Search results for: geo information system
23336 Analysis of Hotel Websites to Attract Tourists in Iran, Case Study: Yazd County
Authors: Leila Habibi, Hadi Hakimi, Hadi Sadeghian, Maryam Jafari Mehrabadi
Abstract:
Nowadays, the importance of information technology and web-based information in tourism is very obvious. Increasing of sales and promotion of brands, the rise of information about tourist attractions and tourist areas, entrepreneurship and making money, introducing of hotels and side information to tourists via web are some examples of website effects on tourism. The hotels using web-based information can succeed in attracting tourists and improve the quality of services to the tourists. So, the study of hotel websites has become one of the most important issues in tourism. Therefore, this research aims to analyze the status of hotel websites in Yazd County as one of the most tourist visited counties in Iran. The quality of hotel website in a county can be very vital for tourism. Hence, this research compares the status of hotel websites in Yazd County with standard indexes and items that extracted from literature and theoretical framework. Content analysis is used for analyzing hotel websites with indexes and items in methodology. In the other words, all of the items are compared with the content of hotel-websites in Yazd one by one. Finally, every hotel archived final score which represents the position of the hotel among the others. All of scores and status of hotels are displayed in their own figures. The result of this research shows that many hotels do not offer standard web-based services and information. So, the existing situation is not very suitable for the attraction of web users or improving the tourism. The result of this research may help the managers and authorities of tourism to offer and improve the web-based services and information.Keywords: e-tourism, hotel websites, tourism, web-tourism
Procedia PDF Downloads 29223335 Multi-Channel Information Fusion in C-OTDR Monitoring Systems: Various Approaches to Classify of Targeted Events
Authors: Andrey V. Timofeev
Abstract:
The paper presents new results concerning selection of optimal information fusion formula for ensembles of C-OTDR channels. The goal of information fusion is to create an integral classificator designed for effective classification of seismoacoustic target events. The LPBoost (LP-β and LP-B variants), the Multiple Kernel Learning, and Weighing of Inversely as Lipschitz Constants (WILC) approaches were compared. The WILC is a brand new approach to optimal fusion of Lipschitz Classifiers Ensembles. Results of practical usage are presented.Keywords: Lipschitz Classifier, classifiers ensembles, LPBoost, C-OTDR systems
Procedia PDF Downloads 46123334 Simscape Library for Large-Signal Physical Network Modeling of Inertial Microelectromechanical Devices
Authors: S. Srinivasan, E. Cretu
Abstract:
The information flow (e.g. block-diagram or signal flow graph) paradigm for the design and simulation of Microelectromechanical (MEMS)-based systems allows to model MEMS devices using causal transfer functions easily, and interface them with electronic subsystems for fast system-level explorations of design alternatives and optimization. Nevertheless, the physical bi-directional coupling between different energy domains is not easily captured in causal signal flow modeling. Moreover, models of fundamental components acting as building blocks (e.g. gap-varying MEMS capacitor structures) depend not only on the component, but also on the specific excitation mode (e.g. voltage or charge-actuation). In contrast, the energy flow modeling paradigm in terms of generalized across-through variables offers an acausal perspective, separating clearly the physical model from the boundary conditions. This promotes reusability and the use of primitive physical models for assembling MEMS devices from primitive structures, based on the interconnection topology in generalized circuits. The physical modeling capabilities of Simscape have been used in the present work in order to develop a MEMS library containing parameterized fundamental building blocks (area and gap-varying MEMS capacitors, nonlinear springs, displacement stoppers, etc.) for the design, simulation and optimization of MEMS inertial sensors. The models capture both the nonlinear electromechanical interactions and geometrical nonlinearities and can be used for both small and large signal analyses, including the numerical computation of pull-in voltages (stability loss). Simscape behavioral modeling language was used for the implementation of reduced-order macro models, that present the advantage of a seamless interface with Simulink blocks, for creating hybrid information/energy flow system models. Test bench simulations of the library models compare favorably with both analytical results and with more in-depth finite element simulations performed in ANSYS. Separate MEMS-electronic integration tests were done on closed-loop MEMS accelerometers, where Simscape was used for modeling the MEMS device and Simulink for the electronic subsystem.Keywords: across-through variables, electromechanical coupling, energy flow, information flow, Matlab/Simulink, MEMS, nonlinear, pull-in instability, reduced order macro models, Simscape
Procedia PDF Downloads 13723333 Credit Risk Evaluation of Dairy Farming Using Fuzzy Logic
Authors: R. H. Fattepur, Sameer R. Fattepur, D. K. Sreekantha
Abstract:
Dairy Farming is one of the key industries in India. India is the leading producer and also the consumer of milk, milk-based products in the world. In this paper, we have attempted to the replace the human expert system and to develop an artificial expert system prototype to increase the speed and accuracy of decision making dairy farming credit risk evaluation. Fuzzy logic is used for dealing with uncertainty, vague and acquired knowledge, fuzzy rule base method is used for representing this knowledge for building an effective expert system.Keywords: expert system, fuzzy logic, knowledge base, dairy farming, credit risk
Procedia PDF Downloads 36223332 Stability of a Self-Excited Machine Due to the Mechanical Coupling
Authors: M. Soltan Rezaee, M. R. Ghazavi, A. Najafi, W.-H. Liao
Abstract:
Generally, different rods in shaft systems can be misaligned based on the mechanical system usages. These rods can be linked together via U-coupling easily. The system is self-stimulated and may cause instabilities due to the inherent behavior of the coupling. In this study, each rod includes an elastic shaft with an angular stiffness and structural damping. Moreover, the mass of shafts is considered via attached solid disks. The impact of the system architecture and shaft mass on the instability of such mechanism are studied. Stability charts are plotted via a method based on Floquet theory. Eventually, the unstable points have been found and analyzed in detail. The results show that stabilizing the driveline is feasible by changing the system characteristics which include shaft mass and architecture.Keywords: coupling, mechanical systems, oscillations, rotating shafts
Procedia PDF Downloads 18123331 Improving Part-Time Instructors’ Academic Outcomes with Gamification
Authors: Jared R. Chapman
Abstract:
This study introduces a type of motivational information system called an educational engagement information system (EEIS). An EEIS draws on principles of behavioral economics, motivation theory, and learning cognition theory to design information systems that help students want to improve their performance. This study compares academic outcomes for course sections taught by part- and full-time instructors both with and without an EEIS. Without an EEIS, students in the part-time instructor's course sections demonstrated significantly higher failure rates (a 143.8% increase) and dropout rates (a 110.4% increase) with significantly fewer students scoring a B- or higher (39.8% decrease) when compared to students in the course sections taught by a full-time instructor. It is concerning that students in the part-time instructor’s course without an EEIS had significantly lower academic outcomes, suggesting less understanding of the course content. This could impact retention and continuation in a major. With an EEIS, when comparing part- and full-time instructors, there was no significant difference in failure and dropout rates or in the number of students scoring a B- or higher in the course. In fact, with an EEIS, the failure and dropout rates were statistically identical for part- and full-time instructor courses. When using an EEIS (compared with not using an EEIS), the part-time instructor showed a 62.1% decrease in failures, a 61.4% decrease in dropouts, and a 41.7% increase in the number of students scoring a B- or higher in the course. We are unaware of other interventions that yield such large improvements in academic performance. This suggests that using an EEIS such as Delphinium may compensate for part-time instructors’ limitations of expertise, time, or rewards that can have a negative impact on students’ academic outcomes. The EEIS had only a minimal impact on failure rates (7.7% decrease) and dropout rates (18.8% decrease) for the full-time instructor. This suggests there is a ceiling effect for the improvements that an EEIS can make in student performance. This may be because experienced instructors are already doing the kinds of things that an EEIS does, such as motivating students, tracking grades, and providing feedback about progress. Additionally, full-time instructors have more time to dedicate to students outside of class than part-time instructors and more rewards for doing so. Using adjunct and other types of part-time instructors will likely remain a prevalent practice in higher education management courses. Given that using part-time instructors can have a negative impact on student graduation and persistence in a field of study, it is important to identify ways we can augment part-time instructors’ performance. We demonstrated that when part-time instructors use an EEIS, it can result in significantly lower students’ failure and dropout rates and an increase in the rate of students earning a B- or above; and bring their students’ performance to parity with the performance of students taught by a full-time instructor.Keywords: gamification, engagement, motivation, academic outcomes
Procedia PDF Downloads 6923330 Performance Analysis of a Shell and Tube Heat Exchanger in the Organic Rankine Cycle Power Plant
Authors: Yogi Sirodz Gaos, Irvan Wiradinata
Abstract:
In the 500 kW Organic Rankine Cycle (ORC) power plant in Indonesia, an AFT (according to the Tubular Exchanger Manufacturers Association – TEMA) type shell and tube heat exchanger device is used as a pre-heating system for the ORC’s hot water circulation system. The pre-heating source is a waste heat recovery of the brine water, which is tapped from a geothermal power plant. The brine water itself has 5 MWₜₕ capacities, with average temperature of 170ᵒC, and 7 barg working pressure. The aim of this research is to examine the performance of the heat exchanger in the ORC system in a 500 kW ORC power plant. The data for this research were collected during the commissioning on the middle of December 2016. During the commissioning, the inlet temperature and working pressure of the brine water to the shell and tube type heat exchanger was 149ᵒC, and 4.4 barg respectively. Furthermore, the ΔT for the hot water circulation of the ORC system to the heat exchanger was 27ᵒC, with the inlet temperature of 140ᵒC. The pressure in the hot circulation system was dropped slightly from 7.4ᵒC to 7.1ᵒC. The flow rate of the hot water circulation was 80.5 m³/h. The presentation and discussion of a case study on the performance of the heat exchanger on the 500 kW ORC system is presented as follows: (1) the heat exchange duty is 2,572 kW; (2) log mean temperature of the heat exchanger is 13.2ᵒC; (3) the actual overall thermal conductivity is 1,020.6 W/m².K (4) the required overall thermal conductivity is 316.76 W/m².K; and (5) the over design for this heat exchange performance is 222.2%. An analysis of the heat exchanger detailed engineering design (DED) is briefly discussed. To sum up, this research concludes that the shell and tube heat exchangers technology demonstrated a good performance as pre-heating system for the ORC’s hot water circulation system. Further research need to be conducted to examine the performance of heat exchanger system on the ORC’s hot water circulation system.Keywords: shell and tube, heat exchanger, organic Rankine cycle, performance, commissioning
Procedia PDF Downloads 14323329 Climate Physical Processes Mathematical Modeling for Dome-Like Traditional Residential Building
Authors: Artem Sedov, Aigerim Uyzbayeva, Valeriya Tyo
Abstract:
The presented article is showing results of dynamic modeling with Mathlab software of optimal automatic room climate control system for two experimental houses in Astana, one of which has circle plan and the other one has square plan. These results are showing that building geometry doesn't influence on climate system PID-controls configuring. This confirms theoretical implication that optimal automatic climate control system parameters configuring should depend on building's internal space volume, envelope heat transfer, number of people inside, supply ventilation air flow and outdoor temperature.Keywords: climate control system, climate physics, dome-like building, mathematical modeling
Procedia PDF Downloads 36623328 Automated Video Surveillance System for Detection of Suspicious Activities during Academic Offline Examination
Authors: G. Sandhya Devi, G. Suvarna Kumar, S. Chandini
Abstract:
This research work aims to develop a system that will analyze and identify students who indulge in malpractices/suspicious activities during the course of an academic offline examination. Automated Video Surveillance provides an optimal solution which helps in monitoring the students and identifying the malpractice event immediately. This work is organized into three modules. The first module deals with performing an impersonation check using a PCA-based face recognition method which is done by cross checking his profile with the database. The presence or absence of the student is even determined in this module by implementing an image registration technique wherein a grid is formed by considering all the images registered using the frontal camera at the determined positions. Second, detecting such facial malpractices in which a student gets involved in conversation with another, trying to obtain unauthorized information etc., based on the threshold range evaluated by considering his/her mouth state whether open or closed. The third module deals with identification of unauthorized material or gadgets used in the examination hall by training the positive samples of the object through various stages. Here, a top view camera feed is analyzed to detect the suspicious activities. The system automatically alerts the administration when any suspicious activities are identified, thereby reducing the error rate caused due to manual monitoring. This work is an improvement over our previous work published in identifying suspicious activities done by examinees in an offline examination.Keywords: impersonation, image registration, incrimination, object detection, threshold evaluation
Procedia PDF Downloads 23023327 Artificial Intelligence and Distributed System Computing: Application and Practice in Real Life
Authors: Lai Junzhe, Wang Lihao, Burra Venkata Durga Kumar
Abstract:
In recent years, due to today's global technological advances, big data and artificial intelligence technologies have been widely used in various industries and fields, playing an important role in reducing costs and increasing efficiency. Among them, artificial intelligence has derived another branch in its own continuous progress and the continuous development of computer personnel, namely distributed artificial intelligence computing systems. Distributed AI is a method for solving complex learning, decision-making, and planning problems, characterized by the ability to take advantage of large-scale computation and the spatial distribution of resources, and accordingly, it can handle problems with large data sets. Nowadays, distributed AI is widely used in military, medical, and human daily life and brings great convenience and efficient operation to life. In this paper, we will discuss three areas of distributed AI computing systems in vision processing, blockchain, and smart home to introduce the performance of distributed systems and the role of AI in distributed systems.Keywords: distributed system, artificial intelligence, blockchain, IoT, visual information processing, smart home
Procedia PDF Downloads 11323326 The Application of Bayesian Heuristic for Scheduling in Real-Time Private Clouds
Authors: Sahar Sohrabi
Abstract:
The emergence of Cloud data centers has revolutionized the IT industry. Private Clouds in specific provide Cloud services for certain group of customers/businesses. In a real-time private Cloud each task that is given to the system has a deadline that desirably should not be violated. Scheduling tasks in a real-time private CLoud determine the way available resources in the system are shared among incoming tasks. The aim of the scheduling policy is to optimize the system outcome which for a real-time private Cloud can include: energy consumption, deadline violation, execution time and the number of host switches. Different scheduling policies can be used for scheduling. Each lead to a sub-optimal outcome in a certain settings of the system. A Bayesian Scheduling strategy is proposed for scheduling to further improve the system outcome. The Bayesian strategy showed to outperform all selected policies. It also has the flexibility in dealing with complex pattern of incoming task and has the ability to adapt.Keywords: cloud computing, scheduling, real-time private cloud, bayesian
Procedia PDF Downloads 35923325 Effect of MPPT and THD in Grid-Connected Photovoltaic System
Authors: Sajjad Yahaghifar
Abstract:
From the end of the last century, the importance and use of renewable energy sources have gained prominence, due not only by the fossil fuels dependence reduction, but mainly by environmental reasons related to climate change and the effects to the humanity. Consequently, solar energy has been arousing interest in several countries for being a technology considered clean, with reduced environmental impact. The output power of photo voltaic (PV) arrays is always changing with weather conditions,i.e., solar irradiation and atmospheric temperature. Therefore, maximum power point tracking (MPPT) control to extract maximum power from the PV arrays at real time becomes indispensable in PV generation system. This paper Study MPPT and total harmonic distortion (THD) in the city of Tabriz, Iran with the grid-connected PV system as distributed generation.Keywords: MPPT, THD, grid-connected, PV system
Procedia PDF Downloads 39823324 General Purpose Graphic Processing Units Based Real Time Video Tracking System
Authors: Mallikarjuna Rao Gundavarapu, Ch. Mallikarjuna Rao, K. Anuradha Bai
Abstract:
Real Time Video Tracking is a challenging task for computing professionals. The performance of video tracking techniques is greatly affected by background detection and elimination process. Local regions of the image frame contain vital information of background and foreground. However, pixel-level processing of local regions consumes a good amount of computational time and memory space by traditional approaches. In our approach we have explored the concurrent computational ability of General Purpose Graphic Processing Units (GPGPU) to address this problem. The Gaussian Mixture Model (GMM) with adaptive weighted kernels is used for detecting the background. The weights of the kernel are influenced by local regions and are updated by inter-frame variations of these corresponding regions. The proposed system has been tested with GPU devices such as GeForce GTX 280, GeForce GTX 280 and Quadro K2000. The results are encouraging with maximum speed up 10X compared to sequential approach.Keywords: connected components, embrace threads, local weighted kernel, structuring elements
Procedia PDF Downloads 44023323 Challenge Response-Based Authentication for a Mobile Voting System
Authors: Tohari Ahmad, Hudan Studiawan, Iwang Aryadinata, Royyana M. Ijtihadie, Waskitho Wibisono
Abstract:
A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system.Keywords: authentication, data protection, mobile voting, security
Procedia PDF Downloads 41923322 Challenges in Anti-Counterfeiting of Cyber-Physical Systems
Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier
Abstract:
This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection
Procedia PDF Downloads 49823321 Suitability of Indonesia's Tax Administration with Abu Yusuf Thought
Authors: Dina Safrina
Abstract:
This paper aims to discuss the suitability of tax administration in Indonesia based on Islamic Shari'a by looking at Abu Yusuf's idea of taxation. This research is a qualitative research and using data collection method by library research, that is by studying, deepening and citing theories or concepts from a number of literature. The purpose of this paper is to find out whether taxation in Indonesia is consistent with the thinking of Islamic economists, namely Abu Yusuf's idea which became known by economists as the canons of taxation. The ability to pay, lax time giving for taxpayers and the centralization of decision-making in the tax administration are some of the principles it emphasizes. In taxation he recommends the use of the Muqassamah (Proportional Tax) system rather than the Mixed (Fixed Tax) system. In this case, the determination of tax rates in Indonesia there are using fixed tax system, proportional tax, progressive tax and regressive tax. Abu Yusuf opposed the existence of Qabalah institution (the guarantor of tax payments to the state) at the time and suggested a tax administration centered and paid directly to the state. This is in accordance with those already applied in Indonesia where tax collection is done centrally. The tax system in Indonesia using self assessment system, which is the authority and responsibility given by the government to the taxpayer to calculate, pay and report the tax itself becomes the gap for taxpayers to commit fraud. Prerequisites that must be met for the success of this system is with the tax consciousness, tax honesty, tax mindedness, and tax discipline.Keywords: Abu Yusuf, Indonesia, tax, tax administration
Procedia PDF Downloads 41823320 Optimizing Inanda Dam Using Water Resources Models
Authors: O. I. Nkwonta, B. Dzwairo, J. Adeyemo, A. Jaiyola, N. Sawyerr, F. Otieno
Abstract:
The effective management of water resources is of great importance to ensure the supply of water resources to support changing water requirements over a selected planning horizon and in a sustainable and cost-effective way. Essentially, the purpose of the water resources planning process is to balance the available water resources in a system with the water requirements and losses to which the system is subjected. In such situations, Water resources yield and planning model can be used to solve those difficulties. It has an advantage over other models by managing model runs, developing a representative system network, modelling incremental sub-catchments, creating a variety of standard system features, special modelling features, and run result output options.Keywords: complex, water resources, planning, cost effective and management
Procedia PDF Downloads 57323319 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic
Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato
Abstract:
Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security
Procedia PDF Downloads 36923318 Improved Acoustic Source Sensing and Localization Based On Robot Locomotion
Authors: V. Ramu Reddy, Parijat Deshpande, Ranjan Dasgupta
Abstract:
This paper presents different methodology for an acoustic source sensing and localization in an unknown environment. The developed methodology includes an acoustic based sensing and localization system, a converging target localization based on the recursive direction of arrival (DOA) error minimization, and a regressive obstacle avoidance function. Our method is able to augment the existing proven localization techniques and improve results incrementally by utilizing robot locomotion and is capable of converging to a position estimate with greater accuracy using fewer measurements. The results also evinced the DOA error minimization at each iteration, improvement in time for reaching the destination and the efficiency of this target localization method as gradually converging to the real target position. Initially, the system is tested using Kinect mounted on turntable with DOA markings which serve as a ground truth and then our approach is validated using a FireBird VI (FBVI) mobile robot on which Kinect is used to obtain bearing information.Keywords: acoustic source localization, acoustic sensing, recursive direction of arrival, robot locomotion
Procedia PDF Downloads 49223317 Analysis of Hotel Websites to Attract Tourists in Iran, Case Study: Yazd City
Authors: Leila Habibi, Hadi Hakimi, Maryam Jafari Mehrabadi, Hadi Sadeghian
Abstract:
Nowadays, the importance of information technology and web- based information in tourism is very obvious. Increasing of sales and promotion of brands, the rise of information about tourist attractions and tourist areas, Entrepreneurship and making money, introducing of hotels and side information to tourists via web are some Examples of website effects on tourism. The hotels using web-based information can succeed in attracting tourists and improve the quality of services to the tourists so; the study of hotel websites has become one of the most important issues in tourism. Therefore, this research aims to analyze the status of hotel websites in Yazd City as one of the most tourist visited counties in Iran. The quality of hotel website in a city such as this city can be very vital for tourism. Hence, this research compares the status of hotel websites in Yazd City with standard indexes and items that extracted from Literature and theoretical framework. It is used content analysis for analyzing of hotel websites with indexes and items in methodology. In the other words, all of the items is compared with the content of hotel-websites in Yazd one by one. Finally, every hotel archived final score and it represents the position of the hotel among the others. All of scores and status of hotels is displayed in their own Figures. The result of this research shows that many hotels do not offer standard web -based services and information. So, the existing situation is not very suitable for the attraction of web users or improving the tourism. The result of this research may help the managers and authorities of tourism to offer and improve the web- based services and information.Keywords: e-tourism, hotel websites, tourism, web-tourism
Procedia PDF Downloads 29323316 Sliding Mode Controlled Quadratic Boost Converter
Authors: Viji Vijayakumar, R. Divya, A. Vivek
Abstract:
This paper deals with a quadratic boost converter which belongs to cascade boost family, controlled by sliding mode controller. In the cascade boost family, quadratic boost converter is the best trade-off when circuit complexity and modulator saturation is considered. Sliding mode control being a nonlinear control results in a robust and stable system when applied to switching converters which are inherently variable structured systems. The stability of this system is analyzed through Lyapunov’s approach. Analysis is done for load regulation, line regulation and step response of the system. Also these results are compared with that of PID controller based system.Keywords: DC-DC converter, quadratic boost converter, sliding mode control, PID control
Procedia PDF Downloads 99323315 Integrating ICT- Based Applications for Sustainable Tourism Development in Algeria
Authors: Boutkhil Guemide, Chellali Benachaiba
Abstract:
Information and Communication Technology (ICT) has an inevitable impact on different industries and their performances. The tourism industry as the largest and fastest growing industry in the world cannot be excluded from this technology and its huge impacts. ICT provides information about tourist attractions in the different destinations before travelling and may improve tourists’ satisfaction. Although Algeria has great tourism potentials, it still needs to be performed well in promoting its attractions to international tourists via ICT tools yet. This research explores the impact of ICT on foreign tourists’ satisfaction of the tourism industry and uses Algerian tourist agencies as a case study, and proposes a model for the impact of ICT on sustainable tourism. Finally, it is concluded that e-ticketing, e-reservation, online payment, multilingual and updated information websites are essential needs for planning strategies in the field of e-tourism. Also, it is recommended that the tourism authorities should develop e-tourism infrastructures in order to keep up with the competitiveness of this field to enable the country to benefit from the global benefits of the tourism industry.Keywords: Information and Communications Technology (ICT), tourism, tourists’ satisfaction, sustainable tourism
Procedia PDF Downloads 53623314 Neuroplasticity: A Fresh Begining for Life
Authors: Leila Maleki, Ezatollah Ahmadi
Abstract:
Neuroplasticity or the flexibility of the neural system is the ability of the brain to adapt to the lack or deterioration of sense and the capability of the neural system to modify itself through changing shape and function. Not only have studies revealed that neuroplasticity does not end in childhood, but also they have proven that it continues till the end of life and is not limited to the neural system and covers the cognitive system as well. In the field of cognition, neuroplasticity is defined as the ability to change old thoughts according to new conditions and the individuals' differences in using various styles of cognitive regulation inducing several social, emotional and cognitive outcomes. On the other hand, complexities of daily life necessitates cognitive neuroplasticity in order to adapt to different circumstances. The present paper attempts to discuss and define major theories and principles of neuroplasticity and elaborate on nature or nurture.Keywords: neuroplasticity, cognitive plasticity, plasticity theories, plasticity mechanisms
Procedia PDF Downloads 49623313 Neuroplasticity: A Fresh Beginning for Life
Authors: Leila Maleki, Ezatollah Ahmadi
Abstract:
Neuroplasticity or the flexibility of the neural system is the ability of the brain to adapt to the lack or deterioration of sense and the capability of the neural system to modify itself through changing shape and function. Not only have studies revealed that neuroplasticity does not end in childhood, but also they have proven that it continues till the end of life and is not limited to the neural system and covers the cognitive system as well. In the field of cognition, neuroplasticity is defined as the ability to change old thoughts according to new conditions and the individuals' differences in using various styles of cognitive regulation inducing several social, emotional and cognitive outcomes. On the other hand, complexities of daily life necessitates cognitive neuroplasticity in order to adapt to different circumstances. The. present paper attempts to discuss and define major theories and principles of neuroplasticity and elaborate on nature or nurture.Keywords: neuroplasticity, cognitive plasticity, plasticity theories, plasticity mechanisms
Procedia PDF Downloads 45223312 Questioning the Relationship Between Young People and Fake News Through Their Use of Social Media
Authors: Marion Billard
Abstract:
This paper will focus on the question of the real relationship between young people and fake news. Fake news is one of today’s main issues in the world of information and communication. Social media and its democratization helped to spread false information. According to traditional beliefs, young people are more inclined to believe what they read through social media. But, the individuals concerned, think that they are more inclined to make a distinction between real and fake news. This phenomenon is due to their use of the internet and social media from an early age. During the 2016 and 2017 French and American presidential campaigns, the term fake news was in the mouth of the entire world and became a real issue in the field of information. While young people were informing themselves with newspapers or television until the beginning of the ’90s, Gen Z (meaning people born between 1997 and 2010), has always been immersed in this world of fast communication. They know how to use social media from a young age and the internet has no secret for them. Today, despite the sporadic use of traditional media, young people tend to turn to their smartphones and social networks such as Instagram or Twitter to stay abreast of the latest news. The growth of social media information led to an “ambient journalism”, giving access to an endless quantity of information. Waking up in the morning, young people will see little posts with short texts supplying the essential of the news, without, for the most, many details. As a result, impressionable people are not able to do a distinction between real media, and “junk news” or Fake News. This massive use of social media is probably explained by the inability of the youngsters to find connections between the communication of the traditional media and what they are living. The question arises if this over-confidence of the young people in their ability to distinguish between accurate and fake news would not make it more difficult for them to examine critically the information. Their relationship with media and fake news is more complex than popular opinion. Today’s young people are not the master in the quest for information, nor inherently the most impressionable public on social media.Keywords: fake news, youngsters, social media, information, generation
Procedia PDF Downloads 16123311 Magnetic Properties of Nickel Oxide Nanoparticles in Superparamagnetic State
Authors: Navneet Kaur, S. D. Tiwari
Abstract:
Superparamagnetism is an interesting phenomenon and observed in small particles of magnetic materials. It arises due to a reduction in particle size. In the superparamagnetic state, as the thermal energy overcomes magnetic anisotropy energy, the magnetic moment vector of particles flip their magnetization direction between states of minimum energy. Superparamagnetic nanoparticles have been attracting the researchers due to many applications such as information storage, magnetic resonance imaging, biomedical applications, and sensors. For information storage, thermal fluctuations lead to loss of data. So that nanoparticles should have high blocking temperature. And to achieve this, nanoparticles should have a higher magnetic moment and magnetic anisotropy constant. In this work, the magnetic anisotropy constant of the antiferromagnetic nanoparticles system is determined. Magnetic studies on nanoparticles of NiO (nickel oxide) are reported well. This antiferromagnetic nanoparticle system has high blocking temperature and magnetic anisotropy constant of order 105 J/m3. The magnetic study of NiO nanoparticles in the superparamagnetic region is presented. NiO particles of two different sizes, i.e., 6 and 8 nm, are synthesized using the chemical route. These particles are characterized by an x-ray diffractometer, transmission electron microscope, and superconducting quantum interference device magnetometry. The magnetization vs. applied magnetic field and temperature data for both samples confirm their superparamagnetic nature. The blocking temperature for 6 and 8 nm particles is found to be 200 and 172 K, respectively. Magnetization vs. applied magnetic field data of NiO is fitted to an appropriate magnetic expression using a non-linear least square fit method. The role of particle size distribution and magnetic anisotropy is taken in to account in magnetization expression. The source code is written in Python programming language. This fitting provides us the magnetic anisotropy constant for NiO and other magnetic fit parameters. The particle size distribution estimated matches well with the transmission electron micrograph. The value of magnetic anisotropy constants for 6 and 8 nm particles is found to be 1.42 X 105 and 1.20 X 105 J/m3, respectively. The obtained magnetic fit parameters are verified using the Neel model. It is concluded that the effect of magnetic anisotropy should not be ignored while studying the magnetization process of nanoparticles.Keywords: anisotropy, superparamagnetic, nanoparticle, magnetization
Procedia PDF Downloads 13423310 Fuzzy Rules Based Improved BEENISH Protocol for Wireless Sensor Networks
Authors: Rishabh Sharma
Abstract:
The main design parameter of WSN (wireless sensor network) is the energy consumption. To compensate this parameter, hierarchical clustering is a technique that assists in extending duration of the networks life by efficiently consuming the energy. This paper focuses on dealing with the WSNs and the FIS (fuzzy interface system) which are deployed to enhance the BEENISH protocol. The node energy, mobility, pause time and density are considered for the selection of CH (cluster head). The simulation outcomes exhibited that the projected system outperforms the traditional system with regard to the energy utilization and number of packets transmitted to sink.Keywords: wireless sensor network, sink, sensor node, routing protocol, fuzzy rule, fuzzy inference system
Procedia PDF Downloads 10623309 Performance of the Cmip5 Models in Simulation of the Present and Future Precipitation over the Lake Victoria Basin
Authors: M. A. Wanzala, L. A. Ogallo, F. J. Opijah, J. N. Mutemi
Abstract:
The usefulness and limitations in climate information are due to uncertainty inherent in the climate system. For any given region to have sustainable development it is important to apply climate information into its socio-economic strategic plans. The overall objective of the study was to assess the performance of the Coupled Model Inter-comparison Project (CMIP5) over the Lake Victoria Basin. The datasets used included the observed point station data, gridded rainfall data from Climate Research Unit (CRU) and hindcast data from eight CMIP5. The methodology included trend analysis, spatial analysis, correlation analysis, Principal Component Analysis (PCA) regression analysis, and categorical statistical skill score. Analysis of the trends in the observed rainfall records indicated an increase in rainfall variability both in space and time for all the seasons. The spatial patterns of the individual models output from the models of MPI, MIROC, EC-EARTH and CNRM were closest to the observed rainfall patterns.Keywords: categorical statistics, coupled model inter-comparison project, principal component analysis, statistical downscaling
Procedia PDF Downloads 36823308 Identification and Characterization of Groundwater Recharge Sites in Kuwait
Authors: Dalal Sadeqi
Abstract:
Groundwater is an important component of Kuwait’s water resources. Although limited in quantity and often poor in quality, the significance of this natural source of water cannot be overemphasized. Recharge of groundwater in Kuwait occurs during periodical storm events, especially in open desert areas. Runoff water dissolves accumulated surficial meteoric salts and subsequently leaches them into the groundwater following a period of evaporative enrichment at or near the soil surface. Geochemical processes governing groundwater recharge vary in time and space. Stable isotope (18O and 2H) and geochemical signatures are commonly used to gain some insight into recharge processes and groundwater salinization mechanisms, particularly in arid and semiarid regions. This article addresses the mechanism used in identifying and characterizing the main water shed areas in Kuwait using stable isotopes in an attempt to determine favorable groundwater recharge sites in the country. Stable isotopes of both rainwater and groundwater were targeted in different hydrogeological settings. Additionally, data and information obtained from subsurface logs in the study area were collected and analyzed to develop a better understanding of the lateral and vertical extent of the groundwater aquifers. Geographic Information System (GIS) and RockWorks 3D modelling software were used to map out the hydrogeomorphology of the study area and the subsurface lithology of the investigated aquifers. The collected data and information, including major ion chemistry, isotopes, subsurface characteristics, and hydrogeomorphology, were integrated in a GIS platform to identify and map out suitable natural recharge areas as part of an integrated water resources management scheme that addresses the challenges of the sustainability of the groundwater reserves in the country.Keywords: scarcity, integrated, recharge, isotope
Procedia PDF Downloads 11523307 Efficient Management through Predicting of Use E-Management within Higher Educational Institutions
Authors: S. Maddi Muhammed, Paul Davis, John Geraghty, Mabruk Derbesh
Abstract:
This study discusses the probability of using electronic management in higher education institutions in Libya. This could be as sampled by creating an electronic gate at the faculties of Engineering and Computing "Information Technology" at Zaytuna University or any other university in Libya. As we all know, the competitive advantage amongst universities is based on their ability to use information technology efficiently and broadly. Universities today value information technology as part of the quality control and assurance and a ranking criterion for a range of services including e-learning and e-Registration. This could be done by developing email systems, electronic or virtual libraries, electronic cards, and other services provided to all students, faculty or staff. This paper discusses a range of important topics that explain how to apply the gate "E" with the faculties at Zaytuna University, Bani Walid colleges in Libya.Keywords: e-management, educational institutions (EI), Libya, Zaytuna, information technology
Procedia PDF Downloads 456