Search results for: internet behaviour
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3502

Search results for: internet behaviour

1312 An Experiential Learning of Ontology-Based Multi-document Summarization by Removal Summarization Techniques

Authors: Pranjali Avinash Yadav-Deshmukh

Abstract:

Remarkable development of the Internet along with the new technological innovation, such as high-speed systems and affordable large storage space have led to a tremendous increase in the amount and accessibility to digital records. For any person, studying of all these data is tremendously time intensive, so there is a great need to access effective multi-document summarization (MDS) systems, which can successfully reduce details found in several records into a short, understandable summary or conclusion. For semantic representation of textual details in ontology area, as a theoretical design, our system provides a significant structure. The stability of using the ontology in fixing multi-document summarization problems in the sector of catastrophe control is finding its recommended design. Saliency ranking is usually allocated to each phrase and phrases are rated according to the ranking, then the top rated phrases are chosen as the conclusion. With regards to the conclusion quality, wide tests on a selection of media announcements are appropriate for “Jammu Kashmir Overflow in 2014” records. Ontology centered multi-document summarization methods using “NLP centered extraction” outshine other baselines. Our participation in recommended component is to implement the details removal methods (NLP) to enhance the results.

Keywords: disaster management, extraction technique, k-means, multi-document summarization, NLP, ontology, sentence extraction

Procedia PDF Downloads 386
1311 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 263
1310 The Use of Modern Technology to Enhance English Language Teaching and Learning: An Analysis

Authors: Fazilet Alachaher (Benzerdjeb)

Abstract:

From the chalkboard to the abacus and beyond, technology has always played an important role in education. Educational technology refers to any teaching tool that helps supports learning, and given the rapid advancements in Information Technology and multimedia applications, the potential to support the teaching of foreign languages in our universities is ever greater. In language teaching and learning, we have a lot of to choose from the world of technology: TV, CDs, DVDs, Computers, the Internet, Email, and Blogs. The use of modern technologies can enrich the experience of learning a foreign language because they provide features that are not present in traditional technology. They can offer a wide range of multimedia resources, opportunities for intensive one-to-one learning in language labs and resources for authentic materials, which can be motivating to both students and teachers. The advent of Information and Communication Technology (ICT) and online interaction can also open up new range of self-access and distance learning opportunities The two last decades have witnessed a revolution due to the onset of technology, and has changed the dynamics of various industries, and has also influenced the way people live and work in society. That is why using the multimedia to create a certain context to teach English has its unique advantages. This paper tries then to analyse the necessity of multimedia technology to language teaching and brings out the problems faced by using these technologies. It also aims at making English teachers aware of the strategies to use it in an effective manner.

Keywords: strategies English teaching, multimedia technology, advantages, disadvantages, English learning

Procedia PDF Downloads 463
1309 Wearable Interface for Telepresence in Robotics

Authors: Uriel Martinez-Hernandez, Luke W. Boorman, Hamideh Kerdegari, Tony J. Prescott

Abstract:

In this paper, we present architecture for the study of telepresence, immersion and human-robot interaction. The architecture is built around a wearable interface, developed here, that provides the human with visual, audio and tactile feedback from a remote location. We have chosen to interface the system with the iCub humanoid robot, as it mimics many human sensory modalities, such as vision, with gaze control and tactile feedback. This allows for a straightforward integration of multiple sensory modalities, but also offers a more complete immersion experience for the human. These systems are integrated, controlled and synchronised by an architecture developed for telepresence and human-robot interaction. Our wearable interface allows human participants to observe and explore a remote location, while also being able to communicate verbally with humans located in the remote environment. Our approach has been tested from local, domestic and business venues, using wired, wireless and Internet based connections. This has involved the implementation of data compression to maintain data quality to improve the immersion experience. Initial testing has shown the wearable interface to be robust. The system will endow humans with the ability to explore and interact with other humans at remote locations using multiple sensing modalities.

Keywords: telepresence, telerobotics, human-robot interaction, virtual reality

Procedia PDF Downloads 290
1308 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan

Authors: Pema Choejey, David Murray, Chun Che Fung

Abstract:

Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.

Keywords: awareness and training, cybersecurity policy, risk management, security risks

Procedia PDF Downloads 345
1307 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 278
1306 Digital Self-Care Intervention Evaluation from the Perspective of Healthcare Users

Authors: Dina Ziadlou, Anthony Sunjaya, Joyzen Cortez Ramos, Romario Muñoz Ramos, Richard Dasselaar

Abstract:

This study aimed to evaluate the opinions of users using digital health technologies to prevent, promote, and maintain their health and well-being with or without the support of a healthcare provider to delineate an overview of the future patient journey while considering the strategic initiatives in the digital transformation era. This research collected the opinions of healthcare clients through a structural questionnaire to collect user accessibility, user knowledge, user experience, user engagement, and personalized medicine to investigate the mindset of the users and illustrate their opinions, expectations, needs, and voices about digital self-care expansion. In the realm of digital transformation, the accessibility of users to the internet, digital health platforms, tools, and mobile health applications have revolutionized the healthcare ecosystem toward nurturing informed and empowered patients who are tech-savvy and can take the initiative to be in charge of their health, involved in medical decision-making, and seek digital health innovations to prevent diseases and promote their healthy lifestyles. Therefore, the future of the patient journey is digital self-care intervention in a healthcare ecosystem where the partnership of patients in healthcare services is tied to their health information and action ownership.

Keywords: digital health, patient engagement, self-care intervention, digital self-care intervention, digital transformation

Procedia PDF Downloads 36
1305 Knowledge Diffusion via Automated Organizational Cartography: Autocart

Authors: Mounir Kehal, Adel Al Araifi

Abstract:

The post-globalisation epoch has placed businesses everywhere in new and different competitive situations where knowledgeable, effective and efficient behaviour has come to provide the competitive and comparative edge. Enterprises have turned to explicit- and even conceptualising on tacit- Knowledge Management to elaborate a systematic approach to develop and sustain the Intellectual Capital needed to succeed. To be able to do that, you have to be able to visualize your organization as consisting of nothing but knowledge and knowledge flows, whilst being presented in a graphical and visual framework, referred to as automated organizational cartography. Hence, creating the ability of further actively classifying existing organizational content evolving from and within data feeds, in an algorithmic manner, potentially giving insightful schemes and dynamics by which organizational know-how is visualised. It is discussed and elaborated on most recent and applicable definitions and classifications of knowledge management, representing a wide range of views from mechanistic (systematic, data driven) to a more socially (psychologically, cognitive/metadata driven) orientated. More elaborate continuum models, for knowledge acquisition and reasoning purposes, are being used for effectively representing the domain of information that an end user may contain in their decision making process for utilization of available organizational intellectual resources (i.e. Autocart). In this paper we present likewise an empirical research study conducted previously to try and explore knowledge diffusion in a specialist knowledge domain.

Keywords: knowledge management, knowledge maps, knowledge diffusion, organizational cartography

Procedia PDF Downloads 417
1304 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 331
1303 The Effects of Gas Metal Arc Welding Parameters on the Corrosion Behaviour of Austenitic Stainless Steel Immersed in Aqueous Sodium Hydroxide

Authors: I. M. B. Omiogbemi, D. S. Yawas, I. M. Dagwa, F. G. Okibe

Abstract:

This work present the effects of some gas metal arc welding parameters on the corrosion behavior of austenitic stainless steel, exposed to 0.5M sodium hydroxide at ambient temperatures (298K) using conventional weight loss determination, together with surface morphology evaluation by scanning electron microscopy and the application of factorial design of experiment to determine welding conditions which enhance the integrity of the welded stainless steel. The welding variables evaluated include speed, voltage and current. Different samples of the welded stainless steels were immersed in the corrosion environment for 8, 16, 24, 32 and 40 days and weight loss determined. From the results, it was found that increase in welding current and speed at constant voltage gave the optimum performance of the austenitic stainless steel in the environment. At a of speed 40cm/min, 110Amp current and voltage of 230 volt the welded stainless steel showed only a 0.0015mg loss in weight after 40 days. Pit-like openings were observed on the surface of the metals indicating corrosion but were minimal at the optimum conditions. It was concluded from the research that relatively high welding speed and current at a constant voltage gives a good welded austenitic stainless steel with better integrity.

Keywords: welding, current, speed, austenitic stainless steel, sodium hydroxide

Procedia PDF Downloads 318
1302 Energy and Exergy Analyses of Thin-Layer Drying of Pineapple Slices

Authors: Apolinar Picado, Steve Alfaro, Rafael Gamero

Abstract:

Energy and exergy analyses of thin-layer drying of pineapple slices (Ananas comosus L.) were conducted in a laboratory tunnel dryer. Drying experiments were carried out at three temperatures (100, 115 and 130 °C) and an air velocity of 1.45 m/s. The effects of drying variables on energy utilisation, energy utilisation ratio, exergy loss and exergy efficiency were studied. The enthalpy difference of the gas increased as the inlet gas temperature increase. It is observed that at the 75 minutes of the drying process the outlet gas enthalpy achieves a maximum value that is very close to the inlet value and remains constant until the end of the drying process. This behaviour is due to the reduction of the total enthalpy within the system, or in other words, the reduction of the effective heat transfer from the hot gas flow to the vegetable being dried. Further, the outlet entropy exhibits a significant increase that is not only due to the temperature variation, but also to the increase of water vapour phase contained in the hot gas flow. The maximum value of the exergy efficiency curve corresponds to the maximum value observed within the drying rate curves. This maximum value represents the stage when the available energy is efficiently used in the removal of the moisture within the solid. As the drying rate decreases, the available energy is started to be less employed. The exergetic efficiency was directly dependent on the evaporation flux and since the convective drying is less efficient that other types of dryer, it is likely that the exergetic efficiency has relatively low values.

Keywords: efficiency, energy, exergy, thin-layer drying

Procedia PDF Downloads 255
1301 Behaviour of Hollow Tubes Filled with Sand Slag Concrete

Authors: Meriem Senani, Noureedine Ferhoune

Abstract:

This paper presents the axial bearing capacity of thin welded rectangular steel stubs filled with concrete sand. A series of tests was conducted to study the behavior of short composite columns under axial compressive load, the cross section dimensions were: 100x70x2 mm. A total of 16 stubs have been tested, as follows: 4 filled with ordinary concrete appointed by BO columns, 6 filled with concrete witch natural sand was completely substitute a crystallized sand slag designated in this paper by BSI, and 6 others were tucked in concrete whose natural sand was partially replace by a crystallized sand slag called by BSII. The main objectives of these tests were to clarify the steel specimen's performance filled by concrete sand compared to those filled with ordinary concrete. The main parameters studied are: The height of the specimen (300mm-500mm), eccentricity of load and type of filling concrete. Based on test results obtained, it is confirmed that the length of the tubes, has a considerable effect on the bearing capacity and the failure mode. In all test tubes, fracture occurred by the convex warping of the largest, followed by the smallest due to the outward thrust of the concrete, it was observed that the sand concrete improves the bearing capacity of tubes compounds compared to those filled with ordinary concrete.

Keywords: concrete sand, crystallized slag, failure mode, buckling

Procedia PDF Downloads 414
1300 Parent and Child Body Dissatisfaction: The Roles of Implicit Behavior and Child Gender in Middle Childhood

Authors: Vivienne Langhorne, Helen Sharpe

Abstract:

Body dissatisfaction begins developing in middle childhood, with wide-ranging implications for mental health and well-being. Previous research on parent behavior has focused on the role of explicit parent behaviors in adolescent and young adult body dissatisfaction, leaving a gap in understanding how implicit parent behaviors relate to body dissatisfaction in childhood. The current study investigated how implicit parent behavior (such as modeling own body dissatisfaction and dieting) relates to parent and child body dissatisfaction. It was hypothesized that implicit behavior would be directly related to parent and child body dissatisfaction and mediate the relationship between the two. Furthermore, this study aimed to examine child gender as a potential moderator in this mediation, as research shows that boys and girls experience body dissatisfaction differently. This study analyzed survey responses on parent body dissatisfaction, implicit behavior, and child body dissatisfaction measures from a sample of 166 parent-child dyads with children between the ages of 6 to 9 years old. Regression analyses revealed that parent body dissatisfaction is related to both parent-implicit behavior and child body dissatisfaction. However, implicit behavior did not mediate the relationship between the two body dissatisfaction variables. Additionally, the results of moderated mediation indicated there were no child gender differences in the strength of the association between parental implicit behaviors and child body dissatisfaction. These findings highlight the need for further research into the mechanisms behind parent and child body dissatisfaction to better understand the process through which intergenerational transmission occurs.

Keywords: body dissatisfaction, implicit behaviour, middle childhood, parenting

Procedia PDF Downloads 62
1299 Machining Responce of Austempered Ductile Iron with Varying Cutting Speed and Depth of Cut

Authors: Prashant Parhad, Vinayak Dakre, Ajay Likhite, Jatin Bhatt

Abstract:

This work mainly focuses on machinability studies of Austempered Ductile Iron (ADI). The Ductile Iron (DI) was austempered at 250 oC for different durations and the process window for austempering was established by studying the microstructure. The microstructural characterization of the material was done using optical microscopy, SEM and XRD. The samples austempered as per the process window were then subjected to turning using a TiAlN-coated tungsten carbide insert to study the effect of cutting parameters, namely the cutting speed and the depth of cut. The effect was investigated in terms of cutting forces required as well as the surface roughness obtained. The turning was conducted on a CNC turning machine and primary (Fx), radial (Fy) and feed (Fz) cutting forces were quantified with a three-component dynamometer. It was observed that the magnitude of radial force was more than that of primary cutting force for all cutting speed and for various depths of cut studied. It has also been seen that increasing the cutting speed improves the surface quality. The observed machinability behaviour was investigated in light of the microstructure of the material obtained under the given austempering conditions and a structure-property- co-relation was established between the two. For all cutting speed and depth of cut, the best machining response in terms of cutting forces and surface quality was obtained towards the centre of process window.

Keywords: process window, cutting speed, depth of cut, surface roughness

Procedia PDF Downloads 368
1298 Parental and Peer Influences on Juvenile Delinquency: Case Studies in Malaysia

Authors: Tan Bee Piang

Abstract:

The family is always seen as the most important agent of socialization, therefore, abusive parents and broken family have often been highlighted as two main factors contributing to juvenile delinquency. However, several studies have indicated that the peer group is one of the most powerful socialization agents in adolescent development, the influences of family are insignificant after peer influences are taken. This study aimed to investigate the relative influence of parents and peers on juvenile delinquency in Malaysia. Malaysia is a multicultural society, so different types of traditional values and religions permeate all aspects of Malaysian society, and the influences of family and parents are always seen as the most important agents of socialization. 80 juveniles from a reform school in Malaysia have been selected to participate in this study. Based on the experiences of juveniles in this study, it found that peer groups play an important role when the adolescents try to create their own identities. Adolescents merely make friends with those who have similar life experiences, so adolescents are easily influenced by their friends and the juvenile delinquency is mostly group behavior. This research found that there is no significant relationship between family factors and delinquency. The data shows that a significant percentage of juveniles come from middle-class family and most of them are not from broken family. However, most of them have strained family relationship. This research suggests that we should take a look into other causes, like peer influence, of juvenile delinquency in Malaysia.

Keywords: juvenile delinquency, peer influence, group behaviour, family relationship

Procedia PDF Downloads 510
1297 Behaviour of Model Square Footing Resting on Three Dimensional Geogrid Reinforced Sand Bed

Authors: Femy M. Makkar, S. Chandrakaran, N. Sankar

Abstract:

The concept of reinforced earth has been used in the field of geotechnical engineering since 1960s, for many applications such as, construction of road and rail embankments, pavements, retaining walls, shallow foundations, soft ground improvement and so on. Conventionally, planar geosynthetic materials such as geotextiles and geogrids were used as the reinforcing elements. Recently, the use of three dimensional reinforcements becomes one of the emerging trends in this field. So, in the present investigation, three dimensional geogrid is proposed as a reinforcing material. Laboratory scaled plate load tests are conducted on a model square footing resting on 3D geogrid reinforced sand bed. The performance of 3D geogrids in triangular and square pattern was compared with conventional geogrids and the improvement in bearing capacity and reduction in settlement and heave are evaluated. When single layer of reinforcement was placed at an optimum depth of 0.25B from the bottom of the footing, the bearing capacity of conventional geogrid reinforced soil improved by 1.85 times compared to unreinforced soil, where as 3D geogrid reinforced soil with triangular pattern and square pattern shows 2.69 and 3.05 times improvement respectively compared to unreinforced soil. Also, 3D geogrids performs better than conventional geogrids in reducing the settlement and heave of sand bed around the model footing.

Keywords: 3D reinforcing elements, bearing capacity, heavy, settlement

Procedia PDF Downloads 302
1296 Online Formative Assessment Challenges Experienced by Grade 10 Physical Sciences Teachers during Remote Teaching and Learning

Authors: Celeste Labuschagne, Sam Ramaila, Thasmai Dhurumraj

Abstract:

Although formative assessment is acknowledged as crucial for teachers to gauge students’ understanding of subject content, applying formative assessment in an online context is more challenging than in a traditional Physical Sciences classroom. This study examines challenges experienced by Grade 10 Physical Sciences teachers when enacting online formative assessment. The empirical investigation adopted a generic qualitative design and involved three purposively selected Grade 10 Physical Sciences teachers from three different schools and quintiles within the Tshwane North District in South Africa. Data were collected through individual and focus group interviews. Technological, pedagogical, and content knowledge (TPACK) was utilised as a theoretical framework underpinning the study. The study identified a myriad of challenges experienced by Grade 10 Physical Sciences teachers when enacting online formative assessment. These challenges include the utilisation of Annual Teaching Plans, lack of technological knowledge, and internet connectivity. The Department of Basic Education faces the key imperative to provide continuous teacher professional development and concomitant online learning materials that can facilitate meaningful enactment of online formative assessment in various educational settings.

Keywords: COVID-19, challenges, online formative assessment, physical sciences, TPACK

Procedia PDF Downloads 66
1295 Black Protests in Poland: Analysis of Women's Movement in Poland, 2016-2018

Authors: Aneta Ostaszewska

Abstract:

The purpose of this research is to reflect on 'black protests' of women in Poland. 'Black protests' have been organized nationwide since October 2016 as a sign of opposition and resistance to anti-women government’s policy and its attempts to exacerbate abortion law. Women protest not only in the biggest cities (Warsaw, Cracow or Wroclaw) but in over 140 towns and villages all over Poland. The research represents qualitative methodological approach – an active research method. It has involved the observation, description, and analysis of 'black protests' carried out mainly in Warsaw (the capital of Poland). The focus has been on behavior and attitudes of protesting women: protesters’ slogans, statements, and views, the ways of dressing up, ways of participating and involvement in protests. Research also involves the analysis of social media discourse: the analysis of content published by women on social media. Black protests are an example of a grassroots social initiative of women in Poland. What unites women is opposition to government policy. The primary space of communication has become the Internet – especially social media (Facebook). A new social movement 'Dziewuchy dziewuchom' (Girls for girls) has been born as well as organization of 'Ogolnopolski Strajk Kobiet' (Nationwide women's strike) as a result of 'black protest'. These protests and marches became a way of emphasizing women’s subjectivity as well as political and civic activity.

Keywords: women, black protests, communitas, experience, Poland, abortion law

Procedia PDF Downloads 375
1294 Production of Hydrogen and Carbon Monoxide Fuel Gas From Pine Needles

Authors: Despina Vamvuka, Despina Pentari

Abstract:

Forestry wastes are readily available in large quantities around the world. Based on European Green Deal for the deployment of renewable and decarbonized energy by 2050, as well as global energy crisis, energy recovery from such wastes reducing greenhouse gas emissions is very attractive. Gasification has superior environmental performance to combustion, producing a clean fuel gas utilized in internal combustion engines, gas turbines, solid oxide fuel cells, or for synthesis of liquid bio-fuels and value-added chemicals. In this work, pine needles, which are abundantly found in Mediterranean countries, were gasified by either steam or carbon dioxide via a two-step process to improve reactivity and eliminate tar, employing a fixed bed unit and a thermal analysis system. Solid, liquid and gaseous products from the whole process were characterized and their energy potential was determined. Thermal behaviour, reactivity, conversion and energy recovery were examined. The gasification process took place above 650°C. At 950°C conversion and energy recovery were 77% dry and 2 under a flow of steam and 85% dry and 2.9 under a flow of carbon dioxide, respectively. Organic matter was almost completely converted to syngas, the yield of which varied between 89% and 99%. The higher heating values of biochar, bio-oil and pyrolysis gas were 27.8 MJ/kg, 33.5 MJ/kg and 13.6 MJ/m3. Upon steam or carbon dioxide gasification, the higher heating value of syngas produced was 11.5 MJ/m3 and 12.7 MJ/m3, respectively.

Keywords: gasification, biomass, steam, carbon dioxide

Procedia PDF Downloads 98
1293 Knowledge regarding Sexual and Reproductive Health among Adolescents in Higher Secondary School

Authors: Kopila Shrestha

Abstract:

Adolescent sexual reproductive health is one of the most important issues in the world. Reproductive ability is taking place at an earlier age and adolescents are indulging in risk taking behaviors day by day. A descriptive cross-sectional study was conducted in Kathmandu valley to assess the knowledge regarding sexual and reproductive health among adolescent. Total of 200 respondents were selected through non-probability convenient sampling technique. Self-administered written questionnaires using semi-structured questions were used. The collected data were analyzed by using descriptive statistics such as frequency, percentage, mean, standard deviation and inferential statistics such as Chi-square test. The findings revealed that most of the respondents had adequate knowledge regarding transmission and protection of HIV/AIDs and STIs but still some respondents had a misconception regarding it. Few respondents had knowledge regarding legal age for marriage and the minimum age for first child bearing. The statistical analysis revealed that the total mean knowledge score with standard deviation was 45.02±8.674. Nearly half of the respondents (49.5%) had a moderate level of knowledge, followed by an inadequate level of knowledge 29.5% and adequate level of knowledge 21.0% regarding sexual and reproductive health. There was significant association of level of knowledge with area of residence (p-value .002) but no association with age (p-value .067), sex (p-value .999), religion (p-value .082) and ethnicity (p-value .114). Nearly half of the participants possess some knowledge about sexual and reproductive health but still effective educational intervention is required in higher secondary school to encourage more sensible and healthy behaviour.

Keywords: adolescents, higher secondary school, knowledge, sexual and reproductive health

Procedia PDF Downloads 283
1292 The Behaviour of Laterally Loaded Piles Installed in the Sand with Enlarged Bases

Authors: J. Omer, H. Haroglu

Abstract:

Base enlargement in piles was invented to enhance pile resistance in downward loading, but the contribution of an enlarged base to the lateral load resistance of a pile has not been fully exploited or understood. This paper presents a laboratory investigation of the lateral capacity and deformation response of small-scale steel piles with enlarged bases installed in dry sand. Static loading tests were performed on 24 model piles having different base-to-shaft diameter ratios. The piles were installed in a box filled with dry sand, and lateral loads were applied to the pile tops using a pulley system. The test piles had shaft diameters of 20 mm, 16 mm, and 10 mm; base diameters of 900 mm, 700 mm, and 500 mm. As a control, a pile without base enlargement was tested to allow comparisons with the enlarged base piles. Incremental maintained loads were applied until pile failure approached while recording pile head deflections with high-precision dial gauges. The results showed that the lateral capacity increased with an increase in base diameter, albeit by different percentages depending on the shaft diameters and embedment length in the sand. There was always an increase in lateral capacity with increasing embedment length. Also, it was observed that an enlarged pile base had deflected less at a given load when compared to the control pile. Therefore, the research demonstrated the benefits of lateral capacity and stability of enlarging a pile base.

Keywords: pile foundations, enlarged base, lateral loading

Procedia PDF Downloads 155
1291 The Influence of Temperature on the Corrosion and Corrosion Inhibition of Steel in Hydrochloric Acid Solution: Thermodynamic Study

Authors: Fatimah Al-Hayazi, Ehteram. A. Noor, Aisha H. Moubaraki

Abstract:

The inhibitive effect of Securigera securidaca seed extract (SSE) on mild steel corrosion in 1 M HCl solution has been studied by weight loss and electrochemical techniques at four different temperatures. All techniques studied provided data that the studied extract does well at all temperatures, and its inhibitory action increases with increasing its concentration. SEM images indicate thin-film formation on mild steel when corroded in solutions containing 1 g L-1 of inhibitor either at low or high temperatures. The polarization studies showed that SSE acts as an anodic inhibitor. Both polarization and impedance techniques show an acceleration behaviour for SSE at concentrations ≤ 0.1 g L-1 at all temperatures. At concentrations ≥ 0.1 g L-1, the efficiency of SSE is dramatically increased with increasing concentration, and its value does not change appreciably with increasing temperature. It was found that all adsorption data obeyed Temkin adsorption isotherm. Kinetic activation and thermodynamic adsorption parameters are evaluated and discussed. The results revealed an endothermic corrosion process with an associative activation mechanism, while a comprehensive adsorption mechanism for SSE on mild steel surfaces is suggested, in which both physical and chemical adsorption are involved in the adsorption process. A good correlation between inhibitor constituents and their inhibitory action was obtained.

Keywords: corrosion, inhibition of steel, hydrochloric acid, thermodynamic study

Procedia PDF Downloads 100
1290 Challenges for Interface Designers in Designing Sensor Dashboards in the Context of Industry 4.0

Authors: Naveen Kumar, Shyambihari Prajapati

Abstract:

Industry 4.0 is the fourth industrial revolution that focuses on interconnectivity of machine to machine, human to machine and human to human via Internet of Things (IoT). Technologies of industry 4.0 facilitate communication between human and machine through IoT and forms Cyber-Physical Production System (CPPS). In CPPS, multiple shop floors sensor data are connected through IoT and displayed through sensor dashboard to the operator. These sensor dashboards have enormous amount of information to be presented which becomes complex for operators to perform monitoring, controlling and interpretation tasks. Designing handheld sensor dashboards for supervision task will become a challenge for the interface designers. This paper reports emerging technologies of industry 4.0, changing context of increasing information complexity in consecutive industrial revolutions and upcoming design challenges for interface designers in context of Industry 4.0. Authors conclude that information complexity of sensor dashboards design has increased with consecutive industrial revolutions and designs of sensor dashboard causes cognitive load on users. Designing such complex dashboards interfaces in Industry 4.0 context will become main challenges for the interface designers.

Keywords: Industry4.0, sensor dashboard design, cyber-physical production system, Interface designer

Procedia PDF Downloads 129
1289 Operational Software Maturity: An Aerospace Industry Analysis

Authors: Raúl González Muñoz, Essam Shehab, Martin Weinitzke, Chris Fowler, Paul Baguley

Abstract:

Software applications have become crucial to the aerospace industry, providing a wide range of functionalities and capabilities used during the design, manufacturing and support of aircraft. However, as this criticality increases, so too does the risk for business operations when facing a software failure. Hence, there is a need for new methodologies to be developed to support aerospace companies in effectively managing their software portfolios, avoiding the hazards of business disruption and additional costs. This paper aims to provide a definition of operational software maturity, and how this can be used to assess software operational behaviour, as well as a view on the different aspects that drive software maturity within the aerospace industry. The key research question addressed is, how can operational software maturity monitoring assist the aerospace industry in effectively managing large software portfolios? This question has been addressed by conducting an in depth review of current literature, by working closely with aerospace professionals and by running an industry case study within a major aircraft manufacturer. The results are a software maturity model composed of a set of drivers and a prototype tool used for the testing and validation of the research findings. By utilising these methodologies to assess the operational maturity of software applications in aerospace, benefits in maintenance activities and operations disruption avoidance have been observed, supporting business cases for system improvement.

Keywords: aerospace, software lifecycle, software maintenance, software maturity

Procedia PDF Downloads 326
1288 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 61
1287 Quantitative Structure–Activity Relationship Analysis of Some Benzimidazole Derivatives by Linear Multivariate Method

Authors: Strahinja Z. Kovačević, Lidija R. Jevrić, Sanja O. Podunavac Kuzmanović

Abstract:

The relationship between antibacterial activity of eighteen different substituted benzimidazole derivatives and their molecular characteristics was studied using chemometric QSAR (Quantitative Structure–Activity Relationships) approach. QSAR analysis has been carried out on inhibitory activity towards Staphylococcus aureus, by using molecular descriptors, as well as minimal inhibitory activity (MIC). Molecular descriptors were calculated from the optimized structures. Principal component analysis (PCA) followed by hierarchical cluster analysis (HCA) and multiple linear regression (MLR) was performed in order to select molecular descriptors that best describe the antibacterial behavior of the compounds investigated, and to determine the similarities between molecules. The HCA grouped the molecules in separated clusters which have the similar inhibitory activity. PCA showed very similar classification of molecules as the HCA, and displayed which descriptors contribute to that classification. MLR equations, that represent MIC as a function of the in silico molecular descriptors were established. The statistical significance of the estimated models was confirmed by standard statistical measures and cross-validation parameters (SD = 0.0816, F = 46.27, R = 0.9791, R2CV = 0.8266, R2adj = 0.9379, PRESS = 0.1116). These parameters indicate the possibility of application of the established chemometric models in prediction of the antibacterial behaviour of studied derivatives and structurally very similar compounds.

Keywords: antibacterial, benzimidazole, molecular descriptors, QSAR

Procedia PDF Downloads 364
1286 Timescape-Based Panoramic View for Historic Landmarks

Authors: H. Ali, A. Whitehead

Abstract:

Providing a panoramic view of famous landmarks around the world offers artistic and historic value for historians, tourists, and researchers. Exploring the history of famous landmarks by presenting a comprehensive view of a temporal panorama merged with geographical and historical information presents a unique challenge of dealing with images that span a long period, from the 1800’s up to the present. This work presents the concept of temporal panorama through a timeline display of aligned historic and modern images for many famous landmarks. Utilization of this panorama requires a collection of hundreds of thousands of landmark images from the Internet comprised of historic images and modern images of the digital age. These images have to be classified for subset selection to keep the more suitable images that chronologically document a landmark’s history. Processing of historic images captured using older analog technology under various different capturing conditions represents a big challenge when they have to be used with modern digital images. Successful processing of historic images to prepare them for next steps of temporal panorama creation represents an active contribution in cultural heritage preservation through the fulfillment of one of UNESCO goals in preservation and displaying famous worldwide landmarks.

Keywords: cultural heritage, image registration, image subset selection, registered image similarity, temporal panorama, timescapes

Procedia PDF Downloads 165
1285 An Exploration of Health Promotion Approach to Increase Optimal Complementary Feeding among Pastoral Mothers Having Children between 6 and 23 Months in Dikhil, Djibouti

Authors: Haruka Ando

Abstract:

Undernutrition of children is a critical issue, especially for people in the remote areas of the Republic of Djibouti, since household food insecurity, inadequate child caring and feeding, unhealthy environment and lack of clean water, as well as insufficient maternal and child healthcare, are underlying causes which affect. Nomadic pastoralists living in the Dikhil region (Dikhil) are socio-economically and geographically more vulnerable due to displacement, which in turn worsens the situation of child stunting. A high prevalence of inappropriate complementary feeding among pastoral mothers might be a significant barrier to child growth. This study aims to identify health promotion intervention strategies that would support an increase in optimal complementary feeding among pastoral mothers of children aged 6-23 months in Dikhil. There are four objectives; to explore and to understand the existing practice of complementary feeding among pastoral mothers in Dikhil; to identify the barriers in appropriate complementary feeding among the mothers; to critically explore and analyse the strategies for an increase in complementary feeding among the mothers; to make pragmatic recommendations to address the barriers in Djibouti. This is an in-depth study utilizing a conceptual framework, the behaviour change wheel, to analyse the determinants of complementary feeding and categorize health promotion interventions for increasing optimal complementary feeding among pastoral mothers living in Dikhil. The analytical tool was utilized to appraise the strategies to mitigate the selected barriers against optimal complementary feeding. The data sources were secondary literature from both published and unpublished sources. The literature was systematically collected. The findings of the determinants including the barriers of optimal complementary feeding were identified: heavy household workload, caring for multiple children under five, lack of education, cultural norms and traditional eating habits, lack of husbands' support, poverty and food insecurity, lack of clean water, low media coverage, insufficient health services on complementary feeding, fear, poor personal hygiene, and mothers' low decision-making ability and lack of motivation for food choice. To mitigate selected barriers of optimal complementary feeding, four intervention strategies based on interpersonal communication at the community-level were chosen: scaling up mothers' support groups, nutrition education, grandmother-inclusive approach, and training for complementary feeding counseling. The strategies were appraised through the criteria of effectiveness and feasibility. Scaling up mothers' support groups could be the best approach. Mid-term and long-term recommendations are suggested based on the situation analysis and appraisal of intervention strategies. Mid-term recommendations include complementary feeding promotion interventions are integrated into the healthcare service providing system in Dikhil, and donor agencies advocate and lobby the Ministry of Health Djibouti (MoHD) to increase budgetary allocation on complementary feeding promotion to implement interventions at a community level. Moreover, the recommendations include a community health management team in Dikhil training healthcare workers and mother support groups by using complementary feeding communication guidelines and monitors behaviour change of pastoral mothers and health outcome of their children. Long-term recommendations are the MoHD develops complementary feeding guidelines to cover sector-wide collaboration for multi-sectoral related barriers.

Keywords: Afar, child food, child nutrition, complementary feeding, complementary food, developing countries, Djibouti, East Africa, hard-to-reach areas, Horn of Africa, nomad, pastoral, rural area, Somali, Sub-Saharan Africa

Procedia PDF Downloads 125
1284 An Evaluation of Kahoot Application and Its Environment as a Learning Tool

Authors: Muhammad Yasir Babar, Ebrahim Panah

Abstract:

Over the past 20 years, internet has seen continual advancement and with the advent of online technology, various types of web-based games have been developed. Games are frequently being used among different age groups from baby boomers to generation Z. Games are not only used for entertainment but also utilized as a learning approach transmitting education to a level that is more interesting and effective for students. One of the popular web-based education games is Kahoot with growing popularity and usage, which is being used in different fields of studies. However, little knowledge is available on university students’ perception of Kahoot environment and application for learning subjects. Hence, the objective of the current study is to investigate students’ perceptions of Kahoot application and environment as a learning tool. The study employed a survey approach by distributing Google Forms –created questionnaire, with high level of reliability index, to 62 students (11 males and 51 females). The findings show that students have positive attitudes towards Kahoot application and its environment for learning. Regarding Kahoot application, it was indicated that activities created using Kahoot are more interesting for students, Kahoot is useful for collaborative learning, and Kahoot enhances interest in learning lesson. In terms of Kahoot environment, it was found that using this application through mobile is easy for students, its design is simple and useful, Kahoot-created activities can easily be shared, and the application can easily be used on any platform. The findings of the study have implications for instructors, policymakers and curriculum developers.

Keywords: application, environment, Kahoot, learning tool

Procedia PDF Downloads 134
1283 The User Experience Evaluation Study on Gamified Classroom via Prezi

Authors: Wong Seng Yue

Abstract:

Game dynamics and game mechanics are the two main components that used in gamification to engage and encourage students to learn. The advantages of gamified classroom are engaging students, increasing students interest, preserving students focus and remain a positive behaviour. However, the empirical studies on gamification are still at early stage, especially the effectiveness of various gamification components have not been evaluated. Thus, this study is aimed to conduct a user experience (UX) evaluation on gamified classroom through Prezi, which focused on learning experience, gaming experience, adaptivity, and gameplay experience. This study is a further study extended from the previous exploratory study to explore more on UX of gamified classroom via Prezi by interview. A focus group study, which involves 22 students from a foundation course has been conducted for the study. Besides the empirical data from the previous study, this focus group study has significantly found that 90.9% respondents show their positive perceptions on gaming experience via Prezi. They are interested, feel fresh, good, and highly motivated of the contents of Prezi. 95.5% participants have had a positive learning experience from the gamified classroom via Prezi, which can engage them, made them concentrate on learning and easy to remember what they have learned if compared to the traditional classroom slides. The adaptivity of the gamified classroom also high due to its zooming user interface, narrative, rewards and engagement features. This study has uncovered on how far the impact of gamification components in the classroom, especially UX that implemented in gamified classroom.

Keywords: user experience (UX), gamification, gamified classroom, Prezi

Procedia PDF Downloads 209