Search results for: IPTV service application
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11449

Search results for: IPTV service application

9079 Lean and Six Sigma in the Freight Railway Supplier Base in South Africa: Factors Leading to Their Application

Authors: Hilda Kundai Chikwanda, Lawrence Thabo Mokhadi

Abstract:

The study aimed to review the factors that lead the freight railway suppliers base in South Africa (SA) to apply the Lean and Six Sigma (L&SS) methodologies. A thorough review of the factors that lead organisations, in the different industries, to implement these methodologies was done. L&SS applications were found to be prominent in the automotive industry. In particular, the railway industry in SA and the region were reviewed in terms of challenges in capturing the freight logistics market and growing market share. Qualitative methods have been used to collect primary data and descriptive statistics was used to calculate, describe, and summarize collected research data. The results show that external factors have a greater influence on the implementation of L&SS. The study drew inferences between freight railway supplier base and the application of Lean and Six Sigma (L&SS) methodologies in the SA context. It identified challenges that leads the SA freight railway to lose market share to road freight users. It further observes and recommends that L&SS methodologies are the ideal strategy required to implement a turnaround in the trajectory of freight railways as a competitive freight transport solution.

Keywords: production, methodology, manufacturing, lean, six sigma

Procedia PDF Downloads 45
9078 Synthesis of MIPs towards Precursors and Intermediates of Illicit Drugs and Their following Application in Sensing Unit

Authors: K. Graniczkowska, N. Beloglazova, S. De Saeger

Abstract:

The threat of synthetic drugs is one of the most significant current drug problems worldwide. The use of drugs of abuse has increased dramatically during the past three decades. Among others, Amphetamine-Type Stimulants (ATS) are globally the second most widely used drugs after cannabis, exceeding the use of cocaine and heroin. ATS are potent central nervous system (CNS) stimulants, capable of inducing euphoric static similar to cocaine. Recreational use of ATS is widespread, even though warnings of irreversible damage of the CNS were reported. ATS pose a big problem and their production contributes to the pollution of the environment by discharging big volumes of liquid waste to sewage system. Therefore, there is a demand to develop robust and sensitive sensors that can detect ATS and their intermediates in environmental water samples. A rapid and simple test is required. Analysis of environmental water samples (which sometimes can be a harsh environment) using antibody-based tests cannot be applied. Therefore, molecular imprinted polymers (MIPs), which are known as synthetic antibodies, have been chosen for that approach. MIPs are characterized with a high mechanical and thermal stability, show chemical resistance in a broad pH range and various organic or aqueous solvents. These properties make them the preferred type of receptors for application in the harsh conditions imposed by environmental samples. To the best of our knowledge, there are no existing MIPs-based sensors toward amphetamine and its intermediates. Also not many commercial MIPs for this application are available. Therefore, the aim of this study was to compare different techniques to obtain MIPs with high specificity towards ATS and characterize them for following use in a sensing unit. MIPs against amphetamine and its intermediates were synthesized using a few different techniques, such as electro-, thermo- and UV-initiated polymerization. Different monomers, cross linkers and initiators, in various ratios, were tested to obtain the best sensitivity and polymers properties. Subsequently, specificity and selectivity were compared with commercially available MIPs against amphetamine. Different linkers, such as lipoic acid, 3-mercaptopioponic acid and tyramine were examined, in combination with several immobilization techniques, to select the best procedure for attaching particles on sensor surface. Performed experiments allowed choosing an optimal method for the intended sensor application. Stability of MIPs in extreme conditions, such as highly acidic or basic was determined. Obtained results led to the conclusion about MIPs based sensor applicability in sewage system testing.

Keywords: amphetamine type stimulants, environment, molecular imprinted polymers, MIPs, sensor

Procedia PDF Downloads 250
9077 Application of Rapid Prototyping to Create Additive Prototype Using Computer System

Authors: Meftah O. Bashir, Fatma A. Karkory

Abstract:

Rapid prototyping is a new group of manufacturing processes, which allows fabrication of physical of any complexity using a layer by layer deposition technique directly from a computer system. The rapid prototyping process greatly reduces the time and cost necessary to bring a new product to market. The prototypes made by these systems are used in a range of industrial application including design evaluation, verification, testing, and as patterns for casting processes. These processes employ a variety of materials and mechanisms to build up the layers to build the part. The present work was to build a FDM prototyping machine that could control the X-Y motion and material deposition, to generate two-dimensional and three-dimensional complex shapes. This study focused on the deposition of wax material. This work was to find out the properties of the wax materials used in this work in order to enable better control of the FDM process. This study will look at the integration of a computer controlled electro-mechanical system with the traditional FDM additive prototyping process. The characteristics of the wax were also analysed in order to optimize the model production process. These included wax phase change temperature, wax viscosity and wax droplet shape during processing.

Keywords: rapid prototyping, wax, manufacturing processes, shape

Procedia PDF Downloads 464
9076 Application of Data Mining Techniques for Tourism Knowledge Discovery

Authors: Teklu Urgessa, Wookjae Maeng, Joong Seek Lee

Abstract:

Application of five implementations of three data mining classification techniques was experimented for extracting important insights from tourism data. The aim was to find out the best performing algorithm among the compared ones for tourism knowledge discovery. Knowledge discovery process from data was used as a process model. 10-fold cross validation method is used for testing purpose. Various data preprocessing activities were performed to get the final dataset for model building. Classification models of the selected algorithms were built with different scenarios on the preprocessed dataset. The outperformed algorithm tourism dataset was Random Forest (76%) before applying information gain based attribute selection and J48 (C4.5) (75%) after selection of top relevant attributes to the class (target) attribute. In terms of time for model building, attribute selection improves the efficiency of all algorithms. Artificial Neural Network (multilayer perceptron) showed the highest improvement (90%). The rules extracted from the decision tree model are presented, which showed intricate, non-trivial knowledge/insight that would otherwise not be discovered by simple statistical analysis with mediocre accuracy of the machine using classification algorithms.

Keywords: classification algorithms, data mining, knowledge discovery, tourism

Procedia PDF Downloads 295
9075 Applications of Engineering Geology in Hydro Power Tunnel Projects in Himalayan Geological Regime

Authors: Rameh Chauhan

Abstract:

Tunnel construction in Himalayan rock is a challenging task due to fragile nature of the strata. Tunnel excavation carried out from lower Himalayas to high Himalayas in different metamorphic rock. Therefore application of engineering geology plays a vital role during various stage of the tunneling projects. Engineering geology is defined as application of geology to construction of civil structures through engineering practice. It is applied to the design, construction and performance aspects of engineering structure on the surface or sub-surface like dam, underground and surface power house, cut slopes, tunnels and underground storage cavern for nuclear material. But this paper emphasized mostly on underground structures like big caverns of Power house, desilting chambers, and tunnels of various sizes. Construction of these structures in the fragile rock conditions of Himalayan geology from Western Himalayas to Eastern Himalayas necessitated the application of the engineering geology on the micro-scale base for the stability, performance, and longevity of the civil structures. Number of hydropower projects have been constructed, some of them are under construction and under investigation stage. These projects are located in various parts of Himalayas under various seismic-tectonic zones. Tunneling works are involved in these projects. This paper represents the various engineering geological practices adopted in investigation and construction stage of various projects based on experiences gained during past construction histories in Himalayan geology of young mountains in very fragile geological conditions. Highlighting and sharing of use of these techniques on various platforms will definitely enhance the knowledge for carrying out the construction of various projects for the development of society. Construction of the tunnels, surface, and sub-surface caverns, dams, highway, metro, highway tunnels are all based on engineering geological parameters in combinations with other engineering considerations.

Keywords: cavern-power house, desilting chambers and tunnels, seismic-tectonic-zones, earthquake-prone zones based on intensities

Procedia PDF Downloads 223
9074 Financial Assessment of the Hard Coal Mining in the Chosen Region in the Czech Republic: Real Options Methodology Application

Authors: Miroslav Čulík, Petr Gurný

Abstract:

This paper is aimed at the financial assessment of the hard coal mining in a given region by real option methodology application. Hard coal mining in this mine makes net loss for the owner during the last years due to the long-term unfavourable mining conditions and significant drop in the coal prices during the last years. Management is going to shut down the operation and abandon the project to reduce the loss of the company. The goal is to assess whether the shutting down the operation is the only and correct solution of the problem. Due to the uncertainty in the future hard coal price evolution, the production might be again restarted if the price raises enough to cover the cost of the production. For the assessment, real option methodology is applied, which captures two important aspect of the financial decision-making: risk and flexibility. The paper is structured as follows: first, current state is described and problem is analysed. Next, methodology of real options is described. At last, project is evaluated by applying real option methodology. The results are commented and recommendations are provided.

Keywords: real option, investment, option to abandon, option to shut down and restart, risk, flexibility

Procedia PDF Downloads 548
9073 Intelligent Rainwater Reuse System for Irrigation

Authors: Maria M. S. Pires, Andre F. X. Gloria, Pedro J. A. Sebastiao

Abstract:

The technological advances in the area of Internet of Things have been creating more and more solutions in the area of agriculture. These solutions are quite important for life, as they lead to the saving of the most precious resource, water, being this need to save water a concern worldwide. The paper proposes the creation of an Internet of Things system based on a network of sensors and interconnected actuators that automatically monitors the quality of the rainwater that is stored inside a tank in order to be used for irrigation. The main objective is to promote sustainability by reusing rainwater for irrigation systems instead of water that is usually available for other functions, such as other productions or even domestic tasks. A mobile application was developed for Android so that the user can control and monitor his system in real time. In the application, it is possible to visualize the data that translate the quality of the water inserted in the tank, as well as perform some actions on the implemented actuators, such as start/stop the irrigation system and pour the water in case of poor water quality. The implemented system translates a simple solution with a high level of efficiency and tests and results obtained within the possible environment.

Keywords: internet of things, irrigation system, wireless sensor and actuator network, ESP32, sustainability, water reuse, water efficiency

Procedia PDF Downloads 149
9072 Harnessing Microorganism Having Potential for Biotreatment of Wastewater

Authors: Haruna Saidu, Sulaiman Mohammed, Abdulkarim Ali Deba, Shaza Eva Mohamad

Abstract:

Determining the diversity of the indigenous microorganisms in Palm Oil Mill Effluent (POME) could allow their wider application for the treatment of recalcitrant agro-based wastewater discharge into the environment. Many research studies mainly determined the efficiency of microorganism or their co-cultivation with microalgae for enhanced treatment of wastewater, suggesting a limited emphasis on the application of microbial diversity. In this study, the microorganism was cultured in POME for a period of 15 days using microalgae as a source of carbon. Pyrosequencing analysis reveals a diversity of microbial community in 20% (v/v) culture than the control experiment. Most of the bacterial species identified in POME belong to the families of Bacillaceae, Paenibacillaceae, Enterococcaceae, Clostridiaceae, Peptostreptococcaceae, Caulobacteraceae, Enterobacteriaceae, Moraxellaceae, and Pseudomonadaceae. Alpha (α) diversity analysis reveals the high composition of the microbial community of 52 in both samples. Beta (β) diversity index indicated the occurrence of similar species of microorganisms in unweighted uni fra than the weighted uni fra of both samples. It is therefore suggested that bacteria found in these families could have a potential for synergistic treatment of high-strength wastewater generated from the palm oil industry.

Keywords: diversity, microorganism, wastewater, pyrosequencing, palm oil mill effluent

Procedia PDF Downloads 37
9071 Design and Development of an Application for the Evaluation of Personal Injury and Disability in Occupational and Forensic Medicine

Authors: Daniel Suárez, Jesús Tomas, Sandra Sendra, Sandra Viciano-Tudela, Luis Felipe Calle, Javier Urios, Jaime Lloret

Abstract:

Our study is to develop a tool for the mobile phone to an assessment of body damage or determination of the degree of disability. This is a field of action of legal medicine and insurance with obvious economic implications. Those people who have suffered an accident or bodily harm demand a quantification of it. The assessment of bodily harm or disability by the expert medical professional is not exempt from complexity. Sometimes it is difficult to quantify pain; other times, the doctor faces simulators or exaggerators, and on many occasions, it is difficult to remember the extensive tables of scales whose details are complex to remember and apply. We present a tool, as a mobile application, that allows entering the sociodemographic date of the patient as well as the characteristics of the accident suffered by the person. With these preliminary data and introducing bodily damage, an approximate calculation of the compensation that the injured party should receive can be made. One of the results of this study is that it allows calculating joint mobility angles without the need to use a goniometer.

Keywords: mobile tool, body damage, personal injury and disability, telemedicine

Procedia PDF Downloads 89
9070 Web-GIS Technology: A Tool for Farm-to-Market Road Project Profiling and Proposal Prioritization of the Philippines’ Department of Agriculture

Authors: Elbert S. Moyon, Edsel Matt O. Morales, Jaymer M. Jayoma, Kent C. Espejon, Jayson C. Dollete, Mark Phil B. Pacot

Abstract:

This research paper focuses on the potential of using Web-GIS technology in prioritizing farm-to-market road projects by the Philippines’ Department of Agriculture (DA). The study aimed to explore the benefits of Web-GIS in addressing the limitations faced by the DA in terms of Farm to Market Road profiling and project prioritization, which include a lack of access to updated data, limited spatial analysis capabilities, and difficulties in sharing information between stakeholders. The research methodology involves a comprehensive literature review and a case study of a Web-GIS application developed for the DA, which was used to profile and prioritize farm-to-market road projects in the Philippines. The results showed that the Web-GIS technology provides the DA with an effective tool for analyzing and visualizing data, which can help in profiling and prioritizing road projects based on various criteria such as economic, social, and environmental impacts. The study also showed that Web-GIS technology could help in reducing the time and effort required for road project prioritization and improve communication between stakeholders.

Keywords: GIS, web application, farm-to-market road, FMR prioritization, Django, GeoServer

Procedia PDF Downloads 83
9069 Influence of Compactive Efforts on the Hydraulic Conductivity of Bagasse Ash Treated Black Cotton Soil

Authors: T. S. Ijimdiya, K. J. Osinubi

Abstract:

This study examines the influence of compactive efforts on hydraulic conductivity behaviour of compacted black cotton soil treated with bagasse ash which is necessary in assessing the performance of the soil - bagasse ash mixture for use as a suitable barrier material in waste containment application. Black cotton soil treated with up to 12% bagasse ash (obtained from burning the fibrous residue from the extraction of sugar juice from sugarcane) by dry weight of soil for use in waste containment application. The natural soil classifies as A-7-6 or CH in accordance with the AASHTO and the Unified Soil Classification System, respectively. The treated soil samples were prepared at molding water contents of -2, 0, +2, and +4 % of optimum moisture contents and compacted using four compactive efforts of Reduced British Standard Light (RBSL), British Standard light (BSL), West African Standard (WAS) and British Standard Heavy (BSH). The results obtained show that hydraulic conductivity decreased with increase in bagasse ash content, moulding water content and compaction energy.

Keywords: bagasse ash treatment, black cotton soil, hydraulic conductivity, moulding water contents, compactive efforts

Procedia PDF Downloads 433
9068 Adsorptive Removal of Cd(II) Ions from Aqueous Systems by Wood Ash-Alginate Composite Beads

Authors: Tichaona Nharingo, Hope Tauya, Mambo Moyo

Abstract:

Wood ash has been demonstrated to have favourable adsorption capacity for heavy metal ions but suffers the application problem of difficult to separate/isolate from the batch adsorption systems. Fabrication of wood ash beads using multifunctional group and non-toxic carbohydrate, alginate, may improve the applicability of wood ash in environmental pollutant remediation. In this work, alginate-wood ash beads (AWAB) were fabricated and applied to the removal of cadmium ions from aqueous systems. The beads were characterized by FTIR, TGA/DSC, SEM-EDX and their pHZPC before and after the adsorption of Cd(II) ions. Important adsorption parameters i.e. pH, AWAB dosage, contact time and ionic strength were optimized and the effect of initial concentration of Cd(II) ions to the adsorption process was established. Adsorption kinetics, adsorption isotherms, adsorption mechanism and application of AWAB to real water samples spiked with Cd(II) ions were ascertained. The composite adsorbent was characterized by a heterogeneous macro pore surface comprising of metal oxides, multiple hydroxyl groups and carbonyl groups that were involved in electrostatic interaction and Lewis acid-base interactions with the Cd(II) ions. The pseudo second order and the Freundlich isotherm models best fitted the adsorption kinetics and isotherm data respectively suggesting chemical sorption process and surface heterogeneity. The presence of Pb(II) ions inhibited the adsorption of Cd(II) ions (reduced by 40 %) attributed to the competition for the adsorption sites. The Cd(II) loaded beads could be regenerated using 0.1 M HCl and could be applied to four sorption-desorption cycles without significant loss in its initial adsorption capacity. The high maximum adsorption capacity, stability, selectivity and reusability of AWAB make the adsorbent ideal for application in the removal of Cd(II) ions from real water samples. Column type adsorption experiments need to be explored to establish the potential of the adsorbent in removing Cd(II) ions using continuous flow systems.

Keywords: adsorption, Cd(II) ions, regeneration, wastewater, wood ash-alginate beads

Procedia PDF Downloads 245
9067 Using Blockchain Technology to Extend the Vendor Managed Inventory for Sustainability

Authors: Elham Ahmadi, Roshaali Khaturia, Pardis Sahraei, Mohammad Niyayesh, Omid Fatahi Valilai

Abstract:

Nowadays, Information Technology (IT) is changing the way traditional enterprise management concepts work. One of the most dominant IT achievements is the Blockchain Technology. This technology enables the distributed collaboration of stakeholders for their interactions while fulfilling the security and consensus rules among them. This paper has focused on the application of Blockchain technology to enhance one of traditional inventory management models. The Vendor Managed Inventory (VMI) has been considered one of the most efficient mechanisms for vendor inventory planning by the suppliers. While VMI has brought competitive advantages for many industries, however its centralized mechanism limits the collaboration of a pool of suppliers and vendors simultaneously. This paper has studied the recent research for VMI application in industries and also has investigated the applications of Blockchain technology for decentralized collaboration of stakeholders. Focusing on sustainability issue for total supply chain consisting suppliers and vendors, it has proposed a Blockchain based VMI conceptual model. The different capabilities of this model for enabling the collaboration of stakeholders while maintaining the competitive advantages and sustainability issues have been discussed.

Keywords: vendor managed inventory, VMI, blockchain technology, supply chain planning, sustainability

Procedia PDF Downloads 224
9066 Nanopriming Potential of Metal Nanoparticles against Internally Seed Borne Pathogen Ustilago triciti

Authors: Anjali Sidhu, Anju Bala, Amit Kumar

Abstract:

Metal nanoparticles have the potential to revolutionize the agriculture owing to sizzling interdisciplinary nano-technological application domain. Numerous patents and products incorporating engineered nanoparticles (NPs) entered into agro-applications with the collective goal to promote proficiency as well as sustainability with lower input and generating meager waste than conventional products and approaches. Loose smut of wheat caused by Ustilago segetum tritici is an internally seed-borne pathogen. It is dormant in the seed unless the seed germinates and its symptoms are expressed at the reproductive stage of the plant only. Various seed treatment agents are recommended for this disease but due to the inappropriate methods of seed treatments used by farmers, each and every seed may not get treated, and the infected seeds escape the fungicidal action. The antimicrobial potential and small size of nanoparticles made them the material of choice as they could enter each seed and restrict the pathogen inside the seed due to the availability of more number of nanoparticles per unit volume of the nanoformulations. Nanoparticles of diverse nature known for their in vitro antimicrobial activity viz. ZnO, MgO, CuS and AgNPs were synthesized, surface modified and characterized by traditional methods. They were applied on infected wheat seeds which were then grown in pot conditions, and their mycelium was tracked in the shoot and leaf region of the seedlings by microscopic staining techniques. Mixed responses of inhibition of this internal mycelium were observed. The time and method of application concluded to be critical for application, which was optimised in the present work. The results implicated that there should be field trails to get final fate of these pot trails up to commercial level. The success of their field trials could be interpreted as a revolution to replace high dose organic fungicides of high residue behaviour.

Keywords: metal nanoparticles, nanopriming, seed borne pathogen, Ustilago segetum tritici

Procedia PDF Downloads 144
9065 Diabetes Diagnosis Model Using Rough Set and K- Nearest Neighbor Classifier

Authors: Usiobaifo Agharese Rosemary, Osaseri Roseline Oghogho

Abstract:

Diabetes is a complex group of disease with a variety of causes; it is a disorder of the body metabolism in the digestion of carbohydrates food. The application of machine learning in the field of medical diagnosis has been the focus of many researchers and the use of recognition and classification model as a decision support tools has help the medical expert in diagnosis of diseases. Considering the large volume of medical data which require special techniques, experience, and high diagnostic skill in the diagnosis of diseases, the application of an artificial intelligent system to assist medical personnel in order to enhance their efficiency and accuracy in diagnosis will be an invaluable tool. In this study will propose a diabetes diagnosis model using rough set and K-nearest Neighbor classifier algorithm. The system consists of two modules: the feature extraction module and predictor module, rough data set is used to preprocess the attributes while K-nearest neighbor classifier is used to classify the given data. The dataset used for this model was taken for University of Benin Teaching Hospital (UBTH) database. Half of the data was used in the training while the other half was used in testing the system. The proposed model was able to achieve over 80% accuracy.

Keywords: classifier algorithm, diabetes, diagnostic model, machine learning

Procedia PDF Downloads 336
9064 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell

Authors: Gigih Supriyatno

Abstract:

SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.

Keywords: web forensic, SQL injection, investigation, web shell

Procedia PDF Downloads 148
9063 The Standard of Best Interest of the Child in Custody Adjudication under the Malaysian Laws

Authors: Roslina Che Soh

Abstract:

Best interest of the child has been the prevailing principle of the custody legislations of most nations in the world. The tremendous shift from parental rights to parental responsibilities throughout the centuries had made the principle of best interests of the child as the utmost matter which parents must uphold in child upbringing. Despite the commitment to this principle is significantly enshrined in the United Nation Convention on Rights of the Child, the content and application of the principle differs across borders. Differences persist notwithstanding many countries have experienced a substantial shift over the last several decades in the types of custodial arrangements that are thought to best serve children’s interests. The laws in Malaysia similarly uphold this principle but do not provide further deliberation on the principle itself. The principle is entirely developed by the courts through decided cases. Thus, this paper seeks to discuss the extent of the application of best interest of the child principle in custody disputes. In doing so, it attempts to provide an overview of the current laws and the approach of the Civil and the Shariah courts in Malaysia in applying the principle in determining custody disputes. For purposes of comparison, it briefly examines the legislations and the courts practices in Australia and England on this matter. The purpose is to determine the best standard to be adopted by Malaysia and to propose improvement to the laws whenever appropriate.

Keywords: child custody, best interest, Malaysian law, bioinformatics, biomedicine

Procedia PDF Downloads 275
9062 The Novelty of Mobile Money Solution to Ghana’S Cashless Future: Opportunities, Challenges and Way Forward

Authors: Julius Y Asamoah

Abstract:

Mobile money has seen faster adoption in the decade. Its emergence serves as an essential driver of financial inclusion and an innovative financial service delivery channel, especially to the unbanked population. The rising importance of mobile money services has caught policymakers and regulators' attention, seeking to understand the many issues emerging from this context. At the same time, it is unlocking the potential of knowledge of this new technology. Regulatory responses and support are essential, requiring significant changes to current regulatory practices in Ghana. The article aims to answer the following research questions: "What risk does an unregulated mobile money service pose to consumers and the financial system? "What factors stimulate and hinder the introduction of mobile payments in developing countries? The sample size used was 250 respondents selected from the study area. The study has adopted an analytical approach comprising a combination of qualitative and quantitative data collection methods. Actor-network theory (ANT) is used as an interpretive lens to analyse this process. ANT helps analyse how actors form alliances and enrol other actors, including non-human actors (i.e. technology), to secure their interests. The study revealed that government regulatory policies impact mobile money as critical to mobile money services in developing countries. Regulatory environment should balance the needs of advancing access to finance with the financial system's stability and draw extensively from Kenya's work as the best strategies for the system's players. Thus, regulators need to address issues related to the enhancement of supportive regulatory frameworks. It recommended that the government involve various stakeholders, such as mobile phone operators. Moreover, the national regulatory authority creates a regulatory environment that promotes fair practices and competition to raise revenues to support a business-enabling environment's key pillars as infrastructure.

Keywords: actor-network theory (ANT), cashless future, Developing countries, Ghana, Mobile Money

Procedia PDF Downloads 138
9061 Virtual Science Hub: An Open Source Platform to Enrich Science Teaching

Authors: Enrique Barra, Aldo Gordillo, Juan Quemada

Abstract:

This paper presents the Virtual Science Hub platform. It is an open source platform that combines a social network, an e-learning authoring tool, a video conference service and a learning object repository for science teaching enrichment. These four main functionalities fit very well together. The platform was released in April 2012 and since then it has not stopped growing. Finally we present the results of the surveys conducted and the statistics gathered to validate this approach.

Keywords: e-learning, platform, authoring tool, science teaching, educational sciences

Procedia PDF Downloads 397
9060 Developing Fault Tolerance Metrics of Web and Mobile Applications

Authors: Ahmad Mohsin, Irfan Raza Naqvi, Syda Fatima Usamn

Abstract:

Applications with higher fault tolerance index are considered more reliable and trustworthy to drive quality. In recent years application development has been shifted from traditional desktop and web to native and hybrid application(s) for the web and mobile platforms. With the emergence of Internet of things IOTs, cloud and big data trends, the need for measuring Fault Tolerance for these complex nature applications has increased to evaluate their performance. There is a phenomenal gap between fault tolerance metrics development and measurement. Classic quality metric models focused on metrics for traditional systems ignoring the essence of today’s applications software, hardware & deployment characteristics. In this paper, we have proposed simple metrics to measure fault tolerance considering general requirements for Web and Mobile Applications. We have aligned factors – subfactors, using GQM for metrics development considering the nature of mobile we apps. Systematic Mathematical formulation is done to measure metrics quantitatively. Three web mobile applications are selected to measure Fault Tolerance factors using formulated metrics. Applications are then analysed on the basis of results from observations in a controlled environment on different mobile devices. Quantitative results are presented depicting Fault tolerance in respective applications.

Keywords: web and mobile applications, reliability, fault tolerance metric, quality metrics, GQM based metrics

Procedia PDF Downloads 344
9059 On the Right an Effective Administrative Justice in the Republic of Macedonia: Challenges and Problems

Authors: Arlinda Memetaj

Abstract:

A sound system of administrative justice represents a vital element of democratic governance. The proper control of public administration consists not only of a sound civil service framework and legislative oversight, but empowerment of the public and courts to hold public officials accountable for their decision-making through the application of fair administrative procedural rules and the use of appropriate administrative appeals processes and judicial review. The establishment of effective public administration, has been since 1990s among the most 'important and urgent' final strategic objectives of the Republic of Macedonia. To this aim the country has so far adopted a huge series of legislative and strategic documents related to any aspects of the administrative justice system. The latter is designed to strengthen the legal position of citizens, businesses, civic organizations, and other societal subjects. 'Changes and reforms' in this field have been thus the most frequent terms being used in the country for the last more than 20 years. Several years ago the County established Administrative Courts, while permanently amending the Law on the General Administrative procedure (LGAP). The new LGAP was adopted in 2015 and it introduced considerable innovations concerned. The most recent inputs in this regard includes the National Public Administration Reform Strategy 2017 – 2022, one of the key expected result of which includes both providing effective protection of the citizens` rights. In doing the aforesaid however there is still a series of interrelated shortcomings in this regard, such as (just to mention few) the complex appeal procedure, delays in enforcing court rulings, etc. Against the above background, the paper firstly describes the Macedonian institutional and legislative framework in the above field, and then illustrates the shortcomings therein. It finally claims that the current status quo situation may be overcome only if there is a proper implementation of the administrative courts decisions and far stricter international monitoring process thereof. A new approach and strong political commitment from the highest political leadership is thus absolutely needed to ensure the principles of transparency, accountability and merit in public administration. The main method used in this paper is the descriptive, analytical and comparative one due to the very character of the paper itself.

Keywords: administrative justice, administrative procedure, administrative courts/disputes, European Human Rights Court, human rights, monitoring, reform, benefit.

Procedia PDF Downloads 155
9058 Model of Application of Blockchain Technology in Public Finances

Authors: M. Vlahovic

Abstract:

This paper presents a model of public finances, which combines three concepts: participatory budgeting, crowdfunding and blockchain technology. Participatory budgeting is defined as a process in which community members decide how to spend a part of community’s budget. Crowdfunding is a practice of funding a project by collecting small monetary contributions from a large number of people via an Internet platform. Blockchain technology is a distributed ledger that enables efficient and reliable transactions that are secure and transparent. In this hypothetical model, the government or authorities on local/regional level would set up a platform where they would propose public projects to citizens. Citizens would browse through projects and support or vote for those which they consider justified and necessary. In return, they would be entitled to a tax relief in the amount of their monetary contribution. Since the blockchain technology enables tracking of transactions, it can be used to mitigate corruption, money laundering and lack of transparency in public finances. Models of its application have already been created for e-voting, health records or land registries. By presenting a model of application of blockchain technology in public finances, this paper takes into consideration the potential of blockchain technology to disrupt governments and make processes more democratic, secure, transparent and efficient. The framework for this paper consists of multiple streams of research, including key concepts of direct democracy, public finance (especially the voluntary theory of public finance), information and communication technology, especially blockchain technology and crowdfunding. The framework defines rules of the game, basic conditions for the implementation of the model, benefits, potential problems and development perspectives. As an oversimplified map of a new form of public finances, the proposed model identifies primary factors, that influence the possibility of implementation of the model, and that could be tracked, measured and controlled in case of experimentation with the model.

Keywords: blockchain technology, distributed ledger, participatory budgeting, crowdfunding, direct democracy, internet platform, e-government, public finance

Procedia PDF Downloads 149
9057 The Grand Technological Promise in Norwegian Child Welfare Services: Social Workers’ Experiences and Expectations

Authors: Ida Bruheim Jensen, Hulda Mjöll Gunnarsdottir, Ingunn T. Ellingsen

Abstract:

Digital government is often seen as an enabler or even driver of transformation of public administration, with the objective of creating public value. The increasing use of digital solutions in public services comes with great expectations of new and/or more efficient service provision. Digitalizing public sector services involve multi-level implementation. It involves national policy negotiations and decisions of digital government solutions. It involves co-creation/-production of ideas where planning, design, and implementation involves several groups of actors targeting end-users. Norway is among the most digitalised countries in the world, and Government spendings on digital technologies in public services are high compared to other OECD countries. This contribution studies an ongoing digital transformation in the Norwegian child welfare services. DigiBarnevern (Digi child welfare) is a nationwide project promising better and more efficient child welfare services through various digital technologies. The digitalization process, which is managed by the state and municipalities, is still in its early stages, and as of 2022, only a few services are operative. Digital technologies such as DigiBarnevern are implemented with promises of qualitatively improving child protection work, making the services more effective, foster user participation, and increase availability. There is limited research on the implications of using digital technologies in child protection work. We aim to present findings from an ongoing research project (2022-2024). Drawing on data from focus group interviews with social workers in 5 municipal child welfare services in Norway, we explore social workers’ experiences and expectations towards using digital technologies in child welfare services. Technological solutions may change the services and child protection work in numerous ways. Potential points of departure for discussion are how technologies may change the relationships between social workers, children, youth, and their families, how technologies can alter and obscure responsibilities, and how technologies may demand digital competence among social workers and service recipients.

Keywords: child welfare, social work, technology, digitalisation

Procedia PDF Downloads 92
9056 Security Architecture for Cloud Networking: A Survey

Authors: Vishnu Pratap Singh Kirar

Abstract:

In the cloud computing hierarchy IaaS is the lowest layer, all other layers are built over it. Thus it is the most important layer of cloud and requisite more importance. Along with advantages IaaS faces some serious security related issue. Mainly Security focuses on Integrity, confidentiality and availability. Cloud computing facilitate to share the resources inside as well as outside of the cloud. On the other hand, cloud still not in the state to provide surety to 100% data security. Cloud provider must ensure that end user/client get a Quality of Service. In this report we describe possible aspects of cloud related security.

Keywords: cloud computing, cloud networking, IaaS, PaaS, SaaS, cloud security

Procedia PDF Downloads 530
9055 Addressing Stigma on the Child and Adolescent Psychiatry Consultation Service Through Use of Video

Authors: Rachel Talbot, Nasuh Malas

Abstract:

Stigma in child and adolescent psychiatry continues to be a significant barrier for youth to receive much needed psychiatric care. Parents misperceptions regarding mental health may interfere with their child’s care and negatively influence their child’s view of mental health. For some children, their first experience with psychiatry may occur during medical hospitalization when they are seen by the Psychiatry Consultation-Liaison (C/L) Service. Despite this unique role, there is limited data on how to address mental health stigma with patients and families within the context of Child and Adolescent C/L Psychiatry. This study explores the use of a brief introductory video with messages from the psychiatry C/L team, families who have accessed mental health consultation in the hospital, as well as clips of family and C/L team interactions to address parental stigma of psychiatry. Common stigmatized concerns shared by parents include concerns about confidentiality, later ramifications of mental healthcare, outsider status, and parental self-blame. There are also stigmatized concerns about psychiatric medication use including overmedication, sedation, long-term effects, medicating ‘real problems’ and personality blunting. Each of these are addressed during the video parents will see with the intent of reducing negative parental perceptions relating to mental healthcare. For this study, families are given a survey highlighting these concerns, prior to and after watching the video. Pre-and post-video responses are compared with the hypothesis that watching the video will effectively reduce parental stigma about psychiatric care. Data collection is currently underway and will be completed by the end of November 2017 with data analysis completed by January 2018. This study will also give vital information about the demographic differences in perceptions of stigma so future interventions can be targeted towards those with higher perceived stigma. This study posits that use of an introductory video is an effective strategy to combat stigma and help educate and empower families. In this way, we will be reducing further barriers for patients and families to seek out mental health resources and supports that are often desperately needed for these youths.

Keywords: child and adolescent psychiatry, consult-liaison psychiatry, media, stigma

Procedia PDF Downloads 192
9054 The Impact of Emoticons in the Workplace: Legal Challenges and Regulatory Change

Authors: Jacques C. Duvenhage

Abstract:

The use of emoticons or so-called ‘emojis’ has gained much attention, not only in the daily use thereof with friends or family but also within the workplace amongst co-workers and employers. Even though emojis may be seen as a way to express feelings or even ideas, it may present legal challenges in the workplace. With new emojis being created on a daily basis, communicating through emojis, whether via phone, email or social media platforms, can become convoluted, especially within the working environment. The question to be addressed is how and/or whether Australian legislators will regulate the use of emojis (as a form of technology) in the workplace to prevent harassment, discrimination and other forms of prejudice. The emojis sent to co-workers may be interpreted by employees and even employers in different ways depending on their age, sexual orientation, and cultural background. Therefore, Australian courts will need to interpret an emoji’s meaning on a case-by-case basis. This paper will explore the use of emojis in the workplace (drawing on a desktop study), the impact emojis have on the employer-employee relationship as well as co-worker relationships, its legal application through case studies and whether a legal framework should be adopted by Australian legislators on this issue. Furthermore, this paper will reflect on the legal framework and application of emojis in the workplace considering foreign jurisdictions such as the United Kingdom and the United States of America and whether Australia should adopt similar legal approaches to these jurisdictions.

Keywords: emoticons, legal approaches, regulation, workplace

Procedia PDF Downloads 150
9053 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 455
9052 Examining the Teaching and Learning Needs of Science and Mathematics Educators in South Africa

Authors: M. Shaheed Hartley

Abstract:

There has been increasing pressure on education researchers and practitioners at higher education institutions to focus on the development of South Africa’s rural and peri-urban communities and improving their quality of life. Many tertiary institutions are obliged to review their outreach interventions in schools. To ensure that the support provided to schools is still relevant, a systemic evaluation of science educator needs is central to this process. These prioritised needs will serve as guide not only for the outreach projects of tertiary institutions, but also to service providers in general so that the process of addressing educators needs become coordinated, organised and delivered in a systemic manner. This paper describes one area of a broader needs assessment exercise to collect data regarding the needs of educators in a district of 45 secondary schools in the Western Cape Province of South Africa. This research focuses on the needs and challenges faced by science educators at these schools as articulated by the relevant stakeholders. The objectives of this investigation are two-fold: (1) to create a data base that will capture the needs and challenges identified by science educators of the selected secondary schools; and (2) to develop a needs profile for each of the participating secondary schools that will serve as a strategic asset to be shared with the various service providers as part of a community of practice whose core business is to support science educators and science education at large. The data was collected by a means of a needs assessment questionnaire (NAQ) which was developed in both actual and preferred versions. An open-ended questionnaire was also administered which allowed teachers to express their views. The categories of the questionnaire were predetermined by participating researchers, educators and education department officials. Group interviews were also held with the science teachers at each of the schools. An analysis of the data revealed important trends in terms of science educator needs and identified schools that can be clustered around priority needs, logistic reasoning and educator profiles. The needs database also provides opportunity for the community of practice to strategise and coordinate their interventions.

Keywords: needs assessment, science and mathematics education, evaluation, teaching and learning, South Africa

Procedia PDF Downloads 183
9051 Impact of Process Parameters on Tensile Strength of Fused Deposition Modeling Printed Crisscross Poylactic Acid

Authors: Shilpesh R. Rajpurohit, Harshit K. Dave

Abstract:

Additive manufacturing gains the popularity in recent times, due to its capability to create prototype as well functional as end use product directly from CAD data without any specific requirement of tooling. Fused deposition modeling (FDM) is one of the widely used additive manufacturing techniques that are used to create functional end use part of polymer that is comparable with the injection-molded parts. FDM printed part has an application in various fields such as automobile, aerospace, medical, electronic, etc. However, application of FDM part is greatly affected by poor mechanical properties. Proper selection of the process parameter could enhance the mechanical performance of the printed part. In the present study, experimental investigation has been carried out to study the behavior of the mechanical performance of the printed part with respect to process variables. Three process variables viz. raster angle, raster width and layer height have been varied to understand its effect on tensile strength. Further, effect of process variables on fractured surface has been also investigated.

Keywords: 3D Printing, fused deposition modeling, layer height, raster angle, raster width, tensile strength

Procedia PDF Downloads 197
9050 The Design of Intelligent Passenger Organization System for Metro Stations Based on Anylogic

Authors: Cheng Zeng, Xia Luo

Abstract:

Passenger organization has always been an essential part of China's metro operation and management. Facing the massive passenger flow, stations need to improve their intelligence and automation degree by an appropriate integrated system. Based on the existing integrated supervisory control system (ISCS) and simulation software (Anylogic), this paper designs an intelligent passenger organization system (IPOS) for metro stations. Its primary function includes passenger information acquisition, data processing and computing, visualization management, decision recommendations, and decision response based on interlocking equipment. For this purpose, the logical structure and intelligent algorithms employed are particularly devised. Besides, the structure diagram of information acquisition and application module, the application of Anylogic, the case library's function process are all given by this research. Based on the secondary development of Anylogic and existing technologies like video recognition, the IPOS is supposed to improve the response speed and address capacity in the face of emergent passenger flow of metro stations.

Keywords: anylogic software, decision-making support system, intellectualization, ISCS, passenger organization

Procedia PDF Downloads 176