Search results for: user preference
693 A Framework for Enhancing Mobile Development Software for Rangsit University, Thailand
Authors: Thossaporn Thossansin
Abstract:
This paper presents the developing of a mobile application for students who are studying in a Faculty of Information Technology, Rangsit University (RSU), Thailand. RSU enhanced the enrollment process by leveraging its information systems, which allows students to download RSU APP. This helps students to access RSU’s information that is important for them. The reason to have a mobile application is to give support students’ ability to access the system at anytime, anywhere and anywhere. The objective of this paper was to develop an application on iOS platform for students who are studying in Faculty of Information Technology, Rangsit University, Thailand. Studies and learns student’s perception for a new mobile app. This paper has targeted a group of students who is studied in year 1-4 in the faculty of information technology, Rangsit University. This new application has been developed by the department of information technology, Rangsit University and it has generally called as RSU APP. This is a new mobile application development for RSU, which has useful features and functionalities in giving support to students. The core module has consisted of RSU’s announcement, calendar, event, activities, and ebook. The mobile app has developed on iOS platform that is related to RSU’s policies in giving free Tablets for the first year students. The user satisfaction is analyzed from interview data that has 81 interviews and Google application such as google form is taken into account for 122 interviews. Generally, users were satisfied to-use application with the most satisfaction at the level of 4.67. SD is 0.52, which found the most satisfaction in that users can learn and use quickly. The most satisfying is 4.82 and SD is 0.71 and the lowest satisfaction rating in its modern form, apps lists. The satisfaction is 4.01, and SD is 0.45.Keywords: mobile application, development of mobile application, framework of mobile development, software development for mobile devices
Procedia PDF Downloads 326692 The Application of AI in Developing Assistive Technologies for Non-Verbal Individuals with Autism
Authors: Ferah Tesfaye Admasu
Abstract:
Autism Spectrum Disorder (ASD) often presents significant communication challenges, particularly for non-verbal individuals who struggle to express their needs and emotions effectively. Assistive technologies (AT) have emerged as vital tools in enhancing communication abilities for this population. Recent advancements in artificial intelligence (AI) hold the potential to revolutionize the design and functionality of these technologies. This study explores the application of AI in developing intelligent, adaptive, and user-centered assistive technologies for non-verbal individuals with autism. Through a review of current AI-driven tools, including speech-generating devices, predictive text systems, and emotion-recognition software, this research investigates how AI can bridge communication gaps, improve engagement, and support independence. Machine learning algorithms, natural language processing (NLP), and facial recognition technologies are examined as core components in creating more personalized and responsive communication aids. The study also discusses the challenges and ethical considerations involved in deploying AI-based AT, such as data privacy and the risk of over-reliance on technology. Findings suggest that integrating AI into assistive technologies can significantly enhance the quality of life for non-verbal individuals with autism, providing them with greater opportunities for social interaction and participation in daily activities. However, continued research and development are needed to ensure these technologies are accessible, affordable, and culturally sensitive.Keywords: artificial intelligence, autism spectrum disorder, non-verbal communication, assistive technology, machine learning
Procedia PDF Downloads 24691 The Impact of Bitcoin and Cryptocurrency on the Development of Community
Authors: Felib Ayman Shawky Salem
Abstract:
Nowadays crypto currency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The crypto currency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin crypto currency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.Keywords: cryptocurrency, bitcoin, payment methods, blockchain, appropriation, online retailers, TOE framework, disappropriation, non-appropriationBitCoin, financial protection, crypto currency, money laundering cryptocurrency, digital wallet, digital forensics
Procedia PDF Downloads 44690 Post Covid-19 Landscape of Global Pharmaceutical Industry
Authors: Abu Zafor Sadek
Abstract:
Pharmaceuticals were one of the least impacted business sectors during the corona pandemic as they are the center point of Covid-19 fight. Emergency use authorization, unproven indication of some commonly used drugs, self-medication, research and production capacity of an individual country, capacity of producing vaccine by many countries, Active Pharmaceutical Ingredients (APIs) related uncertainty, information gap among manufacturer, practitioners and user, export restriction, duration of lock-down, lack of harmony in transportation, disruption in the regulatory approval process, sudden increased demand of hospital items and protective equipment, panic buying, difficulties in in-person product promotion, e-prescription, geo-politics and associated issues added a new dimension to this industry. Although the industry maintains a reasonable growth throughout Covid-19 days; however, it has been characterized by both long- and short-term effects. Short-term effects have already been visible to so many countries, especially those who are import-dependent and have limited research capacity. On the other hand, it will take a few more time to see the long-term effects. Nevertheless, supply chain disruption, changes in strategic planning, new communication model, squeezing of job opportunity, rapid digitalization are the major short-term effects, whereas long-term effects include a shift towards self-sufficiency, growth pattern changes of certain products, special attention towards clinical studies, automation in operations, the increased arena of ethical issues etc. Therefore, this qualitative and exploratory study identifies the post-covid-19 landscape of the global pharmaceutical industry.Keywords: covid-19, pharmaceutical, businees, landscape
Procedia PDF Downloads 93689 Improving the Biocontrol of the Argentine Stem Weevil; Using the Parasitic Wasp Microctonus hyperodae
Authors: John G. Skelly, Peter K. Dearden, Thomas W. R. Harrop, Sarah N. Inwood, Joseph Guhlin
Abstract:
The Argentine stem weevil (ASW; L. bonariensis) is an economically important pasture pest in New Zealand, which causes about $200 million of damage per annum. Microctonus hyperodae (Mh), a parasite of the ASW in its natural range in South America, was introduced into New Zealand to curb the pasture damage caused by the ASW. Mh is an endoparasitic wasp that lays its eggs in the ASW halting its reproduction. Mh was initially successful at preventing ASW proliferation and reducing pasture damage. The effectiveness of Mh has since declined due to decreased parasitism rates and has resulted in increased pasture damage. Although the mechanism through which ASW has developed resistance to Mh has not been discovered, it has been proposed to be due to the different reproductive modes used by Mh and the ASW in New Zealand. The ASW reproduces sexually, whereas Mh reproduces asexually, which has been hypothesised to have allowed the ASW to ‘out evolve’ Mh. Other species within the Microctonus genus reproduce both sexually and asexually. Strains of Microctonus aethiopoides (Ma), a species closely related to Mh, reproduce either by sexual or asexual reproduction. Comparing the genomes of sexual and asexual Microctonus may allow for the identification of the mechanism of asexual reproduction and other characteristics that may improve Mh as a biocontrol agent. The genomes of Mh and three strains of Ma, two of which reproduce sexually and one reproduces asexually, have been sequenced and annotated. The French (MaFR) and Moroccan (MaMO) reproduce sexually, whereas the Irish strain (MaIR) reproduces asexually. Like Mh, The Ma strains are also used as biocontrol agents, but for different weevil species. The genomes of Mh and MaIR were subsequently upgraded using Hi-C, resulting in a set of high quality, highly contiguous genomes. A subset of the genes involved in mitosis and meiosis, which have been identified though the use of Hidden Markov Models generated from genes involved in these processes in other Hymenoptera, have been catalogued in Mh and the strains of Ma. Meiosis and mitosis genes were broadly conserved in both sexual and asexual Microctonus species. This implies that either the asexual species have retained a subset of the molecular components required for sexual reproduction or that the molecular mechanisms of mitosis and meiosis are different or differently regulated in Microctonus to other insect species in which these mechanisms are more broadly characterised. Bioinformatic analysis of the chemoreceptor compliment in Microctonus has revealed some variation in the number of olfactory receptors, which may be related to host preference. Phylogenetic analysis of olfactory receptors highlights variation, which may be able to explain different host range preferences in the Microctonus. Hi-C clustering implies that Mh has 12 chromosomes, and MaIR has 8. Hence there may be variation in gene regulation between species. Genome alignment of Mh and MaIR implies that there may be large scale genome structural variation. Greater insight into the genetics of these agriculturally important group of parasitic wasps may be beneficial in restoring or maintaining their biocontrol efficacy.Keywords: argentine stem weevil, asexual, genomics, Microctonus hyperodae
Procedia PDF Downloads 158688 Design and Performance Analysis of Resource Management Algorithms in Response to Emergency and Disaster Situations
Authors: Volkan Uygun, H. Birkan Yilmaz, Tuna Tugcu
Abstract:
This study focuses on the development and use of algorithms that address the issue of resource management in response to emergency and disaster situations. The presented system, named Disaster Management Platform (DMP), takes the data from the data sources of service providers and distributes the incoming requests accordingly both to manage load balancing and minimize service time, which results in improved user satisfaction. Three different resource management algorithms, which give different levels of importance to load balancing and service time, are proposed for the study. The first one is the Minimum Distance algorithm, which assigns the request to the closest resource. The second one is the Minimum Load algorithm, which assigns the request to the resource with the minimum load. Finally, the last one is the Hybrid algorithm, which combines the previous two approaches. The performance of the proposed algorithms is evaluated with respect to waiting time, success ratio, and maximum load ratio. The metrics are monitored from simulations, to find the optimal scheme for different loads. Two different simulations are performed in the study, one is time-based and the other is lambda-based. The results indicate that, the Minimum Load algorithm is generally the best in all metrics whereas the Minimum Distance algorithm is the worst in all cases and in all metrics. The leading position in performance is switched between the Minimum Distance and the Hybrid algorithms, as lambda values change.Keywords: emergency and disaster response, resource management algorithm, disaster situations, disaster management platform
Procedia PDF Downloads 338687 Security Design of Root of Trust Based on RISC-V
Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li
Abstract:
Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.Keywords: root of trust, secure boot, memory protection, hardware security
Procedia PDF Downloads 220686 Constraints to Partnership Based Financing in Islamic Banks: A Systematic Review of Literature
Authors: Muhammad Nouman, Salim Gul, Karim Ullah
Abstract:
Partnership has been understood as the essence of Islamic banking. However, in practice, the non-partnership paradigm dominates the operations of Islamic banks. Islamic banks adopt partnership contracts for the scheme of deposits, especially for term deposit accounts. However, they do not adopt partnership contracts (i.e., Musharakah and Mudarabah) as the main financing scheme. In practice, non-partnership contracts including Murabahah and Ijara are widely used for financing. Many authors have provided different explanations for the less utilization of the partnership contracts as a scheme of financing. However, the typology of constraints remains missing. The extant literature remains scattered, with diverse studies focused on different dimensions of the issue. Therefore, there is no unified understanding of the constraints in the application of the partnership contracts. This paper aims to highlight the major factors hindering the application of partnership contracts, and produce a coherent view by synthesizing different explanations provided in several studies conducted around the globe. The present study employs insights form the extant literature using a systematic review and provides academia, practitioners, and policy makers with a holistic framework to name and make sense of what is making partnership contracts a less attractive option for Islamic banks. A total of 84 relevant publications including 11 books, 14 chapters of edited books, 48 journal articles, 8 conference papers and 3 IMF working papers were selected using a systematic procedure. Analysis of these selected publications followed three steps: i) In the first step of analysis the constraints explicitly appearing in the literature set of 84 articles were extracted, ii) In the second step 27 factors hindering the application of partnership contracts were identified from the constraints extracted in the first step with the overlapping items either eliminated or combined, iii) In the last step the factors identified in the second step were classified into three distinct categories. Our intention was to develop the typology of constraints by connecting the rather abstract concepts into the broader sets of constraints for better conceptualization and policy implications. Our framework highlights that there are mainly three facets of lower preference for partnership contracts of financing. First, there are several factors in the contemporary business settings, prevailing social setting, and the bank’s internal environment that underpin uncertainty in the success of partnership contracts of financing. Second, partnership contracts have lower demand i.e., entrepreneurs prefer to use non-partnership contracts for financing their ventures due to the inherent restraining characteristics of the partnership contracts. Finally, there are certain factors in the regulatory framework that restraint the extensive utilization of partnership contracts of financing by Islamic banks. The present study contributes to the Islamic banking literature in many ways. It provides clarification to the heavily criticized operations of Islamic banks, integrates the scattered literature, and provides a holistic framework for better conceptualization of the key constraints in the application of the partnership contracts and policy implications. Moreover, it demonstrates an application of systematic review in Islamic banking research.Keywords: Islamic banking, Islamic finance, Mudarabah, Musharakah, partnership, systematic review
Procedia PDF Downloads 276685 Contraceptive Uptake among Women in Low Socio-Economic Areas in Kenya: Quantitative Analysis of Secondary Data
Authors: J. Waita, S. Wamuhu, J. Makoyo, M. Rachel, T. Ngangari, W. Christine, M. Zipporah
Abstract:
Contraceptive use is one of the key global strategies to alleviate maternal mortality. Global efforts through advocating for contraceptive uptake and service provision has led improved contraceptive prevalence. In Kenya maternal mortality rate has remained a challenged despites efforts by government and non-governmental organizations. Objective: To describe the uptake of contraceptives among women in Tunza Clinics, Kenya. Design and Methods: Ps Kenya through health care marketing fund is implementing a family planning program among its 350 Tunza fractional franchise facilities. Through private partnership, private owned facilities in low socio-economic areas are recruited and trained on contraceptive technology update. The providers are supported through facilitative supervision through a mobile based application Health Network Quality Improvement System (HNQIS) and interpersonal communication through 150 community based volunteers. The data analyzed in this paper was collected between January to July 2017 to show the uptake of modern Contraceptives among women in the Tunza franchise, method mix, age and distribution among the age bracket. Further analysis compares two different service delivery strategies; outreach and walk ins. Supportive supervision HNQIS scores was analyzed. Results: During the time period, a total of 132121 family planning clients were attended in 350 facilities. The average age of clients was 29.6 years. The average number of clients attended in the facilities per month was 18874. 73.7 %( n=132121) of the clients attended in the Tunza facilities were aged above 25 years while 22.1% 20-24 years and 4.2% 15-19 years. On contraceptive method mix, intra uterine device insertions clients contributed to 7.5%, implant insertions 15.3%, pills 11.2%, injections 62.7% while condoms and emergency pills had 2.7% and 0.6% respectively. Analysis of service delivery strategy indicated more than 79% of the clients were walk ins while 21% were attended to during outreaches. Uptake of long term contraceptive methods during outreaches was 73% of the clients while short term modern methods were 27%. Health Network Quality Improvement system assessment scores indicated 51% of the facilities scored over 90%, 25% scoring 80-89% while 21% scored below 80%. Conclusion: Preference for short term methods by women is possibly associated to cost as they are cheaper and easy to administer. When the cost of intra uterine device Implants is meant affordable during outreaches, the uptake is observed to increase. Making intra uterine device and implants affordable to women is a key strategy in increasing contraceptive prevalence hence averting maternal mortality.Keywords: contraceptives, contraceptive uptake, low socio economic, supportive supervision
Procedia PDF Downloads 169684 Lab Support: A Computer Laboratory Class Management Support System
Authors: Eugenia P. Ramirez, Kevin Matthe Caramancion, Mia Eleazar
Abstract:
Getting the attention of students is a constant challenge to the instructors/lecturers. Although in the computer laboratories some networking and entertainment websites are blocked, yet, these websites have unlimited ways of attracting students to get into it. Thus, when an instructor gives a specific set of instructions, some students may not be able to follow sequentially the steps that are given. The instructor has to physically go to the specific remote terminal and show the student the details. Sometimes, during an examination in laboratory set-up, a proctor may prefer to give detailed and text-written instructions rather than verbal instructions. Even the mere calling of a specific student at any time will distract the whole class especially when activities are being performed. What is needed is : An application software that is able to lock the student's monitor and at the same time display the instructor’s screen; a software that is powerful enough to process in its side alone and manipulate a specific user’s terminal in terms of free configuration that is, without restrictions at the server level is a required functionality for a modern and optimal server structure; a software that is able to send text messages to students, per terminal or in group will be a solution. These features are found in LabSupport. This paper outlines the LabSupport application software framework to efficiently manage computer laboratory sessions and will include different modules: screen viewer, demonstration mode, monitor locking system, text messaging, and class management. This paper's ultimate aim is to provide a system that increases instructor productivity.Keywords: application software, broadcast messaging, class management, locking system
Procedia PDF Downloads 439683 PM Air Quality of Windsor Regional Scale Transport’s Impact and Climate Change
Authors: Moustafa Osman Mohammed
Abstract:
This paper is mapping air quality model to engineering the industrial system that ultimately utilized in extensive range of energy systems, distribution resources, and end-user technologies. The model is determining long-range transport patterns contribution as area source can either traced from 48 hrs backward trajectory model or remotely described from background measurements data in those days. The trajectory model will be run within stable conditions and quite constant parameters of the atmospheric pressure at the most time of the year. Air parcel trajectory is necessary for estimating the long-range transport of pollutants and other chemical species. It provides a better understanding of airflow patterns. Since a large amount of meteorological data and a great number of calculations are required to drive trajectory, it will be very useful to apply HYPSLIT model to locate areas and boundaries influence air quality at regional location of Windsor. 2–days backward trajectories model at high and low concentration measurements below and upward the benchmark which was areas influence air quality measurement levels. The benchmark level will be considered as 30 (μg/m3) as the moderate level for Ontario region. Thereby, air quality model is incorporating a midpoint concept between biotic and abiotic components to broaden the scope of quantification impact. The later outcomes’ theories of environmental obligation suggest either a recommendation or a decision of what is a legislative should be achieved in mitigation measures of air emission impact ultimately.Keywords: air quality, management systems, environmental impact assessment, industrial ecology, climate change
Procedia PDF Downloads 248682 The Beauty and the Cruel: The Price of Ethics
Authors: Camila Lee Park, Mauro Fracarolli Nunes
Abstract:
Understood as the preference for products and services that do not involve moral dilemmas, ethical consumption has been increasingly discussed by scholars, practitioners, and consumers. Among its diverse trends, the defense of animal rights and welfare seems to have gained particular momentum in past decades. Not surprisingly, companies, governments, ideologues, and virtually any institution or group interested in (re)shaping society invest in the building of narratives oriented to influence consumption behavior. The animal rights movement, for example, is devoted to the elimination of the use of animals in science, as well as of commercial animal agriculture and hunting activities. Although advances in ethical consumption may be observed in practice, it still seems more popular as rhetoric. Diverse scholars have addressed the disparities between self-professed ethical consumers and their actual purchase patterns, with differences being attributed to factors such as price sensitivity, lack of information, quality, cynicism, and limited availability. The gap is also linked to the 'consumer sovereignty myth', according to which consumers are only able to choose from a pre-determined range of choices made before products reach them. On the other hand, academics also debate ethical consumption behavior as more likely to occur when it assumes compliance with social norms. As sustainability becomes a permanent issue, customers may tend to adhere to ethical consumption, either because of an individual value or due to a social one. Regardless of these efforts, the actual value attributed to ethical businesses remains unclear. Likewise, the power of stakeholders’ initiatives to influence corporate strategies is dubious. In search to offer new perspectives on these matters, the present study concentrates on the following research questions: Do customers value products/companies that respect animal rights? If so, does such enhanced value convert into actions from the part of the companies? Broadly, we aim to understand if customers’ perception holds performative traits (i.e., are capable of either trigger or contribute to changes in organizational behaviour around the respect for animal rights). In addressing these issues, two preliminary behavioral vignette-based experiments were conducted, with the perspectives of 307 participants being assessed. Building on a case of the cosmetics industry, social, emotional, and functional values were hypothesized as directly impacting positive word-of-mouth, which, in turn, would carry direct effects on purchase intention. A first structural equation model was analyzed with the combined samples of studies I and II. Results suggest that emotional value strongly impacts both positive word-of-mouth and purchase intention. Data confirms initial expectations on customers valuing products and companies that comply with ethical postures concerning animals, especially if social-oriented practices are also present.Keywords: animal rights, business ethics, emotional value, ethical consumption
Procedia PDF Downloads 120681 Implementing Biogas Technology in Rural Areas of Limpopo: Analysis of Gawula, Mopani District in South Africa
Authors: Thilivhali E. Rasimphi, David Tinarwo
Abstract:
Access to energy is crucial in poverty alleviation, economic growth, education, and agricultural improvement. The best renewable energy source is one which is locally available, affordable, and can easily be used and managed by local communities. The usage of renewable energy technology has the potential to alleviate many of the current problems facing rural areas. To address energy poverty, biogas technology has become an important part of resolving such. This study, therefore, examines the performance of digesters in Gawula village; it also identifies the contributing factors to the adoption and use of the technology. Data was collected using an open-ended questionnaire from biogas users. To evaluate the performance of the digesters, a data envelopment analysis (DEA) non-parametric technique was used, and to identify key factors affecting adoption, a logit model was applied. The reviewed critical barriers to biogas development in the area seem to be a poor institutional framework, poor infrastructure, a lack of technical support, user training on maintenance and operation, and as such, the implemented plants have failed to make the desired impact. Thus most digesters were abandoned. To create awareness amongst rural communities, government involvement is key, and there is a need for national programs. Biogas technology does what few other renewable energy technologies do, which is to integrate waste management and energy. This creates a substantial opportunity for biogas generation and penetration. That is, a promising pathway towards achieving sustainable development through biogas technology.Keywords: domestic biogas technology, economic, sustainable, social, rural development
Procedia PDF Downloads 140680 Identification of Outliers in Flood Frequency Analysis: Comparison of Original and Multiple Grubbs-Beck Test
Authors: Ayesha S. Rahman, Khaled Haddad, Ataur Rahman
Abstract:
At-site flood frequency analysis is used to estimate flood quantiles when at-site record length is reasonably long. In Australia, FLIKE software has been introduced for at-site flood frequency analysis. The advantage of FLIKE is that, for a given application, the user can compare a number of most commonly adopted probability distributions and parameter estimation methods relatively quickly using a windows interface. The new version of FLIKE has been incorporated with the multiple Grubbs and Beck test which can identify multiple numbers of potentially influential low flows. This paper presents a case study considering six catchments in eastern Australia which compares two outlier identification tests (original Grubbs and Beck test and multiple Grubbs and Beck test) and two commonly applied probability distributions (Generalized Extreme Value (GEV) and Log Pearson type 3 (LP3)) using FLIKE software. It has been found that the multiple Grubbs and Beck test when used with LP3 distribution provides more accurate flood quantile estimates than when LP3 distribution is used with the original Grubbs and Beck test. Between these two methods, the differences in flood quantile estimates have been found to be up to 61% for the six study catchments. It has also been found that GEV distribution (with L moments) and LP3 distribution with the multiple Grubbs and Beck test provide quite similar results in most of the cases; however, a difference up to 38% has been noted for flood quantiles for annual exceedance probability (AEP) of 1 in 100 for one catchment. These findings need to be confirmed with a greater number of stations across other Australian states.Keywords: floods, FLIKE, probability distributions, flood frequency, outlier
Procedia PDF Downloads 452679 Multi-Level Framework for Effective Use of Stock Ordering System: Case Study of Small Enterprises in Kgautswane
Authors: Lethamaga Tladi, Ray Kekwaletswe
Abstract:
This study sought to conceptualise a multi-level framework for the effective use of stock ordering system in small enterprises in a rural area context. The interpretive research methodology has been used to enable the researcher to analyse, in-depth, and the subjective meanings of small enterprises’ employees in using the stock ordering system. The empirical data was collected from 13 small enterprises’ employees as participants through semi-structured interviews and observations. Interpretive Phenomenological Analysis (IPA) approach was used to analyse the small enterprises’ employee’s own account of lived experiences in relations to stock ordering system use in terms of their relatedness to, and cognitive engagement with. A case study of Kgautswane, a rural area in Limpopo Province, South Africa, served as a social context where the phenomenon manifested. Technology-Organisation-Environment Theory (TOE), Technology-to-Performance Chain Model (TPC), and Representation Theory (RT) underpinned this study. In this multi-level study, the findings revealed that; At the organisational level, the effective use of stock ordering system was found to be associated with the organisational performance gains such as efficiency, productivity, quality, competitiveness, and market share. Equally so, at the individual level, the effective use of stock ordering system minimised the end-user’s efforts and time to accomplish their tasks, which yields improved individual performance. The Multi-level framework for effective use of stock ordering system was presented.Keywords: effective use, multi-dimensions of use, multi-level of use, multi-level research, small enterprises, stock ordering system
Procedia PDF Downloads 169678 Experiencing Daylight in Architectural Spaces: A Case Study of Public Buildings in the Context of Karachi, Pakistan
Authors: Safia Asif, Saadia Bano
Abstract:
In a world with rapidly depleting resources, using artificial lighting during daytime is an act of human ignorance. Imitated light is the major source of energy consumption in public buildings. Despite, the fact that substantial working hours of these buildings usually persist in natural daylight time; there is a trend of isolated, un-fenestrated and a-contextual interiors majorly dependent on active energy sources. On the contrary, if direct and un-controlled sunlight is allowed inside the building, it will create visual and thermal discomfort. Controlled daylighting with appropriate design mechanisms is one of the important aspects of achieving thermal and visual comfort. The natural sunlight can be utilized intelligently with the help of architectural thermal controlling mechanisms to achieve a healthy and productive environment. This paper is an attempt to investigate and analyze the importance of daylighting with reference to energy efficiency and thermal comfort. For this purpose, three public buildings including two educational institutions and one general post office are selected, as case-studies in the context of Karachi, Pakistan. Various parameters of visual and thermal comfort are analyzed which includes orientation, ceiling heights, overall building profile along with daylight controlling mechanisms in terms of penetration, distribution, protection, and control. In the later part of the research, a questionnaire survey is also conducted to evaluate the user experience in terms of adequate daylighting and thermal comfort.Keywords: daylight, public buildings, sustainable architecture, visual and thermal comfort
Procedia PDF Downloads 211677 Design and Landscape Architecture in the Vernacular Housing of Algiers
Authors: Leila Chebaiki-Adli, Naima Chabbi-Chemrouk
Abstract:
In the Algiers context, the historical city (the old medina) was in the middle age surrounded by several residencies and gardens. They were built in the aim to spend hot days of the year. Among these later, the residences of AbdelTif and the gardens of the dey (which exist always), benefit from important criteria which increase interior comfort. Their know-how is today in trend and can give us several considerations to the architectural design and to the landscape architecture. Their particularity is seen in the built-garden interactions and the design solutions. These later let the user live with vegetation, sky and water through maximum of places in the constructions. On the basis on an aesthetic-tectonic approach, which make in evidence the architectural criteria of the two quoted cases studies (the AbdelTif residence and the gardens of the dey), we will explain in the proposed paper, some important characteristics and design solutions, which contribute strongly to the concretisation and the materialisation of a landscape architecture, and which can be used in all the Mediterranean area. The proposed aesthetic-tectonic approach is based on the fusion between interior and exterior, in the aim to distinguish syntactic criteria. The syntactic criteria correspond to: The composition and the articulation between interior and exterior spaces, the employed materials in the quoted spaces, the manifestation processes. The major finding of this study is the identification of paradigmatic processes related to the architectural design. These later reveal more figurative (direct) than expressive (no direct) way of design and creativeness. While the figurative way benefits from a high level of manifestation, the expressive one benefits from more composed and articulated materials.Keywords: aesthetic/tectonic approach, Algiers context, design, landscape architecture
Procedia PDF Downloads 406676 Developing a Framework to Aid Sustainable Assessment in Indian Buildings
Authors: P. Amarnath, Albert Thomas
Abstract:
Buildings qualify to be the major consumer of energy and resources thereby urging the designers, architects and policy makers to place a great deal of effort in achieving and implementing sustainable building strategies in construction. Green building rating systems help a great deal in this by measuring the effectiveness of these strategies along with the escalation of building performance in social, environmental and economic perspective, and construct new sustainable buildings. However, for a country like India, enormous population and its rapid rate of growth impose an increasing burden on the country's limited and continuously degrading natural resource base, which also includes the land available for construction. In general, the number of sustainable rated buildings in India is very minimal primarily due to the complexity and obstinate nature of the assessment systems/regulations that restrict the stakeholders and designers in proper implementation and utilization of these rating systems. This paper aims to introduce a data driven and user-friendly framework which cross compares the present prominent green building rating systems such as LEED, BREEAM, and GRIHA and subsequently help the users to rate their proposed building design as per the regulations of these assessment frameworks. This framework is validated using the input data collected from green buildings constructed globally. The proposed system has prospects to encourage the users to test the efficiency of various sustainable construction practices and thereby promote more sustainable buildings in the country.Keywords: BREEAM, GRIHA, green building rating systems, LEED, sustainable buildings
Procedia PDF Downloads 140675 A Study on How to Develop the Usage Metering Functions of BIM (Building Information Modeling) Software under Cloud Computing Environment
Authors: Kim Byung-Kon, Kim Young-Jin
Abstract:
As project opportunities for the Architecture, Engineering and Construction (AEC) industry have grown more complex and larger, the utilization of BIM (Building Information Modeling) technologies for 3D design and simulation practices has been increasing significantly; the typical applications of the BIM technologies include clash detection and design alternative based on 3D planning, which have been expanded over to the technology of construction management in the AEC industry for virtual design and construction. As for now, commercial BIM software has been operated under a single-user environment, which is why initial costs for its introduction are very high. Cloud computing, one of the most promising next-generation Internet technologies, enables simple Internet devices to use services and resources provided with BIM software. Recently in Korea, studies to link between BIM and cloud computing technologies have been directed toward saving costs to build BIM-related infrastructure, and providing various BIM services for small- and medium-sized enterprises (SMEs). This study addressed how to develop the usage metering functions of BIM software under cloud computing architecture in order to archive and use BIM data and create an optimal revenue structure so that the BIM services may grow spontaneously, considering a demand for cloud resources. To this end, the author surveyed relevant cases, and then analyzed needs and requirements from AEC industry. Based on the results & findings of the foregoing survey & analysis, the author proposed herein how to optimally develop the usage metering functions of cloud BIM software.Keywords: construction IT, BIM (Building Information Modeling), cloud computing, BIM-based cloud computing, 3D design, cloud BIM
Procedia PDF Downloads 507674 Simulation of the Collimator Plug Design for Prompt-Gamma Activation Analysis in the IEA-R1 Nuclear Reactor
Authors: Carlos G. Santos, Frederico A. Genezini, A. P. Dos Santos, H. Yorivaz, P. T. D. Siqueira
Abstract:
The Prompt-Gamma Activation Analysis (PGAA) is a valuable technique for investigating the elemental composition of various samples. However, the installation of a PGAA system entails specific conditions such as filtering the neutron beam according to the target and providing adequate shielding for both users and detectors. These requirements incur substantial costs, exceeding $100,000, including manpower. Nevertheless, a cost-effective approach involves leveraging an existing neutron beam facility to create a hybrid system integrating PGAA and Neutron Tomography (NT). The IEA-R1 nuclear reactor at IPEN/USP possesses an NT facility with suitable conditions for adapting and implementing a PGAA device. The NT facility offers a thermal flux slightly colder and provides shielding for user protection. The key additional requirement involves designing detector shielding to mitigate high gamma ray background and safeguard the HPGe detector from neutron-induced damage. This study employs Monte Carlo simulations with the MCNP6 code to optimize the collimator plug for PGAA within the IEA-R1 NT facility. Three collimator models are proposed and simulated to assess their effectiveness in shielding gamma and neutron radiation from nucleon fission. The aim is to achieve a focused prompt-gamma signal while shielding ambient gamma radiation. The simulation results indicate that one of the proposed designs is particularly suitable for the PGAA-NT hybrid system.Keywords: MCNP6.1, neutron, prompt-gamma ray, prompt-gamma activation analysis
Procedia PDF Downloads 78673 Computational Fluid Dynamics (CFD) Simulation Approach for Developing New Powder Dispensing Device
Authors: Revanth Rallapalli
Abstract:
Manually dispensing solids and powders can be difficult as it requires gradually pour and check the amount on the scale to be dispensed. Current systems are manual and non-continuous in nature and are user-dependent and difficult to control powder dispensation. Recurrent dosing of powdered medicines in precise amounts quickly and accurately has been an all-time challenge. Various new powder dispensing mechanisms are being designed to overcome these challenges. A battery-operated screw conveyor mechanism is being innovated to overcome the above problems faced. These inventions are numerically evaluated at the concept development level by employing Computational Fluid Dynamics (CFD) of gas-solids multiphase flow systems. CFD has been very helpful in development of such devices saving time and money by reducing the number of prototypes and testing. Furthermore, this paper describes a simulation of powder dispensation from the trocar’s end by considering the powder as secondary flow in air, is simulated by using the technique called Dense Discrete Phase Model incorporated with Kinetic Theory of Granular Flow (DDPM-KTGF). By considering the volume fraction of powder as 50%, the transportation of powder from the inlet side to trocar’s end side is done by rotation of the screw conveyor. Thus, the performance is calculated for a 1-sec time frame in an unsteady computation manner. This methodology will help designers in developing design concepts to improve the dispensation and also at the effective area within a quick turnaround time frame.Keywords: DDPM-KTGF, gas-solids multiphase flow, screw conveyor, Unsteady
Procedia PDF Downloads 183672 Deaf Inmates in Canadian Prisons: Addressing Discrimination through Staff Training Videos with Deaf Actors
Authors: Tracey Bone
Abstract:
Deaf inmates, whose first or preferred language is a Signed Language, experience barriers to accessing the necessary two-way communication with correctional staff, and the educational and social programs that will enhance their eligibility for conditional release from the federal prison system in Canada. The development of visual content to enhance the knowledge and skill development of correctional staff is a contemporary strategy intended to significantly improve the correctional experience for deaf inmates. This presentation reports on the development of two distinct training videos created to enhance staff’s understanding of the needs of deaf inmates; one a two-part simulation of an interaction with a deaf inmate, the second an interview with a deaf academic. Part one of video one demonstrates the challenges and misunderstandings inherent in communicating across languages without a qualified sign language interpreter; the second part demonstrates the ease of communication when communication needs are met. Video two incorporates the experiences of a deaf academic to provide the cultural grounding necessary to educate staff in the unique experiences associated with being a visual language user. Lack of staff understanding or awareness of deaf culture and language must not be acceptable reasons for the inadequate treatment of deaf visual language users in federal prisons. This paper demonstrates a contemporary approach to meeting the human rights and needs of this unique and often ignored inmate subpopulation. The deaf community supports this visual approach to enhancing staff understanding of the unique needs of this population. A study of its effectiveness is currently underway.Keywords: accommodations, American Sign Language (ASL), deaf inmates, sensory deprivation
Procedia PDF Downloads 150671 Impact of Artificial Intelligence Technologies on Information-Seeking Behaviors and the Need for a New Information Seeking Model
Authors: Mohammed Nasser Al-Suqri
Abstract:
Former information-seeking models are proposed more than two decades ago. These already existed models were given prior to the evolution of digital information era and Artificial Intelligence (AI) technologies. Lack of current information seeking models within Library and Information Studies resulted in fewer advancements for teaching students about information-seeking behaviors, design of library tools and services. In order to better facilitate the aforementioned concerns, this study aims to propose state-of-the-art model while focusing on the information seeking behavior of library users in the Sultanate of Oman. This study aims for the development, designing and contextualizing the real-time user-centric information seeking model capable of enhancing information needs and information usage along with incorporating critical insights for the digital library practices. Another aim is to establish far-sighted and state-of-the-art frame of reference covering Artificial Intelligence (AI) while synthesizing digital resources and information for optimizing information-seeking behavior. The proposed study is empirically designed based on a mix-method process flow, technical surveys, in-depth interviews, focus groups evaluations and stakeholder investigations. The study data pool is consist of users and specialist LIS staff at 4 public libraries and 26 academic libraries in Oman. The designed research model is expected to facilitate LIS by assisting multi-dimensional insights with AI integration for redefining the information-seeking process, and developing a technology rich model.Keywords: artificial intelligence, information seeking, information behavior, information seeking models, libraries, Sultanate of Oman
Procedia PDF Downloads 116670 Predictive Analytics of Bike Sharing Rider Parameters
Authors: Bongs Lainjo
Abstract:
The evolution and escalation of bike-sharing programs (BSP) continue unabated. Since the sixties, many countries have introduced different models and strategies of BSP. These include variations ranging from dockless models to electronic real-time monitoring systems. Reasons for using this BSP include recreation, errands, work, etc. And there is all indication that complex, and more innovative rider-friendly systems are yet to be introduced. The objective of this paper is to analyze current variables established by different operators and streamline them identifying the most compelling ones using analytics. Given the contents of available databases, there is a lack of uniformity and common standard on what is required and what is not. Two factors appear to be common: user type (registered and unregistered, and duration of each trip). This article uses historical data provided by one operator based in the greater Washington, District of Columbia, USA area. Several variables including categorical and continuous data types were screened. Eight out of 18 were considered acceptable and significantly contribute to determining a useful and reliable predictive model. Bike-sharing systems have become popular in recent years all around the world. Although this trend has resulted in many studies on public cycling systems, there have been few previous studies on the factors influencing public bicycle travel behavior. A bike-sharing system is a computer-controlled system in which individuals can borrow bikes for a fee or free for a limited period. This study has identified unprecedented useful, and pragmatic parameters required in improving BSP ridership dynamics.Keywords: sharing program, historical data, parameters, ridership dynamics, trip duration
Procedia PDF Downloads 139669 Emergence of Information Centric Networking and Web Content Mining: A Future Efficient Internet Architecture
Authors: Sajjad Akbar, Rabia Bashir
Abstract:
With the growth of the number of users, the Internet usage has evolved. Due to its key design principle, there is an incredible expansion in its size. This tremendous growth of the Internet has brought new applications (mobile video and cloud computing) as well as new user’s requirements i.e. content distribution environment, mobility, ubiquity, security and trust etc. The users are more interested in contents rather than their communicating peer nodes. The current Internet architecture is a host-centric networking approach, which is not suitable for the specific type of applications. With the growing use of multiple interactive applications, the host centric approach is considered to be less efficient as it depends on the physical location, for this, Information Centric Networking (ICN) is considered as the potential future Internet architecture. It is an approach that introduces uniquely named data as a core Internet principle. It uses the receiver oriented approach rather than sender oriented. It introduces the naming base information system at the network layer. Although ICN is considered as future Internet architecture but there are lot of criticism on it which mainly concerns that how ICN will manage the most relevant content. For this Web Content Mining(WCM) approaches can help in appropriate data management of ICN. To address this issue, this paper contributes by (i) discussing multiple ICN approaches (ii) analyzing different Web Content Mining approaches (iii) creating a new Internet architecture by merging ICN and WCM to solve the data management issues of ICN. From ICN, Content-Centric Networking (CCN) is selected for the new architecture, whereas, Agent-based approach from Web Content Mining is selected to find most appropriate data.Keywords: agent based web content mining, content centric networking, information centric networking
Procedia PDF Downloads 475668 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects
Authors: Ma Yuzhe, Burra Venkata Durga Kumar
Abstract:
The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.Keywords: Linux, operating system, system management, security
Procedia PDF Downloads 111667 Enabling Oral Communication and Accelerating Recovery: The Creation of a Novel Low-Cost Electroencephalography-Based Brain-Computer Interface for the Differently Abled
Authors: Rishabh Ambavanekar
Abstract:
Expressive Aphasia (EA) is an oral disability, common among stroke victims, in which the Broca’s area of the brain is damaged, interfering with verbal communication abilities. EA currently has no technological solutions and its only current viable solutions are inefficient or only available to the affluent. This prompts the need for an affordable, innovative solution to facilitate recovery and assist in speech generation. This project proposes a novel concept: using a wearable low-cost electroencephalography (EEG) device-based brain-computer interface (BCI) to translate a user’s inner dialogue into words. A low-cost EEG device was developed and found to be 10 to 100 times less expensive than any current EEG device on the market. As part of the BCI, a machine learning (ML) model was developed and trained using the EEG data. Two stages of testing were conducted to analyze the effectiveness of the device: a proof-of-concept and a final solution test. The proof-of-concept test demonstrated an average accuracy of above 90% and the final solution test demonstrated an average accuracy of above 75%. These two successful tests were used as a basis to demonstrate the viability of BCI research in developing lower-cost verbal communication devices. Additionally, the device proved to not only enable users to verbally communicate but has the potential to also assist in accelerated recovery from the disorder.Keywords: neurotechnology, brain-computer interface, neuroscience, human-machine interface, BCI, HMI, aphasia, verbal disability, stroke, low-cost, machine learning, ML, image recognition, EEG, signal analysis
Procedia PDF Downloads 119666 Web-Based Cognitive Writing Instruction (WeCWI): A Theoretical-and-Pedagogical e-Framework for Language Development
Authors: Boon Yih Mah
Abstract:
Web-based Cognitive Writing Instruction (WeCWI)’s contribution towards language development can be divided into linguistic and non-linguistic perspectives. In linguistic perspective, WeCWI focuses on the literacy and language discoveries, while the cognitive and psychological discoveries are the hubs in non-linguistic perspective. In linguistic perspective, WeCWI draws attention to free reading and enterprises, which are supported by the language acquisition theories. Besides, the adoption of process genre approach as a hybrid guided writing approach fosters literacy development. Literacy and language developments are interconnected in the communication process; hence, WeCWI encourages meaningful discussion based on the interactionist theory that involves input, negotiation, output, and interactional feedback. Rooted in the e-learning interaction-based model, WeCWI promotes online discussion via synchronous and asynchronous communications, which allows interactions happened among the learners, instructor, and digital content. In non-linguistic perspective, WeCWI highlights on the contribution of reading, discussion, and writing towards cognitive development. Based on the inquiry models, learners’ critical thinking is fostered during information exploration process through interaction and questioning. Lastly, to lower writing anxiety, WeCWI develops the instructional tool with supportive features to facilitate the writing process. To bring a positive user experience to the learner, WeCWI aims to create the instructional tool with different interface designs based on two different types of perceptual learning style.Keywords: WeCWI, literacy discovery, language discovery, cognitive discovery, psychological discovery
Procedia PDF Downloads 562665 Reworking of the Anomalies in the Discounted Utility Model as a Combination of Cognitive Bias and Decrease in Impatience: Decision Making in Relation to Bounded Rationality and Emotional Factors in Intertemporal Choices
Authors: Roberta Martino, Viviana Ventre
Abstract:
Every day we face choices whose consequences are deferred in time. These types of choices are the intertemporal choices and play an important role in the social, economic, and financial world. The Discounted Utility Model is the mathematical model of reference to calculate the utility of intertemporal prospects. The discount rate is the main element of the model as it describes how the individual perceives the indeterminacy of subsequent periods. Empirical evidence has shown a discrepancy between the behavior expected from the predictions of the model and the effective choices made from the decision makers. In particular, the term temporal inconsistency indicates those choices that do not remain optimal with the passage of time. This phenomenon has been described with hyperbolic models of the discount rate which, unlike the linear or exponential nature assumed by the discounted utility model, is not constant over time. This paper explores the problem of inconsistency by tracing the decision-making process through the concept of impatience. The degree of impatience and the degree of decrease of impatience are two parameters that allow to quantify the weight of emotional factors and cognitive limitations during the evaluation and selection of alternatives. In fact, although the theory assumes perfectly rational decision makers, behavioral finance and cognitive psychology have made it possible to understand that distortions in the decision-making process and emotional influence have an inevitable impact on the decision-making process. The degree to which impatience is diminished is the focus of the first part of the study. By comparing consistent and inconsistent preferences over time, it was possible to verify that some anomalies in the discounted utility model are a result of the combination of cognitive bias and emotional factors. In particular: the delay effect and the interval effect are compared through the concept of misperception of time; starting from psychological considerations, a criterion is proposed to identify the causes of the magnitude effect that considers the differences in outcomes rather than their ratio; the sign effect is analyzed by integrating in the evaluation of prospects with negative outcomes the psychological aspects of loss aversion provided by Prospect Theory. An experiment implemented confirms three findings: the greatest variation in the degree of decrease in impatience corresponds to shorter intervals close to the present; the greatest variation in the degree of impatience occurs for outcomes of lower magnitude; the variation in the degree of impatience is greatest for negative outcomes. The experimental phase was implemented with the construction of the hyperbolic factor through the administration of questionnaires constructed for each anomaly. This work formalizes the underlying causes of the discrepancy between the discounted utility model and the empirical evidence of preference reversal.Keywords: decreasing impatience, discount utility model, hyperbolic discount, hyperbolic factor, impatience
Procedia PDF Downloads 103664 Using Deep Learning for the Detection of Faulty RJ45 Connectors on a Radio Base Station
Authors: Djamel Fawzi Hadj Sadok, Marrone Silvério Melo Dantas Pedro Henrique Dreyer, Gabriel Fonseca Reis de Souza, Daniel Bezerra, Ricardo Souza, Silvia Lins, Judith Kelner
Abstract:
A radio base station (RBS), part of the radio access network, is a particular type of equipment that supports the connection between a wide range of cellular user devices and an operator network access infrastructure. Nowadays, most of the RBS maintenance is carried out manually, resulting in a time consuming and costly task. A suitable candidate for RBS maintenance automation is repairing faulty links between devices caused by missing or unplugged connectors. A suitable candidate for RBS maintenance automation is repairing faulty links between devices caused by missing or unplugged connectors. This paper proposes and compares two deep learning solutions to identify attached RJ45 connectors on network ports. We named connector detection, the solution based on object detection, and connector classification, the one based on object classification. With the connector detection, we get an accuracy of 0:934, mean average precision 0:903. Connector classification, get a maximum accuracy of 0:981 and an AUC of 0:989. Although connector detection was outperformed in this study, this should not be viewed as an overall result as connector detection is more flexible for scenarios where there is no precise information about the environment and the possible devices. At the same time, the connector classification requires that information to be well-defined.Keywords: radio base station, maintenance, classification, detection, deep learning, automation
Procedia PDF Downloads 202