Search results for: individual share
3566 Sustaining Efficiency in Electricity Distribution to Enhance Effective Human Security for the Vulnerable People in Ghana
Authors: Anthony Nyamekeh-Armah Adjei, Toshiaki Aoki
Abstract:
The unreliable and poor efficiency of electricity distribution leading to frequent power outages and high losses are the major challenge facing the power distribution sector in Ghana. Distribution system routes electricity from the power generating station at a higher voltage through the transmission grid and steps it down through the low voltage lines to end users. Approximately all electricity problems and disturbances that have increased the call for renewable and sustainable energy in recent years have their roots in the distribution system. Therefore, sustaining electricity distribution efficiency can potentially contribute to the reserve of natural energy resources use in power generation, reducing greenhouse gas emission (GHG), decreasing tariffs for consumers and effective human security. Human Security is a people-centered approach where individual human being is the principal object of concern, focuses on protecting the vital core of all human lives in ways for meeting basic needs that enhance the safety and protection of individuals and communities. The vulnerability is the diminished capacity of an individual or group to anticipate, resist and recover from the effect of natural, human-induced disaster. The research objectives are to explore the causes of frequent power outages to consumers, high losses in the distribution network and the effect of poor electricity distribution efficiency on the vulnerable (poor and ordinary) people that mostly depend on electricity for their daily activities or life to survive. The importance of the study is that in a developing country like Ghana where raising a capital for new infrastructure project is difficult, it would be beneficial to enhance the efficiency that will significantly minimize the high energy losses, reduce power outage, to ensure safe and reliable delivery of electric power to consumers to secure the security of people’s livelihood. The methodology used in this study is both interview and questionnaire survey to analyze the response from the respondents on causes of power outages and high losses facing the electricity company of Ghana (ECG) and its effect on the livelihood on the vulnerable people. Among the outcome of both administered questionnaire and the interview survey from the field were; poor maintenance of existing sub-stations, use of aging equipment, use of poor distribution infrastructure and poor metering and billing system. The main observation of this paper is that the poor network efficiency (high losses and power outages) affects the livelihood of the vulnerable people. Therefore, the paper recommends that policymakers should insist on all regulation guiding electricity distribution to improve system efficiency. In conclusion, there should be decentralization of off-grid solar PV technologies to provide a sustainable and cost-effective, which can increase daily productivity and improve the quality of life of the vulnerable people in the rural communities.Keywords: electricity efficiency, high losses, human security, power outage
Procedia PDF Downloads 2863565 Gamification of a Business Intelligence Tool
Authors: Stephen Miller
Abstract:
The act of applying game mechanics and dynamics (which have been traditionally used in video games) into business applications is being widely trialed in an effort to make conventional business software a bit more participative, fun and engaging. This new trend, named ‘gamification’ has its believers and of course, its critics who still need convincing that the concept is an effective and beneficial business tool worthy of investment. The literature reveals that user engagement of business intelligence (BI) tools is much lower than expected and investors are failing to get a good return on their investment (ROI). So, a software prototype will be designed and developed to add gamification to a BI tool to determine its effect upon the user engagement levels of test participants. The experimental study will be evaluated using the comprehensive User Engagement Scale (UES) to see if there are improvements in areas such as; aesthetics, perceived usability, endurability, novelty, felt involvement and focused attention. The results of this unique study should demonstrate whether or not ‘gamifying’ a BI tool has the potential to increase an individual’s motivation to use BI software more often.Keywords: business intelligence, gamification, human computer interaction, user engagement
Procedia PDF Downloads 5853564 Energy Storage in the Future of Ethiopia Renewable Electricity Grid System
Authors: Dawit Abay Tesfamariam
Abstract:
Ethiopia’s Climate- Resilient Green Economy strategy focuses mainly on generating and utilization of Renewable Energy (RE). The data collected in 2016 by Ethiopian Electric Power (EEP) indicates that the intermittent RE sources on the grid from solar and wind energy were only 8 % of the total energy produced. On the other hand, the EEP electricity generation plan in 2030 indicates that 36 % of the energy generation share will be covered by solar and wind sources. Thus, a case study was initiated to model and compute the balance and consumption of electricity in three different scenarios: 2016, 2025, and 2030 using the Energy PLAN Model (EPM). Initially, the model was validated using the 2016 annual power-generated data to conduct the EPM analysis for two predictive scenarios. The EPM simulation analysis using EPM for 2016 showed that there was no significant excess power generated. Hence, the model’s results are in line with the actual 2016 output. Thus, the EPM was applied to analyze the role of energy storage in RE in Ethiopian grid systems. The results of the EPM simulation analysis showed there will be excess production of 402 /7963 MW average and maximum, respectively, in 2025. The excess power was dominant in all months except in the three rainy months of the year (June, July, and August). Consequently, based on the validated outcomes of EPM indicates, there is a good reason to think about other alternatives for the utilization of excess energy and storage of RE. Thus, from the scenarios and model results obtained, it is realistic to infer that; if the excess power is utilized with a storage mechanism that can stabilize the grid system; as a result, the extra RE generated can be exported to support the economy. Therefore, researchers must continue to upgrade the current and upcoming energy storage system to synchronize with RE potentials that can be generated from RE.Keywords: renewable energy, storage, wind, energyplan
Procedia PDF Downloads 813563 Birth Weight, Weight Gain and Feeding Pattern as Predictors for the Onset of Obesity in School Children
Authors: Thimira Pasas P, Nirmala Priyadarshani M, Ishani R
Abstract:
Obesity is a global health issue. Early identification is essential to plan interventions and intervene than to reduce the worsening of obesity and its consequences on the health issues of the individual. Childhood obesity is multifactorial, with both modifiable and unmodifiable risk factors. A genetically susceptible individual (unmodifiable), when placed in an obesogenic environment (modifiable), is likely to become obese in onset and progression. The present study was conducted to identify the age of onset of childhood obesity and the influence of modifiable risk factors for childhood obesity among school children living in a suburban area of Sri Lanka. The study population was aged 11-12 years of Piliyandala Educational Zone. Data were collected from 11–12-year-old school children attending government schools in the Piliyandala Educational Zone. They were using a validated, pre-tested self-administered questionnaire. A stratified random sampling method was performed to select schools and to select a representative sample to include all 3 types of government schools of students due to the prevailing pandemic situation, information from the last school medical inspection on data from 2020used for this purpose. For each obese child identified, 2 non-obese children were selected as controls. A single representative from the area was selected by using a systematic random sampling method with a sampling interval of 3. Data was collected using a validated, pre-tested self-administered questionnaire and the Child Health Development Record of the child. An introduction, which included explanations and instructions for filing the questionnaire, was carried out as a group activity prior to distributing the questionnaire among the sample. The results of the present study aligned with the hypothesis that the age of onset of childhood obesity and prediction must be within the first two years of child life. A total of 130 children (66 males: 64 females) participated in the study. The age of onset of obesity was seen to be within the first two years of life. The risk of obesity at 11-12 years of age was Obesity risk was identified at 3-time s higher among females who underwent rapid weight gain within their infancy period. Consuming milk prior to breakfast emerged as a risk factor that increases the risk of obesity by three times. The current study found that the drink before breakfast tends to increase the obesity risk by 3-folds, especially among obese females. Proper monitoring must be carried out to identify the rapid weight gain, especially within the first 2 years of life. Consumption of mug milk before breakfast tends to increase the obesity risk by 3 times. Identification of the confounding factors, proper awareness of the mothers/guardians and effective proper interventions need to be carried out to reduce the obesity risk among school children in the future.Keywords: childhood obesity, school children, age of onset, weight gain, feeding pattern, activity level
Procedia PDF Downloads 1413562 Minimization of Propagation Delay in Multi Unmanned Aerial Vehicle Network
Authors: Purva Joshi, Rohit Thanki, Omar Hanif
Abstract:
Unmanned aerial vehicles (UAVs) are becoming increasingly important in various industrial applications and sectors. Nowadays, a multi UAV network is used for specific types of communication (e.g., military) and monitoring purposes. Therefore, it is critical to reducing propagation delay during communication between UAVs, which is essential in a multi UAV network. This paper presents how the propagation delay between the base station (BS) and the UAVs is reduced using a searching algorithm. Furthermore, the iterative-based K-nearest neighbor (k-NN) algorithm and Travelling Salesmen Problem (TSP) algorthm were utilized to optimize the distance between BS and individual UAV to overcome the problem of propagation delay in multi UAV networks. The simulation results show that this proposed method reduced complexity, improved reliability, and reduced propagation delay in multi UAV networks.Keywords: multi UAV network, optimal distance, propagation delay, K - nearest neighbor, traveling salesmen problem
Procedia PDF Downloads 2013561 A Bacterial Foraging Optimization Algorithm Applied to the Synthesis of Polyacrylamide Hydrogels
Authors: Florin Leon, Silvia Curteanu
Abstract:
The Bacterial Foraging Optimization (BFO) algorithm is inspired by the behavior of bacteria such as Escherichia coli or Myxococcus xanthus when searching for food, more precisely the chemotaxis behavior. Bacteria perceive chemical gradients in the environment, such as nutrients, and also other individual bacteria, and move toward or in the opposite direction to those signals. The application example considered as a case study consists in establishing the dependency between the reaction yield of hydrogels based on polyacrylamide and the working conditions such as time, temperature, monomer, initiator, crosslinking agent and inclusion polymer concentrations, as well as type of the polymer added. This process is modeled with a neural network which is included in an optimization procedure based on BFO. An experimental study of BFO parameters is performed. The results show that the algorithm is quite robust and can obtain good results for diverse combinations of parameter values.Keywords: bacterial foraging, hydrogels, modeling and optimization, neural networks
Procedia PDF Downloads 1533560 Factors Associated with Self-Rated Health among Persons with Disabilities: A Korean National Survey
Authors: Won-Seok Kim, Hyung-Ik Shin
Abstract:
Self-rated health (SRH) is a subjective assessment of individual health and has been identified as a strong predictor for mortality and morbidity. However few studies have been directed to the factors associated with SRH in persons with disabilities (PWD). We used data of 7th Korean national survey for 5307 PWD in 2008. Multiple logistic regression analysis was performed to find out independent risk factors for poor SRH in PWD. As a result, indicators of physical condition (poor instrumental ADL), socioeconomic disadvantages (poor education, economically inactive, low self-rated social class, medicaid in health insurance, presence of unmet need for hospital use) and social participation and networks (no use of internet service) were selected as independent risk factors for poor SRH in final model. Findings in the present study would be helpful in making a program to promote the health and narrow the gap of health status between the PWD.Keywords: disabilities, risk factors, self-rated health, socioeconomic disadvantages, social networks
Procedia PDF Downloads 3953559 A ‘Just and Loving Gaze’ on Sexuality and Attachment: Why I Think (Not) All Homosexual Relationships are Borne Out of an Abandonment and Attachment Crisis
Authors: Victor Counted
Abstract:
John Bowlby's Attachment theory is often a framework used by many researchers to understand human relationship experiences with close 'others'. In this short brief on sexuality, I tried to discuss homosexual relationships from three attachment positions, or if you like, conditions, in relation to the compensation and correspondence hypothesis used to understand an individual's attachment orientation with an attachment figure who is seen as a secure base, safe haven, and some kind of target for proximity seeking. Drawing from the springs of virtue and hope in light of Murdock’s ‘just and love gaze’ model, I allowed myself to see the homosexual cases cited in positive terms, as I related to the situations and experiences of our homosexual ‘others’ from the guiding herald of Moltmann's theology of hope. This approach allowed me to conclusively convince readers to engage sexuality from a tolerating tendency of hope in our thinking and thoughts towards the actions and conditions of our dynamic world which is always plunging toward the future.Keywords: attachment, wellbeing, sexuality, homosexuality, abandonment, tolerance of hope, wise fool
Procedia PDF Downloads 4123558 Effect of Ownership Structure and Financial Leverage on Corporate Investment Behavior in Tehran Stock Exchange
Authors: Shamshiri Mitra, Abedi Rahim
Abstract:
This paper investigates corporate investment behavior and its relationship with ownership structure and financial leverage for the listed company of Tehran stock exchange during 2008-2012. The results show that the concentration of ownership has s significant positive effect on corporate investment. The results for the kind of major owners show that institutional ownership had a positive significant effect and state and individual ownership had negative significant effects on the corporate investment but the effect of corporate ownership was not significant. Furthermore the effect of financial leverage was negative and significant.Keywords: corporate investment behavior, financial leverage, ownership structure corporate investment behavior
Procedia PDF Downloads 5253557 The Idea of Reputation in a Post-Truth Era
Authors: Karen Armstrong
Abstract:
This paper considers the importance of acquiring, cultivating, and protecting one’s personal online reputation in a post-truth era. Although the idea of the individual is essential psychological construct, the concept necessarily now includes our online reputation. The idea of this online reputation has expanded to become almost more important than any other factor in terms of our professional, social and psychological development. The discussion will first consider philosophical ideas of the self, followed by an examination of underlying concepts of perception and interpretation in a post-truth world. Then, the idea of the recent shift to a consideration of posted images, through words and photos, in the construction of self, will be discussed. Next, the relation between private personal life and exterior social life, including our reputation in a variety of realms will be addressed. This will include the adoption of specific strategies and behaviors, which facilitate accuracy, currency and necessary modifications with regard to our online reputation. Finally, specific ways in which we can negotiate the fluid dynamic between reputation, and inner and outer selves to optimum effect will conclude the discussion.Keywords: image, post-truth, privacy, reputation, surveillance
Procedia PDF Downloads 2543556 ACBM: Attention-Based CNN and Bi-LSTM Model for Continuous Identity Authentication
Authors: Rui Mao, Heming Ji, Xiaoyu Wang
Abstract:
Keystroke dynamics are widely used in identity recognition. It has the advantage that the individual typing rhythm is difficult to imitate. It also supports continuous authentication through the keyboard without extra devices. The existing keystroke dynamics authentication methods based on machine learning have a drawback in supporting relatively complex scenarios with massive data. There are drawbacks to both feature extraction and model optimization in these methods. To overcome the above weakness, an authentication model of keystroke dynamics based on deep learning is proposed. The model uses feature vectors formed by keystroke content and keystroke time. It ensures efficient continuous authentication by cooperating attention mechanisms with the combination of CNN and Bi-LSTM. The model has been tested with Open Data Buffalo dataset, and the result shows that the FRR is 3.09%, FAR is 3.03%, and EER is 4.23%. This proves that the model is efficient and accurate on continuous authentication.Keywords: keystroke dynamics, identity authentication, deep learning, CNN, LSTM
Procedia PDF Downloads 1553555 Active Imagination: The Effective Factor in the Practice of Psychotherapy
Authors: Sonia Regina Lyra
Abstract:
The desire for unequivocal clarity is understandable, but this can make one forget that things of the soul are experiential processes, or transformations, which should never be designated unilaterally if it is not wanted to transform something that moves, a living thing, into something static. Among the so-called ‘things of the soul’ there are especially spontaneous fantasies, that emerge during the processes, as a result from the use of the active imagination technique, for when fantasy is not forced, violated, or subjugated by an illegitimate, intellectually preconceived idea, then it is a legitimate and authentic product of the unconscious mind. This is how one can gain access to unadulterated information about everything that transcends the conscious mind. However, it is vital to discern between ego and non-ego, because this principle will result in a release of energy and a renewal of life, which will come to have meaning. This study will deal with the active imagination as a knowledge that depends on the individual experience of the therapist because the patient will be taken just to reach where the unconscious of the therapist was assimilated to his own conscience. In this way, the therapist becomes the method itself, being his personality, a fundamental part of an effective factor.Keywords: active imagination, effective factor, synchronicity, symptom
Procedia PDF Downloads 1983554 Adaptation of Research Methodology in a Culture: A Reflection from Bangladesh
Authors: Umme Habiba Jasmine, Mzikazi Nduna
Abstract:
Due to the dearth of exploratory research in Bangladesh on parenting practices and transmission thereof, there is a lack of information on culture-sensitive methodology in studying this topic. This paper aims to share some methodological reflections from the research field, which will address this knowledge gap. Eleven dyads of biological mothers and maternal grandmothers of school-going children constituted the sample, and a female fieldworker conducted one-to-one, semi-structured, in-depth interviews with them. The participants were recruited through purposive sampling through a representative of a cooperative society in Mirpur area in Bangladesh. Four dyads of the sample outside that eleven dyads were discarded because of the unavailability of the other participant of the dyads or unsuitability for an in-depth interview. The sample recruitment strategy of approaching mothers without their known reference body had to be discarded because of existing social insecurity in Dhaka city. To meet the cultural demand of the research field the researcher had to change in the research plan and comply with the cultural tradition of mutual entertainment with food while conducting interviews which helped in engaging in positive interaction. Also, the researcher had to compromise the strict confidentiality to a collectivistic sense of confidentiality of the in-depth interview sessions. This study suggests future researchers to investigate Bangladeshi traditional practices and accommodate the applicable ones in their research plan for qualitative studies, especially the Bengali tradition of hospitality and shared confidentiality for building rapport and for proper access to the targeted information and research participants. Sample recruitment should always accompany a well-accepted reference person in the targeted research field.Keywords: confidentiality, culture-sensitive, ethics, parenting practices, sampling
Procedia PDF Downloads 1093553 A Review on Pathological Gaming among Adolescents
Authors: Anjali Malik
Abstract:
This paper presents a review of the literature on behavioral addictions with a particular focus on understanding online gaming habits among adolescents. Extant researches yielded many different sets of antecedent factors for developing pathological online gaming behavior. This paper draws findings from the most-cited publications most closely associated with factors explaining why individuals develop such kind of problematic behavior. What emerges as central to understanding this phenomenon is the presence of multiple variable causes that take into account the individual, the environment and their interaction to explain the risk behavior such as pathological online gaming. In addition to that role of some mediating factors and pull factors has also been discussed, along with the consequences on personal, social and academic performance resulting from such kind of addictive behavior. The paper also makes recommendations for future research including developing a deeper understanding of the phenomena studied here by examining the relative contribution of these multiple-risk contexts.Keywords: pathological gaming, gaming addiction, adolescents, behavior
Procedia PDF Downloads 2303552 Identification of Risks Associated with Process Automation Systems
Authors: J. K. Visser, H. T. Malan
Abstract:
A need exists to identify the sources of risks associated with the process automation systems within petrochemical companies or similar energy related industries. These companies use many different process automation technologies in its value chain. A crucial part of the process automation system is the information technology component featuring in the supervisory control layer. The ever-changing technology within the process automation layers and the rate at which it advances pose a risk to safe and predictable automation system performance. The age of the automation equipment also provides challenges to the operations and maintenance managers of the plant due to obsolescence and unavailability of spare parts. The main objective of this research was to determine the risk sources associated with the equipment that is part of the process automation systems. A secondary objective was to establish whether technology managers and technicians were aware of the risks and share the same viewpoint on the importance of the risks associated with automation systems. A conceptual model for risk sources of automation systems was formulated from models and frameworks in literature. This model comprised six categories of risk which forms the basis for identifying specific risks. This model was used to develop a questionnaire that was sent to 172 instrument technicians and technology managers in the company to obtain primary data. 75 completed and useful responses were received. These responses were analyzed statistically to determine the highest risk sources and to determine whether there was difference in opinion between technology managers and technicians. The most important risks that were revealed in this study are: 1) the lack of skilled technicians, 2) integration capability of third-party system software, 3) reliability of the process automation hardware, 4) excessive costs pertaining to performing maintenance and migrations on process automation systems, and 5) requirements of having third-party communication interfacing compatibility as well as real-time communication networks.Keywords: distributed control system, identification of risks, information technology, process automation system
Procedia PDF Downloads 1393551 A Control Model for the Dismantling of Industrial Plants
Authors: Florian Mach, Eric Hund, Malte Stonis
Abstract:
The dismantling of disused industrial facilities such as nuclear power plants or refineries is an enormous challenge for the planning and control of the logistic processes. Existing control models do not meet the requirements for a proper dismantling of industrial plants. Therefore, the paper presents an approach for the control of dismantling and post-processing processes (e.g. decontamination) in plant decommissioning. In contrast to existing approaches, the dismantling sequence and depth are selected depending on the capacity utilization of required post-processing processes by also considering individual characteristics of respective dismantling tasks (e.g. decontamination success rate, uncertainties regarding the process times). The results can be used in the dismantling of industrial plants (e.g. nuclear power plants) to reduce dismantling time and costs by avoiding bottlenecks such as capacity constraints.Keywords: dismantling management, logistics planning and control models, nuclear power plant dismantling, reverse logistics
Procedia PDF Downloads 3043550 Another Beautiful Sounds: Building the Memory of Sound of Peddling in Beijing with Digital Technology
Authors: Dan Wang, Qing Ma, Xiaodan Wang, Tianjiao Qi
Abstract:
The sound of peddling in Beijing, also called “yo-heave-ho” or “cry of one's ware”, is a unique folk culture and usually found in Beijing hutong. For the civilians in Beijing, sound of peddling is part of their childhood. And for those who love the traditional culture of Beijing, it is an old song singing the local conditions and customs of the ancient city. For example, because of his great appreciation, the British poet Osbert Stewart once put sound of peddling which he had heard in Beijing as a street orchestra performance in the article named "Beijing's sound and color".This research aims to collect and integrate the voice/photo resources and historical materials of sound concerning peddling in Beijing by digital technology in order to protect the intangible cultural heritage and pass on the city memory. With the goal in mind, the next stage is to collect and record all the materials and resources based on the historical documents study and interviews with civilians or performers. Then set up a metadata scheme (which refers to the domestic and international standards such as "Audio Data Processing Standards in the National Library", DC, VRA, and CDWA, etc.) to describe, process and organize the sound of peddling into a database. In order to fully show the traditional culture of sound of peddling in Beijing, web design and GIS technology are utilized to establish a website and plan holding offline exhibitions and events for people to simulate and learn the sound of peddling by using VR/AR technology. All resources are opened to the public and civilians can share the digital memory through not only the offline experiential activities, but also the online interaction. With all the attempts, a multi-media narrative platform has been established to multi-dimensionally record the sound of peddling in old Beijing with text, images, audio, video and so on.Keywords: sound of peddling, GIS, metadata scheme, VR/AR technology
Procedia PDF Downloads 3043549 SMEs Access to Finance in Croatia – Model Approach
Authors: Vinko Vidučić, Ljiljana Vidučić, Damir Boras
Abstract:
The goals of the research include the determination of the characteristics of SMEs finance in Croatia, as well as the determination of indirect growth rates of the information model of the entrepreneurs` perception of business environment. The research results show that cost of finance and access to finance are most important constraining factor in setting up and running the business of small entrepreneurs in Croatia. Furthermore, small entrepreneurs in Croatia are significantly dissatisfied with the administrative barriers although relatively to a lesser extent than was the case in the pre-crisis time. High collateral requirement represents the main characteristic of bank lending concerning SMEs followed by long credit elaboration process. Formulated information model has defined the individual impact of indirect growth rates of the remaining variables on the model’s specific variable.Keywords: business environment, information model, indirect growth rates, SME finance
Procedia PDF Downloads 3653548 Apply Activity-Based Costing Management System by Key Success Paths to Promote the Competitive Advantages and Operation Performance
Authors: Mei-Fang Wu, Shu-Li Wang, Feng-Tsung Cheng
Abstract:
Highly developed technology and highly competitive global market highlight the important role of competitive advantages and operation performances in sustainable company operation. Activity-Based Costing (ABC) provides accurate operation cost and operation performance information. Rich literature provide relevant research with cases study on Activity-Based Costing application, and yet, there is no research studying on cause relationship between key success factors of applying Activity-Based Costing and its specific outcomes, such as profitability or share market. These relationships provide the ways to handle the key success factors to achieve the specific outcomes for ensuring to promote the competitive advantages and operation performances. The main purposes of this research are exploring the key success paths by Key Success Paths approach which will lead the ways to apply Activity-Base Costing. The Key Success Paths is the innovative method which is exploring the cause relationships and explaining what are the effects of key success factors to specific outcomes of Activity-Based Costing implementation. The cause relationships between key success factors and successful specific outcomes are Key Success Paths (KSPs). KSPs are the guidelines to lead the cost management strategies to achieve the goals of competitive advantages and operation performances. The research findings indicate that good management system design may impact the good outcomes of Activity-Based Costing application and achieve to outstanding competitive advantage, operating performance and profitability as well by KSPs exploration.Keywords: activity-based costing, key success factors, key success paths approach, key success paths, key failure paths
Procedia PDF Downloads 3893547 Correlation between Potential Intelligence Explanatory Study in the Perspective of Multiple Intelligence Theory by Using Dermatoglyphics and Culture Approaches
Authors: Efnie Indrianie
Abstract:
Potential Intelligence constitutes one essential factor in every individual. This intelligence can be a provision for the development of Performance Intelligence if it is supported by surrounding environment. Fingerprint analysis is a method in recognizing this Potential Intelligence. This method is grounded on pattern and number of finger print outlines that are assumed symmetrical with the number of nerves in our brain, in which these areas have their own function among another. These brain’s functions are later being transposed into intelligence components in accordance with the Multiple Intelligences theory. This research tested the correlation between Potential Intelligence and the components of its Performance Intelligence. Statistical test results that used Pearson correlation showed that five components of Potential Intelligence correlated with Performance Intelligence. Those five components are Logic-Math, Logic, Linguistic, Music, Kinesthetic, and Intrapersonal. Also, this research indicated that cultural factor had a big role in shaping intelligence.Keywords: potential intelligence, performance intelligence, multiple intelligences, fingerprint, environment, brain
Procedia PDF Downloads 5363546 Spatiotemporal Changes in Drought Sensitivity Captured by Multiple Tree-Ring Parameters of Central European Conifers
Authors: Krešimir Begović, Miloš Rydval, Jan Tumajer, Kristyna Svobodová, Thomas Langbehn, Yumei Jiang, Vojtech Čada, Vaclav Treml, Ryszard Kaczka, Miroslav Svoboda
Abstract:
Environmental changes have increased the frequency and intensity of climatic extremes, particularly hotter droughts, leading to altered tree growth patterns and multi-year lags in tree recovery. The effects of shifting climatic conditions on tree growth are inhomogeneous across species’ natural distribution ranges, with large spatial heterogeneity and inter-population variability, but generally have significant consequences for contemporary forest dynamics and future ecosystem functioning. Despite numerous studies on the impacts of regional drought effects, large uncertainties remain regarding the mechanistic basis of drought legacy effects on wood formation and the ability of individual species to cope with increasingly drier growing conditions and rising year-to-year climatic variability. To unravel the complexity of climate-growth interactions and assess species-specific responses to severe droughts, we combined forward modeling of tree growth (VS-lite model) with correlation analyses against climate (temperature, precipitation, and the SPEI-3 moisture index) and growth responses to extreme drought events from multiple tree-ring parameters (tree-width and blue intensity parameters). We used an extensive dataset with over 1000 tree-ring samples from 23 nature forest reserves across an altitudinal range in Czechia and Slovakia. Our results revealed substantial spatiotemporal variability in growth responses to summer season temperature and moisture availability across species and tree-ring parameters. However, a general trend of increasing spring moisture-growth sensitivity in recent decades was observed in the Scots pine mountain forests and lowland forests of both species. The VS-lite model effectively captured nonstationary climate-growth relationships and accurately estimated high-frequency growth variability, indicating a significant incidence of regional drought events and growth reductions. Notably, growth reductions during extreme drought years and discrete legacy effects identified in individual wood components were most pronounced in the lowland forests. Together with the observed growth declines in recent decades, these findings suggest an increasing vulnerability of Norway spruce and Scots pine in dry lowlands under intensifying climatic constraints.Keywords: dendroclimatology, Vaganova–Shashkin lite, conifers, central Europe, drought, blue intensity
Procedia PDF Downloads 583545 Sugar-Induced Stabilization Effect of Protein Structure
Authors: Mitsuhiro Hirai, Satoshi Ajito, Nobutaka Shimizu, Noriyuki Igarashi, Hiroki Iwase, Shinichi Takata
Abstract:
Sugars and polyols are known to be bioprotectants preventing such as protein denaturation and enzyme deactivation and widely used as a nontoxic additive in various industrial and medical products. The mechanism of their protective actions has been explained by specific bindings between biological components and additives, changes in solvent viscosities, and surface tension and free energy changes upon transfer of those components into additive solutions. On the other hand, some organisms having tolerances against extreme environment produce stress proteins and/or accumulate sugars in cells, which is called cryptobiosis. In particular, trehalose has been drawing attention relevant to cryptobiosis under external stress such as high or low temperature, drying, osmotic pressure, and so on. The function of cryptobiosis by trehalose has been explained relevant to the restriction of the intra-and/or-inter-molecular movement by vitrification or from the replacement of water molecule by trehalose. Previous results suggest that the structure and interaction between sugar and water are a key determinant for understanding cryptobiosis. Recently, we have shown direct evidence that the protein hydration (solvation) and structural stability against chemical and thermal denaturation significantly depend on sugar species and glycerol. Sugar and glycerol molecules tend to be preferentially or weakly excluded from the protein surface and preserved the native protein hydration shell. Due to the protective action of the protein hydration shell by those molecules, the protein structure is stabilized against chemical (guanidinium chloride) and thermal denaturation. The protective action depends on sugar species. To understand the above trend and difference in detail, it is essentially important to clarify the characteristics of solutions containing those additives. In this study, by using wide-angle X-ray scattering technique covering a wide spatial region (~3-120 Å), we have clarified structures of sugar solutions with the concentration from 5% w/w to 65% w/w. The sugars measured in the present study were monosaccharides (glucose, fructose, mannose) and disaccharides (sucrose, trehalose, maltose). Due to observed scattering data with a wide spatial resolution, we have succeeded in obtaining information on the internal structure of individual sugar molecules and on the correlation between them. Every sugar gradually shortened the average inter-molecular distance as the concentration increased. The inter-molecular interaction between sugar molecules was essentially showed an exclusive tendency for every sugar, which appeared as the presence of a repulsive correlation hole. This trend was more weakly seen for trehalose compared to other sugars. The intermolecular distance and spread of individual molecule clearly showed the dependence of sugar species. We will discuss the relation between the characteristic of sugar solution and its protective action of biological materials.Keywords: hydration, protein, sugar, X-ray scattering
Procedia PDF Downloads 1563544 Responsibility of Corporate Manager: To Synthesize of the Different Theories by Economic, Political, Social, and Behavioral Perspectives
Authors: Bahram Soltani, Louai Ghazieh
Abstract:
Following the high profile financial scandals of 2007-2008, corporate management has been faced with strong pressures resulting from more regulatory requirements, as well as the increasing expectations of various groups of stakeholders. The responsibility acquired a big importance in front of this financial crisis. This responsibility requires more transparency and communication, inside the company with the collaborators and outside of the company with the society, while companies try to improve the degree of control and to authorize managers to realize the objectives of the company. The objective of this paper is to present the concept of the responsibility generally and the various types of manager’s responsibility in private individual within the company, as well as the explanatory theories of this responsibility through the various perspectives such as: economic, political, social and behavioral. This study should have academic and practical contributions particularly for regulators seeking to improve the companies’ practices and organizational functioning within capital market economy.Keywords: manager, accountability, corporate performance, financial crisis, behavior
Procedia PDF Downloads 3933543 Self-Concept and Self-Esteem of Adolescents in Lubango, Angola: An Exploratory Study
Authors: Miguel Maria, Tchilissila A. Simoes
Abstract:
The end of a long period of civil wars in Angola (1975-2002) paved the way for growing scientific research in the field of psychology, allowing us to broaden our knowledge on the Angolan population throughout their individual and family development. In this study, we aimed to assess the index of self-concept and self-esteem of adolescents from private and public secondary schools in Lubango, Angola. One hundred adolescents, between 16 and 18 years old (M = 17.2 years, SD = 0.81), completed the Piers-Harris Children's Self-Concept Scale 2 (Piers, 1984) and the Self-Perception Profile for Children (SPPC; Harter, 1985). Our results pointed out lower values of self-esteem and self-concept compared to international samples. Moreover, the level of education and the type of school attended did not seem to influence the level of participants' self-concept and self-esteem. These results contributed to enrich the literature on Angolan adolescents and propels intervention programs to enhance the self-concept and self-esteem of these individuals.Keywords: African adolescents, post-war societies, self-esteem, self-concept
Procedia PDF Downloads 1643542 Cyclic Response of Reinforced Concrete Beam-Column Joint Strengthening by FRP
Authors: N. Attari, S. Amziane, M. Chemrouk
Abstract:
A large number of old buildings have been identified as having potentially critical detailing to resist earthquakes. The main reinforcement of lap-spliced columns just above the joint region, discontinuous bottom beam reinforcement, and little or no joint transverse reinforcement are the most critical details of interior beam column joints in such buildings. This structural type constitutes a large share of the building stock, both in developed and developing countries, and hence it represents a substantial exposure. Direct observation of damaged structures, following the Algiers 2003 earthquake, has shown that damage occurs usually at the beam-column joints, with failure in bending or shear, depending on geometry and reinforcement distribution and type. While substantial literature exists for the design of concrete frame joints to withstand this type of failure, after the earthquake many structures were classified as slightly damaged and, being uneconomic to replace them, at least in the short term, suitable means of repairs of the beam column joint area are being studied. Furthermore; there exists a large number of buildings that need retrofitting of the joints before the next earthquake. The paper reports the results of the experimental programme, constituted of three beam-column reinforced concrete joints at a scale of one to three (1/3) tested under the effect of a pre-stressing axial load acting over the column. The beams were subjected at their ends to an alternate cyclic loading under displacement control to simulate a seismic action. Strain and cracking fields were monitored with the help a digital recording camera. Following the analysis of the results, a comparison can be made between the performances in terms of ductility, strength and mode of failure of the different strengthening solution considered.Keywords: fibre reinforced polymers, joints, reinforced concrete, beam columns
Procedia PDF Downloads 4173541 Investigating the Neural Heterogeneity of Developmental Dyscalculia
Authors: Fengjuan Wang, Azilawati Jamaludin
Abstract:
Developmental Dyscalculia (DD) is defined as a particular learning difficulty with continuous challenges in learning requisite math skills that cannot be explained by intellectual disability or educational deprivation. Recent studies have increasingly recognized that DD is a heterogeneous, instead of monolithic, learning disorder with not only cognitive and behavioral deficits but so too neural dysfunction. In recent years, neuroimaging studies employed group comparison to explore the neural underpinnings of DD, which contradicted the heterogenous nature of DD and may obfuscate critical individual differences. This research aimed to investigate the neural heterogeneity of DD using case studies with functional near-infrared spectroscopy (fNIRS). A total of 54 aged 6-7 years old of children participated in this study, comprising two comprehensive cognitive assessments, an 8-minute resting state, and an 8-minute one-digit addition task. Nine children met the criteria of DD and scored at or below 85 (i.e., the 16th percentile) on the Mathematics or Math Fluency subtest of the Wechsler Individual Achievement Test, Third Edition (WIAT-III) (both subtest scores were 90 and below). The remaining 45 children formed the typically developing (TD) group. Resting-state data and brain activation in the inferior frontal gyrus (IFG), superior frontal gyrus (SFG), and intraparietal sulcus (IPS) were collected for comparison between each case and the TD group. Graph theory was used to analyze the brain network under the resting state. This theory represents the brain network as a set of nodes--brain regions—and edges—pairwise interactions across areas to reveal the architectural organizations of the nervous network. Next, a single-case methodology developed by Crawford et al. in 2010 was used to compare each case’s brain network indicators and brain activation against 45 TD children’s average data. Results showed that three out of the nine DD children displayed significant deviation from TD children’s brain indicators. Case 1 had inefficient nodal network properties. Case 2 showed inefficient brain network properties and weaker activation in the IFG and IPS areas. Case 3 displayed inefficient brain network properties with no differences in activation patterns. As a rise above, the present study was able to distill differences in architectural organizations and brain activation of DD vis-à-vis TD children using fNIRS and single-case methodology. Although DD is regarded as a heterogeneous learning difficulty, it is noted that all three cases showed lower nodal efficiency in the brain network, which may be one of the neural sources of DD. Importantly, although the current “brain norm” established for the 45 children is tentative, the results from this study provide insights not only for future work in “developmental brain norm” with reliable brain indicators but so too the viability of single-case methodology, which could be used to detect differential brain indicators of DD children for early detection and interventions.Keywords: brain activation, brain network, case study, developmental dyscalculia, functional near-infrared spectroscopy, graph theory, neural heterogeneity
Procedia PDF Downloads 533540 Emotion Detection in Twitter Messages Using Combination of Long Short-Term Memory and Convolutional Deep Neural Networks
Authors: Bahareh Golchin, Nooshin Riahi
Abstract:
One of the most significant issues as attended a lot in recent years is that of recognizing the sentiments and emotions in social media texts. The analysis of sentiments and emotions is intended to recognize the conceptual information such as the opinions, feelings, attitudes and emotions of people towards the products, services, organizations, people, topics, events and features in the written text. These indicate the greatness of the problem space. In the real world, businesses and organizations are always looking for tools to gather ideas, emotions, and directions of people about their products, services, or events related to their own. This article uses the Twitter social network, one of the most popular social networks with about 420 million active users, to extract data. Using this social network, users can share their information and opinions about personal issues, policies, products, events, etc. It can be used with appropriate classification of emotional states due to the availability of its data. In this study, supervised learning and deep neural network algorithms are used to classify the emotional states of Twitter users. The use of deep learning methods to increase the learning capacity of the model is an advantage due to the large amount of available data. Tweets collected on various topics are classified into four classes using a combination of two Bidirectional Long Short Term Memory network and a Convolutional network. The results obtained from this study with an average accuracy of 93%, show good results extracted from the proposed framework and improved accuracy compared to previous work.Keywords: emotion classification, sentiment analysis, social networks, deep neural networks
Procedia PDF Downloads 1373539 Optimization of Process Parameters Affecting Biogas Production from Organic Fraction of Municipal Solid Waste via Anaerobic Digestion
Authors: B. Sajeena Beevi, P. P. Jose, G. Madhu
Abstract:
The aim of this study was to obtain the optimal conditions for biogas production from anaerobic digestion of organic fraction of municipal solid waste (OFMSW) using response surface methodology (RSM). The parameters studied were initial pH, substrate concentration and total organic carbon (TOC). The experimental results showed that the linear model terms of initial pH and substrate concentration and the quadratic model terms of the substrate concentration and TOC had significant individual effect (p < 0.05) on biogas yield. However, there was no interactive effect between these variables (p > 0.05). The highest level of biogas produced was 53.4 L/Kg VS at optimum pH, substrate concentration and total organic carbon of 6.5, 99gTS/L, and 20.32 g/L respectively.Keywords: anaerobic digestion, biogas, optimization, response surface methodology
Procedia PDF Downloads 4343538 Issues and Challenges of Tribals in India: A Case of Andhra Pradesh
Authors: P. Lalitha
Abstract:
Economic and social empowerment and educational upliftment of socially disadvantaged groups and marginalized sections of society is necessary for achieving faster and more inclusive development. Programmes are being implemented through states, government’s apex corporations, and NGOs for the up-liftment of disadvantaged and marginalized sections of society. As per the primary data collected, a majority of tribal land holdings (60%) are below 2 hectare and only 5% are above 10 hectares. However, the ownership of large holdings does not give a distinct advantage unless the land is of good quality. There are areas in which even large holdings beyond 5 hectares are not sufficient to meet the food necessity of the tribal families all-round the year. Some initiatives e.g. grain-golas, jhum cultivation, wadi project, Joint Forest Management(JFM), enhancing Livelihood and Health through Traditional Knowledge Management, Associating Individual Rural Volunteers (IRVs) in SHG Bank Linkage Programme have been taken in various tribal areas of the country.Keywords: tribals, unemployment, health, food
Procedia PDF Downloads 2893537 Best Responses for the Dynamic Model of Hotel Room Rate
Authors: Xuan Tran
Abstract:
The purpose of this paper is to present a comprehensive dynamic model for pricing strategies in the hotel competition to find a win-win situation for the competitive set. By utilizing the Cobb-Douglas utility model, the study establishes room rates by analyzing the price elasticity of demand across a competitive set of four hotels, with a focus on occupancy rates. To further enhance the analysis, game theory is applied to identify the best response for each competitive party, which illustrates the optimal pricing strategy for each hotel in the competitive landscape. This approach offers valuable insights into how hotels can strategically adjust their room rates in response to market conditions and competitor actions. The primary contributions of this research include as follows: (1) advantages for both individual hotels and the broader competitive hotel market, (2) benefits for hotel management overseeing multiple brands, and (3) positive impacts on the local community.Keywords: dynamic model, game theory, best response, Cobb-Douglas
Procedia PDF Downloads 22