Search results for: Information Technology Environment
20340 Distance and Coverage: An Assessment of Location-Allocation Models for Fire Stations in Kuwait City, Kuwait
Authors: Saad M. Algharib
Abstract:
The major concern of planners when placing fire stations is finding their optimal locations such that the fire companies can reach fire locations within reasonable response time or distance. Planners are also concerned with the numbers of fire stations that are needed to cover all service areas and the fires, as demands, with standard response time or distance. One of the tools for such analysis is location-allocation models. Location-allocation models enable planners to determine the optimal locations of facilities in an area in order to serve regional demands in the most efficient way. The purpose of this study is to examine the geographic distribution of the existing fire stations in Kuwait City. This study utilized location-allocation models within the Geographic Information System (GIS) environment and a number of statistical functions to assess the current locations of fire stations in Kuwait City. Further, this study investigated how well all service areas are covered and how many and where additional fire stations are needed. Four different location-allocation models were compared to find which models cover more demands than the others, given the same number of fire stations. This study tests many ways to combine variables instead of using one variable at a time when applying these models in order to create a new measurement that influences the optimal locations for locating fire stations. This study also tests how location-allocation models are sensitive to different levels of spatial dependency. The results indicate that there are some districts in Kuwait City that are not covered by the existing fire stations. These uncovered districts are clustered together. This study also identifies where to locate the new fire stations. This study provides users of these models a new variable that can assist them to select the best locations for fire stations. The results include information about how the location-allocation models behave in response to different levels of spatial dependency of demands. The results show that these models perform better with clustered demands. From the additional analysis carried out in this study, it can be concluded that these models applied differently at different spatial patterns.Keywords: geographic information science, GIS, location-allocation models, geography
Procedia PDF Downloads 18220339 Smallholder’s Agricultural Water Management Technology Adoption, Adoption Intensity and Their Determinants: The Case of Meda Welabu Woreda, Oromia, Ethiopia
Authors: Naod Mekonnen Anega
Abstract:
The very objective of this paper was to empirically identify technology tailored determinants to the adoption and adoption intensity (extent of use) of agricultural water management technologies in Meda Welabu Woreda, Oromia regional state, Ethiopia. Meda Welabu Woreda which is one of the administrative Woredas of the Oromia regional state was selected purposively as this Woreda is one of the Woredas in the region where small scale irrigation practices and the use of agricultural water management technologies can be found among smallholders. Using the existence water management practices (use of water management technologies) and land use pattern as a criterion Genale Mekchira Kebele is selected to undergo the study. A total of 200 smallholders were selected from the Kebele using the technique developed by Krejeie and Morgan. The study employed the Logit and Tobit models to estimate and identify the economic, social, geographical, household, institutional, psychological, technological factors that determine adoption and adoption intensity of water management technologies. The study revealed that while 55 of the sampled households are adopters of agricultural water management technology the rest 140 were non adopters of the technologies. Among the adopters included in the sample 97% are using river diversion technology (traditional) with traditional canal while the rest 7% percent are using pond with treadle pump technology. The Logit estimation reveled that while adoption of river diversion is positively and significantly affected by membership to local institutions, active labor force, income, access to credit and land ownership, adoption of treadle pump technology is positively and significantly affected by family size, education level, access to credit, extension contact, income, access to market, and slope. The Logit estimation also revealed that whereas, group action requirement, distance to farm, and size of active labor force negative and significantly influenced adoption of river diversion, age and perception has negatively and significantly influenced adoption decision of treadle pump technology. On the other hand, the Tobit estimation reveled that while adoption intensity (extent of use) of agricultural water management is positively and significantly affected by education, credit, and extension contact, access to credit, access to market and income. This study revealed that technology tailored study on adoption of Agricultural water management technologies (AWMTs) should be considered to indentify and scale up best agricultural water management practices. In fact, in countries like Ethiopia, where there is difference in social, economic, cultural, environmental and agro ecological conditions even within the same Kebele technology tailored study that fit the condition of each Kebele would help to identify and scale up best practices in agricultural water management.Keywords: water management technology, adoption, adoption intensity, smallholders, technology tailored approach
Procedia PDF Downloads 46120338 The Use of Geographic Information System and Spatial Statistic for Analyzing Leukemia in Kuwait for the Period of 2006-2012
Authors: Muhammad G. Almatar, Mohammad A. Alnasrallah
Abstract:
This research focuses on the study of three main issues: 1) The temporal analysis of leukemia for a period of six years (2006-2012), 2) spatial analysis by investigating this phenomenon in the Kuwaiti society spatially in the residential areas within the six governorates, 3) the use of Geographic Information System technology in investigating the hypothesis of the research and its variables using the linear regression, to show the pattern of linear relationship. The study depends on utilizing the map to understand the distribution of blood cancer in Kuwait. Several geodatabases were created for the number of patients and air pollution. Spatial interpolation models were used to generate layers of air pollution in the study area. These geodatabases were tested over the past six years to reach the conclusion: Is there a relationship with significant significance between the two main variables of the study: blood cancer and air pollution? This study is the first to our best knowledge. As far as the researchers know, the distribution of this disease has not been studied geographically at the level of regions in Kuwait within six years and in specific areas as described above. This study investigates the concentration of this type of disease. The study found that there is no relationship of significant value between the two variables studied, and this may be due to the nature of the disease, which are often hereditary. On the other hand, this study has reached a number of suggestions and recommendations that may be useful to decision-makers and interested in the study of leukemia in Kuwait by focusing on the study of genetic diseases, which may be a cause of leukemia rather than air pollution.Keywords: Kuwait, GIS, cancer, geography
Procedia PDF Downloads 11720337 Mathematics Anxiety among Secondary Level Students in Nepal: Classroom Environment Perspective
Authors: Krishna Chandra Paudel
Abstract:
This paper explores the association between the perceived classroom environment and mathematics learning and test anxiety among secondary level students in Nepal. Categorizing the students in three dominant variables- gender, ethnicity and previous schooling, and selecting sample students with respect to higher mathematics anxiety from five heterogeneous classes, the research explores disparities in student's mathematics cognition and reveals nexus between classroom environment and mathematics learning and test anxiety. This research incorporates social learning theory and social development theory as interpretive tool for analyzing themes through qualitative data. Focussing on the interviews with highly mathematics learning anxious students, the study sheds light on how mathematics anxiety among the targeted students is interlinked with multiple factors. The research basically exposes the students’ lack of mathematical passion, their association with other students and participation in classroom learning, asymmetrical content and their lack of preparedness for the tests as caustic factors behind such anxieties. The study further reveals that students’ lack of foundational knowledge and complexity of mathematical content have jointly contributed to mathematics anxiety. Admitting learning as a reciprocal experience, the study points out that the students’ gender, ethnicity and disparities in previous schooling in the context of Nepal has very insignificant impact on students’ mathematics anxiety. It finally recommends that the students who get trapped into the vicious cycle of mathematics anxiety require positive and supportive classroom environment along with inspiring comments/compliments and symmetrical course contents.Keywords: anxiety, asymmetry, cognition, habitus, pedagogy, preparedness
Procedia PDF Downloads 14520336 Ecological Art in the Nuclear Anthropocene
Authors: Eve-Andree Laramee
Abstract:
The aesthetics and ethics of the Nuclear Anthropocene are explored through artists responses to the impact of radioactive materials on ecological systems, global issues, energy policies and ourselves. This presentation tracks and reveals the invisible traces of the nuclear weapons complex and the nuclear energy industry, in relation to environmental justice. Radioactive pollution transgresses international borders, boundaries between land and water, contaminating ecological systems. Radioactive waste is never disposed of; it is dispositioned, placed out of sight and out of mind. These materials leave behind an invisible toxic legacy lasting millions of years. As we are learning post-Fukushima, when climate change occurs and vulnerability spectrums shift, nuclear sites and the life forms surrounding them are at increased risk. By visualizing this contamination through art installations, videos, and social-sculpture interventions, information is shared with the public, raising awareness, and activating community participation in remediation and nonproliferation efforts. The emerging Ecological Art genre proposes paradigms sustainable with the life forms and resources of our planet. It is comprised of artists, scientists, philosophers and activists devoted to these. EcoArt is distinguished by a focus on systems and interrelationships within our environment: the ecological, geographic, political, biological and cultural. This presentation will cover artworks addressing the recent Fukushima meltdowns, weapons proliferation, climate change, radioactive waste disposal and environmental justice. Possibilities for art-and-science collaborations will be discussed as projects that sharpen our ethics and politics in our behaviors and social interactions. The presentation will consist of a PowerPoint talk (paper presentation) accompanied by images and video clips.Keywords: art, ecology, environment, anthropocene, nuclear
Procedia PDF Downloads 23320335 Security of Internet of Things: Challenges, Requirements and Future Directions
Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi
Abstract:
The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture
Procedia PDF Downloads 37820334 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security
Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama
Abstract:
This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach
Procedia PDF Downloads 29420333 An Exploratory Study of the Effects of Head Movement on Engagement within a Telepresence Environment
Authors: B. S. Bamoallem, A. J. Wodehouse, G. M. Mair
Abstract:
Communication takes place not only through speech, but also by means of gestures such as facial expressions, gaze, head movements, hand movements and body posture, and though there has been rapid development, communication platforms still lack this type of behavior. We believe communication platforms need to fully achieve this verbal and non-verbal behavior in order to make interactions more engaging and more efficient. In this study we decided to focus our research on the head rather than any other body part as it is a rich source of information for speech-related movement Thus we aim to investigate the value of incorporating head movements into the use of telepresence robots as communication platforms; this will be done by investigating a system that reproduces head movement manually as closely as possible.Keywords: engagement, nonverbal behaviours, head movements, face-to-face interaction, telepresence robot
Procedia PDF Downloads 45620332 Pesticide Use Practices among Female Headed Households in the Amhara Region, Ethiopia
Authors: Birtukan Atinkut Asmare, Bernhard Freyer, Jim Bingen
Abstract:
Though it is possible to transform the farming system towards a healthy, sustainable, and toxic-free food system by reducing pesticide use both in the field and postharvest, pesticides, including those that have been banned or severely restricted from use in developed countries, are indiscriminately used in African agriculture. Drawing on social practice theory, this study is about pesticide use practices in smallholder farms and its adverse impacts on women’s health and the environment, with reference to Africa, with an empirical focus on Ethiopia. Data have been collected via integrating diverse quantitative and qualitative approaches such as household surveys (n= 318), focus group discussions (n=6), field observations (n=30), and key informant interviews (n=18), with people along the pesticide value chain, including sellers and extension workers up to women farmers. A binary logistic regression model was used to investigate the factors that influence the adoption of personal protective equipment among female headed households. The findings show that Female-headed households carried out risky and unsafe practices from pesticide purchasing up to disposal, largely motivated by material elements (such as labor, income, time, and the provisioning system) but were notably shaped by competences (skills and knowledge), and meanings (norms, values, rules, and shared ideas). The main meaning or material aspect for pesticide purchasing were the perceptions of efficacy on pests, diseases, and weeds (65%), cost and availability in smaller quantities (60.7%), and a woman’s available time and mobility (58.9%). Pesticide hazards to human health or the environment seem not to be relevant for most female headed households. Unsafe practices of pesticide use among women led to the loss of biodiversity and ecosystem degradation, let alone their and family’s health. As the regression results show, the significant factors that influenced PPE adoption among female headed households were age and retailer information (p < 0.05). In line with the empirical finding, in addition to changing individual competences through advisory services and training, a foundational shift is needed in the sociocultural environment (e.g., policy, advisory), or a change in the meanings (social norms), where women are living and working.Keywords: biodiversity, competences, ecosystems, ethiopia, female headed households, materials, meanings, pesticide purchasing, pesticide using, social practice theory
Procedia PDF Downloads 8120331 Understanding Consumer Behaviors by Using Neuromarketing Tools and Methods
Authors: Tabrej Khan
Abstract:
Neuromarketing can refer to the commercial application of neuroscience technologies and insights to drive business further. On the other side, consumer neuroscience can be seen as the academic use of neuroscience to better understand marketing effects on consumer behavior. Consumer Neuroscience and Neuromarketing is a multidisciplinary effort between economics, psychology, and neuroscience and information technology. Traditional methods are using survey, interviews, focus group people are overtly and consciously reporting on their experience and thoughts. The unconscious side of customer behavior is largely unmeasured in the traditional methods. Neuroscience has a potential to understand the unconscious part. Through this paper, we are going to present specific results of selected tools and methods that are used to understand consumer behaviors.Keywords: neuromarketing, neuroscience, consumer behaviors, tools
Procedia PDF Downloads 40620330 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm
Authors: Vaibhav Barve
Abstract:
Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.Keywords: data embedding, decryption, encryption, reversible data hiding, steganography
Procedia PDF Downloads 28920329 Oil Contaminate Removal from Wastewater with Novel Nanofiber-Based Membranes
Authors: Zhaoyang Liu
Abstract:
Oil pollution is typically caused by oil and gas-related operations such as vessel accidents, which can pollute waterways as well as the environment and damage the ecosystem. Tanker ship cleaning contributes to oil spills, which have a negative impact on coastal countries due to protracted service disruption. It is critical for coastal countries to develop efficient oil taint cleanup technology. There are various oil/water separation technologies, such as gravity separation, hydrocyclone, air flotation, and membrane filtration, among others. Among these, membrane filtration has been shown to produce high-quality effluent. Commercial membranes, on the other hand, nevertheless face significant practical challenges, such as a high susceptibility for membrane fouling when dealing with greasy effluent. We developed a unique anti-fouling filtering membrane for oil/water separation in this work. The membrane was made of inorganic nanofibers, which possesses the advantages of low membrane fouling, high permeation flux and long-term durability. This results from this study could facilitate to pave a new way for membranes filtration’s practical applications in oil/gas industry.Keywords: oil, contaminate, wastewater, removal
Procedia PDF Downloads 8420328 A Systematic Review on Assistive Technology Robotics in Lower and Middle-Income Settings
Authors: Sumudu Sameera Perera Kimmantudawage, Chapal Khasnabis
Abstract:
Technology is changing at a rapid rate, with innovations in robotics being hailed and tested in countries such as Japan, the United States and Australia, however the conversation in a public health context is stagnant. While obvious barriers to robotics use in low and middle-income countries and regions exist, the avoidance of attempting to address these regions of the world may potentially lead to an ever-increasing divide between those of high income countries and those of less. A systematic review was undertaken to determine the number of projects involving research, development and testing of robotics considered low and middle-income regions. Major findings indicate that an overwhelmingly significant number of projects failed to consider low and middle-income countries or regions. These results are unsurprising however alarming, as bridging the divide is an important step forward in achieving the UN Sustainable Development Goals by 2030. It is hoped that this research would spawn future robotics research that focusses on lower and middle-income regions.Keywords: assistive technology, health equality, robotics, socioeconomic
Procedia PDF Downloads 24020327 Baby Boomers and Millennials: Creating a Specialized Orientation Program
Authors: K. Rowan
Abstract:
In this paper, the author will discuss how developing a specialized orientation has improved nursing satisfaction and decrease the incidence of incivility among staff. With the predicted shortages in nursing, we must provide an environment that reflects the needs of the current workforce while also focusing on the sustainability of nursing. Each generation has different qualities and methods in which he or she prefers to learn. The Baby Boomer has a desire to share their knowledge. They feel that the quality of undergraduate nursing education has declined. Millennials have grown up with 'helicopter parents' and expect the preceptor to behave in the same manner. This information must be shared with the Baby Boomer, as it is these staff members who are passing the torch of perioperative nursing. Currently, nurse fellows are trained with the Association of periOperative Nurse’s Periop 101 program, with a didactic and clinical observation program. There is no specialized perioperative preceptor program. In creation of a preceptor program, the concept of Novice to Expert, communication techniques, dealing with horizontal violence and generational gap education is reviewed with the preceptor. The fellows are taught communication and de-escalation skills, and generational gaps information. The groups are then brought together for introductions and teamwork exercises. At the program’s core is the knowledge of generational differences. The preceptor training has increased preceptor satisfaction, as well as the new nurse fellows. The creation of a specialized education program has significantly decreased incivility amongst our nurses, all while increasing nursing satisfaction and improving nursing retention. This model of program can translate to all nursing specialties and assist in overcoming the impending shortage.Keywords: baby boomers, education, generational gap, millennials, nursing, perioperative
Procedia PDF Downloads 16920326 An Improved Image Steganography Technique Based on Least Significant Bit Insertion
Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo
Abstract:
In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.Keywords: steganography, image steganography, least significant bits, bit map image
Procedia PDF Downloads 27120325 The Effect of MOOC-Based Distance Education in Academic Engagement and Its Components on Kerman University Students
Authors: Fariba Dortaj, Reza Asadinejad, Akram Dortaj, Atena Baziyar
Abstract:
The aim of this study was to determine the effect of distance education (based on MOOC) on the components of academic engagement of Kerman PNU. The research was quasi-experimental method that cluster sampling with an appropriate volume was used in this study (one class in experimental group and one class in controlling group). Sampling method is single-stage cluster sampling. The statistical society is students of Kerman Payam Noor University, which) were selected 40 of them as sample (20 students in the control group and 20 students in experimental group). To test the hypothesis, it was used the analysis of univariate and Co-covariance to offset the initial difference (difference of control) in the experimental group and the control group. The instrument used in this study is academic engagement questionnaire of Zerang (2012) that contains component of cognitive, behavioral and motivational engagement. The results showed that there is no significant difference between mean scores of academic components of academic engagement in experimental group and the control group on the post-test, after elimination of the pre-test. The adjusted mean scores of components of academic engagement in the experimental group were higher than the adjusted average of scores after the test in the control group. The use of technology-based education in distance education has been effective in increasing cognitive engagement, motivational engagement and behavioral engagement among students. Experimental variable with the effect size 0.26, predicted 26% of cognitive engagement component variance. Experimental variable with the effect size 0.47, predicted 47% of the motivational engagement component variance. Experimental variable with the effect size 0.40, predicted 40% of behavioral engagement component variance. So teaching with technology (MOOC) has a positive impact on increasing academic engagement and academic performance of students in educational technology. The results suggest that technology (MOOC) is used to enrich the teaching of other lessons of PNU.Keywords: educational technology, distance education, components of academic engagement, mooc technology
Procedia PDF Downloads 15120324 Wicking Bed Cultivation System as a Strategic Proposal for the Cultivation of Milpa and Mexican Medicinal Plants in Urban Spaces
Authors: David Lynch Steinicke, Citlali Aguilera Lira, Andrea León García
Abstract:
The proposal posed in this work comes from a researching-action approach. In Mexico, a dialogue of knowledge may function as a link between traditional, local, pragmatic knowledge, and technological, scientific knowledge. The advantage of generating this nexus lies on the positive impact in the environment, in society and economy. This work attempts to combine, on the one hand the traditional Mexican knowledge such as the usage of medicinal herb and the agroecosystem milpa; and on the other hand make use of a newly created agricultural ecotechnology which main function is to take advantage of the urban space and to save water. This ecotechnology is the wicking bed. In a globalized world, is relevant to have a proposal where the most important aspect is to revalorize the culture through the acquisition of traditional knowledge but at the same time adapting them to the new social and urbanized structures without threatening the environment. The methodology used in this work comes from a researching-action approach combined with a practical dimension where an experimental model made of three wickingbeds was implemented. In this model, there were cultivated medicinal herb and milpa components. The water efficiency and the social acceptance were compared with a traditional ground crop, all this practice was made in an urban social context. The implementation of agricultural ecotechnology has had great social acceptance as its irrigation involves minimal effort and it is economically feasible for low-income people. The wicking bed system raised in this project is attainable to be implemented in schools, urban and peri-urban environments, homemade gardens and public areas. The proposal managed to carry out an innovative and sustainable knowledge-based traditional Mexican agricultural technology, allowing regain Milpa agroecosystem in urban environments to strengthen food security in favour of nutritional and protein benefits for the Mexican fare.Keywords: milpa, traditional medicine, urban agriculture, wicking bed
Procedia PDF Downloads 39120323 Social Media, Networks and Related Technology: Business and Governance Perspectives
Authors: M. A. T. AlSudairi, T. G. K. Vasista
Abstract:
The concept of social media is becoming the top of the agenda for many business executives and public sector executives today. Decision makers as well as consultants, try to identify ways in which firms and enterprises can make profitable use of social media and network related applications such as Wikipedia, Face book, YouTube, Google+, Twitter. While it is fun and useful to participating in this media and network for achieving the communication effectively and efficiently, semantic and sentiment analysis and interpretation becomes a crucial issue. So, the objective of this paper is to provide literature review on social media, network and related technology related to semantics and sentiment or opinion analysis covering business and governance perspectives. In this regard, a case study on the use and adoption of Social media in Saudi Arabia has been discussed. It is concluded that semantic web technology play a significant role in analyzing the social networks and social media content for extracting the interpretational knowledge towards strategic decision support.Keywords: CRASP methodology, formative assessment, literature review, semantic web services, social media, social networks
Procedia PDF Downloads 45520322 Electrospun Membrane doped with Gold Nanorods for Surface-Enhanced Raman Sepctroscopy
Authors: Ziwei Wang, Andrea Lucotti, Luigi Brambilla, Matteo Tommasini, Chiara Bertarelli
Abstract:
Surface-enhanced Raman Spectroscopy (SERS) is a highly sensitive detection that provides abundant information on low concentration analytes from various researching areas. Based on localized surface plasmon resonance, metal nanostructures including gold, silver and copper have been investigated as SERS substrate during recent decades. There has been increasing more attention of exploring good performance, homogenous, repeatable SERS substrates. Here, we show that electrospinning, which is an inexpensive technique to fabricate large-scale, self-standing and repeatable membranes, can be effectively used for producing SERS substrates. Nanoparticles and nanorods are added to the feed electrospinning solution to collect functionalized polymer fibrous mats. We report stable electrospun membranes as SERS substrate using gold nanorods (AuNRs) and poly(vinyl alcohol). Particularly, a post-processing crosslinking step using glutaraldehyde under acetone environment was carried out to the electrospun membrane. It allows for using the membrane in any liquid environment, including water, which is of interest both for sensing of contaminant in wastewater, as well as for biosensing. This crosslinked AuNRs/PVA membrane has demonstrated excellent performance as SERS substrate for low concentration 10-6 M Rhodamine 6G (Rh6G) aqueous solution. This post-processing for fabricating SERS substrate is the first time reported and proved through Raman imaging of excellent stability and outstanding performance. Finally, SERS tests have been applied to several analytes, and the application of AuNRs/PVA membrane is broadened by removing the detected analyte by rinsing. Therefore, this crosslinked AuNRs/PVA membrane is re-usable.Keywords: SERS spectroscopy, electrospinning, crosslinking, composite materials
Procedia PDF Downloads 14720321 Cranioplasty with Custom Implant Realized Using 3D Printing Technology
Authors: Trad Khodja Rafik, Mahtout Amine, Ghoul Rachid, Benbouali Amine, Boulahlib Amine, Hariza Abdelmalik
Abstract:
Cranioplasty with custom implant realized using 3D printing technology. Cranioplasty is a surgical act that aims restoring cranial bone losses in order to protect the brain from external aggressions and to improve the patient aesthetic appearance. This objective can be achieved with taking advantage of the current technological development in computer science and biomechanics. The objective of this paper it to present an approach for the realization of high precision biocompatible cranial implants using new 3D printing technologies at the lowest cost. The proposed method is to reproduce the missing part of the skull by referring to its healthy contralateral part. Once the model is validated by the neurosurgeons, a mold is 3D printed for the production of a biocompatible implant in Poly-Methyl-Methacrylate (PMMA) acrylic cement. Using this procedure four patients underwent this procedure with excellent aesthetic results.Keywords: cranioplasty, cranial bone loss, 3D printing technology, custom-made implants, PMMA
Procedia PDF Downloads 11520320 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)
Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo
Abstract:
Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop
Procedia PDF Downloads 40920319 An Investigation into the Potential of Industrial Low Grade Heat in Membrane Distillation for Freshwater Production
Authors: Yehia Manawi, Ahmad Kayvanifard
Abstract:
Membrane distillation is an emerging technology which has been used to produce freshwater and purify different types of aqueous mixtures. Qatar is an arid country where almost 100% of its freshwater demand is supplied through the energy-intensive thermal desalination process. The country’s need for water has reached an all-time high which stipulates finding an alternative way to augment freshwater without adding any drastic affect to the environment. The objective of this paper was to investigate the potential of using the industrial low grade waste heat to produce freshwater using membrane distillation. The main part of this work was conducting a heat audit on selected Qatari chemical industries to estimate the amounts of freshwater produced if such industrial waste heat were to be recovered. By the end of this work, the main objective was met and the heat audit conducted on the Qatari chemical industries enabled us to estimate both the amounts of waste heat which can be potentially recovered in addition to the amounts of freshwater which can be produced if such waste heat were to be recovered. By the end, the heat audit showed that around 605 Mega Watts of waste heat can be recovered from the studied Qatari chemical industries which resulted in a total daily production of 5078.7 cubic meter of freshwater. This water can be used in a wide variety of applications such as human consumption or industry. The amount of produced freshwater may look small when compared to that produced through thermal desalination plants; however, one must bear in mind that this water comes from waste and can be used to supply water for small cities or remote areas which are not connected to the water grid. The idea of producing freshwater from the two widely-available wastes (thermal rejected brine and waste heat) seems promising as less environmental and economic impacts will be associated with freshwater production which may in the near future augment the conventional way of producing freshwater currently being thermal desalination. This work has shown that low grade waste heat in the chemical industries in Qatar and perhaps the rest of the world can contribute to additional production of freshwater using membrane distillation without significantly adding to the environmental impact.Keywords: membrane distillation, desalination, heat recovery, environment
Procedia PDF Downloads 32420318 A PROMETHEE-BELIEF Approach for Multi-Criteria Decision Making Problems with Incomplete Information
Abstract:
Multi-criteria decision aid methods consider decision problems where numerous alternatives are evaluated on several criteria. These methods are used to deal with perfect information. However, in practice, it is obvious that this information requirement is too much strict. In fact, the imperfect data provided by more or less reliable decision makers usually affect decision results since any decision is closely linked to the quality and availability of information. In this paper, a PROMETHEE-BELIEF approach is proposed to help multi-criteria decisions based on incomplete information. This approach solves problems with incomplete decision matrix and unknown weights within PROMETHEE method. On the base of belief function theory, our approach first determines the distributions of belief masses based on PROMETHEE’s net flows and then calculates weights. Subsequently, it aggregates the distribution masses associated to each criterion using Murphy’s modified combination rule in order to infer a global belief structure. The final action ranking is obtained via pignistic probability transformation. A case study of real-world application concerning the location of a waste treatment center from healthcare activities with infectious risk in the center of Tunisia is studied to illustrate the detailed process of the BELIEF-PROMETHEE approach.Keywords: belief function theory, incomplete information, multiple criteria analysis, PROMETHEE method
Procedia PDF Downloads 17220317 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment
Authors: Y. Xu, L. Xiong, Z. Xu
Abstract:
In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing
Procedia PDF Downloads 48820316 Financial Information Transparency on Investor Behavior in the Private Company in Dusit Area
Authors: Yosapon Kidsuntad
Abstract:
The purpose of this dissertation was to explore the relationship between financial transparency and investor behavior. In carrying out this inquiry, the researcher used a questionnaire was utilized as a tool to collect data. Statistics utilized in this research included frequency, percentage, mean, standard deviation, and multiple regression analysis. The results revealed that there are significant differences investor perceptions of the different dimensions of financial information transparency. These differences correspond to demographical variables with the exception of the educational level variable. It was also found that there are relationships between investor perceptions of the dimensions of financial information transparency and investor behavior in the private company in Dusit Area. Finally, the researcher also found that there are differences in investor behavior corresponding to different categories of investor experience.Keywords: financial information transparency, investor behavior, private company, Dusit Area
Procedia PDF Downloads 33320315 Towards the Management of Cybersecurity Threats in Organisations
Authors: O. A. Ajigini, E. N. Mwim
Abstract:
Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information
Procedia PDF Downloads 26320314 A Study of Cloud Computing Solution for Transportation Big Data Processing
Authors: Ilgin Gökaşar, Saman Ghaffarian
Abstract:
The need for fast processed big data of transportation ridership (eg., smartcard data) and traffic operation (e.g., traffic detectors data) which requires a lot of computational power is incontrovertible in Intelligent Transportation Systems. Nowadays cloud computing is one of the important subjects and popular information technology solution for data processing. It enables users to process enormous measure of data without having their own particular computing power. Thus, it can also be a good selection for transportation big data processing as well. This paper intends to examine how the cloud computing can enhance transportation big data process with contrasting its advantages and disadvantages, and discussing cloud computing features.Keywords: big data, cloud computing, Intelligent Transportation Systems, ITS, traffic data processing
Procedia PDF Downloads 47320313 A Vehicle Monitoring System Based on the LoRa Technique
Authors: Chao-Linag Hsieh, Zheng-Wei Ye, Chen-Kang Huang, Yeun-Chung Lee, Chih-Hong Sun, Tzai-Hung Wen, Jehn-Yih Juang, Joe-Air Jiang
Abstract:
Air pollution and climate warming become more and more intensified in many areas, especially in urban areas. Environmental parameters are critical information to air pollution and weather monitoring. Thus, it is necessary to develop a suitable air pollution and weather monitoring system for urban areas. In this study, a vehicle monitoring system (VMS) based on the IoT technique is developed. Cars are selected as the research tool because it can reach a greater number of streets to collect data. The VMS can monitor different environmental parameters, including ambient temperature and humidity, and air quality parameters, including PM2.5, NO2, CO, and O3. The VMS can provide other information, including GPS signals and the vibration information through driving a car on the street. Different sensor modules are used to measure the parameters and collect the measured data and transmit them to a cloud server through the LoRa protocol. A user interface is used to show the sensing data storing at the cloud server. To examine the performance of the system, a researcher drove a Nissan x-trail 1998 to the area close to the Da’an District office in Taipei to collect monitoring data. The collected data are instantly shown on the user interface. The four kinds of information are provided by the interface: GPS positions, weather parameters, vehicle information, and air quality information. With the VMS, users can obtain the information regarding air quality and weather conditions when they drive their car to an urban area. Also, government agencies can make decisions on traffic planning based on the information provided by the proposed VMS.Keywords: LoRa, monitoring system, smart city, vehicle
Procedia PDF Downloads 42120312 Motivating Factors to Use Electric Vehicles Based on Behavioral Intention Model in South Korea
Authors: Seyedsamad Tahani, Samira Ghorbanpour
Abstract:
The global warming crisis forced humans to consider their place in the world and the earth's future. In this regard, Electric Vehicles (EVs) are a significant step toward protecting the environment. By identifying factors that influence people's behavior intentions toward using Electric Vehicles (EV), we proposed a theoretical model by extending the Technology Acceptance Model (TAM), including three more concepts, Subjective Norm (SN), Self-Efficacy (SE), and Perceived Behavior Control (PBC). The study was conducted in South Korea, and a random sample was taken at a specific time. In order to collect data, a questionnaire was created in a Google Form and sent via Kakao Talk, a popular social media application used in Korea. There were about 220 participants in this survey. However, 201 surveys were completely done. The findings revealed that all factors in the TAM model and the other added concepts such as subjective norms, self-efficacy and perceived behavior control significantly affect the behavioral intention of using EVs.Keywords: electric vehicles, behavioral intention, perceived trust, perceived enjoyment, self-efficacy
Procedia PDF Downloads 14020311 Evaluation of Published Materials in Meeting the Information Needs of Students in Three Selected College Libraries in Oyo State, Nigeria
Authors: Rafiat Olasumbo Akande
Abstract:
Most college libraries in Oyo State show signs of unhealthy collection practices like the preponderance of non-recent collections and indiscriminate acquisition of sub-standard books from hawkers. The objective of this study, therefore, is to determine the extent at which available published materials in those college libraries are able to meet both knowledge and information needs of students in those institutions. A descriptive survey was conducted among 18 librarians and 21 library officers in three colleges purposively selected for the exercise using simple sampling technique. In all, 279 questionnaires were administered and out of those 279 administered, 265 were returned and analyzed using Statistical Package for Social Science (SPSS). Three College Librarian were also interviewed. Findings from the study showed that due to the paucity of funds, obsolete materials, and sub-standard materials being procured from roadside book hawkers hinders the college libraries in meeting the information needs of the students in these college libraries. It then concluded that only when there is standard procedure for collection management and acquisition of library materials that the knowledge and information needs of the students could be met. The study recommends that students and curriculum review committee members from various departments should always be involved in determining materials needed by the library to meet students information needs and that institution authority must fund, monitor and ensure compliance with the acquisition policy in place in the college libraries.Keywords: libraries, published materials, information needs, college, evaluation, students
Procedia PDF Downloads 171