Search results for: user preference
603 Chromatographic Fingerprint Analysis of Methanolic Extract of Camellia sinensis Linn. Leaves
Authors: Babar Ali, Mohammad Rashid, Showkat Rasool Mir, Mohammad Ali, Saiba Shams
Abstract:
Background: The plant Camellia sinensis (Theaceae) is an evergreen shrub indigenous to Assam (India) and parts of China and Japan. Traditional Chinese medicine has recommended green tea for headaches, body aches and pains, digestion, enhancement of immune defense, detoxification, as an energizer and to prolong life. The leaves have more than 700 chemical constituents, among which flavanoids, amino acids, vitamins (C, E, K), caffeine and polysaccharides. Adulteration and substitution may affect the quality of formulation containing tea leaves. Standardization of medicinal preparation is essential for further therapeutic results and for global acceptance. Hence, chromatographic fingerprint profiles were carried out for establishing the standards. Materials and methods: TLC studies for methanolic extracts of the leaves of Camellia sinensis were carried out in a new developed solvent system, Toluene: Ethyl acetate: Formic acid (7:3:1). TLC plates were dried in air, visualized in UV at wavelengths 254 nm and 366 nm and photographed. Results: Results provide valuable clue regarding their polarity and selection of solvents for separation of phytochemicals. Fingerprinting of methanolic extract of Camellia sinensis leaves revealed the presence of various phytochemicals in UV at 254 nm and 366 nm. Conclusion: Fingerprint profile is quite helpful in setting up of standards and thus to keep a check on intentional/unintentional adulteration. TLC offers major advantages over other conventional chromatographic techniques such as unsurpassed flexibility (esp. stationary and mobile phase), choice of detection wavelength, user friendly, rapid and cost effective.Keywords: Cammelia sinensis Linn., standardization, methanolic extract, thin layer chromatography
Procedia PDF Downloads 427602 Using the SMT Solver to Minimize the Latency and to Optimize the Number of Cores in an NoC-DSP Architectures
Authors: Imen Amari, Kaouther Gasmi, Asma Rebaya, Salem Hasnaoui
Abstract:
The problem of scheduling and mapping data flow applications on multi-core architectures is notoriously difficult. This difficulty is related to the rapid evaluation of Telecommunication and multimedia systems accompanied by a rapid increase of user requirements in terms of latency, execution time, consumption, energy, etc. Having an optimal scheduling on multi-cores DSP (Digital signal Processors) platforms is a challenging task. In this context, we present a novel technic and algorithm in order to find a valid schedule that optimizes the key performance metrics particularly the Latency. Our contribution is based on Satisfiability Modulo Theories (SMT) solving technologies which is strongly driven by the industrial applications and needs. This paper, describe a scheduling module integrated in our proposed Workflow which is advised to be a successful approach for programming the applications based on NoC-DSP platforms. This workflow transform automatically a Simulink model to a synchronous dataflow (SDF) model. The automatic transformation followed by SMT solver scheduling aim to minimize the final latency and other software/hardware metrics in terms of an optimal schedule. Also, finding the optimal numbers of cores to be used. In fact, our proposed workflow taking as entry point a Simulink file (.mdl or .slx) derived from embedded Matlab functions. We use an approach which is based on the synchronous and hierarchical behavior of both Simulink and SDF. Whence, results of running the scheduler which exist in the Workflow mentioned above using our proposed SMT solver algorithm refinements produce the best possible scheduling in terms of latency and numbers of cores.Keywords: multi-cores DSP, scheduling, SMT solver, workflow
Procedia PDF Downloads 288601 Potentials for Learning History through Role-Playing in Virtual Reality: An Exploratory Study on Role-Playing on a Virtual Heritage Site
Authors: Danzhao Cheng, Eugene Ch'ng
Abstract:
Virtual Reality technologies can reconstruct cultural heritage objects and sites to a level of realism. Concentrating mostly on documenting authentic data and accurate representations of tangible contents, current virtual heritage is limited to accumulating visually presented objects. Such constructions, however, are fragmentary and may not convey the inherent significance of heritage in a meaningful way. In order to contextualise fragmentary historical contents where history can be told, a strategy is to create a guided narrative via role-playing. Such an approach can strengthen the logical connections of cultural elements and facilitate creative synthesis within the virtual world. This project successfully reconstructed the Ningbo Sanjiangkou VR site in Yuan Dynasty combining VR technology and role-play game approach. The results with 80 pairs of participants suggest that VR role-playing can be beneficial in a number of ways. Firstly, it creates thematic interactivity which encourages users to explore the virtual heritage in a more entertaining way with task-oriented goals. Secondly, the experience becomes highly engaging since users can interpret a historical context through the perspective of specific roles that exist in past societies. Thirdly, personalisation allows open-ended sequences of the expedition, reinforcing user’s acquisition of procedural knowledge relative to the cultural domain. To sum up, role-playing in VR poses great potential for experiential learning as it allows users to interpret a historical context in a more entertaining way.Keywords: experiential learning, maritime silk road, role-playing, virtual heritage, virtual reality
Procedia PDF Downloads 166600 Trading off Accuracy for Speed in Powerdrill
Authors: Filip Buruiana, Alexander Hall, Reimar Hofmann, Thomas Hofmann, Silviu Ganceanu, Alexandru Tudorica
Abstract:
In-memory column-stores make interactive analysis feasible for many big data scenarios. PowerDrill is a system used internally at Google for exploration in logs data. Even though it is a highly parallelized column-store and uses in memory caching, interactive response times cannot be achieved for all datasets (note that it is common to analyze data with 50 billion records in PowerDrill). In this paper, we investigate two orthogonal approaches to optimize performance at the expense of an acceptable loss of accuracy. Both approaches can be implemented as outer wrappers around existing database engines and so they should be easily applicable to other systems. For the first optimization we show that memory is the limiting factor in executing queries at speed and therefore explore possibilities to improve memory efficiency. We adapt some of the theory behind data sketches to reduce the size of particularly expensive fields in our largest tables by a factor of 4.5 when compared to a standard compression algorithm. This saves 37% of the overall memory in PowerDrill and introduces a 0.4% relative error in the 90th percentile for results of queries with the expensive fields. We additionally evaluate the effects of using sampling on accuracy and propose a simple heuristic for annotating individual result-values as accurate (or not). Based on measurements of user behavior in our real production system, we show that these estimates are essential for interpreting intermediate results before final results are available. For a large set of queries this effectively brings down the 95th latency percentile from 30 to 4 seconds.Keywords: big data, in-memory column-store, high-performance SQL queries, approximate SQL queries
Procedia PDF Downloads 260599 Species Profiling of Scarab Beetles with the Help of Light Trap in Western Himalayan Region of Uttarakhand
Authors: Ajay Kumar Pandey
Abstract:
White grub (Coleoptera: Scarabaeidae), locally known as Kurmula, Pagra, Chinchu, is a major destructive pest in western Himalayan region of Uttarakhand state of India. Various crops like cereals (up land paddy, wheat, and barley), vegetables (capsicum, cabbage, tomato, cauliflower, carrot etc) and some pulse (like pigeon pea, green gram, black gram) are grown with limited availability of primary resources. Among the various limitations in successful cultivation of these crops, white grub has been proved a major constraint in for all crops grown in hilly area. The losses incurred due to white grubs are huge in case of commercial crops like sugarcane, groundnut, potato, maize and upland rice. Moreover, it has been proved major constraint in potato production in mid and higher hills of India. Adults emerge in May-June following the onset of monsoon and thereafter defoliate the apple, apricot, plum, and walnut during night while 2nd and 3rd instar grubs feed on live roots of cultivated as well as non cultivated crops from August to January. Survey was conducted in hilly (Pauri and Tehri) as well as plain area (Haridwar district) of Uttarakhand state. Collection of beetle was done from various locations from August to September of five consecutive years with the help of light trap and directly from host plant. The grub was also collected by excavating one square meter area from different locations and reared in laboratory to find out adult. During the collection, the diseased or dead cadaver were also collected and brought in the laboratory and identified the causal organisms. Total 25 species of white grub was identified out of which Holotrichia longipennis, Anomala dimidiata, Holotrichia lineatopennis, Maladera insanabilis, Brahmina sp. make complex problem in different area of Uttarakhand where they cause severe damage to various crops. During the survey, it was observed that white grubs beetles have variation in preference of host plant, even in choice of fruit and leaves of host plant. It was observed that, a white grub species, which identified as Lepidiota mansueta Burmeister., was causing severe havoc to sugarcane crop grown in major sugarcane growing belt of Haridwar district. The study also revealed that Bacillus cereus, Beauveria bassiana, Metarhizium anisopliae, Steinernema, Heterorhabditis are major disease causing agents in immature stage of white grub under rain-fed condition of Uttarakhand which caused 15.55 to 21.63 percent natural mortality of grubs with an average of 18.91 percent. However, among the microorganisms, B. cereus found to be significantly more efficient (7.03 percent mortality) then the entomopathogenic fungi (3.80 percent mortality) and nematodes (3.20 percent mortality).Keywords: Lepidiota, profiling, Uttarakhand, whitegrub
Procedia PDF Downloads 222598 Virtual and Augmented Reality Based Heritage Gamification: Basilica of Smyrna in Turkey
Authors: Tugba Saricaoglu
Abstract:
This study argues about the potential representation and interpretation of Basilica of Smyrna through gamification. Representation can be defined as a key which plays a role as a converter in order to provide interpretation of something according to the person who perceives. Representation of cultural heritage is a hypothetical and factual approach in terms of its sustainable conservation. Today, both site interpreters and public of cultural heritage have varying perspectives due to their different demographic, social, and even cultural backgrounds. Additionally, gamification application offers diversion of methods suchlike video games to improve user perspective of non-game platforms, contexts, and issues. Hence, cultural heritage and video game decided to be analyzed. Moreover, there are basically different ways of representation of cultural heritage such as digital, physical, and virtual methods in terms of conservation. Virtual reality (VR) and augmented reality (AR) technologies are two of the contemporary digital methods of heritage conservation. In this study, 3D documented ruins of the Basilica will be presented in the virtual and augmented reality based technology as a theoretical gamification sample. Also, this paper will focus on two sub-topics: First, evaluation of the video-game platforms applied to cultural heritage sites, and second, potentials of cultural heritage to be represented in video game platforms. The former will cover the analysis of some case(s) with regard to the concepts and representational aspects of cultural heritage. The latter will include the investigation of cultural heritage sites which carry such a potential and their sustainable conversation. Consequently, after mutual collection of information from cultural heritage and video game platforms, a perspective will be provided in terms of interpretation of representation of cultural heritage by sampling that on Basilica of Smyrna by using VR and AR based technologies.Keywords: Basilica of Smyrna, cultural heritage, digital heritage, gamification
Procedia PDF Downloads 469597 Strain Sensing Seams for Monitoring Body Movement
Authors: Sheilla Atieno Odhiambo, Simona Vasile, Alexandra De Raeve, Ann Schwarz
Abstract:
Strain sensing seams have been developed by integrating conductive sewing threads in different types of seams design on a fabric typical for sports clothing using sewing technology. The aim is to have a simple integrated textile strain sensor that can be applied to sports clothing to monitor the movements of the upper body parts of the user during sports. Different types of commercially available sewing threads were used as the bobbin thread in the production of different architectural seam sensors. These conductive sewing threads have been integrated into seams in particular designs using specific seam types. Some of the threads are delicate and needed to be laid into the seam with as little friction as possible and less tension; thus, they could only be sewn in as the bobbin thread and not the needle thread. Stitch type 304; 406; 506; 601;602; 605. were produced. The seams were made on a fabric of 80% polyamide 6.6 and 20% elastane. The seams were cycled(stretch-release-stretch) for five cycles and up to 44 cycles following EN ISO 14704-1: 2005 (modified), using a tensile instrument and the changes in the resistance of the seams with time were recorded using Agilent meter U1273A. Both experiments were conducted simultaneously on the same seam sample. Sensing functionality, among which is sensor gauge and reliability, were evaluated on the promising sensor seams. The results show that the sensor seams made from HC Madeira 40 conductive yarns performed better inseam stitch 304 and 602 compared to the other combination of stitch type and conductive sewing threads. These sensing seams 304, 406 and 602 will further be interconnected to our developed processing and communicating unit and further integrated into a sports clothing prototype that can track body posture. This research is done within the framework of the project SmartSeam.Keywords: conductive sewing thread, sensing seams, smart seam, sewing technology
Procedia PDF Downloads 190596 A Linguistic Product of K-Pop: A Corpus-Based Study on the Korean-Originated Chinese Neologism Simida
Authors: Hui Shi
Abstract:
This article examines the online popularity of Chinese neologism simida, which is a loanword derived from Korean declarative sentence-final suffix seumnida. Facilitated by corpus data obtained from Weibo, the Chinese counterpart of Twitter, this study analyzes the morphological and syntactical processes behind simida’s coinage, as well as the causes of its prevalence on Chinese social media. The findings show that simida is used by Weibo bloggers in two manners: (1) as an alternative word of 'Korea' and 'Korean'; (2) as a redundant sentence-final particle which adds a Korean-like speech style to a statement. Additionally, Weibo user profile analysis further reveals demographical distribution patterns concerning this neologism and highlights young Weibo users in the third-tier cities as the leading adopters of simida. These results are accounted for under the theoretical framework of social indexicality, especially how variations generate style in the indexical field. This article argues that the creation of such an ethnically-targeted neologism is a linguistic demonstration of Chinese netizen’s two-sided attitudes toward the previously heated Korean-wave. The exotic suffix seumnida is borrowed to Chinese as simida due to its high-frequency in Korean cultural exports. Therefore, it gradually becomes a replacement of Korea-related lexical items due to markedness, regardless of semantic prosody. Its innovative implantation to Chinese syntax, on the other hand, reflects Chinese netizens’ active manipulation of language for their online identity building. This study has implications for research on the linguistic construction of identity and style and lays the groundwork for linguistic creativity in the Chinese new media.Keywords: Chinese neologism, loanword, humor, new media
Procedia PDF Downloads 175595 Evaluation of Easy-to-Use Energy Building Design Tools for Solar Access Analysis in Urban Contexts: Comparison of Friendly Simulation Design Tools for Architectural Practice in the Early Design Stage
Abstract:
Current building sector is focused on reduction of energy requirements, on renewable energy generation and on regeneration of existing urban areas. These targets need to be solved with a systemic approach, considering several aspects simultaneously such as climate conditions, lighting conditions, solar radiation, PV potential, etc. The solar access analysis is an already known method to analyze the solar potentials, but in current years, simulation tools have provided more effective opportunities to perform this type of analysis, in particular in the early design stage. Nowadays, the study of the solar access is related to the easiness of the use of simulation tools, in rapid and easy way, during the design process. This study presents a comparison of three simulation tools, from the point of view of the user, with the aim to highlight differences in the easy-to-use of these tools. Using a real urban context as case study, three tools; Ecotect, Townscope and Heliodon, are tested, performing models and simulations and examining the capabilities and output results of solar access analysis. The evaluation of the ease-to-use of these tools is based on some detected parameters and features, such as the types of simulation, requirements of input data, types of results, etc. As a result, a framework is provided in which features and capabilities of each tool are shown. This framework shows the differences among these tools about functions, features and capabilities. The aim of this study is to support users and to improve the integration of simulation tools for solar access with the design process.Keywords: energy building design tools, solar access analysis, solar potential, urban planning
Procedia PDF Downloads 342594 Architecture for QoS Based Service Selection Using Local Approach
Authors: Gopinath Ganapathy, Chellammal Surianarayanan
Abstract:
Services are growing rapidly and generally they are aggregated into a composite service to accomplish complex business processes. There may be several services that offer the same required function of a particular task in a composite service. Hence a choice has to be made for selecting suitable services from alternative functionally similar services. Quality of Service (QoS)plays as a discriminating factor in selecting which component services should be selected to satisfy the quality requirements of a user during service composition. There are two categories of approaches for QoS based service selection, namely global and local approaches. Global approaches are known to be Non-Polynomial (NP) hard in time and offer poor scalability in large scale composition. As an alternative to global methods, local selection methods which reduce the search space by breaking up the large/complex problem of selecting services for the workflow into independent sub problems of selecting services for individual tasks are coming up. In this paper, distributed architecture for selecting services based on QoS using local selection is presented with an overview of local selection methodology. The architecture describes the core components, namely, selection manager and QoS manager needed to implement the local approach and their functions. Selection manager consists of two components namely constraint decomposer which decomposes the given global or workflow level constraints in local or task level constraints and service selector which selects appropriate service for each task with maximum utility, satisfying the corresponding local constraints. QoS manager manages the QoS information at two levels namely, service class level and individual service level. The architecture serves as an implementation model for local selection.Keywords: architecture of service selection, local method for service selection, QoS based service selection, approaches for QoS based service selection
Procedia PDF Downloads 426593 The Relationship between Working Models and Psychological Safety
Authors: Rosyellen Rabelo Szvarça, Pedro Fialho, Auristela Duarte de Lima Moser
Abstract:
Background: New ways of working, such as teleworking or hybrid working, have changed and have impacted both employees and organizations. To understand the individuals' perceptions among different working models, this study aimed to investigate levels of psychological safety among employees working in person, hybrid, and remote environments and the correlation of demographic or professional characteristics. Methods: A cross-sectional survey was distributed electronically. A self-administered questionnaire was composed of sociodemographic data, academic status, professional contexts, working models, and the seven-item instrument of psychological safety. The psychological safety instrument was computed to determine its reliability, showing a Cronbach’s 0.75, considering a good scale when compared to the original, analyzed with 51 teams from a North American company, with a Cronbach's alpha coefficient of 0.82. Results: The survey was completed by 328 individuals, 60% of whom were in-person, 29.3% hybrid, and 10.7% remote. The Chi-Square test with the Bonferroni post-test for qualitative variables associated with the working models indicates a significant association (p 0.001) for academic qualifications. In-person models present 29.4% of individuals with secondary education and 38.1% undergraduate; hybrid present 51% postgraduate and 35.4% undergraduate. This was similar to remote workers, with 48.6% postgraduate and 34.3% undergraduate. There were no significant differences in gender composition between work models (p = 0.738), with most respondents being female in all three work groups. Remote workers predominated in areas such as commerce, marketing, and services; education and the public sector were common in the in-person group, while technology and the financial sector were predominant among hybrid workers (p < 0.001). As for leadership roles, there was no significant association with working models (p = 0.126). The decision on the working model was predominantly made by the organization for in-person and hybrid workers (p < 0.001). Preference for the working model was in line with the workers' scenario at that time (p < 0.001). Kruskal-Wallis test with Bonferroni's post hoc test compared the psychological safety scores between working groups, reveling statistically higher scores in hybrid group x̃ = 5.64 compared to in-person group x̃ = 5, with remote workers showing scores similar to other groups x̃ = 5.43 (p = 0.004). Age demonstrated no significant difference between the working groups (p = 0.052). On the other hand, organization tenure and job tenure were higher in in-person groups compared to the hybrid and remote groups (p < 0.001). The hybrid model illustrates a balance between in-person and remote models. The results highlight that higher levels of psychological safety can be correlated with the flexibility of hybrid work, as well as physical interaction, spontaneity, and informal relationships, which are considered determinants of high levels of psychological safety. Conclusions: Psychological safety at the group level using the seven-item scale is widely employed in comparison to other commonly employed measures. Despite psychological safety having been around for decades, primarily studied in in-person work contexts, the current findings contribute to expanding research with hybrid or remote settings. Ultimately, this investigation has demonstrated the significance of work models in assessing psychological safety levels.Keywords: hybrid work, new ways of working, psychological safety, workplace, working models
Procedia PDF Downloads 12592 Intrusion Detection in Cloud Computing Using Machine Learning
Authors: Faiza Babur Khan, Sohail Asghar
Abstract:
With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.Keywords: cloud security, threats, machine learning, random forest, classification
Procedia PDF Downloads 320591 Qualitative Profiling Model and Competencies Evaluation to Fighting Unemployment
Authors: Francesca Carta, Giovanna Linfante, Laura Agneni, Debora Radicchia, Camilla Micheletta, Angelo Del Cimmuto
Abstract:
Overtaking competence mismatches and fostering career pathways congruent with the individual skills profile would significantly contribute to fighting unemployment. The aim of this paper is to examine the usefulness and efficiency of qualitative tools in supporting and improving the quality of caseworkers’ activities during the jobseekers’ profile analysis and career guidance process. The selected target groups are long-term and middle term unemployed, job seekers, young people at the end of the vocational training pathway and unemployed woman with social disadvantages. The experimentation is conducted in Italy at public employment services in 2017. In the framework of Italian labour market reform, the experimentation represents the first step to develop a customized qualitative model profiling; the final general object is to improve the public employment services quality. The experimentation tests the transferability of an OECD self-assessment competences tool in the Italian public employment services. On one hand, the first analysis results will indicate the user’s perception concerning the tool’s application and their different competence levels (literacy, numeracy, problem solving, career interest, subjective well-being and health, behavioural competencies) with reference to the specific target. On the other hand, the experimentation outcomes will show caseworkers understanding regarding the tool’s usability and efficiency for career guidance and reskilling and upskilling programs.Keywords: career guidance, evaluation competences, reskilling pathway, unemployment
Procedia PDF Downloads 320590 Evaluation Study of Easily Identification of Tactile Symbol on Body Soap Bottle
Authors: K. Doi, T. Nishimura, H. Fujimoto, Y. Hoshikawa, T. Wada
Abstract:
Japanese industrial standard (JIS) association established one JIS (JIS S 0021) regarding packaging accessible design for people with visual impairments and elderly people in 2000. Recently, tactile symbol on shampoo bottle has been known as one of package accessible design and more effectively used. However, it has been said that people with visual impairment have been not been in trouble with difficulty of identifying body soap bottle between three bottles such as body soap bottle, shampoo bottle, and conditioner bottle. Japanese low vision association asked JIS association to solve this problem. JIS association and Japan cosmetic industry association constituted one review team for solving the problem. The review team asked our research team to make a proposal regarding new tactile symbol on body soap bottle. We conducted user survey and maker survey regarding tactile symbol on body soap bottle with easily identification. Seven test tactile symbol marks were elected in our proposed tactile symbols. In this study, we evaluate easily identification of tactile symbol on body soap bottle. Six visual impaired subjects were participated in our experiment. These subjects were asked to identify body soap bottle between three bottles such as body soap bottle, shampoo bottle, and conditioner bottle. The test tactile symbol on body soap were presented in random order. The test tactile symbols were produced by use of our originally developed 3D raised equipment. From our study, test tactile symbol marks with easily identification were made a short list of our proposed tactile symbols. This knowledge will be helpful in revision of ISO 11156.Keywords: tactile symbol, easily identification, body soap, people with visual impairments
Procedia PDF Downloads 313589 Thermal Simulation for Urban Planning in Early Design Phases
Authors: Diego A. Romero Espinosa
Abstract:
Thermal simulations are used to evaluate comfort and energy consumption of buildings. However, the performance of different urban forms cannot be assessed precisely if an environmental control system and user schedules are considered. The outcome of such analysis would lead to conclusions that combine the building use, operation, services, envelope, orientation and density of the urban fabric. The influence of these factors varies during the life cycle of a building. The orientation, as well as the surroundings, can be considered a constant during the lifetime of a building. The structure impacts the thermal inertia and has the largest lifespan of all the building components. On the other hand, the building envelope is the most frequent renovated component of a building since it has a great impact on energy performance and comfort. Building services have a shorter lifespan and are replaced regularly. With the purpose of addressing the performance, an urban form, a specific orientation, and density, a thermal simulation method were developed. The solar irradiation is taken into consideration depending on the outdoor temperature. Incoming irradiation at low temperatures has a positive impact increasing the indoor temperature. Consequently, overheating would be the combination of high outdoor temperature and high irradiation at the façade. On this basis, the indoor temperature is simulated for a specific orientation of the evaluated urban form. Thermal inertia and building envelope performance are considered additionally as the materiality of the building. The results of different thermal zones are summarized using the 'Degree day method' for cooling and heating. During the early phase of a design process for a project, such as Masterplan, conclusions regarding urban form, density and materiality can be drawn by means of this analysis.Keywords: building envelope, density, masterplanning, urban form
Procedia PDF Downloads 145588 A Context Aware Mobile Learning System with a Cognitive Recommendation Engine
Authors: Jalal Maqbool, Gyu Myoung Lee
Abstract:
Using smart devices for context aware mobile learning is becoming increasingly popular. This has led to mobile learning technology becoming an indispensable part of today’s learning environment and platforms. However, some fundamental issues remain - namely, mobile learning still lacks the ability to truly understand human reaction and user behaviour. This is due to the fact that current mobile learning systems are passive and not aware of learners’ changing contextual situations. They rely on static information about mobile learners. In addition, current mobile learning platforms lack the capability to incorporate dynamic contextual situations into learners’ preferences. Thus, this thesis aims to address these issues highlighted by designing a context aware framework which is able to sense learner’s contextual situations, handle data dynamically, and which can use contextual information to suggest bespoke learning content according to a learner’s preferences. This is to be underpinned by a robust recommendation system, which has the capability to perform these functions, thus providing learners with a truly context-aware mobile learning experience, delivering learning contents using smart devices and adapting to learning preferences as and when it is required. In addition, part of designing an algorithm for the recommendation engine has to be based on learner and application needs, personal characteristics and circumstances, as well as being able to comprehend human cognitive processes which would enable the technology to interact effectively and deliver mobile learning content which is relevant, according to the learner’s contextual situations. The concept of this proposed project is to provide a new method of smart learning, based on a capable recommendation engine for providing an intuitive mobile learning model based on learner actions.Keywords: aware, context, learning, mobile
Procedia PDF Downloads 245587 Emotional Characteristics of Preschoolers Due to Parameters of Family Interaction
Authors: Nadezda Sergunicheva, Victoria Vasilenko
Abstract:
The emotional sphere is one of the most important aspects of the child's development and significant factor in his psychological well-being. Present research aims to identify the relationships between emotional characteristics of preschoolers and parameters of family interaction: emotional interaction, parental styles, family adaptation, and cohesion. The study involved 40 people from Saint-Petersburg: 20 children (10 boys and 10 girls) from 5 to 6 years, Mage = 5 years 4 months and 20 mothers. Methods used were: Test 'Emotional identification' by E.Izotova, Empathy test by T. Gavrilova, Children's fears test by A. Zakharov, M. Panfilova, 'Parent-child emotional interaction questionnaire' by E. Zakharova, 'Analysis of family relationships questionnaire by E. Eidemiller and V. Yustitskis, Family Adaptation and Cohesion Scales (FACES III) by D. X. Olson, J. Portner, I. Lavi. Сorrelation analysis revealed that the higher index of underdevelopment of parental feelings, the lower the child’s ability to identify emotions (p < 0,05), but at the same time, the higher ability to understand emotional states (p < 0,01), as in the case of hypoprotection (p < 0,05). Two last correlations can be explained by compensatory mechanism. This is also confirmed by negative correlations between maternal educational uncertainty and child’s ability to understand emotional states and between indulgence and child’s ability to perceive emotional states (p < 0,05). The more pronounced the phobia of a child's loss, the higher egocentric nature of child’s empathy (p < 0,05). The child’s fears have the greatest number of relationships with the characteristics of family interaction. The more pronounced mother’s positive feelings in interaction, emotional support, acceptance of himself as a parent, desire for physical contact with child and the more adaptive the family system, the less the total number of child’s fears (p < 0,05). The more the mother's ability to perceive the child's state, positive feelings in interaction, emotional support (p < 0,01), unconditional acceptance of the child, acceptance of himself as a parent and the desire for physical contact (p < 0,05), the less the amount child’s spatial fears. Socially-mediated fears are associated with less pronounced mother's positive feelings in interaction, less emotional support and deficiency of demands, obligations (p < 0,05). Fears of animals and fairy-tale characters positively correlated with the excessive demands, obligations and excessive sanctions (p < 0,05). The more emotional support (p < 0,01), mother's ability to perceive the child's state, positive feelings in interaction, unconditional acceptance of the child, acceptance of himself as a parent (p < 0,05), the less the amount child’s fears of nightmares. This kind of fears is positively correlated with excessive demands, prohibitions (p < 0,05). The more adaptive the family system (p < 0,01), the higher family cohesion, mother's acceptance of himself as a parent and preference to childish traits (p < 0,05), the less fear of death. Thus, the children's fears have the closest relationships with the characteristics of family interaction. The severity of fears, especially spatial, is connected, first of all, with the emotional side of the mother-parent interaction. Fears of animals and fairy-tale characters are associated with some characteristics of the parental styles, connected with the rigor of mothers. Correlations of the emotional identification are contradictory and require further clarification. Research is supported by RFBR №18-013-00990.Keywords: emotional characteristics, family interaction, fears, parental styles, preschoolers
Procedia PDF Downloads 272586 Design and Implementation of Collaborative Editing System Based on Physical Simulation Engine Running State
Authors: Zhang Songning, Guan Zheng, Ci Yan, Ding Gangyi
Abstract:
The application of physical simulation engines in collaborative editing systems has an important background and role. Firstly, physical simulation engines can provide real-world physical simulations, enabling users to interact and collaborate in real time in virtual environments. This provides a more intuitive and immersive experience for collaborative editing systems, allowing users to more accurately perceive and understand various elements and operations in collaborative editing. Secondly, through physical simulation engines, different users can share virtual space and perform real-time collaborative editing within it. This real-time sharing and collaborative editing method helps to synchronize information among team members and improve the efficiency of collaborative work. Through experiments, the average model transmission speed of a single person in the collaborative editing system has increased by 141.91%; the average model processing speed of a single person has increased by 134.2%; the average processing flow rate of a single person has increased by 175.19%; the overall efficiency improvement rate of a single person has increased by 150.43%. With the increase in the number of users, the overall efficiency remains stable, and the physical simulation engine running status collaborative editing system also has horizontal scalability. It is not difficult to see that the design and implementation of a collaborative editing system based on physical simulation engines not only enriches the user experience but also optimizes the effectiveness of team collaboration, providing new possibilities for collaborative work.Keywords: physics engine, simulation technology, collaborative editing, system design, data transmission
Procedia PDF Downloads 88585 Experimental Investigation of Mechanical Friction Influence in Semi-Hydraulic Clutch Actuation System Over Mileage
Authors: Abdul Azarrudin M. A., Pothiraj K., Kandasamy Satish
Abstract:
In the current automobile scenario, there comes a demand on more sophistication and comfort drive feel on passenger segments. The clutch pedal effort is one such customer touch feels in manual transmission vehicles, where the driver continuous to operate the clutch pedal in his entire the driving maneuvers. Hence optimum pedal efforts at green condition and over mileage to be ensured for fatigue free the driving. As friction is one the predominant factor and its tendency to challenge the technicality by causing the function degradation. One such semi-hydraulic systems shows load efficiency of about 70-75% over lifetime only due to the increase in friction which leads to the increase in pedal effort and cause fatigue to the vehicle driver. This work deals with the study of friction with different interfaces and its influence in the fulcrum points over mileage, with the objective of understanding the trend over mileage and determining the alternative ways of resolving it. In that one way of methodology is the reduction of friction by experimental investigation of various friction reduction interfaces like metal-to-metal interface and it has been tried out and is detailed further. Also, the specific attention has been put up considering the fulcrum load and its contact interfaces to move on with this study. The main results of the experimental data with the influence of three different contact interfaces are being presented with an ultimate intention of ending up into less fatigue with longer consistent pedal effort, thus smoothens the operation of the end user. The Experimental validation also has been done through rig-level test setup to depict the performance at static condition and in-parallel vehicle level test has also been performed to record the additional influences if any.Keywords: automobile, clutch, friction, fork
Procedia PDF Downloads 124584 A Parametric Study of the Effect of Size, Position, and Number of Flexible Membranes Attached to a Circular Cylinder on the Fluid Flow Behavior
Authors: Nabaouia.Maktouf, Ali Ben Moussa, Saïd Turki
Abstract:
This paper discusses the effect of an attached flexible membrane on the control of fluid around a circular cylinder. A parametric study has been investigated for different positions, sizes, modes as well as frequencies of oscillation of the flexible membrane. The numerical investigation was conducted for a Reynolds number equal to 150 using the commercial code Fluent 16.0 and parallel calculation into 4 processors. The motion of the flexible membrane was managed by the dynamic mesh and compiled into Fluent as a user-defined function. The first part of this paper discusses the effect of changing the position of a flexible membrane sized 8° as an angle of aperture on the aerodynamic coefficients. Results show that the flexible membrane placed at 110° from the stagnation point presents more non-linearity on the behavior of the drag coefficient compared to the drag behavior when placed at 180°, relative to the stagnation point. The effect of the size of the flexible surface was studied for the corresponding angles of aperture: 32° and 42°, respectively. The effect of modes (modes 1, 2, and 3) of vibrations has been investigated at a constant frequency of vibration f=2Hz for angles 32° and 42°. All the calculations have been done with a constant amplitude A =0.001m. A non-linearity of the drag coefficient was clearly observed for all the sizes, modes as well as frequencies of excitation. The Fast Fourier transformation shows the appearance of the natural shedding frequency and the multiples of the frequency of excitation. An increase in the modes of oscillation leads to a more linear behavior of the drag coefficient.Keywords: fluid flow control, numerical simulation, dynamic mesh, aerodynamic forces, flexible membrane
Procedia PDF Downloads 76583 Tracing Digital Traces of Phatic Communion in #Mooc
Authors: Judith Enriquez-Gibson
Abstract:
This paper meddles with the notion of phatic communion introduced 90 years ago by Malinowski, who was a Polish-born British anthropologist. It explores the phatic in Twitter within the contents of tweets related to moocs (massive online open courses) as a topic or trend. It is not about moocs though. It is about practices that could easily be hidden or neglected if we let big or massive topics take the lead or if we simply follow the computational or secret codes behind Twitter itself and third party software analytics. It draws from media and cultural studies. Though at first it appears data-driven as I submitted data collection and analytics into the hands of a third party software, Twitonomy, the aim is to follow how phatic communion might be practised in a social media site, such as Twitter. Lurking becomes its research method to analyse mooc-related tweets. A total of 3,000 tweets were collected on 11 October 2013 (UK timezone). The emphasis of lurking is to engage with Twitter as a system of connectivity. One interesting finding is that a click is in fact a phatic practice. A click breaks the silence. A click in one of the mooc website is actually a tweet. A tweet was posted on behalf of a user who simply chose to click without formulating the text and perhaps without knowing that it contains #mooc. Surely, this mechanism is not about reciprocity. To break the silence, users did not use words. They just clicked the ‘tweet button’ on a mooc website. A click performs and maintains connectivity – and Twitter as the medium in attendance in our everyday, available when needed to be of service. In conclusion, the phatic culture of breaking silence in Twitter does not have to submit to the power of code and analytics. It is a matter of human code.Keywords: click, Twitter, phatic communion, social media data, mooc
Procedia PDF Downloads 413582 Social Media Idea Ontology: A Concept for Semantic Search of Product Ideas in Customer Knowledge through User-Centered Metrics and Natural Language Processing
Authors: Martin H¨ausl, Maximilian Auch, Johannes Forster, Peter Mandl, Alexander Schill
Abstract:
In order to survive on the market, companies must constantly develop improved and new products. These products are designed to serve the needs of their customers in the best possible way. The creation of new products is also called innovation and is primarily driven by a company’s internal research and development department. However, a new approach has been taking place for some years now, involving external knowledge in the innovation process. This approach is called open innovation and identifies customer knowledge as the most important source in the innovation process. This paper presents a concept of using social media posts as an external source to support the open innovation approach in its initial phase, the Ideation phase. For this purpose, the social media posts are semantically structured with the help of an ontology and the authors are evaluated using graph-theoretical metrics such as density. For the structuring and evaluation of relevant social media posts, we also use the findings of Natural Language Processing, e. g. Named Entity Recognition, specific dictionaries, Triple Tagger and Part-of-Speech-Tagger. The selection and evaluation of the tools used are discussed in this paper. Using our ontology and metrics to structure social media posts enables users to semantically search these posts for new product ideas and thus gain an improved insight into the external sources such as customer needs.Keywords: idea ontology, innovation management, semantic search, open information extraction
Procedia PDF Downloads 189581 Exploring Data Stewardship in Fog Networking Using Blockchain Algorithm
Authors: Ruvaitha Banu, Amaladhithyan Krishnamoorthy
Abstract:
IoT networks today solve various consumer problems, from home automation systems to aiding in driving autonomous vehicles with the exploration of multiple devices. For example, in an autonomous vehicle environment, multiple sensors are available on roads to monitor weather and road conditions and interact with each other to aid the vehicle in reaching its destination safely and timely. IoT systems are predominantly dependent on the cloud environment for data storage, and computing needs that result in latency problems. With the advent of Fog networks, some of this storage and computing is pushed to the edge/fog nodes, saving the network bandwidth and reducing the latency proportionally. Managing the data stored in these fog nodes becomes crucial as it might also store sensitive information required for a certain application. Data management in fog nodes is strenuous because Fog networks are dynamic in terms of their availability and hardware capability. It becomes more challenging when the nodes in the network also live a short span, detaching and joining frequently. When an end-user or Fog Node wants to access, read, or write data stored in another Fog Node, then a new protocol becomes necessary to access/manage the data stored in the fog devices as a conventional static way of managing the data doesn’t work in Fog Networks. The proposed solution discusses a protocol that acts by defining sensitivity levels for the data being written and read. Additionally, a distinct data distribution and replication model among the Fog nodes is established to decentralize the access mechanism. In this paper, the proposed model implements stewardship towards the data stored in the Fog node using the application of Reinforcement Learning so that access to the data is determined dynamically based on the requests.Keywords: IoT, fog networks, data stewardship, dynamic access policy
Procedia PDF Downloads 60580 Revisionist Powers Seeking for Status within the System by Adopting a Compresence of Cooperative and Competitive Strategies
Authors: Mirele Plenishti
Abstract:
Revisionist powers are sometimes associated to revolutionary and status quo powers, this because along the line representing the level of satisfaction–dissatisfaction with the system, revisionist powers are located in between status quo and revolutionary powers. In particular, the case of revisionist powers seeking for social status adjustments (while having status quo intentions) can, in the first option, be refuted due to the disbelief that dissatisfaction could coexist with status quo intentions – this entailing the possibility to trigger a spiral effect by over-counter-reacting. In the second option, revisionist powers can be underestimated as a real threat, this entailing a potential inadequate reaction. The necessity to well manage international change entails the need to understand better how revisionist powers seek for changes in status, within the system. The complexity of this case is heightened by the propensity of both IR scholars and practitioners to infer states' aims and intentions – towards the system – by looking at their behaviours. This has resulted in the tendency to consider cooperative international behaviours as symptomatic of status quo intentions, and vice versa: status quo intentions as manifested through positive/cooperative behaviours. Similarly, assertive/competitive international behaviours are considered as symptomatic (and vice versa, as manifestations) of revolutionary intentions. Therefore, within complex and composite foreign policies, scholars who disbelieve the existence of revisionist powers with status quo intentions, tend to highlight the negative/competitive elements; while more optimist scholars tend to focus on conforming/cooperative behaviours. Both perspectives, while understanding relevant components of the complex international interaction, still miss a composite overview. In order to closely investigate the strategies adopted by (status quo aiming) revisionist states, and by drawing on sociological studies on peer relations, focused on children's behaviour, one could expect that the compresence of both positive (compliant/cooperative) and negative (competitive/assertive) behaviours, is deliberate, and functional to seeking social status adjustments. Indeed, at the end of 90s, peer relation studies focused on children's behaviour, discerned between the concept of social acceptance (that refers to the degree of social preference assigned to the child– how much is s/he liked) and popularity (which refers to the social status assigned to the child within the group). By building on this distinction, it was possible to identify a link relating social acceptance to prosocial (compliant/cooperative) behaviours and strategies, and popularity to both prosocial and antisocial (aggressive/assertive) behaviours and strategies. Since then, antisocial behaviours ceased to be considered as a proof of social maladjustment and were finally identified as socially recognized strategies adopted in function of the achievement of popularity. Drawing on these results, one can hypothesize that also international status seekers perform both positive (conforming/compliant/cooperative) and negative (assertive/aggressive/competitive) behaviours. Therefore, the link between aims and behaviours loses its strength, since cooperative and competitive behaviours are both means for status seeking strategies that aim at status quo intentions. By carrying out a historical investigation of Italy's foreign policy during fascism, the intent is to closely look at this compresence of behaviours, in order to better qualify its components and their relations.Keywords: compresence of cooperative and competitive behaviours and strategies, revisionist powers, status quo intentions, status seeking
Procedia PDF Downloads 320579 Application of Design Thinking for Technology Transfer of Remotely Piloted Aircraft Systems for the Creative Industry
Authors: V. Santamarina Campos, M. de Miguel Molina, B. de Miguel Molina, M. Á. Carabal Montagud
Abstract:
With this contribution, we want to show a successful example of the application of the Design Thinking methodology, in the European project 'Technology transfer of Remotely Piloted Aircraft Systems (RPAS) for the creative industry'. The use of this methodology has allowed us to design and build a drone, based on the real needs of prospective users. It has demonstrated that this is a powerful tool for generating innovative ideas in the field of robotics, by focusing its effectiveness on understanding and solving real user needs. In this way, with the support of an interdisciplinary team, comprised of creatives, engineers and economists, together with the collaboration of prospective users from three European countries, a non-linear work dynamic has been created. This teamwork has generated a sense of appreciation towards the creative industries, through continuously adaptive, inventive, and playful collaboration and communication, which has facilitated the development of prototypes. These have been designed to enable filming and photography in interior spaces, within 13 sectors of European creative industries: Advertising, Architecture, Fashion, Film, Antiques and Museums, Music, Photography, Televison, Performing Arts, Publishing, Arts and Crafts, Design and Software. Furthermore, it has married the real needs of the creative industries, with what is technologically and commercially viable. As a result, a product of great value has been obtained, which offers new business opportunities for small companies across this sector.Keywords: design thinking, design for effectiveness, methodology, active toolkit, storyboards, PAR, focus group, innovation, RPAS, indoor drone, aerial film, creative industry, end users, stakeholder
Procedia PDF Downloads 204578 Real-Time Land Use and Land Information System in Homagama Divisional Secretariat Division
Authors: Kumara Jayapathma J. H. M. S. S., Dampegama S. D. P. J.
Abstract:
Lands are valuable & limited resource which constantly changes with the growth of the population. An efficient and good land management system is essential to avoid conflicts associated with lands. This paper aims to design the prototype model of a Mobile GIS Land use and Land Information System in real-time. Homagama Divisional Secretariat Division situated in the western province of Sri Lanka was selected as the study area. The prototype model was developed after reviewing related literature. The methodology was consisted of designing and modeling the prototype model into an application running on a mobile platform. The system architecture mainly consists of a Google mapping app for real-time updates with firebase support tools. Thereby, the method of implementation consists of front-end and back-end components. Software tools used in designing applications are Android Studio with JAVA based on GeoJSON File structure. Android Studio with JAVA in GeoJSON File Synchronize to Firebase was found to be the perfect mobile solution for continuously updating Land use and Land Information System (LIS) in real-time in the present scenario. The mobile-based land use and LIS developed in this study are multiple user applications catering to different hierarchy levels such as basic users, supervisory managers, and database administrators. The benefits of this mobile mapping application will help public sector field officers with non-GIS expertise to overcome the land use planning challenges with land use updated in real-time.Keywords: Android, Firebase, GeoJSON, GIS, JAVA, JSON, LIS, Mobile GIS, real-time, REST API
Procedia PDF Downloads 231577 Automated Parking System
Authors: N. Arunraj, C. P. V. Paul, D. M. D. Jayawardena, W. N. D. Fernando
Abstract:
Traffic congestion with increased numbers of vehicles is already a serious issue for many countries. The absence of sufficient parking spaces adds to the issue. Motorists are forced to wait in long queues to park their vehicles. This adds to the inconvenience faced by a motorist, kept waiting for a slot allocation, manually done along with the parking payment calculation. In Sri Lanka, nowadays, parking systems use barcode technology to identify the vehicles at both the entrance and the exit points. Customer management is handled by the use of man power. A parking space is, generally permanently sub divided according to the vehicle type. Here, again, is an issue. Parking spaces are not utilized to the maximum. The current arrangement leaves room for unutilized parking spaces. Accordingly, there is a need to manage the parking space dynamically. As a vehicle enters the parking area, available space has to be assigned for the vehicle according to the vehicle type. The system, Automated Parking System (APS), provides an automated solution using RFID Technology to identify the vehicles. Simultaneously, an algorithm manages the space allocation dynamically. With this system, there is no permanent parking slot allocation for a vehicle type. A desktop application manages the customer. A Web application is used to manage the external users with their reservations. The system also has an android application to view the nearest parking area from the current location. APS is built using java and php. It uses LED panels to guide the user inside the parking area to find the allocated parking slot accurately. The system ensures efficient performance, saving precious time for a customer. Compared with the current parking systems, APS interacts with users and increases customer satisfaction as well.Keywords: RFID, android, web based system, barcode, algorithm, LED panels
Procedia PDF Downloads 600576 Detection of Fuel Theft and Vehicle Position Using Third Party Monitoring Software
Authors: P. Senthilraja, C. Rukumani Khandhan, M. Palaniappan, S. L. Rama, P. Sai Sushimitha, R. Madhan, J. Vinumathi, N. Vijayarangan
Abstract:
Nowadays, the logistics achieve a vast improvement in efficient delivery of goods. The technology improvement also helps to improve its development, but still the owners of transport vehicles face problems, i.e., fuel theft in vehicles by the drivers or by an unknown person. There is no proper solution to overcome the problems. This scheme is to determine the amount of fuel that has been stolen and also to determine the position of the vehicle at a particular time using the technologies like GPS, GSM, ultrasonic fuel level sensor and numeric lock system. The ultrasonic sensor uses the ultrasonic waves to calculate the height of the tank up to which the fuel is available. Based on height it is possible to calculate the amount of fuel. The Global Positioning System (GPS) is a satellite-based navigation system. The scientific community uses GPS for its precision timing capability and position information. The GSM provides the periodic information about the fuel level. A numeric lock system has been provided for fuel tank opening lever. A password is provided to access the fuel tank lever and this is authenticated only by the driver and the owner. Once the fuel tank is opened an alert is sent to owner through a SMS including the timing details. Third party monitoring software is a user interface that updates the information automatically into the database which helps to retrieve the data as and when required. Third party monitoring software provides vehicle’s information to the owner and also shows the status of the vehicle. The techniques that are to be proposed will provide an efficient output. This project helps to overcome the theft and hence to put forth fuel economy.Keywords: fuel theft, third party monitoring software, bioinformatics, biomedicine
Procedia PDF Downloads 393575 High-Frequency Modulation of Light-Emitting Diodes for New Ultraviolet Communications
Authors: Meng-Chyi Wu, Bonn Lin, Jyun-Hao Liao, Chein-Ju Chen, Yu-Cheng Jhuang, Mau-Phon Houng, Fang-Hsing Wang, Min-Chu Liu, Cheng-Fu Yang, Cheng-Shong Hong
Abstract:
Since the use of wireless communications has become critical nowadays, the available RF spectrum has become limited. Ultraviolet (UV) communication system can alleviate the spectrum constraint making UV communication system a potential alternative to future communication demands. Also, UV links can provide faster communication rate and can be used in combination with existing RF communication links, providing new communications diversity with higher user capacity. The UV region of electromagnetic spectrum has been of interest to detector, imaging and communication technologies because the stratospheric ozone layer effectively absorbs some solar UV radiation from reaching the earth surface. The wavebands where most of UV radiation is absorbed by the ozone are commonly known as the solar blind region. By operating in UV-C band (200-280 nm) the communication system can minimize the transmission power consumption since it will have less radiation noise. UV communication uses the UV ray as the medium. Electric signal is carried on this band after being modulated and then be transmitted within the atmosphere as channel. Though the background noise of UV-C communication is very low owing to the solar-blind feature, it leads to a large propagation loss. The 370 nm UV provides a much lower propagation loss than that the UV-C does and the recent device technology for UV source on this band is more mature. The fabricated 370 nm AlGaN light-emitting diodes (LEDs) with an aperture size of 45 m exhibit a modulation bandwidth of 165 MHz at 30 mA and a high power of 7 W/cm2 at 230 A/cm2. In order to solve the problem of low power in single UV LED, a UV LED array is presented in.Keywords: ultraviolet (UV) communication, light-emitting diodes (LEDs), modulation bandwidth, LED array, 370 nm
Procedia PDF Downloads 414574 A Structured Mechanism for Identifying Political Influencers on Social Media Platforms: Top 10 Saudi Political Twitter Users
Authors: Ahmad Alsolami, Darren Mundy, Manuel Hernandez-Perez
Abstract:
Social media networks, such as Twitter, offer the perfect opportunity to either positively or negatively affect political attitudes on large audiences. The existence of influential users who have developed a reputation for their knowledge and experience of specific topics is a major factor contributing to this impact. Therefore, knowledge of the mechanisms to identify influential users on social media is vital for understanding their effect on their audience. The concept of the influential user is related to the concept of opinion leaders' to indicate that ideas first flow from mass media to opinion leaders and then to the rest of the population. Hence, the objective of this research was to provide reliable and accurate structural mechanisms to identify influential users, which could be applied to different platforms, places, and subjects. Twitter was selected as the platform of interest, and Saudi Arabia as the context for the investigation. These were selected because Saudi Arabia has a large number of Twitter users, some of whom are considerably active in setting agendas and disseminating ideas. The study considered the scientific methods that have been used to identify public opinion leaders before, utilizing metrics software on Twitter. The key findings propose multiple novel metrics to compare Twitter influencers, including the number of followers, social authority and the use of political hashtags, and four secondary filtering measures. Thus, using ratio and percentage calculations to classify the most influential users, Twitter accounts were filtered, analyzed and included. The structured approach is used as a mechanism to explore the top ten influencers on Twitter from the political domain in Saudi Arabia.Keywords: Twitter, influencers, structured mechanism, Saudi Arabia
Procedia PDF Downloads 119