Search results for: technology based environment
35168 Analysis of Trends in the Promotion of Sustainable Tourism in the Destinations of Barranquilla (Colombia) And Nayarit (Mexico)
Authors: Merly Patiño Villanueva, Dubys Villarreal Torres, Eduardo Salazar Araujo, Lezly Ramos Macedo
Abstract:
The concept of sustainability has been influencing business thinking from the perspective of various economic sectors and their environment, looking for concerns related to the risks associated with the indiscriminate consumption of the planet's resources, which have been widely studied and exposed by different public and private organizations. Tourism is not outsider to this reality; therefore, the concept of sustainable tourism evolves towards the integral management of resources, attending the needs of tourists, host communities and service providers, protecting ecosystems and assuring the conservation of the environment and its biodiversity. Considering the above, the purpose of this paper is to identify trends aimed at promoting sustainable tourism in the destinations of Barranquilla (Colombia) and Nayarit (Mexico). This study is part of the realistic epistemological paradigm, based on the existence of a specific environment for the development of tourism activity and the best sustainability practices associated with this industry, which can be observed and studied, therefore, this research contemplates qualitative research techniques such as the focus group and the interview, applied to 8 experts who are part of the value chain of the sector under study, added to a documentary review taken from the scientific databases Wos and Scopus, as well as statistical information published by official bodies. The data obtained were processed with the qualitative analysis software N-VIVO version 13. As a result, trends and actions to promote tourism are identified for the positioning of the cities of Barranquilla (Colombia) and Nayarit (Mexico) as sustainable destinations: first, the recovery of green areas and environmental spaces, as well as the realization of cultural events; promotion and encouragement of the creative industry and finally the realization of international events. It is concluded that both cities develop activities, projects and investments of public initiative, aimed at positioning them as sustainable tourist destinations.Keywords: marketing, sustainability, tourism management, policies
Procedia PDF Downloads 9835167 Proprioceptive Neuromuscular Facilitation Exercises of Upper Extremities Assessment Using Microsoft Kinect Sensor and Color Marker in a Virtual Reality Environment
Authors: M. Owlia, M. H. Azarsa, M. Khabbazan, A. Mirbagheri
Abstract:
Proprioceptive neuromuscular facilitation exercises are a series of stretching techniques that are commonly used in rehabilitation and exercise therapy. Assessment of these exercises for true maneuvering requires extensive experience in this field and could not be down with patients themselves. In this paper, we developed software that uses Microsoft Kinect sensor, a spherical color marker, and real-time image processing methods to evaluate patient’s performance in generating true patterns of movements. The software also provides the patient with a visual feedback by showing his/her avatar in a Virtual Reality environment along with the correct path of moving hand, wrist and marker. Primary results during PNF exercise therapy of a patient in a room environment shows the ability of the system to identify any deviation of maneuvering path and direction of the hand from the one that has been performed by an expert physician.Keywords: image processing, Microsoft Kinect, proprioceptive neuromuscular facilitation, upper extremities assessment, virtual reality
Procedia PDF Downloads 27335166 Design an Architectural Model for Deploying Wireless Sensor Network to Prevent Forest Fire
Authors: Saurabh Shukla, G. N. Pandey
Abstract:
The fires have become the most serious disasters to forest resources and the human environment. In recent years, due to climate change, human activities and other factors the frequency of forest fires has increased considerably. The monitoring and prevention of forest fires have now become a global concern for forest fire prevention organizations. Currently, the methods for forest fire prevention largely consist of patrols, observation from watch towers. Thus, software like deployment of the wireless sensor network to prevent forest fire is being developed to get a better estimate of the temperature and humidity prospects. Now days, wireless sensor networks are beginning to be deployed at an accelerated pace. It is not unrealistic to expect that in coming years the world will be covered with wireless sensor networks. This new technology has lots of unlimited potentials and can be used for numerous application areas including environmental, medical, military, transportation, entertainment, crisis management, homeland defense, and smart spaces.Keywords: deployment, sensors, wireless sensor networks, forest fires
Procedia PDF Downloads 43635165 Agile Software Development Implementation in Developing a Diet Tracker Mobile Application
Authors: Dwi Puspita Sari, Gulnur Baltabayeva, Nadia Salman, Maxut Toleuov, Vijay Kanabar
Abstract:
Technology era drives people to use mobile phone to support their daily life activities. Technology development has a rapid phase which pushes the IT company to adjust any technology changes in order to fulfill customer’s satisfaction. As a result of that, many companies in the USA emerged from systematics software development approach to agile software development approach in developing systems and applications to develop many mobile phone applications in a short phase to fulfill user’s needs. As a systematic approach is considered as time consuming, costly, and too risky, agile software development has become a more popular approach to use for developing software including mobile applications. This paper reflects a short-term project to develop a diet tracker mobile application using agile software development that focused on applying scrum framework in the development process.Keywords: agile software development, scrum, diet tracker, mobile application
Procedia PDF Downloads 25735164 The Construction of the Residential Landscape in the Mountain Environment: Taking the Eling Peak, 'Mirror of the Sky', in Chongqing, China as an Example
Authors: Yuhang Zou, Zhu Wang
Abstract:
Most of the western part of China is mountainous and hilly region, with abundant resources of mountainous space. However, the resources are complex, and the ecological factors are diverse. As urbanization expands rapidly today, the landscape of the mountain residence needs to be changed. This paper, starting with the ecological environment and visual landscape of the mountain living space, analyzes the basic conditions of the Eling Peak, ‘Mirror of the Sky’, in Chongqing, China before its landscape renovation. Then, it analyzes some parts of the project, including the overall planning, ecological coordination, space expansion and local conditions in mountain environment. After that, this paper concludes the intention of designer and 4 methods, appropriate demolition, space reconstruction, landscape modeling and reasonable road system, to transform the master’s mountain residential works. Finally, through the analysis and understanding of the project, it sums up that the most beautiful landscape is not only the outdoor space, but also borrowing scene from the city and the sky, making them a part of the mountainous residential buildings. Only in this way can people, landscape, building, sky, and city become integrated and coexist harmoniously.Keywords: landscape design, mountainous architecture, renovation, residence
Procedia PDF Downloads 15735163 Modelling Patient Condition-Based Demand for Managing Hospital Inventory
Authors: Esha Saha, Pradip Kumar Ray
Abstract:
A hospital inventory comprises of a large number and great variety of items for the proper treatment and care of patients, such as pharmaceuticals, medical equipment, surgical items, etc. Improper management of these items, i.e. stockouts, may lead to delay in treatment or other fatal consequences, even death of the patient. So, generally the hospitals tend to overstock items to avoid the risk of stockout which leads to unnecessary investment of money, difficulty in storing, more expiration and wastage, etc. Thus, in such challenging environment, it is necessary for hospitals to follow an inventory policy considering the stochasticity of demand in a hospital. Statistical analysis captures the correlation of patient condition based on bed occupancy with the patient demand which changes stochastically. Due to the dependency on bed occupancy, the markov model is developed that helps to map the changes in demand of hospital inventory based on the changes in the patient condition represented by the movements of bed occupancy states (acute care state, rehabilitative state and long-care state) during the length-of-stay of patient in a hospital. An inventory policy is developed for a hospital based on the fulfillment of patient demand with the objective of minimizing the frequency and quantity of placement of orders of inventoried items. The analytical structure of the model based on probability calculation is provided to show the optimal inventory-related decisions. A case-study is illustrated in this paper for the development of hospital inventory model based on patient demand for multiple inpatient pharmaceutical items. A sensitivity analysis is conducted to investigate the impact of inventory-related parameters on the developed optimal inventory policy. Therefore, the developed model and solution approach may help the hospital managers and pharmacists in managing the hospital inventory in case of stochastic demand of inpatient pharmaceutical items.Keywords: bed occupancy, hospital inventory, markov model, patient condition, pharmaceutical items
Procedia PDF Downloads 32335162 Mechanism of Changing a Product Concept
Authors: Kiyohiro Yamazaki
Abstract:
The purpose of this paper is to examine the hypothesis explaining the mechanism in the case, where the product is deleted or reduced the fundamental function of the product through the product concept changes in the digital camera industry. This paper points out not owning the fundamental technology might cause the change of the product concept. Casio could create new competitive factor so that this paper discusses a possibility of the mechanism of changing the product concept.Keywords: firm without fundamental technology, product development, product concept, digital camera industry, Casio
Procedia PDF Downloads 56235161 Development of Strategic Cooperation in Managing Thailand-Myanmar Borders: Roles of Education in Enhancing Sustainability
Authors: Rungrot Trongsakul
Abstract:
This paper was aimed to study the strategic cooperation development of Thailand in accordance with the door open policy of Myanmar, by use of DIMES Model: Diplomacy, Information, Military and Economics, Socio-Culture. This research employed qualitative method, aiming to study, analyze and synthesize the content of laws, policies, relevant research papers and documents, and relevant theories, and to study external environment and national power based on DIMES Model. The five steps of strategic development utilized in this study included (1) conceptual framework and definition; (2) environmental scanning; (3) assessing; (4) determining; and (5) drafting strategic plan. The suggested strategies were based on the concept of 'Soft Power'. Therefore, the determination of measures, action plans or projects as strategic means of public and private organizations should be based on sincere participation among people and communities living on the borders shared by both countries. Adoption of education, learning and sharing process is a key to building sustainability of the countries’ strategic cooperation, while an application of 'Soft Power' in all dimensions of the cooperation between the two countries was suggested.Keywords: education, strategic cooperation, Thailand-Myanmar borders, sustainability
Procedia PDF Downloads 35235160 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria
Authors: Okike Benjamin
Abstract:
Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria
Procedia PDF Downloads 26135159 Scientific Insight Review of Corrosion Methods and Corrosion Control of Pre-Stressed Concrete Cylinder Pipes
Authors: Saad A. Bakheet, Ashraf A. Younees, Abdalsamia M. Falah
Abstract:
The main purpose of this study is to the occurrence of several failures in four-meter diameter pre-restressed concrete cylinder pipes, which transport a huge quantity of water from the Libyan Sahara Desert to the populated coastal area in the north. This study will help to address the problems related to corrosion of the pre-stressed concrete cylinder pipes and methods of controlling it. The methodologies used depended on reviewing the design and fabrication of pre-stressed concrete cylinder pipes and studying the cause of the corrosion, which resulted in the failure of the pre-stressed concrete cylinder pipe Man-Made River project in Libya. The chloride-induced corrosion penetrating through the mortar coat was the main reason for corrosion. The beginning of the occurrence of corrosion, its causes, and the mechanisms of its development in pre-stressed concrete pipes since 1937 have been reviewed and are continuing until now. Manufacturing technology control corrosion and all associated problems and technology to control it have been demonstrated, including variables during manufacture, the use of a modified coating, and cathodic protection systems. It has been revised and is still based on international standards. The development of these standards and the change in some of their technical contents reflect the world's interest in the problems of corrosion and the cost of maintenance and replacement.Keywords: PCCP corrosion, international standard, coating system, failure assessment
Procedia PDF Downloads 7535158 Individualized Teaching Process for Pupils with Moderate Mental Disability
Authors: VojtěCh Gybas, Libor Klubal, KateřIna KostoláNyová
Abstract:
Individualized teaching process for pupils with moderate mental disabilities with the help of using mobile touch devices may be one of the forms of teaching to achieve better development of these students during the teaching process. Didactics of information and communication technology (ICT) for special primary schools, where within the Czech Republic pupils with moderate mental retardation are educated, is not precisely and clearly defined. Still, general educational program for elementary school contains a special educational area of information and communication technology, in which the work and content area are focused on work with the classic desktop, and it is not always acceptable in the case of students with moderate mental disabilities. Individualization of their schooling requires a fully elaborate content of teaching material corresponding with intellectual abilities and individuality of each pupil. After three years of daily use of mobile touch devices iPad and participant observation of 7 pupils in a class from special elementary school, we can say that these technologies can be a very useful tool, and in many ways, they even exceed, compensate and replace freely available printed educational material that is rather outdated. By working with mobile touch technology, a pupil gains responsibility, trains his will, learns to rely on himself. The first results obtained from the case studies suggest that this form of teaching may also be beneficial for pupils with moderate mental disabilities.Keywords: individualized teaching, mobile touch technology, iPad, moderate mental disability, special education needs
Procedia PDF Downloads 32835157 A Review of the Run to Run (R to R) Control in the Manufacturing Processes
Authors: Khalil Aghapouramin, Mostafa Ranjbar
Abstract:
Run- to- Run (R2 R) control was developed in order to monitor and control different semiconductor manufacturing processes based upon the fundamental engineering frameworks. This technology allows rectification in the optimum direction. This control always had a significant potency in which was appeared in a variety of processes. The term run to run refers to the case where the act of control would take with the aim of getting batches of silicon wafers which produced in a manufacturing process. In the present work, a brief review about run-to-run control investigated which mainly is effective in the manufacturing process.Keywords: Run-to-Run (R2R) control, manufacturing, process in engineering, manufacturing controls
Procedia PDF Downloads 49435156 Research on Routing Protocol in Ship Dynamic Positioning Based on WSN Clustering Data Fusion System
Authors: Zhou Mo, Dennis Chow
Abstract:
In the dynamic positioning system (DPS) for vessels, the reliable information transmission between each note basically relies on the wireless protocols. From the perspective of cluster-based routing pro-tocols for wireless sensor networks, the data fusion technology based on the sleep scheduling mechanism and remaining energy in network layer is proposed, which applies the sleep scheduling mechanism to the routing protocols, considering the remaining energy of node and location information when selecting cluster-head. The problem of uneven distribution of nodes in each cluster is solved by the Equilibrium. At the same time, Classified Forwarding Mechanism as well as Redelivery Policy strategy is adopted to avoid congestion in the transmission of huge amount of data, reduce the delay in data delivery and enhance the real-time response. In this paper, a simulation test is conducted to improve the routing protocols, which turns out to reduce the energy consumption of nodes and increase the efficiency of data delivery.Keywords: DPS for vessel, wireless sensor network, data fusion, routing protocols
Procedia PDF Downloads 46735155 Satisfaction Among Preclinical Medical Students with Low-Fidelity Simulation-Based Learning
Authors: Shilpa Murthy, Hazlina Binti Abu Bakar, Juliet Mathew, Chandrashekhar Thummala Hlly Sreerama Reddy, Pathiyil Ravi Shankar
Abstract:
Simulation is defined as a technique that replaces or expands real experiences with guided experiences that interactively imitate real-world processes or systems. Simulation enables learners to train in a safe and non-threatening environment. For decades, simulation has been considered an integral part of clinical teaching and learning strategy in medical education. The several types of simulation used in medical education and the clinical environment can be applied to several models, including full-body mannequins, task trainers, standardized simulated patients, virtual or computer-generated simulation, or Hybrid simulation that can be used to facilitate learning. Simulation allows healthcare practitioners to acquire skills and experience while taking care of patient safety. The recent COVID pandemic has also led to an increase in simulation use, as there were limitations on medical student placements in hospitals and clinics. The learning is tailored according to the educational needs of students to make the learning experience more valuable. Simulation in the pre-clinical years has challenges with resource constraints, effective curricular integration, student engagement and motivation, and evidence of educational impact, to mention a few. As instructors, we may have more reliance on the use of simulation for pre-clinical students while the students’ confidence levels and perceived competence are to be evaluated. Our research question was whether the implementation of simulation-based learning positively influences preclinical medical students' confidence levels and perceived competence. This study was done to align the teaching activities with the student’s learning experience to introduce more low-fidelity simulation-based teaching sessions for pre-clinical years and to obtain students’ input into the curriculum development as part of inclusivity. The study was carried out at International Medical University, involving pre-clinical year (Medical) students who were started with low-fidelity simulation-based medical education from their first semester and were gradually introduced to medium fidelity, too. The Student Satisfaction and Self-Confidence in Learning Scale questionnaire from the National League of Nursing was employed to collect the responses. The internal consistency reliability for the survey items was tested with Cronbach’s alpha using an Excel file. IBM SPSS for Windows version 28.0 was used to analyze the data. Spearman’s rank correlation was used to analyze the correlation between students’ satisfaction and self-confidence in learning. The significance level was set at p value less than 0.05. The results from this study have prompted the researchers to undertake a larger-scale evaluation, which is currently underway. The current results show that 70% of students agreed that the teaching methods used in the simulation were helpful and effective. The sessions are dependent on the learning materials that are provided and how the facilitators engage the students and make the session more enjoyable. The feedback provided inputs on the following areas to focus on while designing simulations for pre-clinical students. There are quality learning materials, an interactive environment, motivating content, skills and knowledge of the facilitator, and effective feedback.Keywords: low-fidelity simulation, pre-clinical simulation, students satisfaction, self-confidence
Procedia PDF Downloads 7835154 EFL Vocabulary Learning Strategies among Students in Greece, Their Preferences and Internet Technology
Authors: Theodorou Kyriaki, Ypsilantis George
Abstract:
Vocabulary learning has attracted a lot of attention in recent years, contrary to the neglected part of the past. Along with the interest in finding successful vocabulary teaching strategies, many scholars focused on locating learning strategies used by language learners. As a result, more and more studies in the area of language pedagogy have been investigating the use of strategies in vocabulary learning by different types of learners. A common instrument in this field is the questionnaire, a tool of work that was enriched by questions involving current technology, and it was further implemented to a sample of 300 Greek students whose age varied from 9 and 17 years. Strategies located were grouped into the three categories of memory, cognitive, and compensatory type and associations between these dependent variables were investigated. In addition, relations between dependent and independent variables (such as age, sex, type of school, cultural background, and grade in English) were pursued to investigate the impact on strategy selection. Finally, results were compared to findings of other studies in the same field to contribute to a hypothesis of ethnic differences in strategy selection. Results initially discuss preferred strategies of all participants and further indicate that: a) technology affects strategy selection while b) differences between ethnic groups are not statistically significant. A number of successful strategies are presented, resulting from correlations of strategy selection and final school grade in English.Keywords: acquisition of English, internet technology, research among Greek students, vocabulary learning strategies
Procedia PDF Downloads 51035153 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security
Authors: D. Pugazhenthi, B. Sree Vidya
Abstract:
Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification
Procedia PDF Downloads 25935152 Investigating the Relationship between Place Attachment and Sustainable Development of Urban Spaces
Authors: Hamid Reza Zeraatpisheh, Ali Akbar Heidari, Soleiman Mohammadi Doust
Abstract:
This study has examined the relationship between place attachment and sustainable development of urban spaces. To perform this, the components of place identity, emotional attachment, place attachment and social bonding which totally constitute the output of place attachment, by means of the standardized questionnaire measure place attachment in three domains of (cognitive) the place identity, (affective) emotional attachment and (behavioral) place attachment and social bonding. To measure sustainable development, three components of sustainable development, including society, economy and environment has been considered. The study is descriptive. The assessment instrument is the standard questionnaire of Safarnia which has been used to measure the variable of place attachment and to measure the variable of sustainable development, a questionnaire has been made by the researcher and been based on the combined theoretical framework. The statistical population of this research has been the city of Shiraz. The statistical sample has been Hafeziyeh. SPSS software has been used to analyze the data and examined the results of both descriptive and inferential statistics. In inferential statistics, Pearson correlation coefficient has been used to examine the hypotheses. In this study, the variable of place attachment is high and sustainable development is also in a high level. These results suggest a positive relationship between attachment to place and sustainable development.Keywords: place attachment, sustainable development, economy-society-environment, Hafez's tomb
Procedia PDF Downloads 70135151 Web Quest as the Tool for Business Writing Skills Enhancement at Technical University EFL Classes
Authors: Nadezda Kobzeva
Abstract:
Under the current trend of globalization, economic and technological dynamics information and the means by which it is delivered and renewed becomes out-of-date rapidly. Thus, educational systems as well as higher education are being seriously tested. New strategies’ developing that is supported by Information and Communication Technology is urgently required. The essential educators’ mission is to meet the demands of the future by preparing our young learners with proper knowledge, skills and innovation capabilities necessary to advance our competitiveness globally. In response to the modern society and future demands, the oldest Siberian Tomsk Polytechnic University has wisely proposed several initiatives to promote the integration of Information and Communication Technology (ICT) in education, and increase the competitiveness of graduates by emphasizing inquiry-based learning, higher order thinking and problem solving. This paper gives a brief overview of how Web Quest as ICT device is being used for language teaching and describes its use advantages for teaching English as a Foreign Language (EFL), in particular business writing skills. This study proposes to use Web Quest to promote higher order thinking and ICT integration in the process of engineers training in Tomsk Polytechnic University, Russia.Keywords: web quest, web quest in pedagogy, resume (CVs) and cover letter writing skills, ICT integration
Procedia PDF Downloads 37935150 Evaluation of Persian Medical Terms Compatibility with International Naming Criteria Based on the Applied Translation Procedures
Authors: Ali Akbar Zeinali
Abstract:
Lack of appropriate equivalences for the terms or technical words is the result of ineffective translation guidelines adopted in the translation processes. The increasing number of foreign words and specific terms incorporated into the native language are due to the ongoing development of technology and science. Many problems appear in medical translation when the Persian translators try to employ non-Persian or imported words in medical texts, in which multiple equivalents may be created for one particular word based on the individual preferences of authors and translators in the target language due to lack of standardization. The study attempted to discuss the findings based on the compatibility of the international naming criteria, considering the translation procedures. About 67% of 339 equivalents under this study were grouped as incompatible words while about 33% of them were compatible terms. The similarities and differences were investigated and discussed according to the compatibility status of the equivalents with Sager’s criteria. Such equivalents have been classified into several groups through bi-dimensional descriptions that were different features of translation procedures related to the international naming criteria. In review of the frequency distribution of compatibilities, the equivalents were divided into two categories of compatibles and incompatibles, indicating the effectiveness of the applied translation procedures.Keywords: linguistics, medical translation, naming, terminology
Procedia PDF Downloads 12035149 Automatic Adjustment of Thresholds via Closed-Loop Feedback Mechanism for Solder Paste Inspection
Authors: Chia-Chen Wei, Pack Hsieh, Jeffrey Chen
Abstract:
Surface Mount Technology (SMT) is widely used in the area of the electronic assembly in which the electronic components are mounted to the surface of the printed circuit board (PCB). Most of the defects in the SMT process are mainly related to the quality of solder paste printing. These defects lead to considerable manufacturing costs in the electronics assembly industry. Therefore, the solder paste inspection (SPI) machine for controlling and monitoring the amount of solder paste printing has become an important part of the production process. So far, the setting of the SPI threshold is based on statistical analysis and experts’ experiences to determine the appropriate threshold settings. Because the production data are not normal distribution and there are various variations in the production processes, defects related to solder paste printing still occur. In order to solve this problem, this paper proposes an online machine learning algorithm, called the automatic threshold adjustment (ATA) algorithm, and closed-loop architecture in the SMT process to determine the best threshold settings. Simulation experiments prove that our proposed threshold settings improve the accuracy from 99.85% to 100%.Keywords: big data analytics, Industry 4.0, SPI threshold setting, surface mount technology
Procedia PDF Downloads 11635148 The Acceptance of Online Social Network Technology for Tourism Destination
Authors: Wanida Suwunniponth
Abstract:
The purpose of this research was to investigate the relationship between the factors of using online social network for tourism destination in case of Bangkok area in Thailand, by extending the use of technology acceptance model (TAM). This study employed by quantitative research and the target population were entrepreneurs and local people in Bangkok who use social network-Facebook concerning tourist destinations in Bangkok. Questionnaire was used to collect data from 300 purposive samples. The multiple regression analysis and path analysis were used to analyze data. The results revealed that most people who used Facebook for promoting tourism destinations in Bangkok perceived ease of use, perceived usefulness, perceived trust in using Facebook and influenced by social normative as well as having positive attitude towards using this application. Addition, the hypothesis results indicate that acceptance of online social network-Facebook was related to the positive attitude towards using of Facebook and related to their intention to use this application for tourism.Keywords: Facebook, online social network, technology acceptance model, tourism destination
Procedia PDF Downloads 34335147 Factors Affecting Citizens’ Behavioural Intention to Use E-voter Registration and Verification System Towards the Electoral Process in Nigeria
Authors: Aishatu Shuaibu
Abstract:
It is expected that electronic voter registration and verification in Nigeria will enhance the integrity of elections, which is vital for democratic development; it is also expected to enhance efficiency, transparency, and security. However, the reasons for citizens' intentions with respect to behavioral use of such platforms have not been studied in the literature much. This paper, therefore, intends to look into significant characteristics affecting the acceptance and use of e-voter technology among Nigerian residents. Data will be collected using a structured questionnaire from several local government areas (LGAs) around Nigeria to evaluate the influence of demographic characteristics, technology usability, security perceptions, and governmental education on the intention to implement e-voter systems. The results will offer vital insights into the barriers and drivers of voter technology acceptance, aiding in policy suggestions to enhance voter registration and verification processes within Nigeria's electoral framework. This study is designed to aid electoral stakeholders in devising successful strategies for encouraging the broad deployment of e-voter systems in Nigeria.Keywords: e-governance, e-voting, e-democracy, INEC, Nigeria
Procedia PDF Downloads 1935146 The Role of Youth Entrepreneurship in Developing the Algerian Economy
Authors: Benabdelaziz Soufyane
Abstract:
The process of developing the activity of small and medium-sized enterprises(SME), and increasing the entrepreneurial sense, is becoming at the current period as one of the main bets, where many countries around the world try to give it the great importance because of their positive role in improving the economic development indicators in these countries. As a result of the sequential changes that international economic environment lives, the biggest global economic entities has become threatened because of different secretions financial crises and economic disorders. For this lots of countries tended to search for a mechanism to help it for creating new jobs and to spur the economy in order to face the foreign competition, fot this, we find the process of creating innovative entrepreneurial activity comes at the forefront of solutions for the purpose of achieving that. For the purpose of highlighting the role of this process and its future in the economy, this study seeks to consolidate the innovation’s concept and innovative entrepreneurship, then the success’s conditions of these entrepreneurships, to conclude with recommendations , solutions and important results.Keywords: entrepreneurship, innovation, performance, vigilance, modernity, technology, business incubators
Procedia PDF Downloads 8035145 A Supply Chain Traceability Improvement Using RFID
Authors: Yaser Miaji, Mohammad Sabbagh
Abstract:
Radio Frequency Identification (RFID) is a technology which shares a similar concept with bar code. With RFID, the electromagnetic or electrostatic coupling in the RF portion of the electromagnetic spectrum is used to transmit signals. Supply chain management is aimed to keep going long-term performance of individual companies and the overall supply chain by maximizing customer satisfaction with minimum costs. One of the major issues in the supply chain management is product loss or shrinkage. In order to overcome this problem, this system which uses Radio Frequency Identification (RFID) technology will be able to RFID track and identify where losses are occurring and enable effective traceability. RFID brings a new dimension to supply chain management by providing a more efficient way of being able to identify and track items at the various stages throughout the supply chain. This system has been developed and tested to prove that RFID technology can be used to improve traceability in supply chain at low cost. Due to its simplicity in interface program and database management system using Visual Basic and MS Excel or MS Access the system can be more affordable and implemented even by small and medium scale industries.Keywords: supply chain, RFID, tractability, radio frequency identification
Procedia PDF Downloads 48835144 A Study of Industry 4.0 and Digital Transformation
Authors: Ibrahim Bashir, Yahaya Y. Yusuf
Abstract:
The ongoing shift towards Industry 4.0 represents a critical growth factor in the industrial enterprise, where the digital transformation of industries is increasingly seen as a crucial element for competitiveness. This transformation holds substantial potential, yet its full benefits have yet to be realized due to the fragmented approach to introducing Industry 4.0 technologies. Therefore, this pilot study aims to explore the individual and collective impact of Industry 4.0 technologies and digital transformation on organizational performance. Data were collected through a questionnaire-based survey across 51 companies in the manufacturing industry in the United Kingdom. The correlations and multiple linear regression analyses were conducted to assess the relationship and impact between the variables in the study. The results show that Industry 4.0 and digital transformation positively influence organizational performance and that Industry 4.0 technologies positively influence digital transformation. The results of this pilot study indicate that the implementation of Industry 4.0 technology is vital for increasing organizational performance; however, their roles differ largely. The differences are manifest in how the types of Industry 4.0 technologies correlate with how organizations integrate digital technologies into their operations. Hence, there is a clear indication of a strong correlation between Industry 4.0 technology, digital transformation, and organizational performance. Consequently, our study presents numerous pertinent implications that propel the theory of I4.0, digital business transformation (DBT), and organizational performance forward, as well as guide managers in the manufacturing sector.Keywords: industry 4.0 technologies, digital transformation, digital integration, organizational performance
Procedia PDF Downloads 14035143 Development and Implementation of a Business Technology Program Based on Techniques for Reusing Water in a Colombian Company
Authors: Miguel A. Jimenez Barros, Elyn L. Solano Charris, Luis E. Ramirez, Lauren Castro Bolano, Carlos Torres Barreto, Juliana Morales Cubillo
Abstract:
This project sought to mitigate the high levels of water consumption in industrial processes in accordance with the water-rationing plan promoted at national and international level due to the water consumption projections published by the United Nations. Water consumption has three main uses, municipal (common use), agricultural and industrial where the latter consumes a minimum percentage (around 20% of the total consumption). Awareness on world water scarcity, a Colombian company responsible for generation of massive consumption products, decided to implement politics and techniques for water treatment, recycling, and reuse. The project consisted in a business technology program that permits a better use of wastewater caused by production operations. This approach reduces the potable water consumption, generates better conditions of water in the sewage dumps, generates a positive environmental impact for the region, and is a reference model in national and international levels. In order to achieve the objective, a process flow diagram was used in order to define the industrial processes that required potable water. This strategy allowed the industry to determine a water reuse plan at the operational level without affecting the requirements associated with the manufacturing process and even more, to support the activities developed in administrative buildings. Afterwards, the company made an evaluation and selection of the chemical and biological processes required for water reuse, in compliance with the Colombian Law. The implementation of the business technology program optimized the water use and recirculation rate up to 70%, accomplishing an important reduction of the regional environmental impact.Keywords: bio-reactor, potable water, reverse osmosis, water treatment
Procedia PDF Downloads 23535142 Yawning Computing Using Bayesian Networks
Authors: Serge Tshibangu, Turgay Celik, Zenzo Ncube
Abstract:
Road crashes kill nearly over a million people every year, and leave millions more injured or permanently disabled. Various annual reports reveal that the percentage of fatal crashes due to fatigue/driver falling asleep comes directly after the percentage of fatal crashes due to intoxicated drivers. This percentage is higher than the combined percentage of fatal crashes due to illegal/Un-Safe U-turn and illegal/Un-Safe reversing. Although a relatively small percentage of police reports on road accidents highlights drowsiness and fatigue, the importance of these factors is greater than we might think, hidden by the undercounting of their events. Some scenarios show that these factors are significant in accidents with killed and injured people. Thus the need for an automatic drivers fatigue detection system in order to considerably reduce the number of accidents owing to fatigue.This research approaches the drivers fatigue detection problem in an innovative way by combining cues collected from both temporal analysis of drivers’ faces and environment. Monotony in driving environment is inter-related with visual symptoms of fatigue on drivers’ faces to achieve fatigue detection. Optical and infrared (IR) sensors are used to analyse the monotony in driving environment and to detect the visual symptoms of fatigue on human face. Internal cues from drivers faces and external cues from environment are combined together using machine learning algorithms to automatically detect fatigue.Keywords: intelligent transportation systems, bayesian networks, yawning computing, machine learning algorithms
Procedia PDF Downloads 45535141 Digital Twin for Retail Store Security
Authors: Rishi Agarwal
Abstract:
Digital twins are emerging as a strong technology used to imitate and monitor physical objects digitally in real time across sectors. It is not only dealing with the digital space, but it is also actuating responses in the physical space in response to the digital space processing like storage, modeling, learning, simulation, and prediction. This paper explores the application of digital twins for enhancing physical security in retail stores. The retail sector still relies on outdated physical security practices like manual monitoring and metal detectors, which are insufficient for modern needs. There is a lack of real-time data and system integration, leading to ineffective emergency response and preventative measures. As retail automation increases, new digital frameworks must control safety without human intervention. To address this, the paper proposes implementing an intelligent digital twin framework. This collects diverse data streams from in-store sensors, surveillance, external sources, and customer devices and then Advanced analytics and simulations enable real-time monitoring, incident prediction, automated emergency procedures, and stakeholder coordination. Overall, the digital twin improves physical security through automation, adaptability, and comprehensive data sharing. The paper also analyzes the pros and cons of implementation of this technology through an Emerging Technology Analysis Canvas that analyzes different aspects of this technology through both narrow and wide lenses to help decision makers in their decision of implementing this technology. On a broader scale, this showcases the value of digital twins in transforming legacy systems across sectors and how data sharing can create a safer world for both retail store customers and owners.Keywords: digital twin, retail store safety, digital twin in retail, digital twin for physical safety
Procedia PDF Downloads 7235140 Mobile Phones in Saudi Arabian EFL Classrooms
Authors: Srinivasa Rao Idapalapati, Manssour Habbash
Abstract:
As mobile connectedness continues to sweep across the landscape, the value of deploying mobile technology to the service of learning and teaching appears to be both self-evident and unavoidable. To this end, this study explores the reasons for the reluctance of teachers in Saudi Arabia to use mobiles in EFL (English as a Foreign Language) classes for teaching and learning purposes. The main objective of this study is a qualitative analysis of the responses of the views of the teachers at a university in Saudi Arabia about the use of mobile phones in classrooms for educational purposes. Driven by the hypothesis that the teachers in Saudi Arabian universities aren’t prepared well enough to use mobile phones in classrooms for educational purposes, this study examines the data obtained through a questionnaire provided to about hundred teachers working at a university in Saudi Arabia through convenient sampling method. The responses are analyzed by qualitative interpretive method and found that teachers and the students are in confusion whether to use mobiles, and need some training sessions on the use of mobile phones in classrooms for educational purposes. The outcome of the analysis is discussed in light of the concerns bases adoption model and the inferences are provided in a descriptive mode.Keywords: mobile assisted language learning, technology adoption, classroom instruction, concerns based adoption model
Procedia PDF Downloads 36435139 The Meaningful Pixel and Texture: Exploring Digital Vision and Art Practice Based on Chinese Cosmotechnics
Authors: Xingdu Wang, Charlie Gere, Emma Rose, Yuxuan Zhao
Abstract:
The study introduces a fresh perspective on the digital realm through an examination of the Chinese concept of Xiang, elucidating how it can build an understanding of pixels and textures on screens as digital trigrams. This concept attempts to offer an outlook on the intersection of digital technology and the natural world, thereby contributing to discussions about the harmonious relationship between humans and technology. The study looks for the ancient Chinese theory of Xiang as a key to establishing the theories and practices to respond to the problem of Contemporary Chinese technics. Xiang is a Chinese method of understanding the essentials of things through appearances, which differs from the method of science in the Westen. Xiang, the basement of Chinese visual art, is rooted in ancient Chinese philosophy and connected to the eight trigrams. The discussion of Xiang connects art, philosophy, and technology. This paper connects the meaning of Xiang with the 'truth appearing' philosophically through the analysis of the concepts of phenomenon and noumenon and the unique Chinese way of observing. Hereafter, the historical interconnection between ancient painting and writing in China emphasizes their relationship between technical craftsmanship and artistic expression. In digital, the paper blurs the traditional boundaries between images and text on digital screens in theory. Lastly, this study identified an ensemble concept relating to pixels and textures in computer vision, drawing inspiration from AI image recognition in Chinese paintings. In art practice, by presenting a fluid visual experience in the form of pixels, which mimics the flow of lines in traditional calligraphy and painting, it is hoped that the viewer will be brought back to the process of the truth appearing as defined by the 'Xiang’.Keywords: Chinese cosmotechnics, computer vision, contemporary Neo-Confucianism, texture and pixel, Xiang
Procedia PDF Downloads 64