Search results for: hardware security evaluation
6588 Assessment of Rural Youth Adoption of Cassava Production Technologies in Southwestern Nigeria
Authors: J. O. Ayinde, S. O. Olatunji
Abstract:
This study assessed rural youth adoption of cassava production technologies in Southwestern, Nigeria. Specifically, it examine the level of awareness and adoption of cassava production technologies by rural youth, determined the extent of usage of cassava production technologies available to the rural youth, examined constrains to the adoption of cassava production technologies by youth and suggested possible solutions. Multistage sampling procedure was adopted for the study. In the first stage, two states were purposively selected in southwest, Nigeria which are Osun and Oyo states due to high level of cassava production and access to cassava production technology in the areas. In the second stage, purposive sampling technique was used to select two local governments each from the states selected which are Ibarapa central (Igbo-Ora) and Ibarapa East (Eruwa) Local Government Areas (LGAs) in Oyo state; and Ife North (Ipetumodu) and Ede South (Oke Ireesi) LGAs in Osun State. In the third stage, proportionate sampling technique was used to randomly select five, four, six and four communities from the selected LGAs respectively representing 20 percent of the rural communities in them, in all 19 communities were selected. In the fourth stage, Snow ball sampling technique was used to select about 7 rural youths in each community selected to make a total of 133 respondents. Validated structured interview schedule was used to elicit information from the respondents. The data collected were analyzed using both descriptive and inferential statistics to summarize and test the hypotheses of the study. The results show that the average age of rural youths participating in cassava production in the study area is 29 ± 2.6 years and 60 percent aged between 30 and 35 years. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). The result also reveals that the average size of farm land of the respondents is 2.5 ± 0.3 hectares. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). Also, extent of usage of the technologies (r = 0.363, p ≤ 0.01) shows significant relationship with level of adoption of the technologies. Household size (b = 0.183; P ≤ 0.01) and membership of social organizations were significant at 0.01 (b = 0.331; P ≤ 0.01) while age was significant at 0.10 (b = 0.097; P ≤ 0.05). On the other hand 0.01, years of residence (b = - 0.063; P ≤ 0.01) and income (b = - 0.204; P ≤ 0.01) had negative values and implies that a unit increase in each of these variables would decrease extent of usage of the Cassava production technologies. It was concluded that the extent of usage of the technologies in the communities will affect the rate of adoption positively and this will change the negative perception of youths on cassava production thereby ensure food security in the study area.Keywords: assessment, rural youths’, Cassava production technologies, agricultural production, food security
Procedia PDF Downloads 2076587 Developments in Performance of Autistic Students in the Egyptian School System
Authors: Magy Atef Awad Attia
Abstract:
The objective of this study was to study the effect of social stories on social interaction of students with autism. The sample was at level 5 student with autism, Another University Demonstration School student, who was diagnosed by the Physician as High Functioning Autism since he was able to read, write, calculate and was studying in inclusive classroom. However, he still had disability in social interaction to participate in social activity group and communication. He could not learn how to develop friendship or create relationship. He had inappropriate behavior in social context. He did not understand complex social situations. In addition, he did seemed to not know time and place. He was not able to understand feeling of oneself as well as the others. Consequently, he could not express his emotion appropriately. He did not understand or express his non-verbal language for communicating with friends. He lacked of common interest or emotion with nearby persons. He greeted inappropriately or was not interested in greeting. In addition, he did not have eye contact. He used inadequate language etc. He was elected by Purposive Sampling. His parents were willing to allow them to participate in this study. The research instruments were the lesson plan of social stories, and the picture book of social stories. The instruments used for data collection, were the social interaction evaluation of autistic students. This research was Experimental Research as One Group Pre-test, Post-test Design. For the Pre-test, the experiment was conducted by social stories. Then, the Post-test was implemented. The statistic used for data analysis. The research results were shown by scale. The results revealed that the autistic students taught by social stories indicated better social reaction after being taught by social stories.Keywords: autism, autistic behavior, stability, harsh environments, techniques, thermal, properties, materials, applications, brittleness, fragility, disadvantages, bank, branches, profitability, setting prediction, effective target, measurement, evaluation, performance, commercial, business, sustainability, financial, system.
Procedia PDF Downloads 386586 Tourism Oriented Planning Experience in the Historical City Center of Trabzon (Turkey) with Strategic Spatial Planning Approach: Evaluation of Approach and Process
Authors: Emrehan Ozcan, Dilek Beyazlı
Abstract:
The development of tourism depends on an accurate planning approach as well as on the right planning process. This dependency is also a key factor in ensuring sustainability of tourism. The types of tourism, social expectations, planning practice, the socio-economic and the cultural structure of the region are determinants of planning approaches for tourism development. The tourism plans prepared for the historic city centers are usually based on the revitalization of cultural and historical values. The preservation and development of the tourism potentials of the historic city centers are important for providing an economic contribution to the locality, creating livable solutions for local residents and also the sustainability of tourism. This research is about experiencing and discussing a planning approach that will provide tourism development based on historical and cultural values. Historical and cultural values in the historical city center of Trabzon -which has a settlement history of approximately 4000 years, is located on the Black Sea coast of Turkey- wear out over years and lose their tourism potential. A planning study has been experienced with strategic spatial planning approach for Trabzon, which has not done a tourism-oriented planning study until now. The stages of the planning process provided by strategic spatial planning approach are an assessment of the current situation; vision, strategies, and actions; action planning; designing and implementation of actions and monitoring-evaluation. In the discussion section, the advantages, planning process, methods and techniques of the approach are discussed for the possibilities and constraints in terms of tourism planning. In this context, it is aimed to put forth tourism planning process, stages, and implementation tools within the scope of strategic spatial planning approach by comparing approaches used in the tourism-oriented/priority planning of historical city centers. Suggestions on the position and effect of the preferred planning approach in the existing spatial planning practice are the outputs of the study.Keywords: cultural heritage, tourism oriented planning, Trabzon, strategic spatial Planning
Procedia PDF Downloads 2586585 Criminal Law and Internet of Things: Challenges and Threats
Authors: Celina Nowak
Abstract:
The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.Keywords: criminal law, internet of things, privacy, security threats
Procedia PDF Downloads 1626584 Secondary True to Life Polyethylene Terephthalate Nanoplastics: Obtention, Characterization, and Hazard Evaluation
Authors: Aliro Villacorta, Laura Rubio, Mohamed Alaraby, Montserrat López Mesas, Victor Fuentes-Cebrian, Oscar H. Moriones, Ricard Marcos, Alba Hernández.
Abstract:
Micro and nano plastics (MNPLs) are emergent environmental pollutants requiring urgent information on their potential risks to human health. One of the problems associated with the evaluation of their undesirable effects is the lack of real samples matching those resulting from the environmental degradation of plastic wastes. To such end, we propose an easy method to obtain polyethylene terephthalate nano plastics from water plastic bottles (PET-NPLs) but, in principle, applicable to any other plastic goods sources. An extensive characterization indicates that the proposed process produces uniform samples of PET-NPLs of around 100 nm, as determined by using a multi-angle and dynamic light scattering methodology. An important point to be highlighted is that to avoid the metal contamination resulting from methods using metal blades/burrs for milling, trituration, or sanding, we propose to use diamond burrs to produce metal-free samples. To visualize the toxicological profile of the produced PET-NPLs, we have evaluated their ability to be internalized by cells, their cytotoxicity, and their ability to induce oxidative stress and induce DNA damage. In this preliminary approach, we have detected their cellular uptake, but without the induction of significant biological effects. Thus, no relevant increases in toxicity, reactive oxygen species (ROS) induction, or DNA damage -as detected with the comet assay- have been observed. The use of real samples, as produced in this study, will generate relevant data in the discussion about the potential health risks associated with MNPLs exposures.Keywords: nanoplastics, polyethylene terephthalate, physicochemical characterization, cell uptake, cytotoxicity
Procedia PDF Downloads 976583 The Detection of Implanted Radioactive Seeds on Ultrasound Images Using Convolution Neural Networks
Authors: Edward Holupka, John Rossman, Tye Morancy, Joseph Aronovitz, Irving Kaplan
Abstract:
A common modality for the treatment of early stage prostate cancer is the implantation of radioactive seeds directly into the prostate. The radioactive seeds are positioned inside the prostate to achieve optimal radiation dose coverage to the prostate. These radioactive seeds are positioned inside the prostate using Transrectal ultrasound imaging. Once all of the planned seeds have been implanted, two dimensional transaxial transrectal ultrasound images separated by 2 mm are obtained through out the prostate, beginning at the base of the prostate up to and including the apex. A common deep neural network, called DetectNet was trained to automatically determine the position of the implanted radioactive seeds within the prostate under ultrasound imaging. The results of the training using 950 training ultrasound images and 90 validation ultrasound images. The commonly used metrics for successful training were used to evaluate the efficacy and accuracy of the trained deep neural network and resulted in an loss_bbox (train) = 0.00, loss_coverage (train) = 1.89e-8, loss_bbox (validation) = 11.84, loss_coverage (validation) = 9.70, mAP (validation) = 66.87%, precision (validation) = 81.07%, and a recall (validation) = 82.29%, where train and validation refers to the training image set and validation refers to the validation training set. On the hardware platform used, the training expended 12.8 seconds per epoch. The network was trained for over 10,000 epochs. In addition, the seed locations as determined by the Deep Neural Network were compared to the seed locations as determined by a commercial software based on a one to three months after implant CT. The Deep Learning approach was within \strikeout off\uuline off\uwave off2.29\uuline default\uwave default mm of the seed locations determined by the commercial software. The Deep Learning approach to the determination of radioactive seed locations is robust, accurate, and fast and well within spatial agreement with the gold standard of CT determined seed coordinates.Keywords: prostate, deep neural network, seed implant, ultrasound
Procedia PDF Downloads 1986582 Exploitation behind the Development of Home Batik Industry in Lawean, Solo, Central Java
Authors: Mukhammad Fatkhullah, Ayla Karina Budita, Cut Rizka Al Usrah, Kanita Khoirun Nisa, Muhammad Alhada Fuadilah Habib, Siti Muslihatul Mukaromah
Abstract:
Batik industry has become one of the leading industries in the economy of Indonesia. Since the recognition of batik as one of cultural wealth and national identity of Indonesia by UNESCO, batik production keeps increasing as a result of increasing demands for batik, whether from domestically or abroad. One of the rapid development batik industries in Indonesia is batik industry in Lawean Village, Solo, Central Java, Indonesia. This batik industry generally uses putting-out system where batik workers work in their own houses. With the implementation of this system, therefore employers don’t have to prepare Environmental Impact Analysis (EIA), social security for workers, overtime payment, space for working, and equipment for working. The implementation of putting-out system causes many problems, starting from environmental pollution, the loss of social rights of workers, and even exploitation of workers by batik entrepreneurs. The data used to describe this reality is the primary data from qualitative research with in-depth interview data collection technique. Informants were determined purposively. The theory used to perform data interpretation is the phenomenology of Alfred Schutz. Both qualitative and phenomenology are used in this study to describe batik workers exploitation in terms of the implementation of putting-out system on home batik industry in Lawean. The research result showed that workers in batik industry sector in Lawean were exploited with the implementation of putting-out system. The workers were strictly employed by the entrepreneurs, so that their job cannot be called 'part-time' job anymore. In terms of labor and time, the workers often work more than 12 hours per day and they often work overtime without receiving any overtime payment. In terms of work safety, the workers often have contact with chemical substances contained in batik making materials without using any protection, such as clothes work, which is worsened by the lack of standard or procedure in work that can cause physical damage, such as burnt and peeled off skin. Moreover, exposure and contamination of chemical materials make the workers and their families vulnerable to various diseases. Meanwhile, batik entrepreneurs did not give any social security (including health cost aid). Besides that, the researchers found that batik industry in home industry sector is not environmentally friendly, even damaging ecosystem because industrial waste disposed without EIA.Keywords: exploitation, home batik industry, occupational health and safety, putting-out system
Procedia PDF Downloads 3176581 Restriction on the Freedom of Economic Activity in the Polish Energy Law
Authors: Zofia Romanowska
Abstract:
Recently there have been significant changes in the Polish energy market. Due to the government's decision to strengthen energy security as well as to strengthen the implementation of the European Union common energy policy, the Polish energy market has been undergoing significant changes. In the face of these, it is necessary to answer the question about the direction the Polish energy rationing sector is going, how wide apart the powers of the state are and also whether the real regulator of energy projects in Poland is not in fact the European Union itself. In order to determine the role of the state as a regulator of the energy market, the study analyses the basic instruments of regulation, i.e. the licenses, permits and permissions to conduct various activities related to the energy market, such as the production and sale of liquid fuels or concessions for trade in natural gas. Bearing in mind that Polish law is part of the widely interpreted European Union energy policy, the legal solutions in neighbouring countries are also being researched, including those made in Germany, a country which plays a key role in the shaping of EU policies. The correct interpretation of the new legislation modifying the current wording of the Energy Law Act, such as obliging the entities engaged in the production and trade of liquid fuels (including abroad) to meet a number of additional requirements for the licensing and providing information to the state about conducted business, plays a key role in the study. Going beyond the legal framework for energy rationing, the study also includes a legal and economic analysis of public and private goods within the energy sector and delves into the subject of effective remedies. The research caused the relationships between progressive rationing introduced by the legislator and the rearrangement rules prevailing on the Polish energy market to be taken note of, which led to the introduction of greater transparency in the sector. The studies refer to the initial conclusion that currently, despite the proclaimed idea of liberalization of the oil and gas market and the opening of market to a bigger number of entities as a result of the newly implanted changes, the process of issuing and controlling the conduction of the concessions will be tightened, guaranteeing to entities greater security of energy supply. In the long term, the effect of the introduced legislative solutions will be the reduction of the amount of entities on the energy market. The companies that meet the requirements imposed on them by the new regulation to cope with the profitability of the business will in turn increase prices for their services, which will be have an impact on consumers' budgets.Keywords: license, energy law, energy market, public goods, regulator
Procedia PDF Downloads 2466580 A Comparative Study of Virus Detection Techniques
Authors: Sulaiman Al amro, Ali Alkhalifah
Abstract:
The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based
Procedia PDF Downloads 4846579 Secure Data Sharing of Electronic Health Records With Blockchain
Authors: Kenneth Harper
Abstract:
The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,
Procedia PDF Downloads 216578 Process of Analysis, Evaluation and Verification of the 'Real' Redevelopment of the Public Open Space at the Neighborhood’s Stairs: Case Study of Serres, Greece
Authors: Ioanna Skoufali
Abstract:
The present study is directed towards adaptation to climate change closely related to the phenomenon of the urban heat island (UHI). This issue is widespread and common to different urban realities, but particularly in Mediterranean cities that are characterized by dense urban. The attention of this work of redevelopment of the open space is focused on mitigation techniques aiming to solve local problems such as microclimatic parameters and the conditions of thermal comfort in summer, related to urban morphology. This quantitative analysis, evaluation, and verification survey involves the methodological elaboration applied in a real study case by Serres, through the experimental support of the ENVImet Pro V4.1 and BioMet software developed: i) in two phases concerning the anteoperam (phase a1 # 2013) and the post-operam (phase a2 # 2016); ii) in scenario A (+ 25% of green # 2017). The first study tends to identify the main intervention strategies, namely: the application of cool pavements, the increase of green surfaces, the creation of water surface and external fans; moreover, it obtains the minimum results achieved by the National Program 'Bioclimatic improvement project for public open space', EPPERAA (ESPA 2007-2013) related to the four environmental parameters illustrated below: the TAir = 1.5 o C, the TSurface = 6.5 o C, CDH = 30% and PET = 20%. In addition, the second study proposes a greater potential for improvement than postoperam intervention by increasing the vegetation within the district towards the SW/SE. The final objective of this in-depth design is to be transferable in homogeneous cases of urban regeneration processes with obvious effects on the efficiency of microclimatic mitigation and thermal comfort.Keywords: cool pavements, microclimate parameters (TAir, Tsurface, Tmrt, CDH), mitigation strategies, outdoor thermal comfort (PET & UTCI)
Procedia PDF Downloads 2026577 A Carrier Phase High Precision Ranging Theory Based on Frequency Hopping
Authors: Jie Xu, Zengshan Tian, Ze Li
Abstract:
Previous indoor ranging or localization systems achieving high accuracy time of flight (ToF) estimation relied on two key points. One is to do strict time and frequency synchronization between the transmitter and receiver to eliminate equipment asynchronous errors such as carrier frequency offset (CFO), but this is difficult to achieve in a practical communication system. The other one is to extend the total bandwidth of the communication because the accuracy of ToF estimation is proportional to the bandwidth, and the larger the total bandwidth, the higher the accuracy of ToF estimation obtained. For example, ultra-wideband (UWB) technology is implemented based on this theory, but high precision ToF estimation is difficult to achieve in common WiFi or Bluetooth systems with lower bandwidth compared to UWB. Therefore, it is meaningful to study how to achieve high-precision ranging with lower bandwidth when the transmitter and receiver are asynchronous. To tackle the above problems, we propose a two-way channel error elimination theory and a frequency hopping-based carrier phase ranging algorithm to achieve high accuracy ranging under asynchronous conditions. The two-way channel error elimination theory uses the symmetry property of the two-way channel to solve the asynchronous phase error caused by the asynchronous transmitter and receiver, and we also study the effect of the two-way channel generation time difference on the phase according to the characteristics of different hardware devices. The frequency hopping-based carrier phase ranging algorithm uses frequency hopping to extend the equivalent bandwidth and incorporates a carrier phase ranging algorithm with multipath resolution to achieve a ranging accuracy comparable to that of UWB at 400 MHz bandwidth in the typical 80 MHz bandwidth of commercial WiFi. Finally, to verify the validity of the algorithm, we implement this theory using a software radio platform, and the actual experimental results show that the method proposed in this paper has a median ranging error of 5.4 cm in the 5 m range, 7 cm in the 10 m range, and 10.8 cm in the 20 m range for a total bandwidth of 80 MHz.Keywords: frequency hopping, phase error elimination, carrier phase, ranging
Procedia PDF Downloads 1226576 Effectiveness of Gamified Virtual Physiotherapy Patients with Shoulder Problems
Authors: A. Barratt, M. H. Granat, S. Buttress, B. Roy
Abstract:
Introduction: Physiotherapy is an essential part of the treatment of patients with shoulder problems. The focus of treatment is usually centred on addressing specific physiotherapy goals, ultimately resulting in the improvement in pain and function. This study investigates if computerised physiotherapy using gamification principles are as effective as standard physiotherapy. Methods: Physiotherapy exergames were created using a combination of commercially available hardware, the Microsoft Kinect, and bespoke software. The exergames used were validated by mapping physiotherapy goals of physiotherapy which included; strength, range of movement, control, speed, and activation of the kinetic chain. A multicenter, randomised prospective controlled trial investigated the use of exergames on patients with Shoulder Impingement Syndrome who had undergone Arthroscopic Subacromial Decompression surgery. The intervention group was provided with the automated sensor-based technology, allowing them to perform exergames and track their rehabilitation progress. The control group was treated with standard physiotherapy protocols. Outcomes from different domains were used to compare the groups. An important metric was the assessment of shoulder range of movement pre- and post-operatively. The range of movement data included abduction, forward flexion and external rotation which were measured by the software, pre-operatively, 6 weeks and 12 weeks post-operatively. Results: Both groups show significant improvement from pre-operative to 12 weeks in elevation in forward flexion and abduction planes. Results for abduction showed an improvement for the interventional group (p < 0.015) as well as the test group (p < 0.003). Forward flexion improvement was interventional group (p < 0.0201) with the control group (p < 0.004). There was however no significant difference between the groups at 12 weeks for abduction (p < 0.118067) , forward flexion (p < 0.189755) or external rotation (p < 0.346967). Conclusion: Exergames may be used as an alternative to standard physiotherapy regimes; however, further analysis is required focusing on patient engagement.Keywords: shoulder, physiotherapy, exergames, gamification
Procedia PDF Downloads 1946575 E-Learning Platform for School Kids
Authors: Gihan Thilakarathna, Fernando Ishara, Rathnayake Yasith, Bandara A. M. R. Y.
Abstract:
E-learning is a crucial component of intelligent education. Even in the midst of a pandemic, E-learning is becoming increasingly important in the educational system. Several e-learning programs are accessible for students. Here, we decided to create an e-learning framework for children. We've found a few issues that teachers are having with their online classes. When there are numerous students in an online classroom, how does a teacher recognize a student's focus on academics and below-the-surface behaviors? Some kids are not paying attention in class, and others are napping. The teacher is unable to keep track of each and every student. Key challenge in e-learning is online exams. Because students can cheat easily during online exams. Hence there is need of exam proctoring is occurred. In here we propose an automated online exam cheating detection method using a web camera. The purpose of this project is to present an E-learning platform for math education and include games for kids as an alternative teaching method for math students. The game will be accessible via a web browser. The imagery in the game is drawn in a cartoonish style. This will help students learn math through games. Everything in this day and age is moving towards automation. However, automatic answer evaluation is only available for MCQ-based questions. As a result, the checker has a difficult time evaluating the theory solution. The current system requires more manpower and takes a long time to evaluate responses. It's also possible to mark two identical responses differently and receive two different grades. As a result, this application employs machine learning techniques to provide an automatic evaluation of subjective responses based on the keyword provided to the computer as student input, resulting in a fair distribution of marks. In addition, it will save time and manpower. We used deep learning, machine learning, image processing and natural language technologies to develop these research components.Keywords: math, education games, e-learning platform, artificial intelligence
Procedia PDF Downloads 1566574 Psychopathy Evaluation for People with Intellectual Disability Living in Institute Using Chinese Version of the Psychopathology Inventory
Authors: Lin Fu-Gong
Abstract:
Background: As WHO announced, people with intellectual disability (ID) were vulnerable to mental health problems. And there were few custom-made mental health scales for those people to monitor their mental health. Those people with mental problems often accompanied worse prognosis and usually became to be a heavier burden on the caregivers. Purpose: In this study, we intend to develop a psychopathy scale as a practical tool for monitoring the mental health for people with ID living in institute. Methods: In this study, we adopt the Psychopathology Inventory for Mentally Retarded Adults developed by professor Matson with certified reliability and validity in Western countries with Dr. Matson’s agreement in advance. We first translated the inventory into Chinese validated version considering the domestic culture background in the past year. And the validity and reliability evaluation of mental health status using this inventory among the people with intellectual living in the institute were done. Results: The inventory includes eight psychiatric disorder scales as schizophrenic, affective, psychosexual, adjustment, anxiety, somatoform, personality disorders and inappropriate mental adjustment. Around 83% of 40 invested people, who randomly selected from the institute, were found to have at least one disorder who were recommended with medical help by two evaluators. Among the residents examined, somatoform disorder and inappropriate mental adjustment were most popular with 60% and 78% people respectively. Conclusion: The result showed the prevalence psychiatric disorders were relatively high among people with ID in institute and the mental problems need to be further cared and followed for their mental health. The results showed that the psychopathology inventory was a useful tool for institute caregiver, manager and for long-term care policy to the government. In the coming stage, we plan to extend the use of the valid Chinese version inventory among more different type institutes for people with ID to establish their dynamic mental health status including medical need, relapse and rehabilitation to promote their mental health.Keywords: intellectual disability, psychiatric disorder, psychopathology inventory, mental health, the institute
Procedia PDF Downloads 2766573 The Effectiveness of Synthesizing A-Pillar Structures in Passenger Cars
Authors: Chris Phan, Yong Seok Park
Abstract:
The Toyota Camry is one of the best-selling cars in America. It is economical, reliable, and most importantly, safe. These attributes allowed the Camry to be the trustworthy choice when choosing dependable vehicle. However, a new finding brought question to the Camry’s safety. Since 1997, the Camry received a “good” rating on its moderate overlap front crash test through the Insurance Institute of Highway Safety. In 2012, the Insurance Institute of Highway Safety introduced a frontal small overlap crash test into the overall evaluation of vehicle occupant safety test. The 2012 Camry received a “poor” rating on this new test, while the 2015 Camry redeemed itself with a “good” rating once again. This study aims to find a possible solution that Toyota implemented to reduce the severity of a frontal small overlap crash in the Camry during a mid-cycle update. The purpose of this study is to analyze and evaluate the performance of various A-pillar shapes as energy absorbing structures in improving passenger safety in a frontal crash. First, A-pillar structures of the 2012 and 2015 Camry were modeled using CAD software, namely SolidWorks. Then, a crash test simulation using ANSYS software, was applied to the A-pillars to analyze the behavior of the structures in similar conditions. Finally, the results were compared to safety values of cabin intrusion to determine the crashworthy behaviors of both A-pillar structures by measuring total deformation. This study highlights that it is possible that Toyota improved the shape of the A-pillar in the 2015 Camry in order to receive a “good” rating from the IIHS safety evaluation once again. These findings can possibly be used to increase safety performance in future vehicles to decrease passenger injury or fatality.Keywords: A-pillar, Crashworthiness, Design Synthesis, Finite Element Analysis
Procedia PDF Downloads 1196572 Study of Evaluation Model Based on Information System Success Model and Flow Theory Using Web-scale Discovery System
Authors: June-Jei Kuo, Yi-Chuan Hsieh
Abstract:
Because of the rapid growth of information technology, more and more libraries introduce the new information retrieval systems to enhance the users’ experience, improve the retrieval efficiency, and increase the applicability of the library resources. Nevertheless, few of them are discussed the usability from the users’ aspect. The aims of this study are to understand that the scenario of the information retrieval system utilization, and to know why users are willing to continuously use the web-scale discovery system to improve the web-scale discovery system and promote their use of university libraries. Besides of questionnaires, observations and interviews, this study employs both Information System Success Model introduced by DeLone and McLean in 2003 and the flow theory to evaluate the system quality, information quality, service quality, use, user satisfaction, flow, and continuing to use web-scale discovery system of students from National Chung Hsing University. Then, the results are analyzed through descriptive statistics and structural equation modeling using AMOS. The results reveal that in web-scale discovery system, the user’s evaluation of system quality, information quality, and service quality is positively related to the use and satisfaction; however, the service quality only affects user satisfaction. User satisfaction and the flow show a significant impact on continuing to use. Moreover, user satisfaction has a significant impact on user flow. According to the results of this study, to maintain the stability of the information retrieval system, to improve the information content quality, and to enhance the relationship between subject librarians and students are recommended for the academic libraries. Meanwhile, to improve the system user interface, to minimize layer from system-level, to strengthen the data accuracy and relevance, to modify the sorting criteria of the data, and to support the auto-correct function are required for system provider. Finally, to establish better communication with librariana commended for all users.Keywords: web-scale discovery system, discovery system, information system success model, flow theory, academic library
Procedia PDF Downloads 1036571 Drugstore Control System Design and Realization Based on Programmable Logic Controller (PLC)
Authors: Muhammad Faheem Khakhi, Jian Yu Wang, Salman Muhammad, Muhammad Faisal Shabir
Abstract:
Population growth and Chinese two-child policy will boost pharmaceutical market, and it will continue to maintain the growth for a period of time in the future, the traditional pharmacy dispensary has been unable to meet the growing medical needs of the peoples. Under the strong support of the national policy, the automatic transformation of traditional pharmacies is the inclination of the Times, the new type of intelligent pharmacy system will continue to promote the development of the pharmaceutical industry. Under this background, based on PLC control, the paper proposed an intelligent storage and automatic drug delivery system; complete design of the lower computer's control system and the host computer's software system has been present. The system can be applied to dispensing work for Chinese herbal medicinal and Western medicines. Firstly, the essential of intelligent control system for pharmacy is discussed. After the analysis of the requirements, the overall scheme of the system design is presented. Secondly, introduces the software and hardware design of the lower computer's control system, including the selection of PLC and the selection of motion control system, the problem of the human-computer interaction module and the communication between PC and PLC solves, the program design and development of the PLC control system is completed. The design of the upper computer software management system is described in detail. By analyzing of E-R diagram, built the establish data, the communication protocol between systems is customize, C++ Builder is adopted to realize interface module, supply module, main control module, etc. The paper also gives the implementations of the multi-threaded system and communication method. Lastly, each module of the lower computer control system is tested. Then, after building a test environment, the function test of the upper computer software management system is completed. On this basis, the entire control system accepts the overall test.Keywords: automatic pharmacy, PLC, control system, management system, communication
Procedia PDF Downloads 3106570 Attitude to Cultural Diversity and Inclusive Pedagogical Practices in the Classroom: A Correlational Study
Authors: Laura M. Espinoza, Karen A. Hernández, Diana B. Ledezma
Abstract:
Currently, in Chile, migratory movements are generated, where the country receives constantly people from Latin America such as Colombia, Peru, Venezuela, Haiti, among others. This phenomenon has reached the schools of Chile, where immigrant children and adolescents are educated in a context of cultural diversity. However, education professionals face this recent phenomenon without prior preparation to carry out their pedagogical practices in the classroom. On the other hand, research on how to understand and guide the processes of cultural diversity especially within the school is even scarce and recent in Latin America and specifically in Chile. The general purpose of the study is to analyze the relationships between teaching efforts towards multiculturalism and inclusive pedagogical practices in the schools of the city of La Serena and Coquimbo, in Chile. The study refers to a quantitative approach, with a correlational design. The selection of the participants was not intentional probabilistic. It comprises 88 teachers of preschool, primary, secondary and special education, who work in two schools with similar characteristics. For the collection of information on the independent variable, the attitude scale towards Immigration and the attitude scale towards Multiculturalism in the school are applied. To obtain information on the independent variable, the guide for the evaluation of inclusive practices in the classroom is applied. Both instruments have statistical validation. A Spearman correlation analysis was made to achieve the objective of the study. Among the main findings, we will find the relationships between the positive perceptions of multiculturalism at school and inclusive practices such as the physical conditions of the classroom, planning, methodology, use of time and evaluation. These findings are relevant to the teaching and learning processes of students in Chilean classrooms and contribute to literature for the understanding of educational processes in contexts of cultural diversity.Keywords: cultural diversity, immigration, inclusive pedagogical practices, multiculturalism
Procedia PDF Downloads 1226569 Transfer Function Model-Based Predictive Control for Nuclear Core Power Control in PUSPATI TRIGA Reactor
Authors: Mohd Sabri Minhat, Nurul Adilla Mohd Subha
Abstract:
The 1MWth PUSPATI TRIGA Reactor (RTP) in Malaysia Nuclear Agency has been operating more than 35 years. The existing core power control is using conventional controller known as Feedback Control Algorithm (FCA). It is technically challenging to keep the core power output always stable and operating within acceptable error bands for the safety demand of the RTP. Currently, the system could be considered unsatisfactory with power tracking performance, yet there is still significant room for improvement. Hence, a new design core power control is very important to improve the current performance in tracking and regulating reactor power by controlling the movement of control rods that suit the demand of highly sensitive of nuclear reactor power control. In this paper, the proposed Model Predictive Control (MPC) law was applied to control the core power. The model for core power control was based on mathematical models of the reactor core, MPC, and control rods selection algorithm. The mathematical models of the reactor core were based on point kinetics model, thermal hydraulic models, and reactivity models. The proposed MPC was presented in a transfer function model of the reactor core according to perturbations theory. The transfer function model-based predictive control (TFMPC) was developed to design the core power control with predictions based on a T-filter towards the real-time implementation of MPC on hardware. This paper introduces the sensitivity functions for TFMPC feedback loop to reduce the impact on the input actuation signal and demonstrates the behaviour of TFMPC in term of disturbance and noise rejections. The comparisons of both tracking and regulating performance between the conventional controller and TFMPC were made using MATLAB and analysed. In conclusion, the proposed TFMPC has satisfactory performance in tracking and regulating core power for controlling nuclear reactor with high reliability and safety.Keywords: core power control, model predictive control, PUSPATI TRIGA reactor, TFMPC
Procedia PDF Downloads 2416568 Integrated Management System of Plant Genetic Resources: Collection, Conservation, Regeneration and Characterization of Cucurbitaceae and Solanaceae of DOA Genebank, Thailand
Authors: Kunyaporn Pipithsangchan, Alongkorn Korntong, Assanee Songserm, Phatchara Piriyavinit, Saowanee Dechakampoo
Abstract:
The Kingdom of Thailand is one of the South East Asian countries. From its area of 514,000 square kilometers (51 million ha), at least 18,000 plant species (8% of the world total) have been estimated to be found in the country. As a result, the conservation of plant genetic diversity, particularly food crops, is becoming important and is an assurance for the national food security. Department of Agriculture Genebank or DOA Genebank, Thailand is responsible for the conservation of plant germplasm by participating and accomplishing several collaborative projects both at national and international levels. Integrated Management System of Plant Genetic Resources or IMPGR is one of the most outstandingly successful cooperation. It is a multilateral project under the Asian Food and Agriculture Cooperation Initiative (AFACI) supported by the Rural Development Administration (RDA) of South Korea. The member countries under the project consist of 11 nations namely Bangladesh, Cambodia, Indonesia, Laos PDR, Mongolia, Nepal, Philippines, Sri Lanka, Thailand, Vietnam and South Korea. The project enabled the members to jointly address the global issues in plant genetic resource (PGR) conservation and strengthen their network in this aspect. The 1st phase of IMPGR project, entitled 'Collection, Conservation, Regeneration and Characterization of Cucurbitaceae and Solanaceae 2012-2014', comprises three main objectives that are: 1) To improve management in storage facilities, collection, and regeneration, 2) To improve linkage between Genebank and material sources (for regeneration), and 3) To improve linkage between Genebank and other field crop or/and horticultural research centers. The project was done for three years from 2012 to 2014. The activities of the project can be described as following details: In the 1st year, there were 9 target provinces for completing plant genetic resource survey and collection. 108 accessions of PGR were collected. In the 2nd year, PGR were continuously surveyed and collected from 9 provinces. The total number of collection was 140 accessions. In addition, the process of regeneration of 237 accessions collected from 1st and 2nd year was started at several sites namely Biotechnology Research and Development Office, Sukothai Horticultural Research Center, Tak Research, and Development Center and Nakhon Ratchasima Research and Development Center. In the 3rd year, besides survey and collection of 115 accessions from 9 target provinces, PGR characterization and evaluation were done for 206 accessions. Moreover, safety duplication of 253 PGR at the World Seed Vault, RDA, was also done according to Standard Agreement on Germplasm Safety Duplication between Department of Agriculture, Ministry of Agriculture and Cooperatives, the Kingdom of Thailand and the National Agrobiodiversity Center, Rural Development Administration of the Republic of Korea. The success of the 1st phase project led to the second phase which entitled 'Collection and Characterization for Effective Conservation of Local Capsicum spp., Solanum spp. and Lycopersicon spp. in Thailand 2015-2017'.Keywords: characterization, conservation, DOA genebank, plant genetic resources
Procedia PDF Downloads 1756567 Rational Allocation of Resources in Water Infrastructure Development Projects
Authors: M. Macchiaroli, V. Pellecchia, L. Dolores
Abstract:
Within any European and world model of management of the integrated water service (in Italy only since 2012 is regulated by a national Authority, that is ARERA), a significant part is covered by the development of assets in terms of hydraulic networks and wastewater collection networks, including all their relative building works. The process of selecting the investments to be made starts from the preventive analysis of critical issues (water losses, unserved areas, low service standards, etc.) who occur in the managed territory of the Operator. Through the Program of Interventions (Provision by ARERA n. 580/2019/R/idr), the Operator provides to program the projects that can meet the emerged needs to determine the improvement of the water service levels. This phase (analyzed and solved by the author with a work published in 2019) involves the use of evaluation techniques (cost-benefit analysis, multi-criteria, and multi-objective techniques, neural networks, etc.) useful in selecting the most appropriate design answers to the different criticalities. However, at this point, the problem of establishing the time priorities between the various works deemed necessary remains open. That is, it is necessary to hierarchize the investments. In this decision-making moment, the interests of the private Operator are often opposed, which favors investments capable of generating high profitability, compared to those of the public controller (ARERA), which favors investments in greater social impact. In support of the concertation between these two actors, the protocol set out in the research has been developed, based on the AHP and capable of borrowing from the programmatic documents an orientation path for the settlement of the conflict. The protocol is applied to a case study of the Campania Region in Italy and has been professionally applied in the shared decision process between the manager and the local Authority.Keywords: analytic hierarchy process, decision making, economic evaluation of projects, integrated water service
Procedia PDF Downloads 1236566 Colorful Ethnoreligious Map of Iraq and the Current Situation of Minorities in the Country
Authors: Meszár Tárik
Abstract:
The aim of the study is to introduce the minority groups living in Iraq and to shed light on their current situation. The Middle East is a rather heterogeneous region in ethnic terms. It includes many ethnic, national, religious, linguistic, or ethnoreligious groups. The relationship between the majority and minority is the main cause of various conflicts in the region. It seems that most of the post-Ottoman states have not yet developed a unified national identity capable of integrating their multi-ethnic societies. The issue of minorities living in the Middle East is highly politicized and controversial, as the various Arab states consider the treatment of minorities as their internal affair, do not recognize discrimination or even deny the existence of any kind of minorities on their territory. This attitude of the Middle Eastern states may also be due to the fact that the minority issue can be abused and can serve as a reference point for the intervention policies of Western countries at any time. Methodologically, the challenges of these groups are perceived through the manifestos of prominent individuals and organizations belonging to minorities. The basic aim is to present the minorities’ own history in dealing with the issue. It also introduces the different ethnic and religious minorities in Iraq and analyzes their situation during the operation of the terrorist organization „Islamic State” and in the aftermath. It is clear that the situation of these communities deteriorated significantly with the advance of ISIS, but it is also clear that even after the expulsion of the militant group, we cannot necessarily report an improvement in this area, especially in terms of the ability of minorities to assert their interests and physical security. The emergence of armed militias involved in the expulsion of ISIS sometimes has extremely negative effects on them. Until the interests of non-Muslims are adequately represented at the local level and in the legislature, most experts and advocates believe that little will change in their situation. When conflicts flare, many Iraqi citizens usually leave Iraq, but because of the poor public security situation (threats from terrorist organizations, interventions by other countries), emigration causes serious problems not only outside the country’s borders but also within the country. Another ominous implication for minorities is that their communities are very slow if ever, to return to their homes after fleeing their own settlements. An important finding of the study is that this phenomenon is changing the face of traditional Iraqi settlements and threatens to plunge groups that have lived there for thousands of years into the abyss of history. Therefore, we not only present the current situation of minorities living in Iraq but also discuss their future possibilities.Keywords: Middle East, Iraq, Islamic State, minorities
Procedia PDF Downloads 876565 Outcome Evaluation of a Blended-Learning Mental Health Training Course in South African Public Health Facilities
Authors: F. Slaven, M. Uys, Y. Erasmus
Abstract:
The South African National Mental Health Education Programme (SANMHEP) was a National Department of Health (NDoH) initiative to strengthen mental health services in South Africa in collaboration with the Foundation for Professional Development (FPD), SANOFI and the various provincial departments of health. The programme was implemented against the backdrop of a number of challenges in the management of mental health in the country related to staff shortages and infrastructure, the intersection of mental health with the growing burden of non-communicable diseases and various forms of violence, and challenges around substance abuse and its relationship with mental health. The Mental Health Care Act (No. 17 of 2002) prescribes that mental health should be integrated into general health services including primary, secondary and tertiary levels to improve access to services and reduce stigma associated with mental illness. In order for the provisions of the Act to become a reality, and for the journey of mental health patients through the system to improve, sufficient and skilled health care providers are critical. SANMHEP specifically targeted Medical Doctors and Professional Nurses working within the facilities that are listed to conduct 72-hour assessments, as well as District Hospitals. The aim of the programme was to improve the clinical diagnosis and management of mental disorders/conditions and the understanding of and compliance with the Mental Health Care Act and related Regulations and Guidelines in the care, treatment and rehabilitation of mental health care users. The course used a blended-learning approach and trained 1 120 health care providers through 36 workshops between February and November 2019. Of those trained, 689 (61.52%) were Professional Nurses, 337 (30.09%) were Medical Doctors, and 91 (8.13%) indicated their occupation as ‘other’ (of these more than half were psychologists). The pre- and post-evaluation of the face-to-face training sessions indicated a marked improvement in knowledge and confidence level scores (both clinical and legislative) in the care, treatment and rehabilitation of mental health care users by participants in all the training sessions. There was a marked improvement in the knowledge and confidence of participants in performing certain mental health activities (on average the ratings increased by 2.72; or 27%) and in managing certain mental health conditions (on average the ratings increased by 2.55; or 25%). The course also required that participants obtain 70% or higher in their formal assessments as part of the online component. The 337 participants who completed and passed the course scored 90% on average. This illustrates that when participants attempted and completed the course, they did very well. To further assess the effect of the course on the knowledge and behaviour of the trained mental health care practitioners a mixed-method outcome evaluation is currently underway consisting of a survey with participants three months after completion, follow-up interviews with participants, and key informant interviews with department of health officials and course facilitators. This will enable a more detailed assessment of the impact of the training on participants' perceived ability to manage and treat mental health patients.Keywords: mental health, public health facilities, South Africa, training
Procedia PDF Downloads 1196564 Challenges in Multi-Cloud Storage Systems for Mobile Devices
Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta
Abstract:
The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices.Keywords: cloud storage, data privacy, data security, multi cloud storage, mobile devices
Procedia PDF Downloads 6996563 Cuckoo Search Optimization for Black Scholes Option Pricing
Authors: Manas Shah
Abstract:
Black Scholes option pricing model is one of the most important concepts in modern world of computational finance. However, its practical use can be challenging as one of the input parameters must be estimated; implied volatility of the underlying security. The more precisely these values are estimated, the more accurate their corresponding estimates of theoretical option prices would be. Here, we present a novel model based on Cuckoo Search Optimization (CS) which finds more precise estimates of implied volatility than Particle Swarm Optimization (PSO) and Genetic Algorithm (GA).Keywords: black scholes model, cuckoo search optimization, particle swarm optimization, genetic algorithm
Procedia PDF Downloads 4536562 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems
Authors: Nadjah Chergui, Narhimene Boustia
Abstract:
Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.Keywords: context, default, exception, vulnerability
Procedia PDF Downloads 2596561 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles
Authors: Anthony Overmars, Sitalakshmi Venkatraman
Abstract:
This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography
Procedia PDF Downloads 2396560 Phone Number Spoofing Attack in VoLTE
Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 5226559 Economic Characteristics of Bitcoin: "An Analytical Study"
Authors: Abdelhalem Shahen
Abstract:
The world is now experiencing a digital revolution and greatly accelerated technological developments, in addition to the transition from the economy in its traditional form to the digital economy, which has resulted in the emergence of new tools that are appropriate to those developments, and from this, this paper attempts to explore the economic characteristics of the bitcoin currency that circulated recently. Due to the many advantages that distinguish it from money in its traditional forms, which have a range of economic effects. The study found that Bitcoin is among the technological innovations, which contain a set of characteristics that are worth studying, those that make it the focus of attention, such as the digital currency, the peer-to-peer property, Lower and Faster Transaction Costs, transparency, decentralized control, privacy, and Double-Spending, as well as security and Cryptographic, and finally mining.Keywords: Digital Economics, Digital Currencies, Bitcoin, Features of Bitcoin
Procedia PDF Downloads 138