanaian context, this research aims to contribute valuable insights to the ongoing discourse on effective law enforcement strategies and their impact on community well-being.Keywords: community, policing, police service, Ghana
Procedia PDF Downloads 661510 Combined Safety and Cybersecurity Risk Assessment for Intelligent Distributed Grids
Authors: Anders Thorsén, Behrooz Sangchoolie, Peter Folkesson, Ted Strandberg
Abstract:
As more parts of the power grid become connected to the internet, the risk of cyberattacks increases. To identify the cybersecurity threats and subsequently reduce vulnerabilities, the common practice is to carry out a cybersecurity risk assessment. For safety classified systems and products, there is also a need for safety risk assessments in addition to the cybersecurity risk assessment in order to identify and reduce safety risks. These two risk assessments are usually done separately, but since cybersecurity and functional safety are often related, a more comprehensive method covering both aspects is needed. Some work addressing this has been done for specific domains like the automotive domain, but more general methods suitable for, e.g., intelligent distributed grids, are still missing. One such method from the automotive domain is the Security-Aware Hazard Analysis and Risk Assessment (SAHARA) method that combines safety and cybersecurity risk assessments. This paper presents an approach where the SAHARA method has been modified in order to be more suitable for larger distributed systems. The adapted SAHARA method has a more general risk assessment approach than the original SAHARA. The proposed method has been successfully applied on two use cases of an intelligent distributed grid.Keywords: intelligent distribution grids, threat analysis, risk assessment, safety, cybersecurity
Procedia PDF Downloads 1531509 Investigating the Effective Parameters in Determining the Type of Traffic Congestion Pricing Schemes in Urban Streets
Authors: Saeed Sayyad Hagh Shomar
Abstract:
Traffic congestion pricing – as a strategy in travel demand management in urban areas to reduce traffic congestion, air pollution and noise pollution – has drawn many attentions towards itself. Unlike the satisfying findings in this method, there are still problems in determining the best functional congestion pricing scheme with regard to the situation. The so-called problems in this process will result in further complications and even the scheme failure. That is why having proper knowledge of the significance of congestion pricing schemes and the effective factors in choosing them can lead to the success of this strategy. In this study, first, a variety of traffic congestion pricing schemes and their components are introduced; then, their functional usage is discussed. Next, by analyzing and comparing the barriers, limitations and advantages, the selection criteria of pricing schemes are described. The results, accordingly, show that the selection of the best scheme depends on various parameters. Finally, based on examining the effective parameters, it is concluded that the implementation of area-based schemes (cordon and zonal) has been more successful in non-diversion of traffic. That is considering the topology of the cities and the fact that traffic congestion is often created in the city centers, area-based schemes would be notably functional and appropriate.Keywords: congestion pricing, demand management, flat toll, variable toll
Procedia PDF Downloads 3901508 Historical Analysis of Nigeria Politics, 1960–2010
Authors: Abdulsalami Muyideen Deji
Abstract:
Nigeria as nation got independence in 1960 from British government which allowed indigenous people to form self-government and rule themselves base on the acceptable laws and orders provided by indigenes. All citizens saw it as a welcome development that gave them opportunity to develop at their own pace. Certainly, this occurred at the first instance up to the first republic of 1963. But things became worse for the country when the first military coup of January 15, 1966 sowed apple of discord between the three major tribes in Nigeria Hausa, Yoruba and Igbo as a result of miscarriage of well-conceived plan of master-minder of that coup Major Chukwuma Kaduna Nzeogwu. Although, the argument had emanated from different quarters that if Nigeria was given opportunity to develop at the pace it was going at that time probably the Nigeria would have been among developed nation today, but that ill-fated coup was a clog in the wheel of nation’s progress. The base of this argument is that Nigeria achievements after independence still depend on the work of leaders who secure independence and also directed the affairs of nation within that short period of time up till today. Since then Nigeria has been grasping with different system of government, yet, the nation is still far from the solution. This paper will analyze Nigeria politics from independence, offer suggestion on the way forward. The source is strictly base on secondary source from textbook, newspapers, internet and journals.Keywords: politics, government, independence, development
Procedia PDF Downloads 3201507 One-Shot Text Classification with Multilingual-BERT
Authors: Hsin-Yang Wang, K. M. A. Salam, Ying-Jia Lin, Daniel Tan, Tzu-Hsuan Chou, Hung-Yu Kao
Abstract:
Detecting user intent from natural language expression has a wide variety of use cases in different natural language processing applications. Recently few-shot training has a spike of usage on commercial domains. Due to the lack of significant sample features, the downstream task performance has been limited or leads to an unstable result across different domains. As a state-of-the-art method, the pre-trained BERT model gathering the sentence-level information from a large text corpus shows improvement on several NLP benchmarks. In this research, we are proposing a method to change multi-class classification tasks into binary classification tasks, then use the confidence score to rank the results. As a language model, BERT performs well on sequence data. In our experiment, we change the objective from predicting labels into finding the relations between words in sequence data. Our proposed method achieved 71.0% accuracy in the internal intent detection dataset and 63.9% accuracy in the HuffPost dataset. Acknowledgment: This work was supported by NCKU-B109-K003, which is the collaboration between National Cheng Kung University, Taiwan, and SoftBank Corp., Tokyo.Keywords: OSML, BERT, text classification, one shot
Procedia PDF Downloads 1011506 Intellectual Capital Disclosure: Profiles of Spanish Public Universities
Authors: Yolanda Ramírez, Ángel Tejada, Agustín Baidez
Abstract:
In the higher education setting, there is a current trend in society toward greater openness and transparency. The economic, social and political changes that have occurred in recent years in public sector universities (particularly the New Public Management, the Bologna Process and the emergence of the “third mission”) call for a wider disclosure of value created by universities to support fundraising activities, to ensure accountability in the use of public funds and the outcomes of research and teaching, as well as close relationships with industries and territories. The paper has two purposes: 1) to explore the intellectual capital (IC) disclosure in Spanish universities through their websites, and 2) to identify university profiles. This study applies a content analysis to analyze the institutional websites of Spanish public universities and a cluster analysis. The analysis reveals that Spanish universities’ website content usually relates to human capital, while structural and relational capitals are less widely disclosed. Our research identifies three behavioral profiles of Spanish universities with regard to the online disclosure of IC (universities more proactive, universities less proactive and universities adopt a middle position in this regard. The results can serve as encouragement to university managers to enhance online IC disclosure to meet the information needs of university stakeholders.Keywords: universities, intellectual capital, disclosure, internet
Procedia PDF Downloads 1581505 Traffic Congestions Modeling and Predictions by Social Networks
Authors: Bojan Najdenov, Danco Davcev
Abstract:
Reduction of traffic congestions and the effects of pollution and waste of resources that come with them has been a big challenge in the past decades. Having reliable systems to facilitate the process of modeling and prediction of traffic conditions would not only reduce the environmental pollution, but will also save people time and money. Social networks play big role of people’s lives nowadays providing them means of communicating and sharing thoughts and ideas, that way generating huge knowledge bases by crowdsourcing. In addition to that, crowdsourcing as a concept provides mechanisms for fast and relatively reliable data generation and also many services are being used on regular basis because they are mainly powered by the public as main content providers. In this paper we present the Social-NETS-Traffic-Control System (SNTCS) that should serve as a facilitator in the process of modeling and prediction of traffic congestions. The main contribution of our system is to integrate data from social networks as Twitter and also implements a custom created crowdsourcing subsystem with which users report traffic conditions using an android application. Our first experience of the usage of the system confirms that the integrated approach allows easy extension of the system with other social networks and represents a very useful tool for traffic control.Keywords: traffic, congestion reduction, crowdsource, social networks, twitter, android
Procedia PDF Downloads 4821504 Comparative Analysis of the Computer Methods' Usage for Calculation of Hydrocarbon Reserves in the Baltic Sea
Authors: Pavel Shcherban, Vlad Golovanov
Abstract:
Nowadays, the depletion of hydrocarbon deposits on the land of the Kaliningrad region leads to active geological exploration and development of oil and natural gas reserves in the southeastern part of the Baltic Sea. LLC 'Lukoil-Kaliningradmorneft' implements a comprehensive program for the development of the region's shelf in 2014-2023. Due to heterogeneity of reservoir rocks in various open fields, as well as with ambiguous conclusions on the contours of deposits, additional geological prospecting and refinement of the recoverable oil reserves are carried out. The key element is use of an effective technique of computer stock modeling at the first stage of processing of the received data. The following step uses information for the cluster analysis, which makes it possible to optimize the field development approaches. The article analyzes the effectiveness of various methods for reserves' calculation and computer modelling methods of the offshore hydrocarbon fields. Cluster analysis allows to measure influence of the obtained data on the development of a technical and economic model for mining deposits. The relationship between the accuracy of the calculation of recoverable reserves and the need of modernization of existing mining infrastructure, as well as the optimization of the scheme of opening and development of oil deposits, is observed.Keywords: cluster analysis, computer modelling of deposits, correction of the feasibility study, offshore hydrocarbon fields
Procedia PDF Downloads 1661503 Creativity in the Use of Sinhala and English in Advertisements in Sri Lanka: A Morphological Analysis
Authors: Chamindi Dilkushi Senaratne
Abstract:
Sri Lanka has lived with the English language for more than 200 years. Although officially considered a link language, the phenomenal usage of English by the Sinhala-English bilingual has given rise to a mixed code with identifiable structural characteristics. The extensive use of the mixed language by the average Sri Lankan bilingual has resulted in it being used as a medium of communication by creative writers of bilingual advertisements in Sri Lanka. This study analyses the way in which English is used in bilingual advertisements in both print and electronic media in Sri Lanka. The theoretical framework for the study is based on Kachru’s analysis of the use of English by the bilingual, Muysken’s typology on code mixing theories in colonial settings and Myers-Scotton’s theory on the Matrix Language Framework Model. The study will look at a selection of Sinhala-English advertisements published in newspapers from 2015 to 2016. Only advertisements using both Sinhala and English are used for the analysis. To substantiate data collected from the newspapers, the study will select bilingual advertisements from television advertisements. The objective of the study is to analyze the mixed patterns used for creative purposes by advertisers. The results of the study will reveal the creativity used by the Sinhala –English bilingual and the morphological processes used by the creators of Sinhala-English bilingual advertisements to attract the masses.Keywords: bilingual, code mixing, morphological processes, mixed code
Procedia PDF Downloads 2851502 Advancing UAV Operations with Hybrid Mobile Network and LoRa Communications
Authors: Annika J. Meyer, Tom Piechotta
Abstract:
Unmanned Aerial Vehicles (UAVs) have increasingly become vital tools in various applications, including surveillance, search and rescue, and environmental monitoring. One common approach to ensure redundant communication systems when flying beyond visual line of sight is for UAVs to employ multiple mobile data modems by different providers. Although widely adopted, this approach suffers from several drawbacks, such as high costs, added weight and potential increases in signal interference. In light of these challenges, this paper proposes a communication framework intermeshing mobile networks and LoRa (Long Range) technology—a low-power, long-range communication protocol. LoRaWAN (Long Range Wide Area Network) is commonly used in Internet of Things applications, relying on stationary gateways and Internet connectivity. This paper, however, utilizes the underlying LoRa protocol, taking advantage of the protocol’s low power and long-range capabilities while ensuring efficiency and reliability. Conducted in collaboration with the Potsdam Fire Department, the implementation of mobile network technology in combination with the LoRa protocol in small UAVs (take-off weight < 0.4 kg), specifically designed for search and rescue and area monitoring missions, is explored. This research aims to test the viability of LoRa as an additional redundant communication system during UAV flights as well as its intermeshing with the primary, mobile network-based controller. The methodology focuses on direct UAV-to-UAV and UAV-to-ground communications, employing different spreading factors optimized for specific operational scenarios—short-range for UAV-to-UAV interactions and long-range for UAV-to-ground commands. This explored use case also dramatically reduces one of the major drawbacks of LoRa communication systems, as a line of sight between the modules is necessary for reliable data transfer. Something that UAVs are uniquely suited to provide, especially when deployed as a swarm. Additionally, swarm deployment may enable UAVs that have lost contact with their primary network to reestablish their connection through another, better-situated UAV. The experimental setup involves multiple phases of testing, starting with controlled environments to assess basic communication capabilities and gradually advancing to complex scenarios involving multiple UAVs. Such a staged approach allows for meticulous adjustment of parameters and optimization of the communication protocols to ensure reliability and effectiveness. Furthermore, due to the close partnership with the Fire Department, the real-world applicability of the communication system is assured. The expected outcomes of this paper include a detailed analysis of LoRa's performance as a communication tool for UAVs, focusing on aspects such as signal integrity, range, and reliability under different environmental conditions. Additionally, the paper seeks to demonstrate the cost-effectiveness and operational efficiency of using a single type of communication technology that reduces UAV payload and power consumption. By shifting from traditional cellular network communications to a more robust and versatile cellular and LoRa-based system, this research has the potential to significantly enhance UAV capabilities, especially in critical applications where reliability is paramount. The success of this paper could pave the way for broader adoption of LoRa in UAV communications, setting a new standard for UAV operational communication frameworks.Keywords: LoRa communication protocol, mobile network communication, UAV communication systems, search and rescue operations
Procedia PDF Downloads 431501 Provision of Afterschool Programs: Understanding the Educational Needs and Outcomes of Newcomer and Refugee Students in Canada
Authors: Edward Shizha, Edward Makwarimba
Abstract:
Newcomer and refugee youth feel excluded in the education system in Canada, and the formal education environment does not fully cater for their learning needs. The objective of this study was to build knowledge and understanding of the educational needs and experiences of these youth in Canada and how available afterschool programs can most effectively support their learning needs and academic outcomes. The Employment and Social Development Canada (ESDC), which funded this research, enables and empowers students to advance their educational experience through targeted investments in services that are delivered by youth-serving organizations outside the formal education system through afterschool initiatives. A literature review and a provincial/territorial internet scan were conducted to determine the availability of services and programs that serve the educational needs and academic outcomes of newcomer youth in 10 provinces and 3 territories in Canada. The goal was to identify intersectional factors (e.g., gender, sexuality, culture, social class, race, etc.) that influence educational outcomes of newcomer/refugee students and to recommend ways the ESDC could complement settlement services to enhance students’ educational success. First, data was collected through a literature search of various databases, including PubMed, Web of Science, Scopus, Google docs, ACADEMIA, and grey literature, including government documents, to inform our analysis. Second, a provincial/territorial internet scan was conducted using a template that was created by ESDC staff with the input of the researchers. The objective of the web-search scan was to identify afterschool programs, projects, and initiatives offered to newcomer/refugee youth by service provider organizations. The method for the scan included both qualitative and quantitative data gathering. Both the literature review and the provincial/territorial scan revealed that there are gender disparities in educational outcomes of newcomer and refugee youth. High school completion rates by gender show that boys are at higher risk of not graduating than girls and that girls are more likely than boys to have at least a high school diploma and more likely to proceed to postsecondary education. Findings from literature reveal that afterschool programs are required for refugee youth who experience mental health challenges and miss out on significant periods of schooling, which affect attendance, participation, and graduation from high school. However, some refugee youth use their resilience and ambition to succeed in their educational outcomes. Another finding showed that some immigrant/refugee students, through ethnic organizations and familial affiliation, maintain aspects of their cultural values, parental expectations and ambitious expectations for their own careers to succeed in both high school and postsecondary education. The study found a significant combination of afterschool programs that include academic support, scholarships, bursaries, homework support, career readiness, internships, mentorship, tutoring, non-clinical counselling, mental health and social well-being support, language skills, volunteering opportunities, community connections, peer networking, culturally relevant services etc. These programs assist newcomer youth to develop self-confidence and prepare for academic success and future career development. The study concluded that advantages of afterschool programs are greatest for youth at risk for poor educational outcomes, such as Latino and Black youth, including 2SLGBTQI+ immigrant youth.Keywords: afterschool programs, educational outcomes, newcomer youth, refugee youth, youth-serving organizations
Procedia PDF Downloads 741500 Modeling of Carbon Monoxide Distribution under the Sky-Train Stations
Authors: Suranath Chomcheon, Nathnarong Khajohnsaksumeth, Benchawan Wiwatanapataphee
Abstract:
Carbon monoxide is one of the harmful gases which have colorless, odorless, and tasteless. Too much carbon monoxide taken into the human body causes the reduction of oxygen transportation within human body cells leading to many symptoms including headache, nausea, vomiting, loss of consciousness, and death. Carbon monoxide is considered as one of the air pollution indicators. It is mainly released as soot from the exhaust pipe of the incomplete combustion of the vehicle engine. Nowadays, the increase in vehicle usage and the slowly moving of the vehicle struck by the traffic jam has created a large amount of carbon monoxide, which accumulated in the street canyon area. In this research, we study the effect of parameters such as wind speed and aspect ratio of the height building affecting the ventilation. We consider the model of the pollutant under the Bangkok Transit System (BTS) stations in a two-dimensional geometrical domain. The convention-diffusion equation and Reynolds-averaged Navier-stokes equation is used to describe the concentration and the turbulent flow of carbon monoxide. The finite element method is applied to obtain the numerical result. The result shows that our model can describe the dispersion patterns of carbon monoxide for different wind speeds.Keywords: air pollution, carbon monoxide, finite element, street canyon
Procedia PDF Downloads 1261499 Spectrum Allocation Using Cognitive Radio in Wireless Mesh Networks
Authors: Ayoub Alsarhan, Ahmed Otoom, Yousef Kilani, Abdel-Rahman al-GHuwairi
Abstract:
Wireless mesh networks (WMNs) have emerged recently to improve internet access and other networking services. WMNs provide network access to the clients and other networking functions such as routing, and packet forwarding. Spectrum scarcity is the main challenge that limits the performance of WMNs. Cognitive radio is proposed to solve spectrum scarcity problem. In this paper, we consider a cognitive wireless mesh network where unlicensed users (secondary users, SUs) can access free spectrum that is allocated to spectrum owners (primary users, PUs). Although considerable research has been conducted on spectrum allocation, spectrum assignment is still considered an important challenging problem. This problem can be solved using cognitive radio technology that allows SUs to intelligently locate free bands and access them without interfering with PUs. Our scheme considers several heuristics for spectrum allocation. These heuristics include: channel error rate, PUs activities, channel capacity and channel switching time. Performance evaluation of the proposed scheme shows that the scheme is able to allocate the unused spectrum for SUs efficiently.Keywords: cognitive radio, dynamic spectrum access, spectrum management, spectrum sharing, wireless mesh networks
Procedia PDF Downloads 5291498 Inter Laboratory Comparison with Coordinate Measuring Machine and Uncertainty Analysis
Authors: Tugrul Torun, Ihsan A. Yuksel, Si̇nem On Aktan, Taha K. Vezi̇roglu
Abstract:
In the quality control processes in some industries, the usage of CMM has increased in recent years. Consequently, the CMMs play important roles in the acceptance or rejection of manufactured parts. For parts, it’s important to be able to make decisions by performing fast measurements. According to related technical drawing and its tolerances, measurement uncertainty should also be considered during assessment. Since uncertainty calculation is difficult and time-consuming, most companies ignore the uncertainty value in their routine inspection method. Although studies on measurement uncertainty have been carried out on CMM’s in recent years, there is still no applicable method for analyzing task-specific measurement uncertainty. There are some standard series for calculating measurement uncertainty (ISO-15530); it is not possible to use it in industrial measurement because it is not a practical method for standard measurement routine. In this study, the inter-laboratory comparison test has been carried out in the ROKETSAN A.Ş. with all dimensional inspection units. The reference part that we used is traceable to the national metrology institute TUBİTAK UME. Each unit has measured reference parts according to related technical drawings, and the task-specific measuring uncertainty has been calculated with related parameters. According to measurement results and uncertainty values, the En values have been calculated.Keywords: coordinate measurement, CMM, comparison, uncertainty
Procedia PDF Downloads 2111497 Experimental Study on Recycled Aggregate Pervious Concrete
Authors: Ji Wenzhan, Zhang Tao, Li Guoyou
Abstract:
Concrete is the most widely used building material in the world. At the same time, the world produces a large amount of construction waste each year. Waste concrete is processed and treated, and the recycled aggregate is used to make pervious concrete, which enables the construction waste to be recycled. Pervious concrete has many advantages such as permeability to water, protection of water resources, and so on. This paper tests the recycled aggregate obtained by crushing high-strength waste concrete (TOU) and low-strength waste concrete (PU), and analyzes the effect of porosity, amount of cement, mineral admixture and recycled aggregate on the strength of permeable concrete. The porosity is inversely proportional to the strength, and the amount of cement used is proportional to the strength. The mineral admixture can effectively improve the workability of the mixture. The quality of recycled aggregates had a significant effect on strength. Compared with concrete using "PU" aggregates, the strength of 7d and 28d concrete using "TOU" aggregates increased by 69.0% and 73.3%, respectively. Therefore, the quality of recycled aggregates should be strictly controlled during production, and the mix ratio should be designed according to different use environments and usage requirements. This test prepared a recycled aggregate permeable concrete with a compressive strength of 35.8 MPa, which can be used for light load roads and provides a reference for engineering applications.Keywords: recycled aggregate, permeable concrete, compressive strength, permeability
Procedia PDF Downloads 2251496 Political Discourse and Linguistic Manipulation in Nigerian Politics
Authors: Kunle Oparinde, Ernestina Maleshoane Rapeane-Mathonsi, Gift Mheta
Abstract:
Using Critical Discourse Analysis (CDA) and Multimodal Discourse Analysis (MDA), the research seeks to deconstruct politically-motivated discourse as observed from Nigerian politics. This is intended to be achieved by analysing linguistic (mis)representation and manipulation in Nigerian political settings, drawing from instances of language use as observed from different political campaigns. Since language in itself is generally meaningless without context, it is therefore paramount to analyse the (mis)representation and manipulation in Nigerian political sceneries within their contextual basis. The study focuses on political language used by Nigerian politicians emanating from printed and social media forms such as posters, pamphlets, speeches, billboards, and internet sources purposely selected across Nigeria. The research further aims at investigating the discursive strategies used by politicians to gain more audience, and, as a result, shape opinions that result in votes. The study employs a qualitative approach. Two parties are intentionally selected because they have been essentially strong at the national level namely: All Progressive Congress (APC) and the People’s Democratic Party (PDP). The study finds out that politicians in Nigeria, as in many parts of the world, use language to manipulate the electorate. Comprehensive discussion of these instances of political manipulation remains the thrust of this paper.Keywords: communication, discourse, manipulation, misrepresentation
Procedia PDF Downloads 2511495 Preharvest and Postharvest Factors Influencing Resveratrol, Myricetin and Quercetin Content of Wine
Authors: Mariam Khomasuridze, Nino Chkhartishvili, Irma Chanturia
Abstract:
The influence of preharvest and postharvest factors on resveratrol, myricetin and quercetin content of wine was studied during the experiment. The content of cis and trans resveratrol, myricetin and quercetin were analyzed by HPLC. In frame of experiment, the various factors affecting on wine composition were researched: variety, climate, viticulture practices, grape maturity, harvesting methods and wine making techniques. The results have shown that varietal potential and amount of yield play the most important role in formation of antioxidant compounds. Based on achieved results, the usage of medium roast oak chips protects resveratrol, myricetin, and quercetin from coagulation and precipitation. Compared to the control samples, the wines, produced by addition of oak chips were approximately four times richer with these antioxidant compounds. The retention of resveratrol was lowered with 45 % in wines, producing in Qvevri by Georgian traditional technology without controlling temperature during fermentation. The opposite effects in case of myricetin, quercetin and total phenolics content were determined. Their concentrations were higher with 56-78%, then in the fermented tank at 22 -25 °C. As the result of the experiment, the optimal technology scheme of wine was worked out, reached by biologically active compounds: resveratrol, myricetin, and quercetin.Keywords: resveratrol, miricetin, quercetin, wine
Procedia PDF Downloads 1861494 Iot Device Cost Effective Storage Architecture and Real-Time Data Analysis/Data Privacy Framework
Authors: Femi Elegbeleye, Omobayo Esan, Muienge Mbodila, Patrick Bowe
Abstract:
This paper focused on cost effective storage architecture using fog and cloud data storage gateway and presented the design of the framework for the data privacy model and data analytics framework on a real-time analysis when using machine learning method. The paper began with the system analysis, system architecture and its component design, as well as the overall system operations. The several results obtained from this study on data privacy model shows that when two or more data privacy model is combined we tend to have a more stronger privacy to our data, and when fog storage gateway have several advantages over using the traditional cloud storage, from our result shows fog has reduced latency/delay, low bandwidth consumption, and energy usage when been compare with cloud storage, therefore, fog storage will help to lessen excessive cost. This paper dwelt more on the system descriptions, the researchers focused on the research design and framework design for the data privacy model, data storage, and real-time analytics. This paper also shows the major system components and their framework specification. And lastly, the overall research system architecture was shown, its structure, and its interrelationships.Keywords: IoT, fog, cloud, data analysis, data privacy
Procedia PDF Downloads 991493 The Effect of Smartphones on Human Health Relative to User’s Addiction: A Study on a Wide Range of Audiences in Jordan
Authors: T. Qasim, M. Obeidat, S. Al-Sharairi
Abstract:
The objective of this study is to investigate the effect of the excessive use of smartphones. Smartphones have enormous effects on the human body in that some musculoskeletal disorders (MSDs) and health problems might evolve. These days, there is a wide use of the smartphones among all age groups of society, thus, the focus on smartphone effects on human behavior and health, especially on the young and elderly people, becomes a crucial issue. This study was conducted in Jordan on smartphone users for different genders and ages, by conducting a survey to collect data related to the symptoms and MSDs that are resulted from the excessive use of smartphones. A total of 357 responses were used in the analysis. The main related symptoms were numbness, fingers pain, and pain in arm, all linked to age and gender for comparative reasons. A statistical analysis was performed to find the effects of extensive usage of a smartphone for long periods of time on the human body. Results show that the significant variables were the vision problems and the time spent when using the smartphone that cause vision problems. Other variables including age of user and ear problems due to the use of the headsets were found to be a border line significant.Keywords: smart phone, age group, musculoskeletal disorders (MSDs), health problems
Procedia PDF Downloads 2531492 Application Programming Interface Security in Embedded and Open Finance
Authors: Andrew John Zeller, Artjoms Formulevics
Abstract:
Banking and financial services are rapidly transitioning from being monolithic structures focusing merely on their own financial offerings to becoming integrated players in multiple customer journeys and supply chains. Banks themselves are refocusing on being liquidity providers and underwriters in these networks, while the general concept of ‘embeddedness’ builds on the market readily available API (Application Programming Interface) architectures to flexibly deliver services to various requestors, i.e., online retailers who need finance and insurance products to better serve their customers, respectively. With this new flexibility come new requirements for enhanced cybersecurity. API structures are more decentralized and inherently prone to change. Unfortunately, this has not been comprehensively addressed in the literature. This paper tries to fill this gap by looking at security approaches and technologies relevant to API architectures found in embedded finance. After presenting the research methodology applied and introducing the major bodies of knowledge involved, the paper will discuss six dominating technology trends shaping high-level financial services architectures. Subsequently, embedded finance and the respective usage of API strategies will be described. Building on this, security considerations for APIs in financial and insurance services will be elaborated on before concluding with some ideas for possible further research.Keywords: embedded finance, embedded banking strategy, cybersecurity, API management, data security, cybersecurity, IT management
Procedia PDF Downloads 42