Search results for: research data sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 39934

Search results for: research data sharing

39724 Green Building Practices: Harmonizing Non-Governmental Organizations Roles and Energy Efficiency

Authors: Abimbola A. Adebayo, Kikelomo I. Adebayo

Abstract:

Green buildings provide serious challenges for governments all over the world with regard to achieving energy efficiency in buildings. Energy efficient buildings are needed to keep up with minimal impacts on the environment throughout their cycle and to enhance sustainable development. The lack of awareness and benefits of energy efficient buildings have given rise to NGO’s playing important role in filling data gaps, publicizing information, and undertaking awareness raising and policy engagement activities. However, these roles are countered by concerns about subsidies for evaluations, incentives to facilitate data-sharing, and incentives to finance independent research. On the basis of literature review on experiences with NGO’s involvement in energy efficient buildings, this article identifies governance strategies that stimulate the harmonization of NGO’s roles in green buildings with the objective to increase energy efficiency in buildings.

Keywords: energy efficiency, green buildings, NGOs, sustainable development

Procedia PDF Downloads 219
39723 Web-GIS Technology: A Tool for Farm-to-Market Road Project Profiling and Proposal Prioritization of the Philippines’ Department of Agriculture

Authors: Elbert S. Moyon, Edsel Matt O. Morales, Jaymer M. Jayoma, Kent C. Espejon, Jayson C. Dollete, Mark Phil B. Pacot

Abstract:

This research paper focuses on the potential of using Web-GIS technology in prioritizing farm-to-market road projects by the Philippines’ Department of Agriculture (DA). The study aimed to explore the benefits of Web-GIS in addressing the limitations faced by the DA in terms of Farm to Market Road profiling and project prioritization, which include a lack of access to updated data, limited spatial analysis capabilities, and difficulties in sharing information between stakeholders. The research methodology involves a comprehensive literature review and a case study of a Web-GIS application developed for the DA, which was used to profile and prioritize farm-to-market road projects in the Philippines. The results showed that the Web-GIS technology provides the DA with an effective tool for analyzing and visualizing data, which can help in profiling and prioritizing road projects based on various criteria such as economic, social, and environmental impacts. The study also showed that Web-GIS technology could help in reducing the time and effort required for road project prioritization and improve communication between stakeholders.

Keywords: GIS, web application, farm-to-market road, FMR prioritization, Django, GeoServer

Procedia PDF Downloads 66
39722 Data Mining As A Tool For Knowledge Management: A Review

Authors: Maram Saleh

Abstract:

Knowledge has become an essential resource in today’s economy and become the most important asset of maintaining competition advantage in organizations. The importance of knowledge has made organizations to manage their knowledge assets and resources through all multiple knowledge management stages such as: Knowledge Creation, knowledge storage, knowledge sharing and knowledge use. Researches on data mining are continues growing over recent years on both business and educational fields. Data mining is one of the most important steps of the knowledge discovery in databases process aiming to extract implicit, unknown but useful knowledge and it is considered as significant subfield in knowledge management. Data miming have the great potential to help organizations to focus on extracting the most important information on their data warehouses. Data mining tools and techniques can predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. This review paper explores the applications of data mining techniques in supporting knowledge management process as an effective knowledge discovery technique. In this paper, we identify the relationship between data mining and knowledge management, and then focus on introducing some application of date mining techniques in knowledge management for some real life domains.

Keywords: Data Mining, Knowledge management, Knowledge discovery, Knowledge creation.

Procedia PDF Downloads 189
39721 Analysis of Knowledge Circulation in Digital Learning Environments: A Case Study of the MOOC 'Communication des Organisations'

Authors: Hasna Mekkaoui Alaoui, Mariem Mekkaoui Alaoui

Abstract:

In a context marked by a growing and pressing demand for online training within Moroccan universities, massive open online courses (Moocs) are undergoing constant evolution, amplified by the widespread use of digital technology and accentuated by the Coronavirus pandemic. However, despite their growing popularity and expansion, these courses are still lacking in terms of tools, enabling teachers and researchers to carry out a fine-grained analysis of the learning processes taking place within them. What's more, the circulation and sharing of knowledge within these environments is becoming increasingly important. The crucial aspect of traceability emerges here, as MOOCs record and generate traces from the most minute to the most visible. This leads us to consider traceability as a valuable approach in the field of educational research, where the trace is envisaged as a research tool in its own right. In this exploratory research project, we are looking at aspects of community knowledge sharing based on traces observed in the "Communication des organisations" Mooc. Focusing in particular on the mediating trace and its impact in identifying knowledge circulation processes in this learning space, we have mobilized the traces of video capsules as an index of knowledge circulation in the Mooc device. Our study uses a methodological approach based on thematic analysis, and although the results show that learners reproduce knowledge from different video vignettes in almost identical ways, they do not limit themselves to the knowledge provided to them. This research offers concrete perspectives for improving the dynamics of online devices, with a potentially positive impact on the quality of online university teaching.

Keywords: circulation, index, digital environments, mediation., trace

Procedia PDF Downloads 48
39720 Turbulent Channel Flow Synthesis using Generative Adversarial Networks

Authors: John M. Lyne, K. Andrea Scott

Abstract:

In fluid dynamics, direct numerical simulations (DNS) of turbulent flows require large amounts of nodes to appropriately resolve all scales of energy transfer. Due to the size of these databases, sharing these datasets amongst the academic community is a challenge. Recent work has been done to investigate the use of super-resolution to enable database sharing, where a low-resolution flow field is super-resolved to high resolutions using a neural network. Recently, Generative Adversarial Networks (GAN) have grown in popularity with impressive results in the generation of faces, landscapes, and more. This work investigates the generation of unique high-resolution channel flow velocity fields from a low-dimensional latent space using a GAN. The training objective of the GAN is to generate samples in which the distribution of the generated samplesis ideally indistinguishable from the distribution of the training data. In this study, the network is trained using samples drawn from a statistically stationary channel flow at a Reynolds number of 560. Results show that the turbulent statistics and energy spectra of the generated flow fields are within reasonable agreement with those of the DNS data, demonstrating that GANscan produce the intricate multi-scale phenomena of turbulence.

Keywords: computational fluid dynamics, channel flow, turbulence, generative adversarial network

Procedia PDF Downloads 187
39719 Social Media Data Analysis for Personality Modelling and Learning Styles Prediction Using Educational Data Mining

Authors: Srushti Patil, Preethi Baligar, Gopalkrishna Joshi, Gururaj N. Bhadri

Abstract:

In designing learning environments, the instructional strategies can be tailored to suit the learning style of an individual to ensure effective learning. In this study, the information shared on social media like Facebook is being used to predict learning style of a learner. Previous research studies have shown that Facebook data can be used to predict user personality. Users with a particular personality exhibit an inherent pattern in their digital footprint on Facebook. The proposed work aims to correlate the user's’ personality, predicted from Facebook data to the learning styles, predicted through questionnaires. For Millennial learners, Facebook has become a primary means for information sharing and interaction with peers. Thus, it can serve as a rich bed for research and direct the design of learning environments. The authors have conducted this study in an undergraduate freshman engineering course. Data from 320 freshmen Facebook users was collected. The same users also participated in the learning style and personality prediction survey. The Kolb’s Learning style questionnaires and Big 5 personality Inventory were adopted for the survey. The users have agreed to participate in this research and have signed individual consent forms. A specific page was created on Facebook to collect user data like personal details, status updates, comments, demographic characteristics and egocentric network parameters. This data was captured by an application created using Python program. The data captured from Facebook was subjected to text analysis process using the Linguistic Inquiry and Word Count dictionary. An analysis of the data collected from the questionnaires performed reveals individual student personality and learning style. The results obtained from analysis of Facebook, learning style and personality data were then fed into an automatic classifier that was trained by using the data mining techniques like Rule-based classifiers and Decision trees. This helps to predict the user personality and learning styles by analysing the common patterns. Rule-based classifiers applied for text analysis helps to categorize Facebook data into positive, negative and neutral. There were totally two models trained, one to predict the personality from Facebook data; another one to predict the learning styles from the personalities. The results show that the classifier model has high accuracy which makes the proposed method to be a reliable one for predicting the user personality and learning styles.

Keywords: educational data mining, Facebook, learning styles, personality traits

Procedia PDF Downloads 210
39718 Importance of Ethics in Cloud Security

Authors: Pallavi Malhotra

Abstract:

This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.

Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education

Procedia PDF Downloads 310
39717 The Quality of the Presentation Influence the Audience Perceptions

Authors: Gilang Maulana, Dhika Rahma Qomariah, Yasin Fadil

Abstract:

Purpose: This research meant to measure the magnitude of the influence of the quality of the presentation to the targeted audience perception in catching information presentation. Design/Methodology/Approach: This research uses a quantitative research method. The kind of data that uses in this research is the primary data. The population in this research are students the economics faculty of Semarang State University. The sampling techniques uses in this research is purposive sampling. The retrieving data uses questionnaire on 30 respondents. The data analysis uses descriptive analysis. Result: The quality of presentation influential positive against perception of the audience. This proved that the more qualified presentation will increase the perception of the audience. Limitation: Respondents were limited to only 30 people.

Keywords: quality of presentation, presentation, audience, perception, semarang state university

Procedia PDF Downloads 369
39716 Motivations for Using Social Networking Sites by College Students for Educational Purposes

Authors: Kholoud H. Al-Zedjali, Abir S. Al-Harrasi, Ali H. Al-Badi

Abstract:

Recently there has been a dramatic proliferation in the number of social networking sites (SNSs) users; however, little is published about what motivates college students to use SNSs in education. The main goal of this research is to explore the college students’ motives for using SNSs in education. A conceptual framework has therefore been developed to identify the main factors that influence/motivate students to use social networking sites for learning purposes. To achieve the research objectives a quantitative method was used to collect data. A questionnaire has been distributed amongst college students. The results reveal that social influence, perceived enjoyment, institute regulation, perceived usefulness, ranking up-lift, attractiveness, communication tools, free of charge, sharing material and course nature all play an important role in the motivation of college students to use SNSs for learning purposes.

Keywords: Social Networking Sites (SNSs), education, college students, motivations

Procedia PDF Downloads 247
39715 A Primer to the Learning Readiness Assessment to Raise the Sharing of E-Health Knowledge amongst Libyan Nurses

Authors: Mohamed Elhadi M. Sharif, Mona Masood

Abstract:

The usage of e-health facilities is seen to be the first priority by the Libyan government. As such, this paper focuses on how the key factors or elements of working size in terms of technological availability, structural environment, and other competence-related matters may affect nurses’ sharing of knowledge in e-health. Hence, this paper investigates learning readiness assessment to raise e-health for Libyan regional hospitals by using e-health services in nursing education.

Keywords: Libyan nurses, e-learning readiness, e-health, nursing education

Procedia PDF Downloads 473
39714 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 370
39713 Control the Flow of Big Data

Authors: Shizra Waris, Saleem Akhtar

Abstract:

Big data is a research area receiving attention from academia and IT communities. In the digital world, the amounts of data produced and stored have within a short period of time. Consequently this fast increasing rate of data has created many challenges. In this paper, we use functionalism and structuralism paradigms to analyze the genesis of big data applications and its current trends. This paper presents a complete discussion on state-of-the-art big data technologies based on group and stream data processing. Moreover, strengths and weaknesses of these technologies are analyzed. This study also covers big data analytics techniques, processing methods, some reported case studies from different vendor, several open research challenges and the chances brought about by big data. The similarities and differences of these techniques and technologies based on important limitations are also investigated. Emerging technologies are suggested as a solution for big data problems.

Keywords: computer, it community, industry, big data

Procedia PDF Downloads 176
39712 Three-Stage Mining Metals Supply Chain Coordination and Product Quality Improvement with Revenue Sharing Contract

Authors: Hamed Homaei, Iraj Mahdavi, Ali Tajdin

Abstract:

One of the main concerns of miners is to increase the quality level of their products because the mining metals price depends on their quality level; however, increasing the quality level of these products has different costs at different levels of the supply chain. These costs usually increase after extractor level. This paper studies the coordination issue of a decentralized three-level supply chain with one supplier (extractor), one mineral processor and one manufacturer in which the increasing product quality level cost at the processor level is higher than the supplier and at the level of the manufacturer is more than the processor. We identify the optimal product quality level for each supply chain member by designing a revenue sharing contract. Finally, numerical examples show that the designed contract not only increases the final product quality level but also provides a win-win condition for all supply chain members and increases the whole supply chain profit.

Keywords: three-stage supply chain, product quality improvement, channel coordination, revenue sharing

Procedia PDF Downloads 169
39711 Digital Repository as a Service: Enhancing Access and Preservation of Cultural Heritage Artefacts

Authors: Lefteris Tsipis, Demosthenes Vouyioukas, George Loumos, Antonis Kargas, Dimitris Varoutas

Abstract:

The employment of technology and digitization is crucial for cultural organizations to establish and sustain digital repositories for their cultural heritage artefacts. This utilization is also essential in facilitating the presentation of cultural works and exhibits to a broader audience. Consequently, in this work, we propose a digital repository that functions as Software as a Service (SaaS), primarily promoting the safe storage, display, and sharing of cultural materials, enhancing accessibility, and fostering a deeper understanding and appreciation of cultural heritage. Moreover, the proposed digital repository service is designed as a multitenant architecture, which enables organizations to expand their reach, enhance accessibility, foster collaboration, and ensure the preservation of their content. Specifically, this project aims to assist each cultural institution in organizing its digital cultural assets into collections and feeding other digital platforms, including educational, museum, pedagogical, and games, through appropriate interfaces. Moreover, the creation of this digital repository offers a cutting-edge and effective open-access laboratory solution. It allows organizations to have a significant influence on their audiences by fostering cultural understanding and appreciation. Additionally, it facilitates the connection between different digital repositories and national/European aggregators, promoting collaboration and information sharing. By embracing this solution, cultural institutions can benefit from shared resources and features, such as system updates, backup and recovery services, and data analytics tools, that are provided by the platform.

Keywords: cultural technologies, gaming technologies, web sharing, digital repository

Procedia PDF Downloads 57
39710 Studyt on New Strategies of Sustainable Neighbourhood Design Based on the 2014 Waf

Authors: Zhou Xiaowen China, Zhang Sanming China

Abstract:

Neighbourhood space as a very important part of city spaces, is an organic combination of material environment and spiritual achievement in people’ daily life, and has a real impact upon the sustainable development of the whole city. Looking back on the past 2014 World Architecture Festival (WAF), 4 out of 35winning buildings were neighbourhood designs, and all of them mentioned about space-sharing and sustainable development. In this paper, three award-winning cases were studied, including the world building of the year—the chapel (Vietnam, A21 studio), The Carve (Norway, A-Lab) and House for Trees (Vietnam, Vo Trong Nghia Architects). Urban context, planning, space construction and sustainable technology were discussed. Based on those, it was discovered that passive energy-saving technologies have been paid more and more attention, sharing space has been designed ingeniously, and the architectural forms of them reflect social inclusion and equity. This paper is aimed at summarizing the excellent works on the Festival and providing reference for the future design.

Keywords: neighbourhood design, 2014 World Architecture Festival (WAF), sustainable development, space-sharing

Procedia PDF Downloads 427
39709 Conceptualizing the Knowledge to Manage and Utilize Data Assets in the Context of Digitization: Case Studies of Multinational Industrial Enterprises

Authors: Martin Böhmer, Agatha Dabrowski, Boris Otto

Abstract:

The trend of digitization significantly changes the role of data for enterprises. Data turn from an enabler to an intangible organizational asset that requires management and qualifies as a tradeable good. The idea of a networked economy has gained momentum in the data domain as collaborative approaches for data management emerge. Traditional organizational knowledge consequently needs to be extended by comprehensive knowledge about data. The knowledge about data is vital for organizations to ensure that data quality requirements are met and data can be effectively utilized and sovereignly governed. As this specific knowledge has been paid little attention to so far by academics, the aim of the research presented in this paper is to conceptualize it by proposing a “data knowledge model”. Relevant model entities have been identified based on a design science research (DSR) approach that iteratively integrates insights of various industry case studies and literature research.

Keywords: data management, digitization, industry 4.0, knowledge engineering, metamodel

Procedia PDF Downloads 338
39708 The Potential of Shifting Urban Village to Public Housing through Sharing Economy: Case Study of Shenzhen

Authors: Xinrui Gao

Abstract:

This research aims to explore the potential of shifting urban villages to public housing in China. In common practice, the central and local governments established two divided systems of urban redevelopment and public housing, including aims, design ideas, policy, headquarters, and branch offices. In most cases, the urban regeneration and public housing projects satisfy only the selected part of the society who can afford it (urban regeneration) or meet the requirements (public housing), which fail to cover the housing demand. However, there are many similarities between these two types of housing under the background of a shared economy, especially in target groups, affordable prices, and efficient use of spaces. Shenzhen always takes the lead in China’s urban regeneration and housing reformation. There are some top-down approaches to transforming housing in the urban village into public housing at present. These new approaches will provide a good chance to evaluate existing practices and explore the future development path of urban villages; while at the same time it could positively influence the housing problem in China.

Keywords: urban village, public housing, sharing economy, urban redevelopment

Procedia PDF Downloads 104
39707 Digital Twin for Retail Store Security

Authors: Rishi Agarwal

Abstract:

Digital twins are emerging as a strong technology used to imitate and monitor physical objects digitally in real time across sectors. It is not only dealing with the digital space, but it is also actuating responses in the physical space in response to the digital space processing like storage, modeling, learning, simulation, and prediction. This paper explores the application of digital twins for enhancing physical security in retail stores. The retail sector still relies on outdated physical security practices like manual monitoring and metal detectors, which are insufficient for modern needs. There is a lack of real-time data and system integration, leading to ineffective emergency response and preventative measures. As retail automation increases, new digital frameworks must control safety without human intervention. To address this, the paper proposes implementing an intelligent digital twin framework. This collects diverse data streams from in-store sensors, surveillance, external sources, and customer devices and then Advanced analytics and simulations enable real-time monitoring, incident prediction, automated emergency procedures, and stakeholder coordination. Overall, the digital twin improves physical security through automation, adaptability, and comprehensive data sharing. The paper also analyzes the pros and cons of implementation of this technology through an Emerging Technology Analysis Canvas that analyzes different aspects of this technology through both narrow and wide lenses to help decision makers in their decision of implementing this technology. On a broader scale, this showcases the value of digital twins in transforming legacy systems across sectors and how data sharing can create a safer world for both retail store customers and owners.

Keywords: digital twin, retail store safety, digital twin in retail, digital twin for physical safety

Procedia PDF Downloads 57
39706 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 245
39705 Data Challenges Facing Implementation of Road Safety Management Systems in Egypt

Authors: A. Anis, W. Bekheet, A. El Hakim

Abstract:

Implementing a Road Safety Management System (SMS) in a crowded developing country such as Egypt is a necessity. Beginning a sustainable SMS requires a comprehensive reliable data system for all information pertinent to road crashes. In this paper, a survey for the available data in Egypt and validating it for using in an SMS in Egypt. The research provides some missing data, and refer to the unavailable data in Egypt, looking forward to the contribution of the scientific society, the authorities, and the public in solving the problem of missing or unreliable crash data. The required data for implementing an SMS in Egypt are divided into three categories; the first is available data such as fatality and injury rates and it is proven in this research that it may be inconsistent and unreliable, the second category of data is not available, but it may be estimated, an example of estimating vehicle cost is available in this research, the third is not available and can be measured case by case such as the functional and geometric properties of a facility. Some inquiries are provided in this research for the scientific society, such as how to improve the links among stakeholders of road safety in order to obtain a consistent, non-biased, and reliable data system.

Keywords: road safety management system, road crash, road fatality, road injury

Procedia PDF Downloads 106
39704 Hydrological Benefits Sharing Concepts in Constructing Friendship Dams on Transboundary Tigris River Between Iraq and Turkey

Authors: Thair Mahmood Altaiee

Abstract:

Because of the increasing population and the growing water requirements from the transboundary water resources within riparian countries in addition to un-proper management of these transboundary water resources, it is likely that a conflicts on the water will be occurred. So it is mandatory to search solutions to mitigate the action and probabilities of these undesired conflicts. One of the solutions for these crises may be sharing the riparian countries in the management of their transboundary water resources and share benefit. Effective cooperation on a transboundary river is any action by the riparian countries that lead to improve management of the river to their mutual acceptance. In principle, friendship dams constructed by riparian countries may play an important role in preventing conflicts like the Turkish-Syrian friendship dam on Asi river (Orontes), Iranian-Tukmenistan dam on Hariroud river, Bulgarian-Turkish dam on Tundzha river, Brazil-Paraguay dam on Parana river, and Aras dam between Iran and Azerbaijan. The objective of this study is to focus the light on the hydrological aspects of cooperation in constructing dams on the transboundary rivers, which may consider an option to prevent conflicts on water between the riparian countries. The various kinds of benefits and external impacts associated with cooperation in dams construction on the transboundary rivers with a real examples will be presented and analyzed. The hydrological benefit sharing from cooperation in dams construction, which type of benefit sharing mechanisms are applicable to dams, and how they vary were discussed. The study considered the cooperative applicability to dams on shared rivers according to selected case study of friendship dams in the world to illustrate the relevance of the cooperation concepts and the feasibility of such propose cooperation between Turkey and Iraq within the Tigris river. It is found that the opportunities of getting benefit from cooperation depend mainly on the hydrological boundary and location of the dam in relation to them. The desire to cooperate on dams construction on transboundary rivers exists if the location of a dam upstream will increase aggregate net benefits. The case studies show that various benefit sharing mechanisms due to cooperation in constructing friendship dams on the riparian countries border are possible for example when the downstream state (Iraq) convinces the upstream state (Turkey) to share building a dam on Tigris river across the Iraqi –Turkish border covering the cost and sharing the net benefit derived from this dam. These initial findings may provide guidance for riparian states engaged in and donors facilitating negotiation on dam projects on transboundary rivers.

Keywords: friendship dams, transboundary rivers, water cooperation, benefit sharing

Procedia PDF Downloads 125
39703 Two-stage Robust Optimization for Collaborative Distribution Network Design Under Uncertainty

Authors: Reza Alikhani

Abstract:

This research focuses on the establishment of horizontal cooperation among companies to enhance their operational efficiency and competitiveness. The study proposes an approach to horizontal collaboration, called coalition configuration, which involves partnering companies sharing distribution centers in a network design problem. The paper investigates which coalition should be formed in each distribution center to minimize the total cost of the network. Moreover, potential uncertainties, such as operational and disruption risks, are considered during the collaborative design phase. To address this problem, a two-stage robust optimization model for collaborative distribution network design under surging demand and facility disruptions is presented, along with a column-and-constraint generation algorithm to obtain exact solutions tailored to the proposed formulation. Extensive numerical experiments are conducted to analyze solutions obtained by the model in various scenarios, including decisions ranging from fully centralized to fully decentralized settings, collaborative versus non-collaborative approaches, and different amounts of uncertainty budgets. The results show that the coalition formation mechanism proposes some solutions that are competitive with the savings of the grand coalition. The research also highlights that collaboration increases network flexibility and resilience while reducing costs associated with demand and capacity uncertainties.

Keywords: logistics, warehouse sharing, robust facility location, collaboration for resilience

Procedia PDF Downloads 53
39702 Empirical Analysis of Forensic Accounting Practices for Tackling Persistent Fraud and Financial Irregularities in the Nigerian Public Sector

Authors: Sani AbdulRahman Bala

Abstract:

This empirical study delves into the realm of forensic accounting practices within the Nigerian Public Sector, seeking to quantitatively analyze their efficacy in addressing the persistent challenges of fraud and financial irregularities. With a focus on empirical data, this research employs a robust methodology to assess the current state of fraud in the Nigerian Public Sector and evaluate the performance of existing forensic accounting measures. Through quantitative analyses, including statistical models and data-driven insights, the study aims to identify patterns, trends, and correlations associated with fraudulent activities. The research objectives include scrutinizing documented fraud cases, examining the effectiveness of established forensic accounting practices, and proposing data-driven strategies for enhancing fraud detection and prevention. Leveraging quantitative methodologies, the study seeks to measure the impact of technological advancements on forensic accounting accuracy and efficiency. Additionally, the research explores collaborative mechanisms among government agencies, regulatory bodies, and the private sector by quantifying the effects of information sharing on fraud prevention. The empirical findings from this study are expected to provide a nuanced understanding of the challenges and opportunities in combating fraud within the Nigerian Public Sector. The quantitative insights derived from real-world data will contribute to the refinement of forensic accounting strategies, ensuring their effectiveness in addressing the unique complexities of financial irregularities in the public sector. The study's outcomes aim to inform policymakers, practitioners, and stakeholders, fostering evidence-based decision-making and proactive measures for a more resilient and fraud-resistant financial governance system in Nigeria.

Keywords: fraud, financial irregularities, nigerian public sector, quantitative investigation

Procedia PDF Downloads 40
39701 Creating a Quasi-Folklore as a Tool for Knowledge Sharing in a Family-Based Business

Authors: Chico A. E. Hindarto

Abstract:

Knowledge management practices are more contextual when they combine with the corporate culture. Each entity has a specific cultural climate that enables knowledge sharing in both functional and individual levels. The interactions between people within organization can be influenced by the culture and how the knowledge is transmitted. On the other hand, these interactions have impacts in culture modification as well. Storytelling is one of the methods in delivering the knowledge throughout the organization. This paper aims to explore the possibility in using a quasi-folklore in the family-based business. Folklore is defined as informal tradition culture that spreading through a word-of-mouth, without knowing the source of the story. In this paper, the quasi-folklore term is used to differentiate it with the original term of folklore. The story is created by somebody in the organization, not like the folklore with unknown source. However, the source is not disclosed, in order to avoid the predicted interest from the story origin. The setting of family-based business is deliberately chosen, since the kinship is considerably strong in this type of entity. Through a thorough literature review that relates to knowledge management, storytelling, and folklore, this paper determines how folklore can be an option for knowledge sharing within the organization.

Keywords: folklore, family business, organizational culture, knowledge management, storytelling

Procedia PDF Downloads 267
39700 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 307
39699 Optimizing The Residential Design Process Using Automated Technologies

Authors: Martin Georgiev, Milena Nanova, Damyan Damov

Abstract:

Architects, engineers, and developers need to analyse and implement a wide spectrum of data in different formats, if they want to produce viable residential developments. Usually, this data comes from a number of different sources and is not well structured. The main objective of this research project is to provide parametric tools working with real geodesic data that can generate residential solutions. Various codes, regulations and design constraints are described by variables and prioritized. In this way, we establish a common workflow for architects, geodesists, and other professionals involved in the building and investment process. This collaborative medium ensures that the generated design variants conform to various requirements, contributing to a more streamlined and informed decision-making process. The quantification of distinctive characteristics inherent to typical residential structures allows a systematic evaluation of the generated variants, focusing on factors crucial to designers, such as daylight simulation, circulation analysis, space utilization, view orientation, etc. Integrating real geodesic data offers a holistic view of the built environment, enhancing the accuracy and relevance of the design solutions. The use of generative algorithms and parametric models offers high productivity and flexibility of the design variants. It can be implemented in more conventional CAD and BIM workflow. Experts from different specialties can join their efforts, sharing a common digital workspace. In conclusion, our research demonstrates that a generative parametric approach based on real geodesic data and collaborative decision-making could be introduced in the early phases of the design process. This gives the designers powerful tools to explore diverse design possibilities, significantly improving the qualities of the building investment during its entire lifecycle.

Keywords: architectural design, residential buildings, urban development, geodesic data, generative design, parametric models, workflow optimization

Procedia PDF Downloads 33
39698 A Blockchain-Based Protection Strategy against Social Network Phishing

Authors: Francesco Buccafurri, Celeste Romolo

Abstract:

Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.

Keywords: phishing, social networks, information sharing, blockchain

Procedia PDF Downloads 315
39697 Applications of Big Data in Education

Authors: Faisal Kalota

Abstract:

Big Data and analytics have gained a huge momentum in recent years. Big Data feeds into the field of Learning Analytics (LA) that may allow academic institutions to better understand the learners’ needs and proactively address them. Hence, it is important to have an understanding of Big Data and its applications. The purpose of this descriptive paper is to provide an overview of Big Data, the technologies used in Big Data, and some of the applications of Big Data in education. Additionally, it discusses some of the concerns related to Big Data and current research trends. While Big Data can provide big benefits, it is important that institutions understand their own needs, infrastructure, resources, and limitation before jumping on the Big Data bandwagon.

Keywords: big data, learning analytics, analytics, big data in education, Hadoop

Procedia PDF Downloads 392
39696 The Use of Whatsapp Platform in Spreading Fake News among Mass Communication Students of Abdu Gusau Polytechnic, Talata Mafara

Authors: Aliyu Damri

Abstract:

In every educational institution, students of mass communication receive training to report events and issues accurately and objectively in accordance with official controls. However, the complex nature of society today made it possible to use WhatsApp platform that revolutionizes the means of sharing information, ideas, and experiences. This paper examined how students in the Department of Mass Communication, Abdu Gusau Polytechnic, Talata Mafara used WhatsApp platform in spreading fake news. It used in depth interview techniques and focus group discussion with students as well as the use of published materials to gather related and relevant data. Also, the paper used procedures involved to analyze long interview content. This procedure includes observation of a useful utterance, development of expanded observation, examination of interconnection of observed comments, collective scrutiny of observation for patterns and themes, and review and analysis of the themes across all interviews for development of thesis. The result indicated that inadequate and absent of official controls guiding the conduct of online information sharing, inaccuracies and poor source verification, lack of gate keeping procedures to ensure ethical and legal provisions, bringing users into the process, sharing all information, availability of misinformation, disinformation and rumor and problem of conversation strongly encouraged the emergence of fake news. Surprisingly, the idea of information as a commodity has increased, and transparency of a source as new ethics emerged.

Keywords: disinformation, fake news, group, mass communication, misinformation, WhatsApp

Procedia PDF Downloads 126
39695 OER on Academic English, Educational Research and ICT Literacy, Promoting International Graduate Programs in Thailand

Authors: Maturos Chongchaikit, Sitthikorn Sumalee, Nopphawan Chimroylarp, Nongluck Manowaluilou, Thapanee Thammetha

Abstract:

The 2015 Kasetsart University Research Plan, which was funded by the National Research Institutes: TRF – NRCT, comprises four sub-research projects on the development of three OER websites and on their usage study by students in international programs. The goals were to develop the open educational resources (OER) in the form of websites that will promote three key skills of quality learning and achievement: Academic English, Educational Research, and ICT Literacy, to graduate students in international programs of Thailand. The statistics from the Office of Higher Education showed that the number of foreign students who come to study in international higher education of Thailand has increased respectively by 25 percent per year, proving that the international education system and institutes of Thailand have been already recognized regionally and globally as meeting the standards. The output of the plan: the OER websites and their materials, and the outcome: students’ learning improvement due to lecturers’ readiness for open educational media, will ultimately lead the country to higher business capabilities for international education services in ASEAN Community in the future. The OER innovation is aimed at sharing quality knowledge to the world, with the adoption of Creative Commons Licenses that makes sharing be able to do freely (5Rs openness), without charge and leading to self and life-long learning. The research has brought the problems on the low usage of existing OER in the English language to develop the OER on three specific skills and try them out with the sample of 100 students randomly selected from the international graduate programs of top 10 Thai universities, according to QS Asia University Rankings 2014. The R&D process was used for product evaluation in 2 stages: the development stage and the usage study stage. The research tools were the questionnaires for content and OER experts, the questionnaires for the sample group and the open-ended interviews for the focus group discussions. The data were analyzed using frequency, percentage, mean and SD. The findings revealed that the developed websites were fully qualified as OERs by the experts. The students’ opinions and satisfaction were at the highest levels for both the content and the technology used for presentation. The usage manual and self-assessment guide were finalized during the focus group discussions. The direct participation according to the concept of 5Rs Openness Activities through the provided tools of OER models like MERLOT and OER COMMONS, as well as the development of usage manual and self-assessment guide, were revealed as a key approach to further extend the output widely and sustainably to the network of users in various higher education institutions.

Keywords: open educational resources, international education services business, academic English, educational research, ICT literacy, international graduate program, OER

Procedia PDF Downloads 209