Search results for: information insurance
8851 Digital Preservation in Nigeria Universities Libraries: A Comparison between University of Nigeria Nsukka and Ahmadu Bello University Zaria
Authors: Suleiman Musa, Shuaibu Sidi Safiyanu
Abstract:
This study examined the digital preservation in Nigeria university libraries. A comparison between the university of Nigeria Nsukka (UNN) and Ahmadu Bello University Zaria (ABU, Zaria). The study utilized primary source of data obtained from two selected institution librarians. Finding revealed varying results in terms of skills acquired by librarians before and after digitization of the two institutions. The study reports that journals publication, text book, CD-ROMS, conference papers and proceedings, theses, dissertations and seminar papers are among the information resources available for digitization. The study further documents that copyright issue, power failure, and unavailability of needed materials are among the challenges facing the digitization of library of the institution. On the basis of the finding, the study concluded that digitization of library enhances efficiency in organization and retrieval of information services. The study therefore recommended that software should be upgraded with backup, training of the librarians on digital process, installation of antivirus and enhancement of technical collaboration between the library and MIS.Keywords: digitalization, preservation, libraries, comparison
Procedia PDF Downloads 3378850 [Keynote Speech]: Bridge Damage Detection Using Frequency Response Function
Authors: Ahmed Noor Al-Qayyim
Abstract:
During the past decades, the bridge structures are considered very important portions of transportation networks, due to the fast urban sprawling. With the failure of bridges that under operating conditions lead to focus on updating the default bridge inspection methodology. The structures health monitoring (SHM) using the vibration response appeared as a promising method to evaluate the condition of structures. The rapid development in the sensors technology and the condition assessment techniques based on the vibration-based damage detection made the SHM an efficient and economical ways to assess the bridges. SHM is set to assess state and expects probable failures of designated bridges. In this paper, a presentation for Frequency Response function method that uses the captured vibration test information of structures to evaluate the structure condition. Furthermore, the main steps of the assessment of bridge using the vibration information are presented. The Frequency Response function method is applied to the experimental data of a full-scale bridge.Keywords: bridge assessment, health monitoring, damage detection, frequency response function (FRF), signal processing, structure identification
Procedia PDF Downloads 3468849 Learning with Music: The Effects of Musical Tension on Long-Term Declarative Memory Formation
Authors: Nawras Kurzom, Avi Mendelsohn
Abstract:
The effects of background music on learning and memory are inconsistent, partly due to the intrinsic complexity and variety of music and partly to individual differences in music perception and preference. A prominent musical feature that is known to elicit strong emotional responses is musical tension. Musical tension can be brought about by building anticipation of rhythm, harmony, melody, and dynamics. Delaying the resolution of dominant-to-tonic chord progressions, as well as using dissonant harmonics, can elicit feelings of tension, which can, in turn, affect memory formation of concomitant information. The aim of the presented studies was to explore how forming declarative memory is influenced by musical tension, brought about within continuous music as well as in the form of isolated chords with varying degrees of dissonance/consonance. The effects of musical tension on long-term memory of declarative information were studied in two ways: 1) by evoking tension within continuous music pieces by delaying the release of harmonic progressions from dominant to tonic chords, and 2) by using isolated single complex chords with various degrees of dissonance/roughness. Musical tension was validated through subjective reports of tension, as well as physiological measurements of skin conductance response (SCR) and pupil dilation responses to the chords. In addition, music information retrieval (MIR) was used to quantify musical properties associated with tension and its release. Each experiment included an encoding phase, wherein individuals studied stimuli (words or images) with different musical conditions. Memory for the studied stimuli was tested 24 hours later via recognition tasks. In three separate experiments, we found positive relationships between tension perception and physiological measurements of SCR and pupil dilation. As for memory performance, we found that background music, in general, led to superior memory performance as compared to silence. We detected a trade-off effect between tension perception and memory, such that individuals who perceived musical tension as such displayed reduced memory performance for images encoded during musical tension, whereas tense music benefited memory for those who were less sensitive to the perception of musical tension. Musical tension exerts complex interactions with perception, emotional responses, and cognitive performance on individuals with and without musical training. Delineating the conditions and mechanisms that underlie the interactions between musical tension and memory can benefit our understanding of musical perception at large and the diverse effects that music has on ongoing processing of declarative information.Keywords: musical tension, declarative memory, learning and memory, musical perception
Procedia PDF Downloads 978848 Exploring the Relationships between Cyberbullying Perceptions and Facebook Attitudes of Turkish Students
Authors: Yavuz Erdoğan, Hidayet Çiftçi
Abstract:
Cyberbullying, a phenomenon among adolescents, is defined as actions that use information and communication technologies such as social media to support deliberate, repeated, and hostile behaviour by an individual or group. With the advancement in communication and information technology, cyberbullying has expanded its boundaries among students in schools. Thus, parents, psychologists, educators, and lawmakers must become aware of the potential risks of this phenomenon. In the light of these perspectives, this study aims to investigate the relationships between cyberbullying perception and Facebook attitudes of Turkish students. A survey method was used for the study and the data were collected by “Cyberbullying Perception Scale”, “Facebook Attitude Scale” and “Personal Information Form”. For this purpose, study has been conducted during 2014-2015 academic year, with a total of 748 students with 493 male (%65.9) and 255 female (%34.1) from randomly selected high schools. In the analysis of data Pearson correlation and multiple regression analysis, multivariate analysis of variance (MANOVA) and Scheffe post hoc test has been used. At the end of the study, the results displayed a negative correlation between Turkish students’ Facebook attitudes and cyberbullying perception (r=-.210; p<0.05). In order to identify the predictors of students’ cyberbullying perception, multiple regression analysis was used. As a result, significant relations were detected between cyberbullying perception and independent variables (F=5.102; p<0.05). Independent variables together explain 11.0% of the total variance in cyberbullying scores. The variables that significantly predict the students’ cyberbullying perception are Facebook attitudes (t=-5.875; p<0.05), and gender (t=3.035; p<0.05). In order to calculate the effects of independent variables on students’ Facebook attitudes and cyberbullying perception MANOVA was conducted. The results of the MANOVA indicate that the Facebook attitudes and cyberbullying perception were significantly differed according to students’ gender, age, educational attainment of the mother, educational attainment of the father, income of the family and daily usage of internet.Keywords: facebook, cyberbullying, attitude, internet usage
Procedia PDF Downloads 4028847 Protecting the Privacy and Trust of VIP Users on Social Network Sites
Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi
Abstract:
There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.Keywords: social network sites, online social network, privacy, trust, security and authentication
Procedia PDF Downloads 3808846 Time Travel Testing: A Mechanism for Improving Renewal Experience
Authors: Aritra Majumdar
Abstract:
While organizations strive to expand their new customer base, retaining existing relationships is a key aspect of improving overall profitability and also showcasing how successful an organization is in holding on to its customers. It is an experimentally proven fact that the lion’s share of profit always comes from existing customers. Hence seamless management of renewal journeys across different channels goes a long way in improving trust in the brand. From a quality assurance standpoint, time travel testing provides an approach to both business and technology teams to enhance the customer experience when they look to extend their partnership with the organization for a defined phase of time. This whitepaper will focus on key pillars of time travel testing: time travel planning, time travel data preparation, and enterprise automation. Along with that, it will call out some of the best practices and common accelerator implementation ideas which are generic across verticals like healthcare, insurance, etc. In this abstract document, a high-level snapshot of these pillars will be provided. Time Travel Planning: The first step of setting up a time travel testing roadmap is appropriate planning. Planning will include identifying the impacted systems that need to be time traveled backward or forward depending on the business requirement, aligning time travel with other releases, frequency of time travel testing, preparedness for handling renewal issues in production after time travel testing is done and most importantly planning for test automation testing during time travel testing. Time Travel Data Preparation: One of the most complex areas in time travel testing is test data coverage. Aligning test data to cover required customer segments and narrowing it down to multiple offer sequencing based on defined parameters are keys for successful time travel testing. Another aspect is the availability of sufficient data for similar combinations to support activities like defect retesting, regression testing, post-production testing (if required), etc. This section will talk about the necessary steps for suitable data coverage and sufficient data availability from a time travel testing perspective. Enterprise Automation: Time travel testing is never restricted to a single application. The workflow needs to be validated in the downstream applications to ensure consistency across the board. Along with that, the correctness of offers across different digital channels needs to be checked in order to ensure a smooth customer experience. This section will talk about the focus areas of enterprise automation and how automation testing can be leveraged to improve the overall quality without compromising on the project schedule. Along with the above-mentioned items, the white paper will elaborate on the best practices that need to be followed during time travel testing and some ideas pertaining to accelerator implementation. To sum it up, this paper will be written based on the real-time experience author had on time travel testing. While actual customer names and program-related details will not be disclosed, the paper will highlight the key learnings which will help other teams to implement time travel testing successfully.Keywords: time travel planning, time travel data preparation, enterprise automation, best practices, accelerator implementation ideas
Procedia PDF Downloads 1588845 Adversarial Disentanglement Using Latent Classifier for Pose-Independent Representation
Authors: Hamed Alqahtani, Manolya Kavakli-Thorne
Abstract:
The large pose discrepancy is one of the critical challenges in face recognition during video surveillance. Due to the entanglement of pose attributes with identity information, the conventional approaches for pose-independent representation lack in providing quality results in recognizing largely posed faces. In this paper, we propose a practical approach to disentangle the pose attribute from the identity information followed by synthesis of a face using a classifier network in latent space. The proposed approach employs a modified generative adversarial network framework consisting of an encoder-decoder structure embedded with a classifier in manifold space for carrying out factorization on the latent encoding. It can be further generalized to other face and non-face attributes for real-life video frames containing faces with significant attribute variations. Experimental results and comparison with state of the art in the field prove that the learned representation of the proposed approach synthesizes more compelling perceptual images through a combination of adversarial and classification losses.Keywords: disentanglement, face detection, generative adversarial networks, video surveillance
Procedia PDF Downloads 1288844 Establishment of an Information Platform Increases Spontaneous Reporting of Adverse Drug Reactions
Authors: Pei-Chun Chen, Chi-Ting Tseng, Lih-Chi Chen, Kai-Hsiang Yang
Abstract:
Introduction: The pharmacist is responsible for encouraging adverse drug reaction (ADR) reporting. In a local center in Northern Taiwan, promotion and rewarding of ADR reporting have continued for over six years but failed to bring significant changes. This study aims to find a solution to increase ADR reporting. Research question or hypothesis: We hypothesized that under-reporting is due to the inconvenience of the reporting system. Reports were made conventionally through printed sheets. We proposed that reports made per month will increase if they were computerized. Study design: An ADR reporting platform was established in April 2015, before which was defined as the first stage of this study (January-March, 2015) and after which the second stage. The third stage commenced in November, 2015, after adding a reporting module to physicians prescription system. ADRs could be reported simultaneously when documenting drug allergies. Methods: ADR report rates during the three stages of the study were compared. Effects of the information platform on reporting were also analyzed. Results: During the first stage, the number of ADR reports averaged 6 per month. In the second stage, the number of reports per month averaged 1.86. Introducing the information platform had little effect on the monthly number of ADR reports. The average number of reports each month during the third stage of the study was 11±3.06, with 70.43% made electronically. Reports per month increased significantly after installing the reporting module in November, 2015 (P<0.001, t-test). In the first two stages, 29.03% of ADR reports were made by physicians, as compared to 70.42% of cases in the third stage of the study. Increased physician reporting possibly account for these differences. Conclusion: Adding a reporting module to the prescription system significantly increased ADR reporting. Improved accessibility is likely the cause. The addition of similar modules to computer systems of other healthcare professions may be considered to encourage spontaneous ADR reporting.Keywords: adverse drug reactions, adverse drug reaction reporting systems, regional hospital, prescription system
Procedia PDF Downloads 3508843 Determination of Harmful Important Mite (ACARI) and Nematoda Species, Their Distribution and Their Control Possibility on Garlic and Onion Growing Areas in Turkey
Authors: Cihan Cilbircioğlu
Abstract:
Allium sativum L.(garlic) and Allium. cepa L. (onion) are the most common species of the Allium spp. and are produced at the very high rate all over the world. The yield loss caused by pests is the most important problem in the production of these crops. In the absence of control measures, yield loss would be around 35% on average. The yield loss sometimes depending on the pest species and population density can reach about 100%. Mites and nematodes are the most important pests of them. These pests that cause damage to A. sativum and A. cepa shows a wide range of taxonomic categories. The number of common pest mite and nematode species that cause damage to either A. sativum and A. cepa are over 20 species. In this study, detailed information on morphology, life cycle, management, and symptoms of the economically most important harmful important mite (acari) and nematode species of onion and garlic has been provided through careful survey of corresponding researches in Turkey and given information about new practices and approaches on their controls.Keywords: onion, garlic, pest, acari, nematoda control methods, Turkey
Procedia PDF Downloads 4858842 Prediction of Gully Erosion with Stochastic Modeling by using Geographic Information System and Remote Sensing Data in North of Iran
Authors: Reza Zakerinejad
Abstract:
Gully erosion is a serious problem that threading the sustainability of agricultural area and rangeland and water in a large part of Iran. This type of water erosion is the main source of sedimentation in many catchment areas in the north of Iran. Since in many national assessment approaches just qualitative models were applied the aim of this study is to predict the spatial distribution of gully erosion processes by means of detail terrain analysis and GIS -based logistic regression in the loess deposition in a case study in the Golestan Province. This study the DEM with 25 meter result ion from ASTER data has been used. The Landsat ETM data have been used to mapping of land use. The TreeNet model as a stochastic modeling was applied to prediction the susceptible area for gully erosion. In this model ROC we have set 20 % of data as learning and 20 % as learning data. Therefore, applying the GIS and satellite image analysis techniques has been used to derive the input information for these stochastic models. The result of this study showed a high accurate map of potential for gully erosion.Keywords: TreeNet model, terrain analysis, Golestan Province, Iran
Procedia PDF Downloads 5358841 Efficiency of Information Technology Based Learning and Teaching in Higher Educations
Authors: Mahalingam Palaniandi
Abstract:
Higher education plays vital role in the nation building process for a country and the rest of world. The higher education sector develops the change-agents for the various fields which will help the human-kind wheel to run further. Conventional and traditional class-room based learning and teaching was followed in many decades which is one-to-one and one-to-many. In a way, these are simplest form of learners to be assembled in a class room wherein the teacher used the blackboard to demonstrate the theory and laboratories used for practical. As the technology evolved tremendously for the last 40 years, the teaching and learning environment changed slowly, wherein, the learning community will be anywhere in the world and teacher deliver the content through internet based tools such as video conferencing, web based conferencing tools or E-learning platforms such as Blackboard or noodle. Present day, the mobile technologies plays an important tool to deliver the teaching content on-the-go. Both PC based and mobile based learning technology brought the learning and teaching community together in various aspects. However, as the learning technology also brought various hurdles for learning processes such as plagiarism and not using the reference books entirely as most of the students wants the information instantaneously using internet without actually going to the library to take the notes from the millions of the books which are not available online as e-books which result lack of fundamental knowledge of the concepts complex theories. However, technology is inseparable in human life, now-a-days and every part of it contains piece of information technology right from computers to home appliances. To make use of the IT based learning and teaching at most efficiency, we should have a proper framework and recommendations laid to the learning community in order to derive the maximum efficiency from the IT based teaching and leaning. This paper discusses various IT based tools available for the learning community, efficiency from its usage and recommendations for the suitable framework that needs to be implemented at higher education institutions which makes the learners stronger in both theory as well as real-time knowledge of their studies that is going to be used in their future for the better world.Keywords: higher education, e-learning, teaching learning, eLearning tools
Procedia PDF Downloads 4268840 Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation
Authors: Venkata Venugopal Rao Gudlur
Abstract:
The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities.Keywords: Internet of Things, Process Management, Forensic Investigation, M2M Framework
Procedia PDF Downloads 1008839 Voluntary Disclosure Of Sustainability Information In Malaysian Federal-level Statutory Bodies
Authors: Siti Zabedah Saidin, Aidi Ahmi, Azharudin Ali, Wan Norhayati Wan Ahmad
Abstract:
In today's increasingly complex and interconnected world, the concept of sustainability has transcended mere corporate social responsibility, evolving into a fundamental driver of organizational behaviour and disclosure. This content analysis study delves into the Malaysian federal-level statutory bodies’ annual report for the year 2021, aiming to elucidate the extent of sustainability disclosures within the non-financial sections of these reports. The escalating global emphasis on sustainability has prompted organizations to embrace transparency as a means to demonstrate their commitment to environmental, social, and governance (ESG) considerations. Voluntary sustainability disclosure has emerged as a crucial channel through which organizations communicate their efforts, initiatives, and impacts in these areas, thereby fostering trust and accountability with stakeholders. The study aims to identify and examine the types of sustainability information disclosed voluntarily by the federal-level statutory bodies, concentrating on the non-financial sections of the annual reports. To achieve this, the study adopts a simplified disclosure index, a pragmatic tool that quantifies the extent of sustainability reporting in a standardized manner. Using convenience sampling, the study selects a sample of annual reports from the federal-level statutory bodies in Malaysia, as provided on their respective websites. The content analysis is centred on the non-financial sections of these reports, allowing for an in-depth exploration of sustainability disclosures. The findings of the study present the extent to which Malaysian federal-level statutory bodies embrace sustainability reporting. Through thorough content analysis, the study uncovered diverse dimensions of sustainability information, encompassing environmental impact assessments, social engagement endeavours, and governance frameworks. This reveals a deliberate effort by these bodies to encapsulate their holistic organizational contributions and challenges, transcending traditional financial metrics. This research contributes to the existing literature by providing insights into the evolving landscape of sustainability disclosure practices among Malaysian federal-level statutory bodies. The findings underline the proactive nature of these bodies in voluntarily sharing sustainability-related information, reflecting their recognition of the interconnectedness between organizational success and societal well-being. Furthermore, the study underscores the potential influence of regulatory guidelines and societal expectations in shaping the extent and nature of voluntary sustainability disclosures. Organizations are not merely responding to regulatory mandates but are actively aligning with global sustainability goals and stakeholder expectations. As organizations continue to navigate the intricate web of stakeholder expectations and sustainability imperatives, this study enriches the discourse surrounding transparency and sustainability reporting. The analysis emphasizes the important role of non-financial disclosures in portraying a holistic organizational narrative. In an era where stakeholders demand accountability, and the interconnectedness of global challenges necessitates collaborative action, the voluntary disclosure of sustainability information stands as a testament to the commitment of Malaysian federal-level statutory bodies in shaping a more sustainable future.Keywords: voluntary disclosure, sustainability information, annual report, federal-level statutory body
Procedia PDF Downloads 618838 A Spatial Point Pattern Analysis to Recognize Fail Bit Patterns in Semiconductor Manufacturing
Authors: Youngji Yoo, Seung Hwan Park, Daewoong An, Sung-Shick Kim, Jun-Geol Baek
Abstract:
The yield management system is very important to produce high-quality semiconductor chips in the semiconductor manufacturing process. In order to improve quality of semiconductors, various tests are conducted in the post fabrication (FAB) process. During the test process, large amount of data are collected and the data includes a lot of information about defect. In general, the defect on the wafer is the main causes of yield loss. Therefore, analyzing the defect data is necessary to improve performance of yield prediction. The wafer bin map (WBM) is one of the data collected in the test process and includes defect information such as the fail bit patterns. The fail bit has characteristics of spatial point patterns. Therefore, this paper proposes the feature extraction method using the spatial point pattern analysis. Actual data obtained from the semiconductor process is used for experiments and the experimental result shows that the proposed method is more accurately recognize the fail bit patterns.Keywords: semiconductor, wafer bin map, feature extraction, spatial point patterns, contour map
Procedia PDF Downloads 3818837 The New Media and Their Economic and Socio-Political Imperatives for Africa: A Study of Nigeria
Authors: Chukwukelue Uzodinma Umenyilorah
Abstract:
The advent of the New Media as enabled by information and communication technology from the 19th through the 21st century has no doubt taken its toll on all fronts of human existence; especially in Africa. Apart from shortening the distance between all parts of the world, technology and the new media has also succeeded in making the world a global village. Hence, it is now easy to relay live audio and visual signals across the length and breadth of the world in real time. People now contract and execute businesses across countries, conferences are held and ideas are shared with a simple push of a button. Likewise, political leaders and diplomats are now just a click away from reaching those important decisions that take their country’s fortunes to the next level. On the flip side, ICT and the New Media have also contributed in no small measure in aiding global terrorism and general insecurity around the world. More interesting is the fact that as developing economies, African countries have massively embraced the information technology and this has helped them in keeping up with the trends in the polity of other model democracies around the world. This paper is therefore designed to determine the how much effect ICT and the New Media has exerted on the economic, social and political lives of African. Nigeria shall be used as a case in point for the purpose of this paper.Keywords: Africa, ICT, new media, Nigeria
Procedia PDF Downloads 2538836 Attraction and Identification of Early Scavenger Insects on Shaded and Sunny Liver Baits in a Saharian Region of South-Central Algeria
Authors: A. M. Taleb, A. G. Tail, A. F. Kara, B. B. Djedouani, C. T. Moussa
Abstract:
Forensic entomology is the use of insects to aid legal investigations. The main purpose of forensic entomology is to establish the postmortem interval (PMI). In order to estimate the PMI, a forensic entomologist compares the case data with certain reference information relevant to the particular location and time of year. This reference information, including the local distribution of species, are not available in Algeria. Therefore, experiments need to be conducted to provide references for entomological evidence. The objective of this study was to identify the necrophagous flies species which arrive first to carrion using liver baits in Ghardaia, South Algeria. The study was carried out during the spring season in the palmeral of Beni Isguen, Ghardaia which is well known by its hot arid climate. The experiment site (32°28’0’’ N, 3°42’0’’ E), is situated at an altitude of about 526 metres above mean sea level. On April the 4th, 2014, a number of three replicates of liver baited traps were placed in the shade and other three baits were exposed to the sun. Flying insects and larvae were captured and identified. After few minutes, flies invaded the traps which were exposed to the sun. In contrast, no flies were observed in the other traps. A total number of fourty five (45) adult specimens belonging to three taxa were identified: Calliphora vicina (Robineau-Desvoidy, 1830) (Diptera, Calliphoridae) (51.11 %), Lucilia sericata (Meigen, 1826) (Diptera, Calliphoridae) (33.33 %) and Sarcophaga africa (Wiedemann, 1824) (Diptera: Sarcophagidae) (15.55 %). Six hundred and three (603) maggots belonging to two taxa were identified: Calliphora vicina (76.28 %) and Lucilia sericata (23.71 %). The data obtained from this study provides baseline information regarding the carrion fauna of this area. It will also form a basis for similar studies in different geographical and climatological regions of Algeria.Keywords: forensic entomology, liver baits, necrophagous fly, Ghardaia, South Algeria
Procedia PDF Downloads 3638835 A Study on Urine Flow Characteristics in Ureter with Fluid-Structure Interaction
Authors: Myoung Je Song
Abstract:
Ureteral stent insertion is being used as one of the clinical interventional treatments due to stenosis and/or obstruction in the ureter. For the development of the ureteral stents, we have to know the flow patterns with and without peristalsis in the ureter. The purpose of this study is to understand the flow characteristics and movement of the ureter for the ureter model according to the presence or absence of peristalsis and to use it as fundamental information to design the optimal ureteral stent. In this study, CFD (Computational Fluid Dynamics) and FSI (Fluid-Structure Interaction) approaches were applied and compared the flow characteristics in the ureter. The distribution of streamlines was different in the near ureteropelvic junction. As a result of analyzing the area change of the ureter, the area change was large at the frontal and posterior ends, and the frontal and posterior aspects of the area change were reversed. There was no significant difference in the flow rate at the ureter outlet, and the movement of the ureter was larger when peristalsis was considered. Finally, as an introductory stage for the development of ureteral stents, basic information about the ureters according to the presence or absence of peristalsis is acquired.Keywords: computational fluid dynamics, fluid-structure interaction, peristalsis, urine flow
Procedia PDF Downloads 1118834 Managing Human-Wildlife Conflicts Compensation Claims Data Collection and Payments Using a Scheme Administrator
Authors: Eric Mwenda, Shadrack Ngene
Abstract:
Human-wildlife conflicts (HWCs) are the main threat to conservation in Africa. This is because wildlife needs overlap with those of humans. In Kenya, about 70% of wildlife occurs outside protected areas. As a result, wildlife and human range overlap, causing HWCs. The HWCs in Kenya occur in the drylands adjacent to protected areas. The top five counties with the highest incidences of HWC are Taita Taveta, Narok, Lamu, Kajiado, and Laikipia. The common wildlife species responsible for HWCs are elephants, buffaloes, hyenas, hippos, leopards, baboons, monkeys, snakes, and crocodiles. To ensure individuals affected by the conflicts are compensated, Kenya has developed a model of HWC compensation claims data collection and payment. We collected data on HWC from all eight Kenya Wildlife Service (KWS) Conservation Areas from 2009 to 2019. Additional data was collected from stakeholders' consultative workshops held in the Conservation Areas and a literature review regarding payment of injuries and ongoing insurance schemes being practiced in areas. This was followed by the description of the claims administration process and calculation of the pricing of the compensation claims. We further developed a digital platform for data capture and processing of all reported conflict cases and payments. Our product recognized four categories of HWC (i.e., human death and injury, property damage, crop destruction, and livestock predation). Personal bodily injury and human death were provided based on the Continental Scale of Benefits. We proposed a maximum of Kenya Shillings (KES) 3,000,000 for death. Medical, pharmaceutical, and hospital expenses were capped at a maximum of KES 150,000, as well as funeral costs at KES 50,000. Pain and suffering were proposed to be paid for 12 months at the rate of KES 13,500 per month. Crop damage was to be based on farm input costs at a maximum of KES 150,000 per claim. Livestock predation leading to death was based on Tropical Livestock Unit (TLU), which is equivalent to KES 30,000, whick includes Cattle (1 TLU = KES 30,000), Camel (1.4 TLU = KES 42,000), Goat (0.15 TLU = 4,500), Sheep (0.15 TLU = 4,500), and Donkey (0.5 TLU = KES 15,000). Property destruction (buildings, outside structures and harvested crops) was capped at KES 150,000 per any one claim. We conclude that it is possible to use an administrator to collect data on HWC compensation claims and make payments using technology. The success of the new approach will depend on a piloting program. We recommended that a pilot scheme be initiated for eight months in Taita Taveta, Kajiado, Baringo, Laikipia, Narok, and Meru Counties. This will test the claims administration process as well as harmonize data collection methods. The results of this pilot will be crucial in adjusting the scheme before country-wide roll out.Keywords: human-wildlife conflicts, compensation, human death and injury, crop destruction, predation, property destruction
Procedia PDF Downloads 538833 Innovations for Freight Transport Systems
Authors: M. Lu
Abstract:
The paper presents part of the results of EU-funded projects: SoCool@EU (Sustainable Organisation between Clusters Of Optimized Logistics @ Europe), DG-RTD (Research and Innovation), Regions of Knowledge Programme (FP7-REGIONS-2011-1). It will provide an in-depth review of emerging technologies for further improving urban mobility and freight transport systems, such as (information and physical) infrastructure, ICT-based Intelligent Transport Systems (ITS), vehicles, advanced logistics, and services. Furthermore, the paper will provide an analysis of the barriers and will review business models for the market uptake of innovations. From a perspective of science and technology, the challenges of urbanization could be mainly handled through adequate (human-oriented) solutions for urban planning, sustainable energy, the water system, building design and construction, the urban transport system (both physical and information aspects), and advanced logistics and services. Implementation of solutions for these domains should be follow a highly integrated and balanced approach, a silo approach should be avoided. To develop a sustainable urban transport system (for people and goods), including inter-hubs and intra-hubs, a holistic view is needed. To achieve a sustainable transport system for people and goods (in terms of cost-effectiveness, efficiency, environment-friendliness and fulfillment of the mobility, transport and logistics needs of the society), a proper network and information infrastructure, advanced transport systems and operations, as well as ad hoc and seamless services are required. In addition, a road map for an enhanced urban transport system until 2050 will be presented. This road map aims to address the challenges of urban transport, and to provide best practices in inter-city and intra-city environments from various perspectives, including policy, traveler behaviour, economy, liability, business models, and technology.Keywords: synchromodality, multimodal transport, logistics, Intelligent Transport Systems (ITS)
Procedia PDF Downloads 3168832 Graph Based Traffic Analysis and Delay Prediction Using a Custom Built Dataset
Authors: Gabriele Borg, Alexei Debono, Charlie Abela
Abstract:
There on a constant rise in the availability of high volumes of data gathered from multiple sources, resulting in an abundance of unprocessed information that can be used to monitor patterns and trends in user behaviour. Similarly, year after year, Malta is also constantly experiencing ongoing population growth and an increase in mobilization demand. This research takes advantage of data which is continuously being sourced and converting it into useful information related to the traffic problem on the Maltese roads. The scope of this paper is to provide a methodology to create a custom dataset (MalTra - Malta Traffic) compiled from multiple participants from various locations across the island to identify the most common routes taken to expose the main areas of activity. This use of big data is seen being used in various technologies and is referred to as ITSs (Intelligent Transportation Systems), which has been concluded that there is significant potential in utilising such sources of data on a nationwide scale. Furthermore, a series of traffic prediction graph neural network models are conducted to compare MalTra to large-scale traffic datasets.Keywords: graph neural networks, traffic management, big data, mobile data patterns
Procedia PDF Downloads 1278831 Improved Super-Resolution Using Deep Denoising Convolutional Neural Network
Authors: Pawan Kumar Mishra, Ganesh Singh Bisht
Abstract:
Super-resolution is the technique that is being used in computer vision to construct high-resolution images from a single low-resolution image. It is used to increase the frequency component, recover the lost details and removing the down sampling and noises that caused by camera during image acquisition process. High-resolution images or videos are desired part of all image processing tasks and its analysis in most of digital imaging application. The target behind super-resolution is to combine non-repetition information inside single or multiple low-resolution frames to generate a high-resolution image. Many methods have been proposed where multiple images are used as low-resolution images of same scene with different variation in transformation. This is called multi-image super resolution. And another family of methods is single image super-resolution that tries to learn redundancy that presents in image and reconstruction the lost information from a single low-resolution image. Use of deep learning is one of state of art method at present for solving reconstruction high-resolution image. In this research, we proposed Deep Denoising Super Resolution (DDSR) that is a deep neural network for effectively reconstruct the high-resolution image from low-resolution image.Keywords: resolution, deep-learning, neural network, de-blurring
Procedia PDF Downloads 5158830 Thermal Comfort Investigation Based on Predicted Mean Vote (PMV) Index Using Computation Fluid Dynamic (CFD) Simulation: Case Study of University of Brawijaya, Malang-Indonesia
Authors: Dewi Hardiningtyas Sugiono
Abstract:
Concerning towards the quality of air comfort and safety to pedestrians in the University area should be increased as Indonesia economics booming. Hence, the University management needs guidelines of thermal comfort to innovate a new layout building. The objectives of this study is to investigate and then to evaluate the distribution of thermal comfort which is indicated by predicted mean vote (PMV) index at the University of Brawijaya (UB), Malang. The PMV figures are used to evaluate and to redesign the UB layout. The research is started with study literature and early survey to collect all information of building layout and building shape at the University of Brawijaya. The information is used to create a 3D model in CAD software. The model is simulated by Computational Fluid Dynamic (CFD) software to measure the PMV factors of air temperature, relative humidity and air speed in some locations. Validation is done by comparing between PMV value from observation and PMV value from simulation. The resuls of the research shows the most sensitive of microclimatic factors is air temperature surrounding the UB building. Finally, the research is successfully figure out the UB layout and provides further actions to increase the thermal comfort.Keywords: thermal comfort, heat index (HI), CFD, layout
Procedia PDF Downloads 3038829 AI-Based Techniques for Online Social Media Network Sentiment Analysis: A Methodical Review
Authors: A. M. John-Otumu, M. M. Rahman, O. C. Nwokonkwo, M. C. Onuoha
Abstract:
Online social media networks have long served as a primary arena for group conversations, gossip, text-based information sharing and distribution. The use of natural language processing techniques for text classification and unbiased decision-making has not been far-fetched. Proper classification of this textual information in a given context has also been very difficult. As a result, we decided to conduct a systematic review of previous literature on sentiment classification and AI-based techniques that have been used in order to gain a better understanding of the process of designing and developing a robust and more accurate sentiment classifier that can correctly classify social media textual information of a given context between hate speech and inverted compliments with a high level of accuracy by assessing different artificial intelligence techniques. We evaluated over 250 articles from digital sources like ScienceDirect, ACM, Google Scholar, and IEEE Xplore and whittled down the number of research to 31. Findings revealed that Deep learning approaches such as CNN, RNN, BERT, and LSTM outperformed various machine learning techniques in terms of performance accuracy. A large dataset is also necessary for developing a robust sentiment classifier and can be obtained from places like Twitter, movie reviews, Kaggle, SST, and SemEval Task4. Hybrid Deep Learning techniques like CNN+LSTM, CNN+GRU, CNN+BERT outperformed single Deep Learning techniques and machine learning techniques. Python programming language outperformed Java programming language in terms of sentiment analyzer development due to its simplicity and AI-based library functionalities. Based on some of the important findings from this study, we made a recommendation for future research.Keywords: artificial intelligence, natural language processing, sentiment analysis, social network, text
Procedia PDF Downloads 1158828 Contraceptives: Experiences of Agency and Coercion of Young People Living in Colombia
Authors: Paola Montenegro, Maria de los Angeles Balaguera Villa
Abstract:
Contraceptive methods play a fundamental role in preventing unwanted pregnancies and protecting users from sexually transmitted infections (STIs). Despite being known to almost the entire population of reproductive age living in Colombia, there are barriers, practices and complex notions about contraceptives that affect their desired mass use and effectiveness. This work aims to analyse some of the perceptions and practices discussed with young people (13-28 years old) living in Colombia regarding the use of contraceptives in their daily lives, preferences, needs and perceived side effects. This research also examines the perceived paradox in autonomy that young people experience regarding contraceptive use: in one hand, its use (or lack of it) is interpreted as an act of self-determination and primary example of reproductive agency, on the other hand, it was frequently associated with coercion and limited autonomy derived from the gaps in reliable information available for young people, the difficulty of accessing certain preferred methods, and sometimes the experienced coercion exercise by doctors, partners and/or family members. The data and analysis discussed in this work stems from a research project whose objective was to provide information about needs and preferences in sexual and reproductive health of young people living in Colombia in relation to a possible telehealth service that could close the gap in access to quality care and safe information. Through a mixed methods approach, this study collected 5.736 responses to a virtual survey disseminated nationwide in Colombia and 47 inperson interviews (24 of them with people who were assigned female at birth and 21 with local key stakeholders in the abortion ecosystem). Quantitative data was analyzed using Stata SE Version 16.0 and qualitative analysis was completed through NVivo using thematic analysis. Key findings on contraception use in young people living in Colombia reveal that 85,8% of participants had used a contraceptive method in the last two years, and that the most commonly used methods were condoms, contraceptive pills, the morning-after pill and the method of interruption. The remaining 14,2% of respondents who declared to not have used contraceptives in the last two years expressed that the main four barriers to access were: "Lack of knowledge about contraceptive methods and where to obtain information and/or access them (13.9%)", "Have had sex with people who have vaginas (10.2%)", "Cost of contraceptive method (8.4%)" and "Difficulties in obtaining medical authorisations (7.6%)". These barriers coincided with the ones used to explain the non-use of contraceptives in young people, which reveals that limitations in information, cost, and quality care represent structural issues that need to be address in programmes, services, and public policy. Finally, interviews showed that young people perceive contraceptive use and non-use as an example of reaffirming reproductive agency and limitations to this can be explained through the widespread incomplete knowledge about how methods work and the prevalence of other social representations of contraception associated with trust, fidelity, and partner preferences, that in the end create limitations to young people’s autonomy.Keywords: contraception, family planning, premarital fertility, unplanned pregnancy
Procedia PDF Downloads 758827 An Analysis of Non-Elliptic Curve Based Primality Tests
Authors: William Wong, Zakaria Alomari, Hon Ching Lai, Zhida Li
Abstract:
Modern-day information security depends on implementing Diffie-Hellman, which requires the generation of prime numbers. Because the number of primes is infinite, it is impractical to store prime numbers for use, and therefore, primality tests are indispensable in modern-day information security. A primality test is a test to determine whether a number is prime or composite. There are two types of primality tests, which are deterministic tests and probabilistic tests. Deterministic tests are adopting algorithms that provide a definite answer whether a given number is prime or composite. While in probabilistic tests, a probabilistic result would be provided, there is a degree of uncertainty. In this paper, we review three probabilistic tests: the Fermat Primality Test, the Miller-Rabin Test, and the Baillie-PSW Test, as well as one deterministic test, the Agrawal-Kayal-Saxena (AKS) Test. Furthermore, we do an analysis of these tests. All of the reviews discussed are not based on the Elliptic Curve. The analysis demonstrates that, in the majority of real-world scenarios, the Baillie- PSW test’s favorability stems from its typical operational complexity of O(log 3n) and its capacity to deliver accurate results for numbers below 2^64.Keywords: primality tests, Fermat’s primality test, Miller-Rabin primality test, Baillie-PSW primality test, AKS primality test
Procedia PDF Downloads 878826 A Comparative and Doctrinal Analysis towards the Investigation of a Right to Be Forgotten in Hong Kong
Authors: Jojo Y. C. Mo
Abstract:
Memories are good. They remind us of people, places and experiences that we cherish. But memories cannot be changed and there may well be memories that we do not want to remember. This is particularly true in relation to information which causes us embarrassment and humiliation or simply because it is private – we all want to erase or delete such information. This desire to delete is recently recognised by the Court of Justice of the European Union in the 2014 case of Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González in which the court ordered Google to remove links to some information about the complainant which he wished to be removed. This so-called ‘right to be forgotten’ received serious attention and significantly, the European Council and the European Parliament enacted the General Data Protection Regulation (GDPR) to provide a more structured and normative framework for implementation of right to be forgotten across the EU. This development in data protection laws will, undoubtedly, have significant impact on companies and co-operations not just within the EU but outside as well. Hong Kong, being one of the world’s leading financial and commercial center as well as one of the first jurisdictions in Asia to implement a comprehensive piece of data protection legislation, is therefore a jurisdiction that is worth looking into. This article/project aims to investigate the following: a) whether there is a right to be forgotten under the existing Hong Kong data protection legislation b) if not, whether such a provision is necessary and why. This article utilises a comparative methodology based on a study of primary and secondary resources, including scholarly articles, government and law commission reports and working papers and relevant international treaties, constitutional documents, case law and legislation. The author will primarily engage literature and case-law review as well as comparative and doctrinal analyses. The completion of this article will provide privacy researchers with more concrete principles and data to conduct further research on privacy and data protection in Hong Kong and internationally and will provide a basis for policy makers in assessing the rationale and need for a right to be forgotten in Hong Kong.Keywords: privacy, right to be forgotten, data protection, Hong Kong
Procedia PDF Downloads 1888825 Investigating the Effect of the Pedagogical Agent on Visual Attention in Attention Deficit Hyperactivity Disorder Students
Authors: Nasrin Mohammadhasani, Rosa Angela Fabio
Abstract:
The attention to relevance information is the key element for learning. Otherwise, Attention Deficit Hyperactivity Disorder (ADHD) students have a fuzzy visual pattern that prevents them to attention and remember learning subject. The present study aimed to test the hypothesis that the presence of a pedagogical agent can effectively support ADHD learner's attention and learning outcomes in a multimedia learning environment. The learning environment was integrated with a pedagogical agent, named Koosha as a social peer. This study employed a pretest and posttest experimental design with control group. The statistical population was 30 boys students, age 10-11 with ADHD that randomly assigned to learn with/without an agent in well designed environment for mathematic. The results suggested that experimental and control groups show a significant difference in time when they participated and mathematics achievement. According to this research, using the pedagogical agent can enhance learning of ADHD students by gaining and guiding their attention to relevance information part on display, so it can be considered as asocial cue that provides theme cognitive supports.Keywords: attention, computer assisted instruction, multimedia learning environment, pedagogical agent
Procedia PDF Downloads 3128824 An Examination of the Effectiveness of iPad-Based Augmentative and Alternative Intervention on Acquisition, Generalization and Maintenance of the Requesting Information Skills of Children with Autism
Authors: Amaal Almigal
Abstract:
Technology has been argued to offer distinct advantages and benefits for teaching children with autism spectrum disorder (ASD) to communicate. One aspect of this technology is augmentative and alternative communication (AAC) systems such as picture exchange or speech generation devices. Whilst there has been significant progress in teaching these children to request their wants and needs with AAC, there remains a need for developing technologies that can really make a difference in teaching them to ask questions. iPad-based AAC can be effective for communication. However, the effectiveness of this type of AAC in teaching children to ask questions needs to be examined. Thus, in order to examine the effectiveness of iPad-based AAC in teaching children with ASD to ask questions, This research will test whether iPad leads to more learning than a traditional approach picture and text cards does. Two groups of children who use AAC will be taught to ask ‘What is it?’ questions. With the first group, low-tech AAC picture and text cards will be used, while an iPad-based AAC application called Proloquo2Go will be used with the second group. Interviews with teachers and parents will be conducted before and after the experiment. The children’s perspectives will also be considered. The initial outcomes of this research indicate that iPad can be an effective tool to help children with autism to ask questions.Keywords: autism, communication, information, iPad, pictures, requesting
Procedia PDF Downloads 2638823 Bibliometric Measures on Leveraging Technology to Mitigate the Impact of Covid-19 on Business
Authors: Olanrewaju Johnson Akinduntire
Abstract:
This paper investigates the statistical evaluation of books, citations, articles, journals and other publications in accounting and finance on leveraging technology to mitigate the impact of COVID-19 on business. The research proffers an appraisal of the impact of computerized accounting systems in pre and post pandemic era on activities of the formal and informal sectors, it analyzes the concept of computerized accounting systems, and it seeks to determine the impact of computerized of the overall activities of the informal sector. A special focus of this ICT strategy should be to demystify and promote the diffusion of ICT as a general-purpose technology to the informal sector. It is believed that the use of new technologies can be crucial to meeting the Millennium Development Goals (MDGs) in a timely and effective fashion. Consequent to these, there is a need to prevent the further marginalization of the informal sector by availing ICT services which are mixed appropriately and also properly located. By implication, this will help them access markets and other business information, which can enable or make their economic activities more vibrant and facilitate the availability of information about new opportunities. Conclusively, for one to understand the application of ICT and their locational dynamics in informal sector clusters, there is a need to comprehend and acknowledge the drivers and pressures leading to the adoption of new technology.Keywords: COVID-19 , (MDGs) , ICT, bibliometric
Procedia PDF Downloads 1868822 The Findings EEG-LORETA about Epilepsy
Authors: Leila Maleki, Ahmad Esmali Kooraneh, Hossein Taghi Derakhshi
Abstract:
Neural activity in the human brain starts from the early stages of prenatal development. This activity or signals generated by the brain are electrical in nature and represent not only the brain function but also the status of the whole body. At the present moment, three methods can record functional and physiological changes within the brain with high temporal resolution of neuronal interactions at the network level: the electroencephalogram (EEG), the magnet oencephalogram (MEG), and functional magnetic resonance imaging (fMRI); each of these has advantages and shortcomings. EEG recording with a large number of electrodes is now feasible in clinical practice. Multichannel EEG recorded from the scalp surface provides a very valuable but indirect information about the source distribution. However, deep electrode measurements yield more reliable information about the source locations، Intracranial recordings and scalp EEG are used with the source imaging techniques to determine the locations and strengths of the epileptic activity. As a source localization method, Low Resolution Electro-Magnetic Tomography (LORETA) is solved for the realistic geometry based on both forward methods, the Boundary Element Method (BEM) and the Finite Difference Method (FDM). In this paper, we review The findings EEG- LORETA about epilepsy.Keywords: epilepsy, EEG, EEG-LORETA
Procedia PDF Downloads 543