Search results for: online advertising mechanism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5892

Search results for: online advertising mechanism

3672 E-Learning in Life-Long Learning: Best Practices from the University of the Aegean

Authors: Chryssi Vitsilaki, Apostolos Kostas, Ilias Efthymiou

Abstract:

This paper presents selected best practices on online learning and teaching derived from a novel and innovating Lifelong Learning program through e-Learning, which has during the last five years been set up at the University of the Aegean in Greece. The university, capitalizing on an award-winning, decade-long experience in e-learning and blended learning in undergraduate and postgraduate studies, recently expanded into continuous education and vocational training programs in various cutting-edge fields. So, in this article we present: (a) the academic structure/infrastructure which has been developed for the administrative, organizational and educational support of the e-Learning process, including training the trainers, (b) the mode of design and implementation based on a sound pedagogical framework of open and distance education, and (c) the key results of the assessment of the e-learning process by the participants, as they are used to feedback on continuous organizational and teaching improvement and quality control.

Keywords: distance education, e-learning, life-long programs, synchronous/asynchronous learning

Procedia PDF Downloads 334
3671 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 290
3670 The Power of Words: A Corpus Analysis of Campaign Speeches of President Donald J. Trump

Authors: Aiza Dalman

Abstract:

Words are powerful when these are used wisely and strategically. In this study, twelve (12) campaign speeches of President Donald J. Trump were analyzed as to frequently used words and ethos, pathos and logos being employed. The speeches were read thoroughly, analyzed and interpreted. With the use of Word Counter Tool and Text Analyzer software accessible online, it was found out that the word ‘will’ has the highest frequency of 121, followed by Hillary (58), American (38), going (35), plan and Clinton (32), illegal (30), government (28), corruption (26) and criminal (24). When the speeches were analyzed as to ethos, pathos and logos, on the other hand, it revealed that these were all employed in his speeches. The statements under these pointed out against Hillary or in his favor. The unique strategy of President Donald J. Trump as to frequently used words and ethos, pathos and logos in persuading people perhaps lead the way to his victory.

Keywords: campaign speeches, corpus analysis, ethos, logos and pathos, power of words

Procedia PDF Downloads 280
3669 Providing Support On-Time: Need to Establish De-Radicalization Hotlines

Authors: Ashir Ahmed

Abstract:

Peacekeeping is a collective responsibility of governments, law enforcement agencies, communities, families, and individuals. Moreover, the complex nature of peacekeeping activities requires a holistic and collaborative approach where various community sectors work together to form collective strategies that are likely to be more effective than strategies designed and delivered in isolation. Similarly, it is important to learn from past programs to evaluate the initiatives that have worked well and the areas that need further improvement. Review of recent peacekeeping initiatives suggests that there have been tremendous efforts and resources put in place to deal with the emerging threat of terrorism, radicalization and violent extremism through number of de-radicalization programs. Despite various attempts in designing and delivering successful programs for deradicalization, the threat of people being radicalized is growing more than ever before. This research reviews the prominent de-radicalization programs to draw an understanding of their strengths and weaknesses. Some of the weaknesses in the existing programs include. Inaccessibility: Limited resources, geographical location of potential participants (for offline programs), inaccessibility or inability to use various technologies (for online programs) makes it difficult for people to participate in de-radicalization programs. Timeliness: People might need to wait for a program on a set date/time to get the required information and to get their questions answered. This is particularly true for offline programs. Lack of trust: The privacy issues and lack of trust between participants and program organizers are another hurdle in the success of de-radicalization programs. The fear of sharing participants information with organizations (such as law enforcement agencies) without their consent led them not to participate in these programs. Generalizability: Majority of these programs are very generic in nature and do not cater the specific needs of an individual. Participants in these programs may feel that the contents are irrelevant to their individual situations and hence feel disconnected with purpose of the programs. To address the above-mentioned weaknesses, this research developed a framework that recommends some improvements in de-radicalization programs. One of the recommendations is to offer 24/7, secure, private and online hotline (also referred as helpline) for the people who have any question, concern or situation to discuss with someone who is qualified (a counsellor) to deal with people who are vulnerable to be radicalized. To make these hotline services viable and sustainable, the existing organizations offering support for depression, anxiety or suicidal ideation could additionally host these services. These helplines should be available via phone, the internet, social media and in-person. Since these services will be embedded within existing and well-known services, they would likely to get more visibility and promotion. The anonymous and secure conversation between a person and a counsellor would ensure that a person can discuss the issues without being afraid of information sharing with any third party – without his/her consent. The next stage of this project would include the operationalization of the framework by collaborating with other organizations to host de-radicalization hotlines and would assess the effectiveness of such initiatives.

Keywords: de-radicalization, framework, hotlines, peacekeeping

Procedia PDF Downloads 214
3668 A Forearm-Wrist Rehabilitation Module for Stroke and Spinal Cord Injuries

Authors: Vahid Mehrabi, Iman Sharifi, H. A. Talebi

Abstract:

The automation of rehabilitation procedure by the implementation of robotic devices can overcome the limitation in conventional physiotherapy methods by increasing training sessions and duration of process. In this paper, the design of a simple rehabilitation robot for forearm-wrist therapy in stroke and spinal cord injuries is presented. Wrist’s biological joint motion is modeled by a gimbal-like mechanism which resembles the human arm anatomy. Presented device is an exoskeleton robot with rotation axes corresponding to human skeleton anatomy. The mechanical structure, actuator and sensor selection, system kinematics and comparison between our device range of motion and required active daily life values is illustrated.

Keywords: rehabilitation, robotic devices, physiotherapy, forearm-wrist

Procedia PDF Downloads 285
3667 Simultaneous Relationship among Strategic Corporate Social Responsibility, Corporate Governance, and Firm Performance: Evidence from Indonesia

Authors: Ayu Diar Sari, Sidharta Utama

Abstract:

The main objective of this study is to examine the empirical association among strategic corporate social responsibility (Strategic CSR), corporate governance (CG), and firm performance by investigating their causal effects. In order to get the comprehensive result, this study uses CSR variables which consist of Strategic CSR, Non-Strategic CSR and CSR as a whole. Exerting the two stage least square (2SLS) method, the result showed that CG mechanism positively influences CSR, Non-Strategic CSR, and firm performance (both ROA and PBV). CSR and Non-Strategic CSR positively influence ROA. Meanwhile CSR, Strategic and Non-Strategic CSR positively influence PBV. Firm’s Strategic CSR engagement plays a significantly positive role in enhancing PBV. The results supported the social impact hypothesis, agency theory, and conflict resolution theory.

Keywords: corporate financial performance, corporate governance, corporate social responsibility, strategic corporate social responsibility

Procedia PDF Downloads 301
3666 Ethereum Based Smart Contracts for Trade and Finance

Authors: Rishabh Garg

Abstract:

Traditionally, business parties build trust with a centralized operating mechanism, such as payment by letter of credit. However, the increase in cyber-attacks and malicious hacking has jeopardized business operations and finance practices. Emerging markets, owing to their higher banking risks and bigger presence of digital financing, are looking forward to technology-driven solutions, financial inclusion and innovative working paradigms. Blockchain has the potential to enhance transaction transparency and supply chain traceability. It has captured a vast landscape with 200 million crypto users worldwide. Fintech and blockchain products are popping up across brokerage, digital wallets, exchanges, post-trade clearance, settlement, middleware, infrastructure, and base protocols.

Keywords: blockchain, distributed ledger technology, decentralized applications, ethereum, smart contracts, trade finance

Procedia PDF Downloads 155
3665 Anti-Western Sentiment amongst Arabs and How It Drives Support for Russia against Ukraine

Authors: Soran Tarkhani

Abstract:

A glance at social media shows that Russia's invasion of Ukraine receives considerable support among Arabs. This significant support for the Russian invasion of Ukraine is puzzling since most Arab leaders openly condemned the Russian invasion through the UN ES‑11/4 Resolution, and Arabs are among the first who experienced the devastating consequences of war firsthand. This article tries to answer this question by using multiple regression to analyze the online content of Arab responses to Russia's invasion of Ukraine on seven major news networks: CNN Arabic, BBC Arabic, Sky News Arabic, France24 Arabic, DW, Aljazeera, and Al-Arabiya. The article argues that the underlying reason for this Arab support is a reaction to the common anti-Western sentiments among Arabs. The empirical result from regression analysis supports the central arguments and uncovers the motivations behind the endorsement of the Russian invasion of Ukraine and the opposing Ukraine by many Arabs.

Keywords: Ukraine, Russia, Arabs, Ukrainians, Russians, Putin, invasion, Europe, war

Procedia PDF Downloads 75
3664 Adsorption of Congo Red on MgO Nanoparticles Prepared by Molten Salt Method

Authors: Shahbaa F. Bdewi, Bakhtyar K. Aziz, Ayad A. R. Mutar

Abstract:

Nano-materials show different surface properties due to their high surface area and active sites. This study investigates the feasibility of using nano-MgO (NMO) for removing Congo red (CR) dye from wastewater. NMO was prepared by molten salt method. Equilibrium experiments show the equilibrium was reached after 120 minutes and maximum adsorption efficiency was obtained in acidic media up to pH 6. Isotherm studies revealed the favorability of the adsorption process. The overall adsorption process was spontaneous and endothermic in nature with a maximum adsorption capacity of 1100 mg g-1 at 40°C as estimated from Langmuir isotherm. The adsorption kinetics was found to follow pseudo second-order rate equation. Relatively high activation energy (180.7 kJ mol-1) was obtained which is consistent with chemisorption mechanism for the adsorption process.

Keywords: adsorption, congo red, magnesium oxide, nanoparticles

Procedia PDF Downloads 209
3663 Common Laws Principles: A Way to Solve Global Environmental Change

Authors: Neelam Kadyan

Abstract:

Global environmental change is happening at an alarming rate in the present world. Floods, Tsunamis’, Avalanches, Change in Weather patterns, Rise in sea temperature, Landslides, are only few evidences of this change. To regulate such alarming growth of global change in environment certain regulatory system or mechanism is required. Nuisance,negligence,absolute liability,strict liability and trespass are some of the effective common law principles which are helpful in environmental problems. What we need today is sufficient law and adequate machinery to enforce the legal standards. Without law environmental standards cannot be enforced and once again there is need to adopt the common law approach in solving the problem of environmental change as through this approach the affected person can get compensation and as the same time it puts check on wrongdoer.

Keywords: global environmental problems, nuisance, negligence, trespass, strict liability, absolute liability

Procedia PDF Downloads 566
3662 A Numerical Studies for Improving the Performance of Vertical Axis Wind Turbine by a Wind Power Tower

Authors: Soo-Yong Cho, Chong-Hyun Cho, Chae-Whan Rim, Sang-Kyu Choi, Jin-Gyun Kim, Ju-Seok Nam

Abstract:

Recently, vertical axis wind turbines (VAWT) have been widely used to produce electricity even in urban. They have several merits such as low sound noise, easy installation of the generator and simple structure without yaw-control mechanism and so on. However, their blades are operated under the influence of the trailing vortices generated by the preceding blades. This phenomenon deteriorates its output power and makes difficulty predicting correctly its performance. In order to improve the performance of VAWT, wind power towers can be applied. Usually, the wind power tower can be constructed as a multi-story building to increase the frontal area of the wind stream. Hence, multiple sets of the VAWT can be installed within the wind power tower, and they can be operated at high elevation. Many different types of wind power tower can be used in the field. In this study, a wind power tower with circular column shape was applied, and the VAWT was installed at the center of the wind power tower. Seven guide walls were used as a strut between the floors of the wind power tower. These guide walls were utilized not only to increase the wind velocity within the wind power tower but also to adjust the wind direction for making a better working condition on the VAWT. Hence, some important design variables, such as the distance between the wind turbine and the guide wall, the outer diameter of the wind power tower, the direction of the guide wall against the wind direction, should be considered to enhance the output power on the VAWT. A numerical analysis was conducted to find the optimum dimension on design variables by using the computational fluid dynamics (CFD) among many prediction methods. The CFD could be an accurate prediction method compared with the stream-tube methods. In order to obtain the accurate results in the CFD, it needs the transient analysis and the full three-dimensional (3-D) computation. However, this full 3-D CFD could be hard to be a practical tool because it requires huge computation time. Therefore, the reduced computational domain is applied as a practical method. In this study, the computations were conducted in the reduced computational domain and they were compared with the experimental results in the literature. It was examined the mechanism of the difference between the experimental results and the computational results. The computed results showed this computational method could be an effective method in the design methodology using the optimization algorithm. After validation of the numerical method, the CFD on the wind power tower was conducted with the important design variables affecting the performance of VAWT. The results showed that the output power of the VAWT obtained using the wind power tower was increased compared to them obtained without the wind power tower. In addition, they showed that the increased output power on the wind turbine depended greatly on the dimension of the guide wall.

Keywords: CFD, performance, VAWT, wind power tower

Procedia PDF Downloads 387
3661 Half Metallic Antiferromagnetic of Doped TiO2 Rutile with Doubles Impurities (Os, Mo) from Ab Initio Calculations

Authors: M. Fakhim Lamrani, M. Ouchri, M. Belaiche, El Kenz, M. Loulidi, A. Benyoussef

Abstract:

Electronic and magnetic calculations based on density functional theory within the generalized gradient approximation for II-VI compound semiconductor TiO2 doped with single impurity Os and Mo; these compounds are a half metallic ferromagnet in their ground state with a total magnetic moment of 2 μB for both systems. Then, TiO2 doped with double impurities Os and Mo have been performed. As result, Ti1-2xOsxMoxO2 with x=0.065 is half-metallic antiferromagnets with 100% spin polarization of the conduction electrons crossing the Fermi level, without showing a net magnetization. Moreover, Ti14OsMoO32 compound is stable energetically than Ti1-xMoxO2 and Ti1-xOsxO2. The antiferromagnetic interaction in Ti1-2xOsxMoxO2 system is attributed to the double exchange mechanism, and the latter could also be the origin of their half metallic.

Keywords: diluted magnetic semiconductor, half-metallic antiferromagnetic, augmented spherical wave method

Procedia PDF Downloads 421
3660 On the Impact of Oil Price Fluctuations on Stock Markets: A Multivariate Long-Memory GARCH Framework

Authors: Manel Youssef, Lotfi Belkacem

Abstract:

This paper employs multivariate long memory GARCH models to simultaneously estimate mean and conditional variance spillover effects between oil prices and different financial markets. Since different financial assets are traded based on these market sector returns, it’s important for financial market participants to understand the volatility transmission mechanism over time and across these series in order to make optimal portfolio allocation decisions. We examine weekly returns from January 1, 2003 to November 30, 2012 and find evidence of significant transmission of shocks and volatilities between oil prices and some of the examined financial markets. The findings support the idea of cross-market hedging and sharing of common information by investors.

Keywords: oil prices, stock indices returns, oil volatility, contagion, DCC-multivariate (FI) GARCH

Procedia PDF Downloads 533
3659 Code-Switching in Facebook Chatting Among Maldivian Teenagers

Authors: Aaidha Hammad

Abstract:

This study examines the phenomenon of code switching among teenagers in the Maldives while they carry out conversations through Facebook in the form of “Facebook Chatting”. The current study aims at evaluating the frequency of code-switching and it investigates between what languages code-switching occurs. Besides the study identifies the types of words that are often codeswitched and the triggers for code switching. The methodology used in this study is mixed method of qualitative and quantitative approach. In this regard, the chat log of a group conversation between 10 teenagers was collected and analyzed. A questionnaire was also administered through online to 24 different teenagers from different corners of the Maldives. The age of teenagers ranged between 16 and 19 years. The findings of the current study revealed that while Maldivian teenagers chat in Facebook they very often code switch and these switches are most commonly between Dhivehi and English, but some other languages are also used to some extent. It also identified the different types of words that are being often code switched among the teenagers. Most importantly it explored different reasons behind code switching among the Maldivian teenagers in Facebook chatting.

Keywords: code-switching, Facebook, Facebook chatting Maldivian teenagers

Procedia PDF Downloads 245
3658 A Framework for Review Spam Detection Research

Authors: Mohammadali Tavakoli, Atefeh Heydari, Zuriati Ismail, Naomie Salim

Abstract:

With the increasing number of people reviewing products online in recent years, opinion sharing websites has become the most important source of customers’ opinions. Unfortunately, spammers generate and post fake reviews in order to promote or demote brands and mislead potential customers. These are notably destructive not only for potential customers but also for business holders and manufacturers. However, research in this area is not adequate, and many critical problems related to spam detection have not been solved to date. To provide green researchers in the domain with a great aid, in this paper, we have attempted to create a high-quality framework to make a clear vision on review spam-detection methods. In addition, this report contains a comprehensive collection of detection metrics used in proposed spam-detection approaches. These metrics are extremely applicable for developing novel detection methods.

Keywords: fake reviews, feature collection, opinion spam, spam detection

Procedia PDF Downloads 413
3657 Effect of Celebrity Endorsements and Social Media Influencers on Brand Loyalty: A Comparative Study

Authors: Dhruv Saini, Megha Sharma, Sharad Gupta

Abstract:

This research is showing the use of celebrity endorsement and social media influencers and how they help in enhancing the brand loyalty of the consumers. The study aims at keeping brand image of the brand as the link between the two. However, choosing the right celebrity or social media influencer is not an easy task and it is very essential for a brand to select the right ambassador for advertising their products and for selling the product to the ultimate consumer. The purpose of the study is to create a relationship of Celebrity endorsement with brand image and with brand loyalty and creating a relationship of Social media influencers with brand image and with brand loyalty and then making a comparison between the two by measuring the effects of both simultaneously. And then by analyzing which among the two has a greater impact on brand loyalty of the consumers. The study mainly focuses on four major variables namely Celebrity endorsement, Social media influencers, Brand image and Brand loyalty. The study also focuses on interdependence and relationships that these variables have with each other and how they are linked with each other. The study also aims at looking which among Celebrity endorsement and Social media influencer has a greater impact on increasing or enhancing the loyalty for a brand. Earlier celebrity endorsers had a major impact on brand loyalty of the consumers but with time social media influencers are also playing a very vital role in impacting the brand loyalty of the consumers and are giving a fight to the celebrity endorsers as well. Also, Brand image also has a very vital role to play in enhancing the brand loyalty of a brand in the minds of the consumers as a well-known and a better perception of a brand leads to retention of more and more consumers. Also, both Celebrity endorsement and Social media influencers are two-way swords as both have a number of positives and a number of negatives as well, so these are to be compared keeping in mind their adverse effects. Examination of the current market situation has shown that the recommendations of celebrities when properly integrated by comparing product strengths. Advertisers agree that celebrity authorization does not guarantee sales but it can create buzz and make the consumer feel better by-product, which is also what customers should expect as a real star by delivering the promise. On the other hand, depending on the results of the studies, there should be a variety of conclusions planned. Some of the influential people on social media had a positive impact on the product portrait. One of the conclusions is that the product image had a positive impact on consumers. Moreover, the results of the following study states that the most influential influencers consumers in their intended purpose of the purchase, but instead produced a positive result indirectly with Brand image which would further lead to brand loyalty .

Keywords: brand image, brand loyalty, celebrity endorsement, social media influencer

Procedia PDF Downloads 195
3656 Modeling a Feedback Concept in a Spherical Thundercloud Cell

Authors: Zemlianskaya Daria, Egor Stadnichuk, Ekaterina Svechnikova

Abstract:

Relativistic runaway electron avalanches (RREAs) are generally accepted as a source of thunderstorms gamma-ray radiation. Avalanches' dynamics in the electric fields can lead to their multiplication via gamma-rays and positrons, which is called relativistic feedback. This report shows that a non-uniform electric field geometry leads to the new RREAs multiplication mechanism - “geometric feedback”, which occurs due to the exchange of high-energy particles between different accelerating regions within a thundercloud. This report will present the results of the simulation in GEANT4 of feedback in a spherical cell. Necessary conditions for the occurrence of geometric feedback were obtained from it.

Keywords: electric field, GEANT4, gamma-rays, relativistic runaway electron avalanches (RREAs), relativistic feedback, the thundercloud

Procedia PDF Downloads 173
3655 Hybrid Hierarchical Routing Protocol for WSN Lifetime Maximization

Authors: H. Aoudia, Y. Touati, E. H. Teguig, A. Ali Cherif

Abstract:

Conceiving and developing routing protocols for wireless sensor networks requires considerations on constraints such as network lifetime and energy consumption. In this paper, we propose a hybrid hierarchical routing protocol named HHRP combining both clustering mechanism and multipath optimization taking into account residual energy and RSSI measures. HHRP consists of classifying dynamically nodes into clusters where coordinators nodes with extra privileges are able to manipulate messages, aggregate data and ensure transmission between nodes according to TDMA and CDMA schedules. The reconfiguration of the network is carried out dynamically based on a threshold value which is associated with the number of nodes belonging to the smallest cluster. To show the effectiveness of the proposed approach HHRP, a comparative study with LEACH protocol is illustrated in simulations.

Keywords: routing protocol, optimization, clustering, WSN

Procedia PDF Downloads 469
3654 Hybrid Multipath Congestion Control

Authors: Akshit Singhal, Xuan Wang, Zhijun Wang, Hao Che, Hong Jiang

Abstract:

Multiple Path Transmission Control Protocols (MPTCPs) allow flows to explore path diversity to improve the throughput, reliability and network resource utilization. However, the existing solutions may discourage users to adopt the solutions in the face of multipath scenario where different paths are charged based on different pricing structures, e.g., WiFi vs cellular connections, widely available for mobile phones. In this paper, we propose a Hybrid MPTCP (H-MPTCP) with a built-in mechanism to incentivize users to use multiple paths with different pricing structures. In the meantime, H-MPTCP preserves the nice properties enjoyed by the state-of-the-art MPTCP solutions. Extensive real Linux implementation results verify that H-MPTCP can indeed achieve the design objectives.

Keywords: network, TCP, WiFi, cellular, congestion control

Procedia PDF Downloads 718
3653 Improving Fire Resistance of Wood and Wood-Based Composites and Fire Testing Systems

Authors: Nadir Ayrilmis

Abstract:

Wood and wood-based panels are one of the oldest structural materials used in the construction industry due to their significant advantages such as good mechanical properties, low density, renewable material, low-cost, recycling, etc. However, they burn when exposed to a flame source or high temperatures. This is very important when the wood products are used as structural or hemi-structural materials in the construction industry, furniture industry, so on. For this reason, the fire resistance is demanded property for wood products. They can be impregnated with fire retardants to improve their fire resistance. The most used fire retardants, fire-retardant mechanism, and fire-testing systems, and national and international fire-durability classifications and standard requirements for fire-durability of wood and wood-based panels were given in this study.

Keywords: fire resistance, wood-based panels, cone calorimeter, wood

Procedia PDF Downloads 165
3652 Optimal Tuning of a Fuzzy Immune PID Parameters to Control a Delayed System

Authors: S. Gherbi, F. Bouchareb

Abstract:

This paper deals with the novel intelligent bio-inspired control strategies, it presents a novel approach based on an optimal fuzzy immune PID parameters tuning, it is a combination of a PID controller, inspired by the human immune mechanism with fuzzy logic. Such controller offers more possibilities to deal with the delayed systems control difficulties due to the delay term. Indeed, we use an optimization approach to tune the four parameters of the controller in addition to the fuzzy function; the obtained controller is implemented in a modified Smith predictor structure, which is well known that it is the most efficient to the control of delayed systems. The application of the presented approach to control a three tank delay system shows good performances and proves the efficiency of the method.

Keywords: delayed systems, fuzzy immune PID, optimization, Smith predictor

Procedia PDF Downloads 433
3651 Behavior of Reinforced Concrete Structures Subjected to Multiple Floor Fire Loads

Authors: Suresh Narayana, Chaitanya Akkannavar

Abstract:

Assessment of behavior of reinforced concrete structures subjected to fire load, and its behavior for the multi-floor fire have been presented in this paper. This research is the part of the study to evaluate the performance of ten storied RC structure when it is subjected to fire loads at multiple floors and to evaluate the post-fire effects on structure such as deflection and stresses occurring due to combined effect of static and thermal loading. Thermal loading has been assigned to different floor levels to estimate the critical floors that initiate the collapse of the structure. The structure has been modeled and analyzed in Solid Works and commercially available Finite Element Software ABAQUS. Results are analyzed, and particular design solution has been suggested.

Keywords: collapse mechanism, fire analysis, RC structure, stress vs temperature

Procedia PDF Downloads 472
3650 Environmental Impact of Gas Field Decommissioning

Authors: Muhammad Ahsan

Abstract:

The effective decommissioning of oil and gas fields and related assets is one of the most important challenges facing the oil and gas industry today and in the future. Decommissioning decisions can no longer be avoided by the operators and the industry as a whole. Decommissioning yields no return on investment and carries significant regulatory liabilities. The main objective of this paper is to provide an approach and mechanism for the estimation of emissions associated with decommissioning of Oil and Gas fields. The model uses gate to gate approach and considers field life from development phase up to asset end life. The model incorporates decommissioning processes which includes; well plugging, plant dismantling, wellhead, and pipeline dismantling, cutting and temporary fabrication, new manufacturing from raw material and recycling of metals. The results of the GHG emissions during decommissioning phase are 2.31x10-2 Kg CO2 Eq. per Mcf of the produced natural gas. Well plug and abandonment evolved to be the most GHG emitting activity with 84.7% of total field decommissioning operational emissions.

Keywords: LCA (life cycle analysis), gas field, decommissioning, emissions

Procedia PDF Downloads 186
3649 The Influence of COVID-19 Pandemic: Global Policies Towards Chinese International Students

Authors: Xuefan Li, Donghua Li, Juanjuan Li

Abstract:

This study explores the changes in policies toward Chinese students studying abroad in different countries during the pre-pandemic, pandemic, and post-pandemic periods. Interviews and questionnaire surveys were conducted with participating institutions at the China International Education Exhibition. The results indicate that institutions were impacted by the pandemic differently, with a gradual recovery in the two years following the initial outbreak. Institutions encourage and support Chinese students to resume offline studies during the post-pandemic period. The impact of the pandemic on the recruitment of Chinese students by international institutions varied, with different measures being adopted by different institutions. Compared with universities, colleges were more affected in terms of student employment rates. Some institutions were able to respond quickly and effectively to the pandemic due to their online teaching platforms. Overall, this study is expected to provide insights into the changes in policies toward Chinese students studying abroad during the pandemic and highlights the diverse responses of international institutions.

Keywords: international education, Chinese international education, COVID-19 pandemic, international institutions

Procedia PDF Downloads 87
3648 Design and Evaluation of a Pneumatic Muscle Actuated Gripper

Authors: Tudor Deaconescu, Andrea Deaconescu

Abstract:

Deployment of pneumatic muscles in various industrial applications is still in its early days, considering the relative newness of these components. The field of robotics holds particular future potential for pneumatic muscles, especially in view of their specific behaviour known as compliance. The paper presents and discusses an innovative constructive solution for a gripper system mountable on an industrial robot, based on actuation by a linear pneumatic muscle and transmission of motion by gear and rack mechanism. The structural, operational and constructive models of the new gripper are presented, along with some of the experimental results obtained subsequently to the testing of a prototype. Further presented are two control variants of the gripper system, one by means of a 3/2-way fast-switching solenoid valve, the other by means of a proportional pressure regulator. Advantages and disadvantages are discussed for both variants.

Keywords: gripper system, pneumatic muscle, structural modelling, robotics

Procedia PDF Downloads 235
3647 Its about Cortana, Microsoft’s Virtual Assistant

Authors: Aya Idriss, Esraa Othman, Lujain Malak

Abstract:

Artificial intelligence is the emulation of human intelligence processes by machines, particularly computer systems that act logically. Some of the specific applications of AI include natural language processing, speech recognition, and machine vision. Cortana is a virtual assistant and she’s an example of an AI Application. Microsoft made it possible for this app to be accessed not only on laptops and PCs but can be downloaded on mobile phones and used as a virtual assistant which was a huge success. Cortana can offer a lot apart from the basic orders such as setting alarms and marking the calendar. Its capabilities spread past that, for example, it provides us with listening to music and podcasts on the go, managing my to-do list and emails, connecting with my contacts hands-free by simply just telling the virtual assistant to call somebody, gives me instant answers and so on. A questionnaire was sent online to numerous friends and family members to perform the study, which is critical in evaluating Cortana's recognition capacity and the majority of the answers were in favor of Cortana’s capabilities. The results of the questionnaire assisted us in determining the level of Cortana's skills.

Keywords: artificial intelligence, Cortana, AI, abstract

Procedia PDF Downloads 176
3646 An Empirical Investigation of Big Data Analytics: The Financial Performance of Users versus Vendors

Authors: Evisa Mitrou, Nicholas Tsitsianis, Supriya Shinde

Abstract:

In the age of digitisation and globalisation, businesses have shifted online and are investing in big data analytics (BDA) to respond to changing market conditions and sustain their performance. Our study shifts the focus from the adoption of BDA to the impact of BDA on financial performance. We explore the financial performance of both BDA-vendors (business-to-business) and BDA-clients (business-to-customer). We distinguish between the five BDA-technologies (big-data-as-a-service (BDaaS), descriptive, diagnostic, predictive, and prescriptive analytics) and discuss them individually. Further, we use four perspectives (internal business process, learning and growth, customer, and finance) and discuss the significance of how each of the five BDA-technologies affects the performance measures of these four perspectives. We also present the analysis of employee engagement, average turnover, average net income, and average net assets for BDA-clients and BDA-vendors. Our study also explores the effect of the COVID-19 pandemic on business continuity for both BDA-vendors and BDA-clients.

Keywords: BDA-clients, BDA-vendors, big data analytics, financial performance

Procedia PDF Downloads 124
3645 Perceived Ethnic Discrimination, Aggression, and School Connectedness among Adolescents in Finland

Authors: Isik Z. Ulubas, Kaj Bjorkqvist

Abstract:

The relationships between perceived ethnic discrimination, peer aggression and school connectedness are being examined among 1,000 adolescents in Ostrobothnia, Finland with an online questionnaire. The study aims at investigating perceived ethnic discrimination in school environment by peers and teachers, and within society in general. Six types of aggressive behavior are measured: physical, verbal, indirect, and cyber aggression, in addition to both verbal and physical sexual harassment. High perceived ethnic discrimination is expected to be related with high aggression and low school connectedness. Adolescents who have special diet and clothing because of their cultural or religious background are expected to score higher on perceived ethnic discrimination and lower school connectedness. Adolescents who have lower domestic language skills (Finnish/Swedish) are expected to show lower school connectedness and higher perceived ethnic discrimination.

Keywords: adolescents, aggression, ethnic discrimination, school connectedness

Procedia PDF Downloads 223
3644 Social Aspects and Successfully Funding a Crowd-Funding Project: The Impact of Social Information

Authors: Peggy S. C. van Teunenbroek

Abstract:

Recently, philanthropic crowd-funding -the raising of external funding from a large audience via social networks or social media- emerged as a new funding instrument for the Dutch cultural sector. However, such philanthropic crowdfunding in the US and the Netherlands is less successful than any other form of crowdfunding. We argue that social aspects are an important stimulus in philanthropic crowd-funding since previous research has shown that crowdfunding is stimulated by something beyond financial merits. Put simply, crowd-funding seems to be a socially motivated activity. In this paper we focus on the effect of social information, described as information about the donation behavior of previous donors. Using a classroom experiment we demonstrated a positive effect of social information on the donation behavior in crowdfunding campaigns. Our study extends previous research by showing who is affected by social information and why, and highlights how social information can be used to stimulate individuals to donate more to crowdfunding projects.

Keywords: online donation behavior, philanthropic crowdfunding, social information, social influence, social motivation

Procedia PDF Downloads 405
3643 The Use of Social Media in the Recruitment Process as HR Strategy

Authors: Seema Sant

Abstract:

In the 21st century were four generation workforces are working, it’s crucial for organizations to build talent management strategy, as tech-savvy Gen Y has entered the work force. They are more connected to each other than ever – through the internet enabled Social media networks Social media has become important in today’s world. The users of such Social media sites have increased in multiple. From sharing their opinion for a brand/product to researching a company before going for an interview, making a conception about a company’s culture or following a Company’s updates due to sheer interest or for job vacancy, Work force today is constantly in touch with social networks. Thus corporate world has rightly realized its potential uses for business purpose. Companies now use social media for marketing, advertising, consumer survey, etc. For HR professionals, it is used for networking and connecting to the Talent pool- through Talent Community. Social recruiting is the process of sourcing or hiring candidates through the use of social sites such as LinkedIn, Facebook Twitter which provide them with an array of information about potential employee; this study represents an exploratory investigation on the role of social networking sites in recruitment. The primarily aim is to analyze the factors that can enhance the channel of recruitment used by of the recruiter with specific reference to the IT organizations in Mumbai, India. Particularly, the aim is to identify how and why companies use social media to attract and screen applicants during their recruitment processes. It also examines the advantages and limitations of recruitment through social media for employers. This is done by literature review. Further, the papers examine the recruiter impact and understand the various opportunities which have created due to technology, thus, to analyze and examine these factors, both primary, as well as secondary data, are collected for the study. The primary data are gathered from five HR manager working in five top IT organizations in Mumbai and 100 HR consultants’ i.e., recruiter. The data was collected by conducting a survey and supplying a closed-ended questionnaire. A comprehension analysis of the study is depicted through graphs and figures. From the analysis, it was observed that there exists a positive relationship between the level of employee recruited through social media and their organizational commitment. Finally the findings show that company’s i.e. recruiters are currently using social media in recruitment, but perhaps not as effective as they could be. The paper gives recommendations and conditions for success that can help employers to make the most out of social media in recruitment.

Keywords: recruitment, social media, social sites, workforce

Procedia PDF Downloads 179