Search results for: secret information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10841

Search results for: secret information

8951 Geospatial Modeling of Dry Snow Avalanches Distribution Using Geographic Information Systems and Remote Sensing: A Case Study of the Šar Mountains (Balkan Peninsula)

Authors: Uroš Durlević, Ivan Novković, Nina Čegar, Stefanija Stojković

Abstract:

Snow avalanches represent one of the most dangerous natural phenomena in mountain regions worldwide. Material and human casualties caused by snow avalanches can be very significant. In this study, using geographic information systems and remote sensing, the natural conditions of the Šar Mountains were analyzed for geospatial modeling of dry slab avalanches. For this purpose, the Fuzzy Analytic Hierarchy Process (FAHP) multi-criteria analysis method was used, within which fifteen environmental criteria were analyzed and evaluated. Based on the existing analyzes and results, it was determined that a significant area of the Šar Mountains is very highly susceptible to the occurrence of dry slab avalanches. The obtained data can be of significant use to local governments, emergency services, and other institutions that deal with natural disasters at the local level. To our best knowledge, this is one of the first research in the Republic of Serbia that uses the FAHP method for geospatial modeling of dry slab avalanches.

Keywords: GIS, FAHP, Šar Mountains, snow avalanches, environmental protection

Procedia PDF Downloads 92
8950 Keyloggers Prevention with Time-Sensitive Obfuscation

Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee

Abstract:

Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.

Keywords: authentication, computer security, keylogger, privacy, information leakage

Procedia PDF Downloads 122
8949 Multimodal Convolutional Neural Network for Musical Instrument Recognition

Authors: Yagya Raj Pandeya, Joonwhoan Lee

Abstract:

The dynamic behavior of music and video makes it difficult to evaluate musical instrument playing in a video by computer system. Any television or film video clip with music information are rich sources for analyzing musical instruments using modern machine learning technologies. In this research, we integrate the audio and video information sources using convolutional neural network (CNN) and pass network learned features through recurrent neural network (RNN) to preserve the dynamic behaviors of audio and video. We use different pre-trained CNN for music and video feature extraction and then fine tune each model. The music network use 2D convolutional network and video network use 3D convolution (C3D). Finally, we concatenate each music and video feature by preserving the time varying features. The long short term memory (LSTM) network is used for long-term dynamic feature characterization and then use late fusion with generalized mean. The proposed network performs better performance to recognize the musical instrument using audio-video multimodal neural network.

Keywords: multimodal, 3D convolution, music-video feature extraction, generalized mean

Procedia PDF Downloads 215
8948 Investigation of Preschool Children's Mathematics Concept Acquisition in Terms of Different Variables

Authors: Hilal Karakuş, Berrin Akman

Abstract:

Preschool years are considered as critical years because of shaping the future lives of individuals. All of the knowledge, skills, and concepts are acquired during this period. Also, basis of academic skills is based on this period. As all of the developmental areas are the fastest in that period, the basis of mathematics education should be given in this period, too. Mathematics is seen as a difficult and abstract course by the most people. Therefore, the enjoyable side of mathematics should be presented in a concrete way in this period to avoid any bias of children for mathematics. This study is conducted to examine mathematics concept acquisition of children in terms of different variables. Screening model is used in this study which is carried out in a quantity way. The study group of this research consists of total 300 children, selected from each class randomly in groups of five, who are from public and private preschools in Çankaya, which is district of Ankara, in 2014-2015 academic year and attending children in the nursery classes and preschool institutions are connected to the Ministry of National Education. The study group of the research was determined by stage sampling method. The schools, which formed study group, are chosen by easy sampling method and the children are chosen by simple random method. Research data were collected with Bracken Basic Concept Scale–Revised Form and Child’s Personal Information Form generated by the researcher in order to get information about children and their families. Bracken Basic Concept Scale-Revised Form consists of 11 sub-dimensions (color, letter, number, size, shape, comparison, direction-location, and quantity, individual and social awareness, building- material) and 307 items. Subtests related to the mathematics were used in this research. In the “Child Individual Information Form” there are items containing demographic information as followings: age of children, gender of children, attending preschools educational intuitions for children, school attendance, mother’s and father’s education levels. At the result of the study, while it was found that children’s mathematics skills differ from age, state of attending any preschool educational intuitions , time of attending any preschool educational intuitions, level of education of their mothers and their fathers; it was found that it does not differ by the gender and type of school they attend.

Keywords: preschool education, preschool period children, mathematics education, mathematics concept acquisitions

Procedia PDF Downloads 350
8947 A Decision Support System for the Detection of Illicit Substance Production Sites

Authors: Krystian Chachula, Robert Nowak

Abstract:

Manufacturing home-made explosives and synthetic drugs is an increasing problem in Europe. To combat that, a data fusion system is proposed for the detection and localization of production sites in urban environments. The data consists of measurements of properties of wastewater performed by various sensors installed in a sewage network. A four-stage fusion strategy allows detecting sources of waste products from known chemical reactions. First, suspicious measurements are used to compute the amount and position of discharged compounds. Then, this information is propagated through the sewage network to account for missing sensors. The next step is clustering and the formation of tracks. Eventually, tracks are used to reconstruct discharge events. Sensor measurements are simulated by a subsystem based on real-world data. In this paper, different discharge scenarios are considered to show how the parameters of used algorithms affect the effectiveness of the proposed system. This research is a part of the SYSTEM project (SYnergy of integrated Sensors and Technologies for urban sEcured environMent).

Keywords: continuous monitoring, information fusion and sensors, internet of things, multisensor fusion

Procedia PDF Downloads 115
8946 Lecturers Attitudes towards the Use of Information and Communication Technology

Authors: Sujata Gupta Kedar, Fasiha Fayaz

Abstract:

This paper presents various studies being carried out by various researchers globally on the attitude of lecturers towards the advent of information technology and e-learning. An effort has been made in this paper to study the various trends being presented by researchers and draw some general conclusions. These show the effect of the lecturer’s gender, age and educational background on their attitude towards the e-learning. Also the favorable attitude of teachers' towards using new technology in teaching will certainly make teachers use them in appropriate situations in teaching and thus measuring of teachers attitude towards using new technology in teaching is very much needed. The sample of 50 males and 50 females were studied from different colleges of Bangalore “Attitudes towards using new technology scale” by Dr. Rajasekar was used. It was seen that male and female had no significant difference in hardware and software use, whereas both had favorable attitude. And there was a significant difference at 1% level among female lecturers belonging to arts faculty. There is no significant difference between the gender and age, because higher the age lower the score is. Irrespective of teaching experience males had no significant difference, whereas females are significant at 1% level, which says that higher the teaching experience of lecturers less knowledge they have towards the use of ICT, as the younger generation is more expose to technology.

Keywords: e-learning, ICT, attitudes, lecturers, communication technology

Procedia PDF Downloads 464
8945 Improvement of Brain Tumors Detection Using Markers and Boundaries Transform

Authors: Yousif Mohamed Y. Abdallah, Mommen A. Alkhir, Amel S. Algaddal

Abstract:

This was experimental study conducted to study segmentation of brain in MRI images using edge detection and morphology filters. For brain MRI images each film scanned using digitizer scanner then treated by using image processing program (MatLab), where the segmentation was studied. The scanned image was saved in a TIFF file format to preserve the quality of the image. Brain tissue can be easily detected in MRI image if the object has sufficient contrast from the background. We use edge detection and basic morphology tools to detect a brain. The segmentation of MRI images steps using detection and morphology filters were image reading, detection entire brain, dilation of the image, filling interior gaps inside the image, removal connected objects on borders and smoothen the object (brain). The results of this study were that it showed an alternate method for displaying the segmented object would be to place an outline around the segmented brain. Those filters approaches can help in removal of unwanted background information and increase diagnostic information of Brain MRI.

Keywords: improvement, brain, matlab, markers, boundaries

Procedia PDF Downloads 516
8944 Multiscale Modelling of Textile Reinforced Concrete: A Literature Review

Authors: Anicet Dansou

Abstract:

Textile reinforced concrete (TRC)is increasingly used nowadays in various fields, in particular civil engineering, where it is mainly used for the reinforcement of damaged reinforced concrete structures. TRC is a composite material composed of multi- or uni-axial textile reinforcements coupled with a fine-grained cementitious matrix. The TRC composite is an alternative solution to the traditional Fiber Reinforcement Polymer (FRP) composite. It has good mechanical performance and better temperature stability but also, it makes it possible to meet the criteria of sustainable development better.TRCs are highly anisotropic composite materials with nonlinear hardening behavior; their macroscopic behavior depends on multi-scale mechanisms. The characterization of these materials through numerical simulation has been the subject of many studies. Since TRCs are multiscale material by definition, numerical multi-scale approaches have emerged as one of the most suitable methods for the simulation of TRCs. They aim to incorporate information pertaining to microscale constitute behavior, mesoscale behavior, and macro-scale structure response within a unified model that enables rapid simulation of structures. The computational costs are hence significantly reduced compared to standard simulation at a fine scale. The fine scale information can be implicitly introduced in the macro scale model: approaches of this type are called non-classical. A representative volume element is defined, and the fine scale information are homogenized over it. Analytical and computational homogenization and nested mesh methods belong to these approaches. On the other hand, in classical approaches, the fine scale information are explicitly introduced in the macro scale model. Such approaches pertain to adaptive mesh refinement strategies, sub-modelling, domain decomposition, and multigrid methods This research presents the main principles of numerical multiscale approaches. Advantages and limitations are identified according to several criteria: the assumptions made (fidelity), the number of input parameters required, the calculation costs (efficiency), etc. A bibliographic study of recent results and advances and of the scientific obstacles to be overcome in order to achieve an effective simulation of textile reinforced concrete in civil engineering is presented. A comparative study is further carried out between several methods for the simulation of TRCs used for the structural reinforcement of reinforced concrete structures.

Keywords: composites structures, multiscale methods, numerical modeling, textile reinforced concrete

Procedia PDF Downloads 108
8943 Love and Loss: The Emergence of Shame in Romantic Information Communication Technology

Authors: C. Caudwell, R. Syed, C. Lacey

Abstract:

While the development and advancement of information communication technologies (ICTs) offers powerful opportunities for meaningful connections and relationships, shame is a significant barrier to social and cultural acceptance. In particular, artificial intelligence and socially oriented robots are increasingly becoming partners in romantic relationships with people, offering bonding, support, comfort, growth, and reciprocity. However, these relationships suffer hierarchical, anthropocentric shame that is a significant barrier to their success and longevity. This paper will present case studies of human and artificially intelligent agent relationships, in the context of internal and external shame, as cultivated, propagated, and communicated through ICT. Using an interdisciplinary methodology we aim to present a framework for technological shame, building on the experimental and emergent psychoanalytical theories of emotions. Our study finds principally that socialization is a powerful factor in the vectors of shame as experienced by humans. On a wider scale, we contribute understanding of social emotion and the phenomenon of shame proliferated through ICTs, which is at present under-explored, but vital, as society and culture is increasingly mediated through this medium.

Keywords: shame, artificial intelligence, romance, society

Procedia PDF Downloads 134
8942 Building Green Infrastructure Networks Based on Cadastral Parcels Using Network Analysis

Authors: Gon Park

Abstract:

Seoul in South Korea established the 2030 Seoul City Master Plan that contains green-link projects to connect critical green areas within the city. However, the plan does not have detailed analyses for green infrastructure to incorporate land-cover information to many structural classes. This study maps green infrastructure networks of Seoul for complementing their green plans with identifying and raking green areas. Hubs and links of main elements of green infrastructure have been identified from incorporating cadastral data of 967,502 parcels to 135 of land use maps using geographic information system. Network analyses were used to rank hubs and links of a green infrastructure map with applying a force-directed algorithm, weighted values, and binary relationships that has metrics of density, distance, and centrality. The results indicate that network analyses using cadastral parcel data can be used as the framework to identify and rank hubs, links, and networks for the green infrastructure planning under a variable scenarios of green areas in cities.

Keywords: cadastral data, green Infrastructure, network analysis, parcel data

Procedia PDF Downloads 206
8941 Rules in Policy Integration, Case Study: Victoria Catchment Management

Authors: Ratri Werdiningtyas, Yongping Wei, Andrew Western

Abstract:

This paper contributes to on-going attempts at bringing together land, water and environmental policy in catchment management. A tension remains in defining the boundaries of policy integration. Most of Integrated Water Resource Management is valued as rhetoric policy. It is far from being achieved on the ground because the socio-ecological system has not been understood and developed into complete and coherent problem representation. To clarify the feature of integration, this article draws on institutional fit for public policy integration and uses these insights in an empirical setting to identify the mechanism that can facilitate effective public integration for catchment management. This research is based on the journey of Victoria’s government from 1890-2016. A total of 274 Victorian Acts related to land, water, environment management published in those periods has been investigated. Four conditions of integration have been identified in their co-evolution: (1) the integration policy based on reserves, (2) the integration policy based on authority interest, (3) policy based on integrated information and, (4) policy based coordinated resource, authority and information. Results suggest that policy coordination among their policy instrument is superior rather than policy integration in the case of catchment management.

Keywords: catchment management, co-evolution, policy integration, phase

Procedia PDF Downloads 247
8940 An Exploratory Study Regarding the Effects of Auditor Switch, Auditee’s Industry, and Auditee’s Location on Audit Fees in Australia

Authors: Ashkan Mirzay Fashami

Abstract:

This study examines the effects of auditor switch, auditee’s industry, and auditee’s location on audit fees in Australia. It uses fee data of Australian Securities Exchange 500 companies, considering all industry classifications throughout the country from 2006 until 2016. Main findings show that auditor switch does not affect audit fees. However, auditee’s industry affects audit fees. This effect occurs in information technology, financials, energy, and materials sectors among the top 500 companies. Financials, energy, and materials sectors face a fee rise, whereas information technology has a fee cut. The extent of fee changes is different among various industries, wherein the financial sector has the highest increase. Further, auditee’s location affects audit fees. Top 500 companies in Hobart, Perth, and Brisbane face a fee reduction, wherein the highest cut is in Hobart. Further analysis suggests that the Australian audit market is being increasingly concentrated in the hands of the Big Four audit firms.

Keywords: audit, auditor switch, Australia, fee, low-balling

Procedia PDF Downloads 140
8939 Spatiotemporal Neural Network for Video-Based Pose Estimation

Authors: Bin Ji, Kai Xu, Shunyu Yao, Jingjing Liu, Ye Pan

Abstract:

Human pose estimation is a popular research area in computer vision for its important application in human-machine interface. In recent years, 2D human pose estimation based on convolution neural network has got great progress and development. However, in more and more practical applications, people often need to deal with tasks based on video. It’s not far-fetched for us to consider how to combine the spatial and temporal information together to achieve a balance between computing cost and accuracy. To address this issue, this study proposes a new spatiotemporal model, namely Spatiotemporal Net (STNet) to combine both temporal and spatial information more rationally. As a result, the predicted keypoints heatmap is potentially more accurate and spatially more precise. Under the condition of ensuring the recognition accuracy, the algorithm deal with spatiotemporal series in a decoupled way, which greatly reduces the computation of the model, thus reducing the resource consumption. This study demonstrate the effectiveness of our network over the Penn Action Dataset, and the results indicate superior performance of our network over the existing methods.

Keywords: convolutional long short-term memory, deep learning, human pose estimation, spatiotemporal series

Procedia PDF Downloads 148
8938 Human Machine Interface for Controlling a Robot Using Image Processing

Authors: Ambuj Kumar Gautam, V. Vasu

Abstract:

This paper introduces a head movement based Human Machine Interface (HMI) that uses the right and left movements of head to control a robot motion. Here we present an approach for making an effective technique for real-time face orientation information system, to control a robot which can be efficiently used for Electrical Powered Wheelchair (EPW). Basically this project aims at application related to HMI. The system (machine) identifies the orientation of the face movement with respect to the pixel values of image in a certain areas. Initially we take an image and divide that whole image into three parts on the basis of its number of columns. On the basis of orientation of face, maximum pixel value of approximate same range of (R, G, and B value of a pixel) lie in one of divided parts of image. This information we transfer to the microcontroller through serial communication port and control the motion of robot like forward motion, left and right turn and stop in real time by using head movements.

Keywords: electrical powered wheelchair (EPW), human machine interface (HMI), robotics, microcontroller

Procedia PDF Downloads 292
8937 Turkey Disaster Risk Management System Project (TAFRISK)

Authors: Ahmet Parlak, Celalettin Bilgen

Abstract:

In order to create an effective early warning system, Identification of the risks, preparation and carrying out risk modeling of risk scenarios, taking into account the shortcomings of the old disaster scenarios should be used to improve the system. In the light of this, the importance of risk modeling in creating an effective early warning system is understood. In the scope of TAFRISK project risk modeling trend analysis report on risk modeling developed and a demonstration was conducted for Risk Modeling for flood and mass movements. For risk modeling R&D, studies have been conducted to determine the information, and source of the information, to be gathered, to develop algorithms and to adapt the current algorithms to Turkey’s conditions for determining the risk score in the high disaster risk areas. For each type of the disaster; Disaster Deficit Index (DDI), Local Disaster Index (LDI), Prevalent Vulnerability Index (PVI), Risk Management Index (RMI) have been developed as disaster indices taking danger, sensitivity, fragility, and vulnerability, the physical and economic damage into account in the appropriate scale of the respective type.

Keywords: disaster, hazard, risk modeling, sensor

Procedia PDF Downloads 428
8936 Information Technology (IT) Outsourcing and the Challenges of Implementation in Financial Industries: A Case Study of Guarantee Trust Assurance PLC

Authors: Salim Ahmad, Ahamed Sani Kazaure, Haruna Musa

Abstract:

Outsourcing had been the contractual relationship in which the responsibility for a function or task is handed over to an outside firm for a fixed period of time which is not the same as contracting where a specific one-off task is allocated to an external business; therefore in information technology a specialist area such as maintenance of web servers is controlled by an outside firm or if the department is not a critical factor the whole IT section may be outsourced. Organisation contracts is frequently a major area in successful outsourcing relationship, whereby the contracts specify the right, liability and expectation of the vendor and contracts are mostly of high value and last for very long. Therefore, in this research one particular project that is been outsourced for the financial industry (Guarantee Trust Assurance PlC) is been discussed along with the approach used and the various problems encountered, though Outsourcing is not necessarily a perfect and easy way out for business. It is extremely critical for a company to look at all the aspect of outsourcing before deciding to use it as an instrument for development. Moreover, critical analysis of the management issues encountered while implementing the outsourcing project have been fully discussed in the paper.

Keywords: outsourcing, techniques used in outsourcing, challenges of outsourcing implementation, management issues during implementation of outsourcing project

Procedia PDF Downloads 383
8935 Active Learning Strategies to Develop Student Skills in Information Systems for Management

Authors: Filomena Lopes, Sandra Fernandes

Abstract:

Active learning strategies are at the center of any change process aimed to improve the development of student skills. This paper aims to analyse the impact of teaching strategies, including problem-based learning (PBL), in the curricular unit of information system for management, based on students’ perceptions of how they contribute to develop the desired learning outcomes of the curricular unit. This course is part of the 1st semester and 3rd year of the graduate degree program in management at a private higher education institution in Portugal. The methodology included an online questionnaire to students (n=40). Findings from students reveal a positive impact of the teaching strategies used. In general, 35% considered that the strategies implemented in the course contributed to the development of courses’ learning objectives. Students considered PBL as the learning strategy that better contributed to enhance the courses’ learning outcomes. This conclusion brings forward the need for further reflection and discussion on the impact of student feedback on teaching and learning processes.

Keywords: higher education, active learning strategies, skills development, student assessment

Procedia PDF Downloads 61
8934 The Effect of Sustainable Supply Chain Management on Performance of Agricultural Firms in Nigeria

Authors: Haruna Daddau

Abstract:

This study investigates the effect of sustainable supply chain management (SSCM) on the performance of agricultural firms in Nigeria. Green packaging, product design, waste reduction and supply chain design were examined. The ecological modernization theory, which suggests the economic benefit of the environment, was used to underpin the study. The research is quantitative in nature, and a survey research method was adopted where information was obtained using questionnaires distributed directly to the top managers of 6 agricultural firms in Nigeria. STATA and SPSS were used for the data analysis, and regression analysis was used to examine the effects. Findings showed that SSCM positively improves the performance of the firms. Also, detailed information about the study’s selected variables' effect on performance was provided. Additionally, the significant role of SSCM in accelerating the firms’ performance was highlighted. It is recommended that SSCM should be given serious attention by integrating it into the overall firm's business strategy.

Keywords: sustainable supply chain management, green packaging, product design, waste reduction, supply chain design and performance

Procedia PDF Downloads 46
8933 A Framework for Analyzing Public Interaction of Saudi Universities on Twitter

Authors: Sahar Al-Qahtani, Rabeeh Ayaz Abbasi, Naif Radi Aljohani

Abstract:

Many universities use social media platforms as new communication channels to disseminate information and promptly communicate with their audience. As Twitter is one of the widely used social media platforms, this research aims to explore the adaption and utilization of Twitter by universities. We propose a framework called 'Social Network Analysis for Universities on Twitter' (SNAUT) to analyze the usage of Twitter by universities and to measure their interaction with public. The study includes a sample of around 110,000 tweets from 36 Saudi universities, including both public and private universities. Using SNAUT, we can (1) investigate the purpose of using Twitter by universities, (2) determine the broad topics discussed by them, and (3) identify the groups closely associated with the universities. The results show that most of the Saudi universities (whether public or private) actively use Twitter. Results also reveal that public universities respond to public queries more frequently, but private universities stand out more in terms of information dissemination using retweets and diverse hashtags. Finally, we develop a ranking mechanism in SNAUT for ranking universities based on their social interaction with the public on Twitter.

Keywords: social media, twitter, social network analysis, universities, higher education, Saudi Arabia

Procedia PDF Downloads 137
8932 The Critical Relevance of Credit and Debt Data in Household Food Security Analysis: The Risks of Ineffective Response Actions

Authors: Siddharth Krishnaswamy

Abstract:

Problem Statement: Currently, when analyzing household food security, the most commonly studied food access indicators are household income and expenditure. Larger studies do take into account other indices such as credit and employment. But these are baselines studies and by definition are conducted infrequently. Food security analysis for access is usually dedicated to analyzing income and expenditure indicators. And both these indicators are notoriously inconsistent. Yet this data can very often end up being the basis on which household food access is calculated; and by extension, be used for decision making. Objectives: This paper argues that along with income and expenditure, credit and debit information should be collected so that an accurate analysis of household food security (and in particular) food access can be determined. The lack of collection and analysis of this information routinely means that there is often a “masking” of the actual situation; a household’s food access and food availability patterns may be adequate mainly as a result of borrowing and may even be due to a long- term dependency (a debt cycle). In other words, such a household is, in reality, worse off than it appears a factor masked by its performance on basic access indicators. Procedures/methodologies/approaches: Existing food security data sets collected in 2005 in Azerbaijan, 2010 across Myanmar and 2014-15 across Uganda were used to support the theory that analyzing income and expenditure of a HHs and analyzing the same in addition to data on credit & borrowing patterns will result in an entirely different scenario of food access of the household. Furthermore, the data analyzed depicts food consumption patterns across groups of households and then relates this to the extent of dependency on credit, i.e. households borrowing money in order to meet food needs. Finally, response options that were based on analyzing only income and expenditure; and response options based on income, expenditure, credit, and borrowing – from the same geographical area of operation are studied and discussed. Results: The purpose of this work was to see if existing methods of household food security analysis could be improved. It is hoped that food security analysts will collect household level information on credit and debit and analyze them against income, expenditure and consumption patterns. This will help determine if a household’s food access and availability are dependent on unsustainable strategies such as borrowing money for food or undertaking sustained debts. Conclusions: The results clearly show the amount of relevant information that is missing in Food Access analysis if debit and borrowing of the household is not analyzed along with the typical Food Access indicators that are usually analyzed. And the serious repercussions this has on Programmatic response and interventions.

Keywords: analysis, food security indicators, response, resilience analysis

Procedia PDF Downloads 331
8931 Intelligent Earthquake Prediction System Based On Neural Network

Authors: Emad Amar, Tawfik Khattab, Fatma Zada

Abstract:

Predicting earthquakes is an important issue in the study of geography. Accurate prediction of earthquakes can help people to take effective measures to minimize the loss of personal and economic damage, such as large casualties, destruction of buildings and broken of traffic, occurred within a few seconds. United States Geological Survey (USGS) science organization provides reliable scientific information of Earthquake Existed throughout history & Preliminary database from the National Center Earthquake Information (NEIC) show some useful factors to predict an earthquake in a seismic area like Aleutian Arc in the U.S. state of Alaska. The main advantage of this prediction method that it does not require any assumption, it makes prediction according to the future evolution of object's time series. The article compares between simulation data result from trained BP and RBF neural network versus actual output result from the system calculations. Therefore, this article focuses on analysis of data relating to real earthquakes. Evaluation results show better accuracy and higher speed by using radial basis functions (RBF) neural network.

Keywords: BP neural network, prediction, RBF neural network, earthquake

Procedia PDF Downloads 496
8930 An Ultrasonic Signal Processing System for Tomographic Imaging of Reinforced Concrete Structures

Authors: Edwin Forero-Garcia, Jaime Vitola, Brayan Cardenas, Johan Casagua

Abstract:

This research article presents the integration of electronic and computer systems, which developed an ultrasonic signal processing system that performs the capture, adaptation, and analog-digital conversion to later carry out its processing and visualization. The capture and adaptation of the signal were carried out from the design and implementation of an analog electronic system distributed in stages: 1. Coupling of impedances; 2. Analog filter; 3. Signal amplifier. After the signal conditioning was carried out, the ultrasonic information was digitized using a digital microcontroller to carry out its respective processing. The digital processing of the signals was carried out in MATLAB software for the elaboration of A-Scan, B and D-Scan types of ultrasonic images. Then, advanced processing was performed using the SAFT technique to improve the resolution of the Scan-B-type images. Thus, the information from the ultrasonic images was displayed in a user interface developed in .Net with Visual Studio. For the validation of the system, ultrasonic signals were acquired, and in this way, the non-invasive inspection of the structures was carried out and thus able to identify the existing pathologies in them.

Keywords: acquisition, signal processing, ultrasound, SAFT, HMI

Procedia PDF Downloads 107
8929 Conceptual Model Design for E-Readiness of Entrepreneurial City Case Study: Entrepreneurial Cities in Iran

Authors: Mohsen Yaghmoor, Sima Radmanesh, Ameneh Gholami

Abstract:

Cities are the principal ground for manifestation of an information society. To create an entrepreneurial city, it is required that just and equal access to opportunities are provided for all segments of the city and technologies are intelligently employed. Furthermore, it is necessary for us to be electronically ready in all political, economic, social, cultural, and technological aspects. Also e-city creates enormous potentials and opportunities for development of the entrepreneurial city. After improvement of e-readiness for establishment of entrepreneurial e-city, potentials, and capitals of the city become productive and more suitable opportunities are offered to citizens, state sectors, and private sectors in order to become entrepreneurs. To create and develop an entrepreneurial city, we need to have readiness to detection and creation of entrepreneurial opportunities and finally exploitation of these opportunities which, in turn, lead to use of entrepreneurial events and their quality in the city. In this model, the quality of entrepreneurial events, the productivity of activities, the necessity of reducing the digital gap, positive and active attendance in information society and compatibility and aligning with the global society are emphasized. In an entrepreneurial city, citizens are not help seekers, private sector is not passive, and the government is entrepreneurial.

Keywords: e-city, e-readiness, entrepreneurial city, entrepreneurial events, technological entrepreneurship

Procedia PDF Downloads 384
8928 A Study on 5-11 Year-Old Children's Level of Knowledge about Personal Safety and Protection from Social Dangers

Authors: Özden Kuşcu, Yağmur Kuşcu, Zeynep Çetintaş, S. Sunay Yildirim Doğru

Abstract:

The purpose of this work is to evaluate the effect of the subjects “personal safety” and “protection from dangers” included in primary school curriculum on the students’ levels of knowledge about safety and protection from social dangers. The study group included 469 students between 5–11 years old with 231 preschoolers and 238 primary school students and their parents and teachers. Instruments used to collect data were “Personal Safety Interview Form” for children, “Parent Interview Form” and “Teacher Interview Form”. Forms included 15 open-ended questions about personal safety. The researchers collected the research data through one-on-one interviews with children. Results of the study revealed that preschoolers and 1st, 2nd, and 3rd graders did not know their home addresses and telephone numbers and their families were not aware of that. The study also showed that those who had this information were unsure as to who to share this information with. Accordingly, more should be done to increase the levels of knowledge of preschoolers and 1st, 2nd, and 3rd graders about personal safety and protection from dangers.

Keywords: security, social danger, elementary school, preschool

Procedia PDF Downloads 458
8927 A Study on Sentiment Analysis Using Various ML/NLP Models on Historical Data of Indian Leaders

Authors: Sarthak Deshpande, Akshay Patil, Pradip Pandhare, Nikhil Wankhede, Rushali Deshmukh

Abstract:

Among the highly significant duties for any language most effective is the sentiment analysis, which is also a key area of NLP, that recently made impressive strides. There are several models and datasets available for those tasks in popular and commonly used languages like English, Russian, and Spanish. While sentiment analysis research is performed extensively, however it is lagging behind for the regional languages having few resources such as Hindi, Marathi. Marathi is one of the languages that included in the Indian Constitution’s 8th schedule and is the third most widely spoken language in the country and primarily spoken in the Deccan region, which encompasses Maharashtra and Goa. There isn’t sufficient study on sentiment analysis methods based on Marathi text due to lack of available resources, information. Therefore, this project proposes the use of different ML/NLP models for the analysis of Marathi data from the comments below YouTube content, tweets or Instagram posts. We aim to achieve a short and precise analysis and summary of the related data using our dataset (Dates, names, root words) and lexicons to locate exact information.

Keywords: multilingual sentiment analysis, Marathi, natural language processing, text summarization, lexicon-based approaches

Procedia PDF Downloads 74
8926 An Exploratory Study into the Suggestive Impact of Alaa Al-Aswany's Political Essays

Authors: Valerii Dudin

Abstract:

With the continuous increase in quantity and importance of the information surrounding our daily lives, it has become crucial to understand what makes information stand out and affect our point of view, regardless of the accuracy of the facts involved. Alaa Al-Aswany’s numerous works have been an inspiration for millions of his readers in Egypt and all across the Arab World. While highly factual, the author’s political essays are both lexically and stylistically rich; they also implement descriptive allusions and proverbs to support the presented opinions. We have undertaken an effort to explore the impact on the individual perception through these political works of the author. In this study, we have overviewed previously made research on similar subjects and through contextual, intertextual, linguistic and corpus analyses we have come to realize the presence of suggestive themes in these works, capable of shaping the reader’s perception regarding a certain topic, specifically targeting the reader’s emotional bias. The findings presented in the study will reveal an overview of such examples of suggestive elements used in the author’s works, as well as various new insights on what can be considered suggestive in the context of modern Arabic printed press.

Keywords: Alaa al-Aswany, cognitive linguistics, political essays, suggestion

Procedia PDF Downloads 157
8925 Expansive-Restrictive Style: Conceptualizing Knowledge Workers

Authors: Ram Manohar Singh, Meenakshi Gupta

Abstract:

Various terms such as ‘learning style’, ‘cognitive style’, ‘conceptual style’, ‘thinking style’, ‘intellectual style’ are used in literature to refer to an individual’s characteristic and consistent approach to organizing and processing information. However, style concepts are criticized for mutually overlapping definitions and confusing classification. This confusion should be addressed at the conceptual as well as empirical level. This paper is an attempt to bridge this gap in literature by proposing a new concept: expansive-restrictive intellectual style based on phenomenological analysis of an auto-ethnography and interview of 26 information technology (IT) professionals working in knowledge intensive organizations (KIOs) in India. Expansive style is an individual’s preference to expand his/her horizon of knowledge and understanding by gaining real meaning and structure of his/her work. On the contrary restrictive style is characterized by an individual’s preference to take minimalist approach at work reflected in executing a job efficiently without an attempt to understand the real meaning and structure of the work. The analysis suggests that expansive-restrictive style has three dimensions: (1) field dependence-independence (2) cognitive involvement and (3) epistemological beliefs.

Keywords: expansive, knowledge workers, restrictive, style

Procedia PDF Downloads 424
8924 Applications of Digital Tools, Satellite Images and Geographic Information Systems in Data Collection of Greenhouses in Guatemala

Authors: Maria A. Castillo H., Andres R. Leandro, Jose F. Bienvenido B.

Abstract:

During the last 20 years, the globalization of economies, population growth, and the increase in the consumption of fresh agricultural products have generated greater demand for ornamentals, flowers, fresh fruits, and vegetables, mainly from tropical areas. This market situation has demanded greater competitiveness and control over production, with more efficient protected agriculture technologies, which provide greater productivity and allow us to guarantee the quality and quantity that is required in a constant and sustainable way. Guatemala, located in the north of Central America, is one of the largest exporters of agricultural products in the region and exports fresh vegetables, flowers, fruits, ornamental plants, and foliage, most of which were grown in greenhouses. Although there are no official agricultural statistics on greenhouse production, several thesis works, and congress reports have presented consistent estimates. A wide range of protection structures and roofing materials are used, from the most basic and simple ones for rain control to highly technical and automated structures connected with remote sensors for monitoring and control of crops. With this breadth of technological models, it is necessary to analyze georeferenced data related to the cultivated area, to the different existing models, and to the covering materials, integrated with altitude, climate, and soil data. The georeferenced registration of the production units, the data collection with digital tools, the use of satellite images, and geographic information systems (GIS) provide reliable tools to elaborate more complete, agile, and dynamic information maps. This study details a methodology proposed for gathering georeferenced data of high protection structures (greenhouses) in Guatemala, structured in four phases: diagnosis of available information, the definition of the geographic frame, selection of satellite images, and integration with an information system geographic (GIS). It especially takes account of the actual lack of complete data in order to obtain a reliable decision-making system; this gap is solved through the proposed methodology. A summary of the results is presented in each phase, and finally, an evaluation with some improvements and tentative recommendations for further research is added. The main contribution of this study is to propose a methodology that allows to reduce the gap of georeferenced data in protected agriculture in this specific area where data is not generally available and to provide data of better quality, traceability, accuracy, and certainty for the strategic agricultural decision öaking, applicable to other crops, production models and similar/neighboring geographic areas.

Keywords: greenhouses, protected agriculture, GIS, Guatemala, satellite image, digital tools, precision agriculture

Procedia PDF Downloads 194
8923 Individual Differences and Paired Learning in Virtual Environments

Authors: Patricia M. Boechler, Heather M. Gautreau

Abstract:

In this research study, postsecondary students completed an information learning task in an avatar-based 3D virtual learning environment. Three factors were of interest in relation to learning; 1) the influence of collaborative vs. independent conditions, 2) the influence of the spatial arrangement of the virtual environment (linear, random and clustered), and 3) the relationship of individual differences such as spatial skill, general computer experience and video game experience to learning. Students completed pretest measures of prior computer experience and prior spatial skill. Following the premeasure administration, students were given instruction to move through the virtual environment and study all the material within 10 information stations. In the collaborative condition, students proceeded in randomly assigned pairs, while in the independent condition they proceeded alone. After this learning phase, all students individually completed a multiple choice test to determine information retention. The overall results indicated that students in pairs did not perform any better or worse than independent students. As far as individual differences, only spatial ability predicted the performance of students. General computer experience and video game experience did not. Taking a closer look at the pairs and spatial ability, comparisons were made on pairs high/matched spatial ability, pairs low/matched spatial ability and pairs that were mismatched on spatial ability. The results showed that both high/matched pairs and mismatched pairs outperformed low/matched pairs. That is, if a pair had even one individual with strong spatial ability they would perform better than pairs with only low spatial ability individuals. This suggests that, in virtual environments, the specific individuals that are paired together are important for performance outcomes. The paper also includes a discussion of trends within the data that have implications for virtual environment education.

Keywords: avatar-based, virtual environment, paired learning, individual differences

Procedia PDF Downloads 116
8922 The Role of Digital Technology in Crime Prevention: A Case Study of Cellular Forensics Unit, Capital City Police Peshawar

Authors: Muhammad Ashfaq

Abstract:

Main theme: This prime focus of this study is on the role of digital technology in crime prevention, with special focus on Cellular Forensic Unit, Capital City Police Peshawar-Khyber Pakhtunkhwa-Pakistan. Objective(s) of the study: The prime objective of this study is to provide statistics, strategies, and pattern of analysis used for crime prevention in Cellular Forensic Unit of Capital City Police Peshawar, Khyber Pakhtunkhwa-Pakistan. Research Method and Procedure: Qualitative method of research has been used in the study for obtaining secondary data from research wing and Information Technology (IT) section of Peshawar police. Content analysis was the method used for the conduction of the study. This study is delimited to Capital City Police and Cellular Forensic Unit Peshawar-KP, Pakistan. information technologies. Major finding(s): It is evident that the old traditional approach will never provide solutions for better management in controlling crimes. The best way to control crimes and promotion of proactive policing is to adopt new technologies. The study reveals that technology have transformed police more effective and vigilant as compared to traditional policing. The heinous crimes like abduction, missing of an individual, snatching, burglaries, and blind murder cases are now traceable with the help of technology. Recommendation(s): From the analysis of the data, it is reflected that Information Technology (IT) expert should be recruited along with research analyst to timely assist and facilitate operational as well as investigation units of police. A mobile locator should be Provided to Cellular Forensic Unit to timely apprehend the criminals. Latest digital analysis software should be provided to equip the Cellular Forensic Unit.

Keywords: criminology-pakistan, crime prevention-KP, digital forensics, digital technology-pakistan

Procedia PDF Downloads 98