Search results for: user attributes analysis
28177 The Use of Simulation Programs of Leakage of Harmful Substances for Crisis Management
Authors: Jiří Barta
Abstract:
The paper deals with simulation programs of spread of harmful substances. Air pollution has a direct impact on the quality of human life and environmental protection is currently a very hot topic. Therefore, the paper focuses on the simulation of release of harmful substances. The first part of article deals with perspectives and possibilities of implementation outputs of simulations programs into the system which is education and of practical training of the management staff during emergency events in the frame of critical infrastructure. The last part shows the practical testing and evaluation of simulation programs. Of the tested simulations software been selected Symos97. The tool offers advanced features for setting leakage. Gradually allows the user to model the terrain, location, and method of escape of harmful substances.Keywords: Computer Simulation, Symos97, Spread, Simulation Software, Harmful Substances
Procedia PDF Downloads 29928176 Accelerating Side Channel Analysis with Distributed and Parallelized Processing
Authors: Kyunghee Oh, Dooho Choi
Abstract:
Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.Keywords: DPA, distributed computing, parallelized processing, side channel analysis
Procedia PDF Downloads 43028175 Effects of Poultry Manure Rates on Some Growth and Yield Attributes of Cucumber in Owerri, South Eastern Nigeria
Authors: Chinwe Pearl Poly-Mbah, Evelyn Obioma, Juliet Amajuoyi
Abstract:
The investigation here reported examined growth and yield responses of Cucumber to manure rates in Owerri, Southeastern Nigeria. Fruit vegetables are widely cultivated and produced in Northern Nigeria but greatly consumed in Southern Nigeria where cucumbers command high demand and price but are minimally cultivated. Unfortunately, farmers in northern Nigeria incur lots of losses because cucumber is a perishable vegetable and is transported all the way from the northern Nigeria where cucumbers are produced to Southern Nigeria where cucumbers are consumed, hence the high cost of cucumber fruits in Southern Nigeria. There is a need, therefore, to evolve packages that will enhance cucumber production in Southern Nigeria. The main objective of this study was to examine the effects of poultry manure rates on the growth and yield of cucumber in Owerri, South Eastern Nigeria. Specifically, this study was designed to assess the effect of poultry manure rates on number of days to 50% seedling emergence, vine length/plant, leaf area per plant and the number of leaves produced per plant. The design used for the experiment was Randomized Complete Block Design (RCBD) with three blocks (replications). Treatment consisted of four rates of well-decomposed poultry manure at the rate of 0 tons/ha, 2 tons/ha, 4 tons/ha and 6 tons/ha. Data were collected on number of days to 50% seedling emergence, vine length per plant at two weeks interval, leaf number per plant at two weeks interval, leaf area per plant at two weeks interval, number of fruits produced per plant, and fresh weight of fruits per plant at harvest. Results from the analysis of variance (ANOVA) showed that there were highly significant effects (P=0.05) of poultry manure on growth and yield parameters studied which include number of days to 50% seedling emergence, vine length per plant, leaf number per plant, leaf area per plant, fruit number and fruit weight per plant such that increase in poultry manure rates lead to increase in growth and yield parameters studied. Therefore, the null hypothesis (Ho) was rejected, while the alternative hypothesis was accepted. Farmers should be made to know that growing cucumber with poultry manure in southeastern Nigeria agro ecology is a successful enterpriseKeywords: cucumber, effects, growth and yield, manure
Procedia PDF Downloads 24328174 Cooking Attributes of Rice Stored under Varying Temperature and Moisture Regimes
Authors: Lakshmi E. Jayachandran, Manepally Rajkumar, Pavuluri Srinivasa Rao
Abstract:
The objective of this research was to study the changes in eating quality of rice during storage under varying temperature and moisture regimes. Paddy (IR-36) with high amylose content (27%) was stored at a temperature range between 10 to 40°C and moisture content from 9 to 18% (d.b.) for 6 months. Drastic changes in color and parameters representing cooking qualities, cooked rice texture, and surface morphology occurred after 4 months of storage, especially at elevated temperature conditions. Head rice yield was stable throughout the storage except at extreme conditions of temperature and moisture content. Yellowing of rice was prominent at combinations of high temperature and moisture content, both of which had a synergistic effect on the b* values of rice. The cooking time, length expansion ratio and volume expansion ratio of all the rice samples increased with prolonged storage. The texture parameter, primarily, the hardness, cohesiveness, and adhesiveness of cooked rice samples were higher following storage at elevated temperature. Surface morphology was also significantly affected in stored rice as compared to fresh rice. Storage of rice at 10°C with a grain moisture content of 10% for 2 months gave cooked rice samples with good palatability and minimal cooking time. The temperature was found to be the most prominent storage parameter for rough rice, followed by moisture content and storage duration, influencing the quality of rice.Keywords: rice, cooking quality, storage, surface morphology
Procedia PDF Downloads 18228173 Integrated Power Saving for Multiple Relays and UEs in LTE-TDD
Authors: Chun-Chuan Yang, Jeng-Yueng Chen, Yi-Ting Mai, Chen-Ming Yang
Abstract:
In this paper, the design of integrated sleep scheduling for relay nodes and user equipments under a Donor eNB (DeNB) in the mode of Time Division Duplex (TDD) in LTE-A is presented. The idea of virtual time is proposed to deal with the discontinuous pattern of the available radio resource in TDD, and based on the estimation of the traffic load, three power saving schemes in the top-down strategy are presented. Associated mechanisms in each scheme including calculation of the virtual subframe capacity, the algorithm of integrated sleep scheduling, and the mapping mechanisms for the backhaul link and the access link are presented in the paper. Simulation study shows the advantage of the proposed schemes in energy saving over the standard DRX scheme.Keywords: LTE-A, relay, TDD, power saving
Procedia PDF Downloads 51728172 Modified RSA in Mobile Communication
Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar
Abstract:
The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.Keywords: M-RSA, sensor networks, sensor applications, security
Procedia PDF Downloads 34328171 Computational Agent-Based Approach for Addressing the Consequences of Releasing Gene Drive Mosquito to Control Malaria
Authors: Imran Hashmi, Sipkaduwa Arachchige Sashika Sureni Wickramasooriya
Abstract:
Gene-drive technology has emerged as a promising tool for disease control by influencing the population dynamics of disease-carrying organisms. Various gene drive mechanisms, derived from global laboratory experiments, aim to strategically manage and prevent the spread of targeted diseases. One prominent strategy involves population replacement, wherein genetically modified mosquitoes are introduced to replace the existing local wild population. To enhance our understanding and aid in the design of effective release strategies, we employ a comprehensive mathematical model. The utilized approach employs agent-based modeling, enabling the consideration of individual mosquito attributes and flexibility in parameter manipulation. Through the integration of an agent-based model and a meta-population spatial approach, the dynamics of gene drive mosquito spreading in a released site are simulated. The model's outcomes offer valuable insights into future population dynamics, providing guidance for the development of informed release strategies. This research significantly contributes to the ongoing discourse on the responsible and effective implementation of gene drive technology for disease vector control.Keywords: gene drive, agent-based modeling, disease-carrying organisms, malaria
Procedia PDF Downloads 6528170 'Call Drop': A Problem for Handover Minimizing the Call Drop Probability Using Analytical and Statistical Method
Authors: Anshul Gupta, T. Shankar
Abstract:
In this paper, we had analyzed the call drop to provide a good quality of service to user. By optimizing it we can increase the coverage area and also the reduction of interference and congestion created in a network. Basically handover is the transfer of call from one cell site to another site during a call. Here we have analyzed the whole network by two method-statistic model and analytic model. In statistic model we have collected all the data of a network during busy hour and normal 24 hours and in analytic model we have the equation through which we have to find the call drop probability. By avoiding unnecessary handovers we can increase the number of calls per hour. The most important parameter is co-efficient of variation on which the whole paper discussed.Keywords: coefficient of variation, mean, standard deviation, call drop probability, handover
Procedia PDF Downloads 49128169 Drivers of E-Participation: Case of Saudi Arabia
Authors: R. Alrashedi, A. Persaud
Abstract:
This study provides insights into the readiness of users to participate in e-government activities in Saudi Arabia. A user-centric model of e-participation is developed based on a review of the literature and empirically tested. The findings are based on an online survey of a sample of 200 hundred Saudi citizens and residents living in Saudi Arabia. The study found that trust of the government, attitude towards e-participation, e-participation through the use of social media, and social influence and social identity positively influence e-participation while perceived benefits of e-government is negatively related to e-participation. This study contributes to the literature by providing empirical evidence of the drivers of e-participation. The study also provides insights that could be used by policymakers to increase the level of e-participation in Saudi Arabia.Keywords: e-government, e-participation, social media, trust, social influence and social identity
Procedia PDF Downloads 46228168 An Abductive Approach to Policy Analysis: Policy Analysis as Informed Guessing
Authors: Adrian W. Chew
Abstract:
This paper argues that education policy analysis tends to be steered towards empiricist oriented approaches, which place emphasis on objective and measurable data. However, this paper argues that empiricist oriented approaches are generally based on inductive and/or deductive reasoning, which are unable to generate new ideas/knowledge. This paper will outline the logical structure of induction, deduction, and abduction, and argues that only abduction provides possibilities for the creation of new ideas/knowledge. This paper proposes the neologism of ‘informed guessing’ as a reformulation of abduction, and also as an approach to education policy analysis. On one side, the signifier ‘informed’ encapsulates the idea that abductive policy analysis needs to be informed by descriptive conceptualization theory to be able to make relations and connections between, and within, observed phenomenon and unobservable general structures. On the other side, the signifier ‘guessing’ captures the cyclical and unsystematic process of abduction. This paper will end with a brief example of utilising ‘informed guessing’ for a policy analysis of school choice lotteries in the United States.Keywords: abductive reasoning, empiricism, informed guessing, policy analysis
Procedia PDF Downloads 35628167 Validation of a Reloading Vehicle Design by Finite Element Analysis
Authors: Tuğrul Aksoy, Hüseyin Karabıyık
Abstract:
Reloading vehicles are the vehicles which are generally equipped with a crane and used to carry a stowage from a point and locate onto the vehicle or vice versa. In this study, structural analysis of a reloading vehicle was performed under the loads which are predicted to be exposed under operating conditions via the finite element method. Among the finite element analysis results, the stress and displacement distributions of the vehicle and the contact pressure distributions of the guide rings within the stabilization legs were examined. Vehicle design was improved by strengthening certain parts according to the analysis results. The analyses performed for the final design were verified by the experiments involving strain gauge measurements.Keywords: structural analysis, reloading vehicle, crane, strain gauge
Procedia PDF Downloads 7028166 Exergy Analysis and Evaluation of the Different Flowsheeting Configurations for CO₂ Capture Plant Using 2-Amino-2-Methyl-1-Propanol
Authors: Ebuwa Osagie, Vasilije Manovic
Abstract:
Exergy analysis provides the identification of the location, sources of thermodynamic inefficiencies, and magnitude in a thermal system. Thus, both the qualitative and quantitative assessment can be evaluated with exergy, unlike energy which is based on quantitative assessment only. The main purpose of exergy analysis is to identify where exergy is destroyed. Thus, reduction of the exergy destruction and losses associated with the capture plant systems can improve work potential. Furthermore, thermodynamic analysis of different configurations of the process helps to identify opportunities for reducing the steam requirements for each of the configurations. This paper presents steady-state simulation and exergy analysis of the 2-amino-2-methyl-1-propanol (AMP)-based post-combustion capture (PCC) plant. Exergy analysis performed for the AMP-based plant and the different configurations revealed that the rich split with intercooling configuration gave the highest exergy efficiency of 73.6%, while that of the intercooling and the reference AMP-based plant were 57.3% and 55.8% respectively.Keywords: 2-amino-2-methyl-1-propanol, modelling, and simulation, post-combustion capture plant, exergy analysis, flowsheeting configurations
Procedia PDF Downloads 16428165 Implementation of Achterbahn-128 for Images Encryption and Decryption
Authors: Aissa Belmeguenai, Khaled Mansouri
Abstract:
In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.Keywords: Achterbahn-128, stream cipher, image encryption, security analysis
Procedia PDF Downloads 53228164 An Intelligent Decision Support System Approach for New Product Development by Using QFD and Its Application in Metal Plating Industry
Authors: Ufuk Cebeci, Onur Doğan
Abstract:
New product becomes critical in competitive environment shortening a product's lifecycle due to the rapidly changing technology and increasing consumer requirements. Quality Function Deployment is one of the first steps of NPD process. The study presents an intelligent QFD application in metal plating industry. For application, an intelligent decision support system was developed. By intelligent system, house of quality was drawn and some calculations were shown. According to the results, some recommendations are given to end user. One of the purposes of this system is to give some advices to firms which do not know technical details of QFD and guide them about first steps of the new product development process.Keywords: intelligent decision support systems, metal plating, quality function deployment, QFD software, new product development
Procedia PDF Downloads 39828163 Analysis of CO₂ Capture Products from Carbon Capture and Utilization Plant
Authors: Bongjae Lee, Beom Goo Hwang, Hye Mi Park
Abstract:
CO₂ capture products manufactured through Carbon Capture and Utilization (CCU) Plant that collect CO₂ directly from power plants require accurate measurements of the amount of CO₂ captured. For this purpose, two tests were carried out on the weight loss test. And one was analyzed using a carbon dioxide quantification device. First, the ignition loss analysis was performed by measuring the weight of the sample at 550°C after the first conversation and then confirming the loss when ignited at 950°C. Second, in the thermogravimetric analysis, the sample was divided into two sections of 40 to 500°C and 500 to 800°C to confirm the reduction. The results of thermal weight loss analysis and thermogravimetric analysis were confirmed to be almost similar. However, the temperature of the ignition loss analysis method was 950°C, which was 150°C higher than that of the thermogravimetric method at a temperature of 800°C, so that the difference in the amount of weight loss was 3 to 4% higher by the heat loss analysis method. In addition, the tendency that the CO₂ content increases as the reaction time become longer is similarly confirmed. Third, the results of the wet titration method through the carbon dioxide quantification device were found to be significantly lower than the weight loss method. Therefore, based on the results obtained through the above three analysis methods, we will establish a method to analyze the accurate amount of CO₂. Acknowledgements: This work was supported by the Korea Institute of Energy Technology Evaluation and planning (No. 20152010201850).Keywords: carbon capture and utilization, CCU, CO2, CO2 capture products, analysis method
Procedia PDF Downloads 21828162 A Comparative Analysis of Zotero and Mendeley Reference Management Software
Authors: Sujit K. Basak
Abstract:
This paper presents a comparison of the reference management software between Zotero and Mendeley and the results were drawn by comparing the two software’s. The novelty of this paper is the comparative analysis of the software and it has shown that Mendeley can import more information from the Google Scholar for the researchers. This finding can help to know researchers to use the reference management software.Keywords: analysis, comparative analysis, zotero, researchers, Mendeley
Procedia PDF Downloads 61428161 Factors Determining Selection of Essential Nutrition Supplements
Authors: Daniel C. S. Lim
Abstract:
There are numerous nutritional supplements, such as multivitamins and nutrition drinks, in the market today. Many of these supplements are expensive and tend to be driven commercially by business decisions and big marketing budgets. Many of the costs are ultimately borne by the end user in the quest for keeping to a healthy lifestyle. This paper proposes a system with a list of ten determinants to gauge how to decide the value of various supplements. It suggests variables such as composition, safety, efficacy and bioavailability, as well as several other considerations. These guidelines can help to tackle many of the issues that people of all ages face in the way that they receive essential nutrients. The system also aims to promote and improve the safety and choice of foods and supplements. In so doing, the system aims to promote the individual’s or population’s control over their own health and reduce the growing health care burden on the society.Keywords: choice of foods and supplements, essential nutrients, nutritional supplements, system safety
Procedia PDF Downloads 34128160 Conflicts Identification Approach among Stakeholders in Goal-Oriented Requirements Analysis
Authors: Muhammad Suhaib
Abstract:
Requirements Analysis are the most important part of software Engineering for both system application development, and project requirements. Conflicts often arise during the requirements gathering and analysis phase. This research aims to identify conflicts during the requirements gathering phase in software development life cycle, Research, Development, and Technology converted the world into a global village. During requirements elicitation/gathering phase it’s very difficult to understand the main objective of stakeholders, after completion of requirements elicitation task final results are used for Software Requirements Specification (SRS), SRS is the highly important outcome of the requirements analysis phase. this is the foundation between the developers and stakeholders or customers, proposed methodology will be helpful to identify those conflicts in a very easy manner during the initial phase of the project.Keywords: goal oriented requirements analysis, conflicts identification model, requirements analysis, requirements engineering
Procedia PDF Downloads 13628159 Exploring the Role of Extracurricular Activities (ECAs) in Fostering University Students’ Soft Skills
Authors: Hanae Ait Hattani, Nohaila Ait Hattani
Abstract:
Globalization, with the rapid technological progress, is affecting every life aspect. The 21st century higher education faces a major challenge in preparing well-rounded and competent graduates to compete in the global marketplace. Worldwide, educational policies work to develop the quality of instruction at all educational levels by focusing on promoting students’ qualifications and skills, considering both academic activities and non-academic attributes. In fact, extracurricular activities (ECAs) complement the academic curriculum and enhance the student experience by improving their interpersonal skills and attitudes. This study comes to examine the potential of extracurricular activities as a vital tool for soft skills’ development. Using empirical research, the study aims to measure and evaluate the extent to which university students’ engagement in extracurricular activities contribute in positively changing their learning experience, fostering their soft skills and fostering their behaviors and attitudes. Findings emanating from a questionnaire and semi-structured interviews add a number of contributions to the literature. They support the assumption suggesting that ECAs can be considered a valuable way to acquire, develop, and demonstrate softs skills that students today need to evidence in a variety of contexts, such as communication skills, team work, leadership, problem-solving, to name but a few.Keywords: extracurricular activities (ECAs), soft skills, education, university, attitude
Procedia PDF Downloads 7228158 Effect of Sugar Mill Effluent on Growth, Yield and Soil Properties of Ratoon Cane in Cauvery Command Area
Authors: G. K. Madhu, S. Bhaskar, M. S. Dinesh, R. Manii, C. A. Srinivasamurthy
Abstract:
A field experiment was conducted in the premises of M/s Sri Chamundeshwari Sugars Ltd., Bharathinagar, Mandya District Pvt. Ltd., during 2014 to study the effect of sugar mill effluent (SME) on growth, yield and soil properties of ratoon cane with eight treatments replicated thrice using RCBD design. Significantly higher growth parameters like cane height (249.77 cm) and number of tillers per clump (12.22) were recorded in treatment which received cycle of 3 irrigations with freshwater + 1 irrigation with sugar mill effluent + RDF as compared to other treatments. Significantly lower growth attributes were recorded in treatment which received irrigation with sugar mill effluent alone. Significantly higher cane yield (104. 93 t -1) was recorded in treatment which received cycle of 3 irrigations with freshwater + 1 irrigation with sugar mill effluent + RDF as compared to other treatments. Significantly lower cane yield (87.40 t ha-1) was observed in treatment which received irrigation with sugar mill effluent alone. Soil properties like pH (7.84) was higher in treatment receiving Alternate irrigation with freshwater and sugar mill effluent + RDF. But EC was significantly higher in treatment which received Cycle of1 irrigation with freshwater + 2 irrigations with sugar mill effluent + RDF as compared to other treatments.Keywords: sugar mill effluent, sugarcane, irrigation, cane yield
Procedia PDF Downloads 33528157 Challenges and Opportunities in Computing Logistics Cost in E-Commerce Supply Chain
Authors: Pramod Ghadge, Swadesh Srivastava
Abstract:
Revenue generation of a logistics company depends on how the logistics cost of a shipment is calculated. Logistics cost of a shipment is a function of distance & speed of the shipment travel in a particular network, its volumetric size and dead weight. Logistics billing is based mainly on the consumption of the scarce resource (space or weight carrying capacity of a carrier). Shipment’s size or deadweight is a function of product and packaging weight, dimensions and flexibility. Hence, to arrive at a standard methodology to compute accurate cost to bill the customer, the interplay among above mentioned physical attributes along with their measurement plays a key role. This becomes even more complex for an ecommerce company, like Flipkart, which caters to shipments from both warehouse and marketplace in an unorganized non-standard market like India. In this paper, we will explore various methodologies to define a standard way of billing the non-standard shipments across a wide range of size, shape and deadweight. Those will be, usage of historical volumetric/dead weight data to arrive at a factor which can be used to compute the logistics cost of a shipment, also calculating the real/contour volume of a shipment to address the problem of irregular shipment shapes which cannot be solved by conventional bounding box volume measurements. We will also discuss certain key business practices and operational quality considerations needed to bring standardization and drive appropriate ownership in the ecosystem.Keywords: contour volume, logistics, real volume, volumetric weight
Procedia PDF Downloads 26928156 Locally Crafted Sustainability: A Scoping Review for Nesting Social-Ecological and Socio-Technical Systems Towards Action Research in Agriculture
Authors: Marcia Figueira
Abstract:
Context: Positivist transformations in agriculture were responsible for top-down – often coercive – mechanisms of uniformed modernization that weathered local diversities and agency. New development pathways need to now shift according to comprehensive integrations of knowledge - scientific, indigenous, and local, and to be sustained on political interventions, bottom-up change, and social learning if climate goals are to be met – both in mitigation and adaptation. Objectives The objectives of this research are to understand how social-ecological and socio-technical systems characterisation can be nested to bridge scientific research/knowledge into a local context and knowledge system; and, with it, stem sustainable innovation. Methods To do so, we conducted a scoping review to explore theoretical and empirical works linked to Ostrom’s Social-Ecological Systems framework and Geels’ multi-level perspective of socio-technical systems transformations in the context of agriculture. Results As a result, we were able to identify key variables and connections to 1- understand the rules in use and the community attributes influencing resource management; and 2- how they are and have been shaped and shaping systems innovations. Conclusion Based on these results, we discuss how to leverage action research for mutual learning toward a replicable but highly place-based agriculture transformation frame.Keywords: agriculture systems innovations, social-ecological systems, socio-technical systems, action research
Procedia PDF Downloads 9528155 A Design Framework for an Open Market Platform of Enriched Card-Based Transactional Data for Big Data Analytics and Open Banking
Authors: Trevor Toy, Josef Langerman
Abstract:
Around a quarter of the world’s data is generated by financial with an estimated 708.5 billion global non-cash transactions reached between 2018 and. And with Open Banking still a rapidly developing concept within the financial industry, there is an opportunity to create a secure mechanism for connecting its stakeholders to openly, legitimately and consensually share the data required to enable it. Integration and data sharing of anonymised transactional data are still operated in silos and centralised between the large corporate entities in the ecosystem that have the resources to do so. Smaller fintechs generating data and businesses looking to consume data are largely excluded from the process. Therefore there is a growing demand for accessible transactional data for analytical purposes and also to support the rapid global adoption of Open Banking. The following research has provided a solution framework that aims to provide a secure decentralised marketplace for 1.) data providers to list their transactional data, 2.) data consumers to find and access that data, and 3.) data subjects (the individuals making the transactions that generate the data) to manage and sell the data that relates to themselves. The platform also provides an integrated system for downstream transactional-related data from merchants, enriching the data product available to build a comprehensive view of a data subject’s spending habits. A robust and sustainable data market can be developed by providing a more accessible mechanism for data producers to monetise their data investments and encouraging data subjects to share their data through the same financial incentives. At the centre of the platform is the market mechanism that connects the data providers and their data subjects to the data consumers. This core component of the platform is developed on a decentralised blockchain contract with a market layer that manages transaction, user, pricing, payment, tagging, contract, control, and lineage features that pertain to the user interactions on the platform. One of the platform’s key features is enabling the participation and management of personal data by the individuals from whom the data is being generated. This framework developed a proof-of-concept on the Etheruem blockchain base where an individual can securely manage access to their own personal data and that individual’s identifiable relationship to the card-based transaction data provided by financial institutions. This gives data consumers access to a complete view of transactional spending behaviour in correlation to key demographic information. This platform solution can ultimately support the growth, prosperity, and development of economies, businesses, communities, and individuals by providing accessible and relevant transactional data for big data analytics and open banking.Keywords: big data markets, open banking, blockchain, personal data management
Procedia PDF Downloads 7528154 The Evolutionary Characteristics and Mechanisms and of Multi-scale Intercity Innovation Enclave Networks in China’s Yangtze River Delta Region
Authors: Yuhua Yang, Yingcheng Li
Abstract:
As a new form of intercity economic cooperation, innovation enclaves have received much attention from governments and scholars in China, which are of great significance in promoting the flow of innovation elements and advancing regional integration. Utilizing inter-city linkages of innovation enclaves within and beyond the Yangtze River Delta Region, we construct multi-scalar innovation enclave networks in 2018 and 2022, and analyze the evolutionary characteristics and underlying mechanisms of the networks. Overall, we find that: (1) The intercity innovation enclave networks have the characteristics of preferential connection and are gradually forming a clear multi-scale and hierarchical structure, with Shanghai, Hangzhou and Nanjing as the core and other cities as the general nodes; (2) The intercity innovation enclave networks exhibit local clustering dominated by geographical proximity connections, and are becoming more noticeable in the effect of distance decay and functionally polycentric as the spatial scale decreases; (3) The intercity innovation enclave networks are influenced by both functional distance and multidimensional proximity. While the innovation potential differences caused by urban attributes internally drive the formation of innovation enclave cooperation, geographic proximity, technological proximity and institutional proximity externally affect the selection of cooperation partners.Keywords: economic enclave, intercity cooperation, proximity, yangtze river delta region
Procedia PDF Downloads 2728153 Assessing the Impacts of Folktales (Story Telling) On the Moral Advancement of Children Yoruba Communities in Ute-Owo, Nigeria
Authors: Felicia Titilayo Olanrewaju
Abstract:
Folktales are a subclass of folklores which are verbally told and passed down from one generation to another, from the elderly ones to their children, usually at moonlight. These tales are heavily laden with moral lessons of what should be done and what not within the society. Though these are oftentimes heavily embellished yet are related to guide, guard, train, and dishing out moral attributes and mores worthwhile for ethical progression of the young minds within our traditional settings. With the rapid advancement of technological know-how, the existence of most of these moral-inclined stories becomes questionable; hence this study appraised the influences of these traditional storytellings have in the upgrading of moral learning of ethical behavioral traits acceptable among the Yoruba people. Oral interviews couples with recording gadgets were used to collate both sample parents' and children’s responses within a particular community in Owo (ute) local government area of Owo Ondo State, Nigeria. Findings reveal that diverse tales told at moonlight periods have an untold impact on the speedy growth of the children intellectually than the modern happenings around them. These telltale stories become powerful aids in learning goodly traits and eschewing bad manners. It is recommended that folk stories be told within the household among the family after hard labour in the evenings as this would help develop human relationships and brings about a strong sense of community bindings.Keywords: folktales, folklores, impact, advancement, ethical progression
Procedia PDF Downloads 17828152 Using Deep Learning Real-Time Object Detection Convolution Neural Networks for Fast Fruit Recognition in the Tree
Authors: K. Bresilla, L. Manfrini, B. Morandi, A. Boini, G. Perulli, L. C. Grappadelli
Abstract:
Image/video processing for fruit in the tree using hard-coded feature extraction algorithms have shown high accuracy during recent years. While accurate, these approaches even with high-end hardware are computationally intensive and too slow for real-time systems. This paper details the use of deep convolution neural networks (CNNs), specifically an algorithm (YOLO - You Only Look Once) with 24+2 convolution layers. Using deep-learning techniques eliminated the need for hard-code specific features for specific fruit shapes, color and/or other attributes. This CNN is trained on more than 5000 images of apple and pear fruits on 960 cores GPU (Graphical Processing Unit). Testing set showed an accuracy of 90%. After this, trained data were transferred to an embedded device (Raspberry Pi gen.3) with camera for more portability. Based on correlation between number of visible fruits or detected fruits on one frame and the real number of fruits on one tree, a model was created to accommodate this error rate. Speed of processing and detection of the whole platform was higher than 40 frames per second. This speed is fast enough for any grasping/harvesting robotic arm or other real-time applications.Keywords: artificial intelligence, computer vision, deep learning, fruit recognition, harvesting robot, precision agriculture
Procedia PDF Downloads 42328151 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10
Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin
Abstract:
The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10
Procedia PDF Downloads 17128150 Artificial Nesting in Birds at UVAS-Ravi Campus: Punjab-Pakistan
Authors: Fatima Chaudhary, Rehan Ul Haq
Abstract:
Spatial and anthropogenic factors influencing nest-site selection in birds need to be identified for effective conservative practices. Environmental attributes such as food availability, predator density, previous reproductive success, etc., provide information regarding the site's quality. An artificial nest box experiment was carried out to evaluate the effect of various factors on nest-site selection, as it is hard to assess the natural cavities. The experiment was conducted whereby half of the boxes were filled with old nest material. Artificial nest boxes created with different materials and different sizes and colors were installed at different heights. A total of 14 out of 60 nest boxes were occupied and four of them faced predation. The birds explored a total of 32 out of 60 nests, whereas anthropogenic factors destroyed 25 out of 60 nests. Birds chose empty nest boxes at higher rates however, there was no obvious avoidance of sites having high ectoparasites load due to old nest material. It is also possible that the preference towards the artificial nest boxes may differ from year to year because of several climatic factors and the age of old nest material affecting the parasite's survival. These variables may fluctuate from one season to another. Considering these factors, nest-site selection experiments concerning the effectiveness of artificial nest boxes should be carried out over several successive seasons. This topic may stimulate further studies, which could lead to a fully understanding the birds' evolutionary ecology. Precise information on these factors influencing nest-site selection can be essential from an economic point of view as well.Keywords: artificial nesting, nest box, old nest material, birds
Procedia PDF Downloads 9628149 Parallelization of Random Accessible Progressive Streaming of Compressed 3D Models over Web
Authors: Aayushi Somani, Siba P. Samal
Abstract:
Three-dimensional (3D) meshes are data structures, which store geometric information of an object or scene, generally in the form of vertices and edges. Current technology in laser scanning and other geometric data acquisition technologies acquire high resolution sampling which leads to high resolution meshes. While high resolution meshes give better quality rendering and hence is used often, the processing, as well as storage of 3D meshes, is currently resource-intensive. At the same time, web applications for data processing have become ubiquitous owing to their accessibility. For 3D meshes, the advancement of 3D web technologies, such as WebGL, WebVR, has enabled high fidelity rendering of huge meshes. However, there exists a gap in ability to stream huge meshes to a native client and browser application due to high network latency. Also, there is an inherent delay of loading WebGL pages due to large and complex models. The focus of our work is to identify the challenges faced when such meshes are streamed into and processed on hand-held devices, owing to its limited resources. One of the solutions that are conventionally used in the graphics community to alleviate resource limitations is mesh compression. Our approach deals with a two-step approach for random accessible progressive compression and its parallel implementation. The first step includes partition of the original mesh to multiple sub-meshes, and then we invoke data parallelism on these sub-meshes for its compression. Subsequent threaded decompression logic is implemented inside the Web Browser Engine with modification of WebGL implementation in Chromium open source engine. This concept can be used to completely revolutionize the way e-commerce and Virtual Reality technology works for consumer electronic devices. These objects can be compressed in the server and can be transmitted over the network. The progressive decompression can be performed on the client device and rendered. Multiple views currently used in e-commerce sites for viewing the same product from different angles can be replaced by a single progressive model for better UX and smoother user experience. Can also be used in WebVR for commonly and most widely used activities like virtual reality shopping, watching movies and playing games. Our experiments and comparison with existing techniques show encouraging results in terms of latency (compressed size is ~10-15% of the original mesh), processing time (20-22% increase over serial implementation) and quality of user experience in web browser.Keywords: 3D compression, 3D mesh, 3D web, chromium, client-server architecture, e-commerce, level of details, parallelization, progressive compression, WebGL, WebVR
Procedia PDF Downloads 17028148 The SBO/LOCA Analysis of TRACE/SNAP for Kuosheng Nuclear Power Plant
Authors: J. R. Wang, H. T. Lin, Y. Chiang, H. C. Chen, C. Shih
Abstract:
Kuosheng Nuclear Power Plant (NPP) is located on the northern coast of Taiwan. Its nuclear steam supply system is a type of BWR/6 designed and built by General Electric on a twin unit concept. First, the methodology of Kuosheng NPP SPU (Stretch Power Uprate) safety analysis TRACE/SNAP model was developed in this research. Then, in order to estimate the safety of Kuosheng NPP under the more severe condition, the SBO (Station Blackout) + LOCA (Loss-of-Coolant Accident) transient analysis of Kuosheng NPP SPU TRACE/SNAP model was performed. Besides, the animation model of Kuosheng NPP was presented using the animation function of SNAP with TRACE/SNAP analysis results.Keywords: TRACE, safety analysis, BWR/6, severe accident
Procedia PDF Downloads 715