Search results for: communication platform
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5787

Search results for: communication platform

2847 Secured Transmission and Reserving Space in Images Before Encryption to Embed Data

Authors: G. R. Navaneesh, E. Nagarajan, C. H. Rajam Raju

Abstract:

Nowadays the multimedia data are used to store some secure information. All previous methods allocate a space in image for data embedding purpose after encryption. In this paper, we propose a novel method by reserving space in image with a boundary surrounded before encryption with a traditional RDH algorithm, which makes it easy for the data hider to reversibly embed data in the encrypted images. The proposed method can achieve real time performance, that is, data extraction and image recovery are free of any error. A secure transmission process is also discussed in this paper, which improves the efficiency by ten times compared to other processes as discussed.

Keywords: secure communication, reserving room before encryption, least significant bits, image encryption, reversible data hiding

Procedia PDF Downloads 408
2846 ACO-TS: an ACO-based Algorithm for Optimizing Cloud Task Scheduling

Authors: Fahad Y. Al-dawish

Abstract:

The current trend by a large number of organizations and individuals to use cloud computing. Many consider it a significant shift in the field of computing. Cloud computing are distributed and parallel systems consisting of a collection of interconnected physical and virtual machines. With increasing request and profit of cloud computing infrastructure, diverse computing processes can be executed on cloud environment. Many organizations and individuals around the world depend on the cloud computing environments infrastructure to carry their applications, platform, and infrastructure. One of the major and essential issues in this environment related to allocating incoming tasks to suitable virtual machine (cloud task scheduling). Cloud task scheduling is classified as optimization problem, and there are several meta-heuristic algorithms have been anticipated to solve and optimize this problem. Good task scheduler should execute its scheduling technique on altering environment and the types of incoming task set. In this research project a cloud task scheduling methodology based on ant colony optimization ACO algorithm, we call it ACO-TS Ant Colony Optimization for Task Scheduling has been proposed and compared with different scheduling algorithms (Random, First Come First Serve FCFS, and Fastest Processor to the Largest Task First FPLTF). Ant Colony Optimization (ACO) is random optimization search method that will be used for assigning incoming tasks to available virtual machines VMs. The main role of proposed algorithm is to minimizing the makespan of certain tasks set and maximizing resource utilization by balance the load among virtual machines. The proposed scheduling algorithm was evaluated by using Cloudsim toolkit framework. Finally after analyzing and evaluating the performance of experimental results we find that the proposed algorithm ACO-TS perform better than Random, FCFS, and FPLTF algorithms in each of the makespaan and resource utilization.

Keywords: cloud Task scheduling, ant colony optimization (ACO), cloudsim, cloud computing

Procedia PDF Downloads 417
2845 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 224
2844 A High Quality Factor Filter Based on Quasi- Periodic Photonic Structure

Authors: Hamed Alipour-Banaei, Farhad Mehdizadeh

Abstract:

We report the design and characterization of ultra high quality factor filter based on one-dimensional photonic-crystal Thue-Morse sequence structure. The behavior of aperiodic array of photonic crystal structure is numerically investigated and we show that by changing the angle of incident wave, desired wavelengths could be tuned and a tunable filter is realized. Also it is shown that high quality factor filter be achieved in the telecommunication window around 1550 nm, with a device based on Thue-Morse structure. Simulation results show that the proposed structure has a quality factor more than 100000 and it is suitable for DWDM communication applications.

Keywords: Thue-Morse, filter, quality factor, photonic

Procedia PDF Downloads 561
2843 The Parallelization of Algorithm Based on Partition Principle for Association Rules Discovery

Authors: Khadidja Belbachir, Hafida Belbachir

Abstract:

subsequently the expansion of the physical supports storage and the needs ceaseless to accumulate several data, the sequential algorithms of associations’ rules research proved to be ineffective. Thus the introduction of the new parallel versions is imperative. We propose in this paper, a parallel version of a sequential algorithm “Partition”. This last is fundamentally different from the other sequential algorithms, because it scans the data base only twice to generate the significant association rules. By consequence, the parallel approach does not require much communication between the sites. The proposed approach was implemented for an experimental study. The obtained results, shows a great reduction in execution time compared to the sequential version and Count Distributed algorithm.

Keywords: association rules, distributed data mining, partition, parallel algorithms

Procedia PDF Downloads 402
2842 Identification of Autism Spectrum Disorders in Day-Care Centres

Authors: Kenneth Larsen, Astrid Aasland, Synnve Schjølberg, Trond Diseth

Abstract:

Autism Spectrum Disorders (ASD) are neurodevelopmental disorders emerging in early development characterized by impairment in social communication skills and a restricted, repetitive and stereotyped patterns of behavior and interests. Early identification and interventions potentially improve development and quality of life of children with ASD. Symptoms of ASD are apparent through the second year of life, yet diagnostic age are still around 4 years of age. This study explored whether symptoms associated with ASD are possible to identify in typical Norwegian day-care centers in the second year of life. Results of this study clearly indicates that most described symptoms also are identifiable by day-care staff, and that a short observation list of 5 symptoms clearly identify children with ASD from a sample of normal developing peers.

Keywords: autism, early identification, day-care, screening

Procedia PDF Downloads 387
2841 A Structured Mechanism for Identifying Political Influencers on Social Media Platforms Top 10 Saudi Political Twitter Users

Authors: Ahmad Alsolami, Darren Mundy, Manuel Hernandez-Perez

Abstract:

Social media networks, such as Twitter, offer the perfect opportunity to either positively or negatively affect political attitudes on large audiences. A most important factor contributing to this effect is the existence of influential users, who have developed a reputation for their awareness and experience on specific subjects. Therefore, knowledge of the mechanisms to identify influential users on social media is vital for understanding their effect on their audience. The concept of the influential user is based on the pioneering work of Katz and Lazarsfeld (1959), who created the concept of opinion leaders' to indicate that ideas first flow from mass media to opinion leaders and then to the rest of the population. Hence, the objective of this research was to provide reliable and accurate structural mechanisms to identify influential users, which could be applied to different platforms, places, and subjects. Twitter was selected as the platform of interest, and Saudi Arabia as the context for the investigation. These were selected because Saudi Arabia has a large number of Twitter users, some of whom are considerably active in setting agendas and disseminating ideas. The study considered the scientific methods that have been used to identify public opinion leaders before, utilizing metrics software on Twitter. The key findings propose multiple novel metrics to compare Twitter influencers, including the number of followers, social authority and the use of political hashtags, and four secondary filtering measures. Thus, using ratio and percentage calculations to classify the most influential users, Twitter accounts were filtered, analyzed and included. The structured approach is used as a mechanism to explore the top ten influencers on Twitter from the political domain in Saudi Arabia.

Keywords: twitter, influencers, structured mechanism, Saudi Arabia

Procedia PDF Downloads 129
2840 Developing an Automated Protocol for the Wristband Extraction Process Using Opentrons

Authors: Tei Kim, Brooklynn McNeil, Kathryn Dunn, Douglas I. Walker

Abstract:

To better characterize the relationship between complex chemical exposures and disease, our laboratory uses an approach that combines low-cost, polydimethylsiloxane (silicone) wristband samplers that absorb many of the chemicals we are exposed to with untargeted high-resolution mass spectrometry (HRMS) to characterize 1000’s of chemicals at a time. In studies with human populations, these wristbands can provide an important measure of our environment: however, there is a need to use this approach in large cohorts to study exposures associated with the disease. To facilitate the use of silicone samplers in large scale population studies, the goal of this research project was to establish automated sample preparation methods that improve throughput, robustness, and scalability of analytical methods for silicone wristbands. Using the Opentron OT2 automated liquid platform, which provides a low-cost and opensource framework for automated pipetting, we created two separate workflows that translate the manual wristband preparation method to a fully automated protocol that requires minor intervention by the operator. These protocols include a sequence generation step, which defines the location of all plates and labware according to user-specified settings, and a transfer protocol that includes all necessary instrument parameters and instructions for automated solvent extraction of wristband samplers. These protocols were written in Python and uploaded to GitHub for use by others in the research community. Results from this project show it is possible to establish automated and open source methods for the preparation of silicone wristband samplers to support profiling of many environmental exposures. Ongoing studies include deployment in longitudinal cohort studies to investigate the relationship between personal chemical exposure and disease.

Keywords: bioinformatics, automation, opentrons, research

Procedia PDF Downloads 103
2839 N-Heterocyclic Carbene Based Dearomatized Iridium Complex as an Efficient Catalyst towards Carbon-Carbon Bond Formation via Hydrogen Borrowing Strategy

Authors: Mandeep Kaur, Jitendra K. Bera

Abstract:

The search for atom-economical and green synthetic methods for the synthesis of functionalized molecules has attracted much attention. Metal ligand cooperation (MLC) plays a pivotal role in organometallic catalysis to activate C−H, H−H, O−H, N−H and B−H bonds through reversible bond breaking and bond making process. Towards this goal, a bifunctional N─heterocyclic carbene (NHC) based pyridyl-functionalized amide ligand precursor, and corresponding dearomatized iridium complex was synthesized. The NMR and UV/Vis acid titration study have been done to prove the proton response nature of the iridium complex. Further, the dearomatized iridium complex explored as a catalyst on the platform of MLC via dearomatzation/aromatization mode of action towards atom economical α and β─alkylation of ketones and secondary alcohols by using primary alcohols through hydrogen borrowing methodology. The key features of the catalysis are high turnover frequency (TOF) values, low catalyst loading, low base loading and no waste product. The greener syntheses of quinoline, lactone derivatives and selective alkylation of drug molecules like pregnenolone and testosterone were also achieved successfully. Another structurally similar iridium complex was also synthesized with modified ligand precursor where a pendant amide unit was absent. The inactivity of this analogue iridium complex towards catalysis authenticated the participation of proton responsive imido sidearm of the ligand to accelerate the catalytic reaction. The mechanistic investigation through control experiments, NMR and deuterated labeling study, authenticate the borrowing hydrogen strategy.

Keywords: C-C bond formation, hydrogen borrowing, metal ligand cooperation (MLC), n-heterocyclic carbene

Procedia PDF Downloads 171
2838 The Project Management for Quality Services in Special Education Schools

Authors: Aysegul Salikutluk, Zehra Altinay, Gokmen Dagli, Fahriye Altinay

Abstract:

The aim of the study is to reveal the performance of special education schools as regards the service quality and management within the school culture. The project management and school climate are the fundamental elements for the quality in organisations. Having strategic plans, activities and funded projects improve service quality and satisfaction for the families who have children with disabilities. The research has qualitative nature, self-reports were used to examine the perceptions of teachers upon project management and school climate for service quality. The results show that special education schools' teachers are aware of essence of school climate and flow of communication for service quality and project management.

Keywords: disability, education, service quality, project management

Procedia PDF Downloads 261
2837 A Step Magnitude Haptic Feedback Device and Platform for Better Way to Review Kinesthetic Vibrotactile 3D Design in Professional Training

Authors: Biki Sarmah, Priyanko Raj Mudiar

Abstract:

In the modern world of remotely interactive virtual reality-based learning and teaching, including professional skill-building training and acquisition practices, as well as data acquisition and robotic systems, the revolutionary application or implementation of field-programmable neurostimulator aids and first-hand interactive sensitisation techniques into 3D holographic audio-visual platforms have been a coveted dream of many scholars, professionals, scientists, and students. Integration of 'kinaesthetic vibrotactile haptic perception' along with an actuated step magnitude contact profiloscopy in augmented reality-based learning platforms and professional training can be implemented by using an extremely calculated and well-coordinated image telemetry including remote data mining and control technique. A real-time, computer-aided (PLC-SCADA) field calibration based algorithm must be designed for the purpose. But most importantly, in order to actually realise, as well as to 'interact' with some 3D holographic models displayed over a remote screen using remote laser image telemetry and control, all spatio-physical parameters like cardinal alignment, gyroscopic compensation, as well as surface profile and thermal compositions, must be implemented using zero-order type 1 actuators (or transducers) because they provide zero hystereses, zero backlashes, low deadtime as well as providing a linear, absolutely controllable, intrinsically observable and smooth performance with the least amount of error compensation while ensuring the best ergonomic comfort ever possible for the users.

Keywords: haptic feedback, kinaesthetic vibrotactile 3D design, medical simulation training, piezo diaphragm based actuator

Procedia PDF Downloads 157
2836 Language Maintenance and Literacy of Madurese in Probolinggo City

Authors: Maria Ulfa, Nur Awaliyah Putri

Abstract:

Madurese is known as Malayo-Sumbawan Austronesian language which is used by Madurese people in Madura Island, Indonesia. However, there was a massive migration of Madurese people due to Dutch colonization. The Madurese people were brought by force for cultivation system to the eastern salient north coast or called as Tapal Kuda that spread in region covers the regencies of Probolinggo, Lumajang, Jember, Situbondo, Bondowoso, and Banyuwangi, the eastern part of the Pasuruan Regency, as well as the city of Probolinggo. The city of Probolinggo has unique characteristic regarding the ethnic and language variation. Several ethnics can be found in this city, such as Madurese, Javanese, Tengger, Arabic, Mandhalungan, Osing, and Chinese. Hence, the hybrid culture happens in Probolinggo, they called the culture as Pendhalungan which is the combination of culture among Madurese and Javanese. Among those ethnics, Madurese is the strongest ethnic that still maintains their identity, such as their ethnic language. The massive growth of Madurese in Probolinggo city, East Java is interesting to be analyzed. The object of this study is to discover language ideology and literacy of Madurese to maintain their ethnic language in Probolinggo city, East Java. The researchers used the theory of language maintenance practice based on three types of practices social language, social literacy, and peripheral ritualized practices. The approach of this study was qualitative research with ethnography method. In order to collect the data, researchers used observation and interview techniques. The amount of informants were 20 families which consist of mother, father and children in 5 sub-districts in Probolinggo city and they were interviewed regarding language ideology and literacy of Madurese. In supporting the data, researchers employed the Madurese speakers outside family scope like in school, office, and market. The result of the study revealed that Madurese has been preserved heritably to young generations by ethnics of Madura in Probolinggo city. Primarily the language is being taught in the earlier age of their children as L1 and used as ethnic identity. The parents teach them with simple sentences that grammatically correct. This language literacy is applied to maintain ethnic language as their ethnicity marker since they inhabit in Javanese ethnic area. In fact, it is not the only ideology of Madurese ethnic but also the influence of economic situation like in trading communication. The usage of Madurese in the trading scope is very beneficial since people can bargain the goods cheaper and easier because most of the traders are from Madurese ethnic. In this situation, linguistic phenomena such as code mixing and code switching between Madurese and Javanese are emerged as the trading communication. From the result, it can be concluded that solidarity exists among Madurese people in many scopes.

Keywords: language literacy, language maintenance, Madurese, Probolinggo City

Procedia PDF Downloads 228
2835 The Debureaucratization Strategy for the Portuguese Health Service through Effective Communication

Authors: Fernando Araujo, Sandra Cardoso, Fátima Fonseca, Sandra Cavaca

Abstract:

A debureaucratization strategy for the Portuguese Health Service was assumed by the Executive Board of the SNS, in deep articulation with the Shared Services of the Ministry of Health. Two of the main dimensions were focused on sick leaves (SL), that transform primary health care (PHC) in administrative institutions, limiting access to patients. The self-declaration of illness (SDI) project, through the National Health Service Contact Centre (SNS24), began on May 1, 2023, and has already resulted in the issuance of more than 300,000 SDI without the need to allocate resources from the National Health Service (NHS). This political decision allows each citizen, in a maximum 2 times/year, and 3 days each time, if ill, through their own responsibility, report their health condition in a dematerialized way, and by this way justified the absence to work, although by Portuguese law in these first three days, there is no payment of salary. Using a digital approach, it is now feasible without the need to go to the PHC and occupy the time of the PHC only to obtain an SL. Through this measure, bureaucracy has been reduced, and the system has been focused on users, improving the lives of citizens and reducing the administrative burden on PHC, which now has more consultation times for users who need it. The second initiative, which began on March 1, 2024, allows the SL to be issued in emergency departments (ED) of public hospitals and in the health institutions of the social and private sectors. This project is intended to allow the user who has suffered a situation of acute urgent illness and who has been observed in an ED of a public hospital or in a private or social entity no longer need to go to PHC only to apply for the respective SL. Since March 1, 54,453 SLs have been issued, 242 in private or social sector institutions and 6,918 in public hospitals, of which 134 were in ED and 47,292 in PHC. This approach has proven to be technically robust, allows immediate resolution of problems and differentiates the performance of doctors. However, it is important to continue to qualify the proper functioning of the ED, preventing non-urgent users from going there only to obtain SL. Thus, in order to make better use of existing resources, it was operationalizing this extension of its issuance in a balanced way, allowing SL to be issued in the ED of hospitals only to critically ill patients or patients referred by INEM, SNS24, or PHC. In both cases, an intense public campaign was implemented to explain the way it works and the benefits for patients. In satisfaction surveys, more than 95% of patients and doctors were satisfied with the solutions, asking for extensions to other areas. The administrative simplification agenda of the NHS continues its effective development. For the success of this debureaucratization agenda, the key factors are effective communication and the ability to reach patients and health professionals in order to increase health literacy and the correct use of NHS.

Keywords: debureaucratization strategy, self-declaration of illness, sick leaves, SNS24

Procedia PDF Downloads 53
2834 Biomimetic Architecture: The Bio Process to an Eco-Friendly Design

Authors: Odeyemi Ifeoluwayemi, Maha Joushua, Fulani Omoyeni

Abstract:

In the search for sustainability, over time, architectural approaches to design have moved from just nature inspired design to the study of nature’s principles to produce effective designs that solve the issue of sustainability. Nature has established materials, shapes and processes that are effective right from a minor scale to an enormous scale. A branch of human knowledge that studies nature is called biology. Biology helps us to grasp and understand nature. Biomimicry is a new way of viewing and valuing nature, based not on what we can extract from the natural world but on what we can learn from it. Life has sustained on the earth for the last 3.85 billion years, and it is necessary for us to find out how life has been able to stay sustained for that long. The building must teach the society new ecological morals, thus, a better understanding of how nature works can usefully inspire architectural designs to resolve issues that have already been resolved by nature. This will not only help in creating a healthy environment but will also produce positive environmental impacts. Biomimetic Architecture connects and reproduces the ideologies found in nature in order to create built environment which benefit people and other living creatures as well as preserving it for the future. Understanding the bioprocess would lead to the establishment of ecological approaches that serve as a platform for creating a built environment that goes beyond sustaining current settings but also mimic nature’s regenerative ecosystem. This paper aims to explain these design methods under the name of biomimicry and biomimetic architecture by reviewing literature and research works done by examining these approaches classified as forms, processes and ecosystems. It is expected that this research will provide information that would, therefore, lead to the creation of buildings that are eco-friendly and provide greater comfort to the populaces.

Keywords: biomimetic architecture, biomimicry, ecological design, nature

Procedia PDF Downloads 249
2833 Islamic Extremist Groups' Usage of Populism in Social Media to Radicalize Muslim Migrants in Europe

Authors: Muhammad Irfan

Abstract:

The rise of radicalization within Islam has spawned a new era of global terror. The battlefield Successes of ISIS and the Taliban are fuelled by an ideological war waged, largely and successfully, in the media arena. This research will examine how Islamic extremist groups are using media modalities and populist narratives to influence migrant Muslim populations in Europe towards extremism. In 2014, ISIS shocked the world in exporting horrifically graphic forms of violence on social media. Their Muslim support base was largely disgusted and reviled. In response, they reconfigured their narrative by introducing populist 'hooks', astutely portraying the Muslim populous as oppressed and exploited by unjust, corrupt autocratic regimes and Western power structures. Within this crucible of real and perceived oppression, hundreds of thousands of the most desperate, vulnerable and abused migrants left their homelands, risking their lives in the hope of finding peace, justice, and prosperity in Europe. Instead, many encountered social stigmatization, detention and/or discrimination for being illegal migrants, for lacking resources and for simply being Muslim. This research will examine how Islamic extremist groups are exploiting the disenfranchisement of these migrant populations and using populist messaging on social media to influence them towards violent extremism. ISIS, in particular, formulates specific encoded messages for newly-arriving Muslims in Europe, preying upon their vulnerability. Violence is posited, as a populist response, to the tyranny of European oppression. This research will analyze the factors and indicators which propel Muslim migrants along the spectrum from resilience to violence extremism. Expected outcomes are identification of factors which influence vulnerability towards violent extremism; an early-warning detection framework; predictive analysis models; and de-radicalization frameworks. This research will provide valuable tools (practical and policy level) for European governments, security stakeholders, communities, policy-makers, and educators; it is anticipated to contribute to a de-escalation of Islamic extremism globally.

Keywords: populism, radicalization, de-radicalization, social media, ISIS, Taliban, shariah, jihad, Islam, Europe, political communication, terrorism, migrants, refugees, extremism, global terror, predictive analysis, early warning detection, models, strategic communication, populist narratives, Islamic extremism

Procedia PDF Downloads 115
2832 Voices of Youth: Contributing to Healthy Teens

Authors: Christa Beyers

Abstract:

Investing in the health of youth is essential for the well-being of society. If youth do not live a healthy life, the future of the global workforce and overall development of adolescents looks bleak given the challenges posed in this developmental stage. The idea of sexuality education at home and in our schools is a controversial and contentious subject, as many parents and teachers do not hold the same beliefs as to what content should be taught. Despite high incidence of HIV and STD infections, early school dropout and teen pregnancies, sexuality education has still not been given the recognition or importance it deserves. By giving youth a voice can lead to both behavioural and policy changes. This article is based on a literature review of sex and sexuality education from a social studies approach. This article argues that adults tend to teach from their own perspective, which does not meet the needs of youth, thereby ignoring the social aspects of sexual behaviour.

Keywords: sexuality education, adolescents, communication, cycle of socialization

Procedia PDF Downloads 189
2831 The Chemistry in the Video Game No Man’s Sky

Authors: Diogo Santos, Nelson Zagalo, Carla Morais

Abstract:

No Man’s Sky (NMS) is a sci-fi video game about survival and exploration where players fly spaceships, search for elements, and use them to survive. NMS isn’t a serious game, and not all the science in the game is presented with scientific evidence. To find how players felt about the scientific content in the game and how they perceive the chemistry in it, a survey was sent to NMS’s players, from which were collected answers from 124 respondents from 23 countries. Chemophobia is still a phenomenon when chemistry or chemicals are a subject of discussion, but 68,9% of our respondents showed a positive attitude towards the presence of chemistry in NMS, with 57% stating that playing the video game motivated them to know more about science. 8% of the players stated that NMS often prompted conversations about the science in the video game between them and teachers, parents, or friends. These results give us ideas on how an entertainment game can potentially help scientists, educators, and science communicators reach a growing, evolving, vibrant, diverse, and demanding audience.

Keywords: digital games, science communication, chemistry, informal learning, No Man’s Sky

Procedia PDF Downloads 103
2830 The Structure of Southern Tunisian Atlas Deformation Front: Integrated Geological and Geophysical Interpretation

Authors: D. Manai, J. Alvarez-Marron, M. Inoubli

Abstract:

The southern Tunisian Atlas is a part of the wide Cenozoic intracontinental deformation that affected North Africa as a result of convergence between African and Eurasian plates. The Southern Tunisian Atlas Front (STAF) corresponds to the chotts area that covers several hundreds of Km² and represents a 60 km wide transition between the deformed Tunisian Atlas to the North and the undeformed Saharan platform to the South. It includes three morphostructural alignments, a fold and thrust range in the North, a wide depression in the middle and a monocline to horizontal zone to the south. Four cross-sections have been constructed across the chotts area to illustrate the structure of the Southern Tunisian Atlas Front based on integrated geological and geophysical data including geological maps, petroleum wells, and seismic data. The fold and thrust zone of the northern chotts is interpreted as related to a detachment level near the Triassic-Jurassic contact. The displacement of the basal thrust seems to die out progressively under the Fejej antiform and it is responsible to the south dipping of the southern chotts range. The restoration of the cross-sections indicates that the Southern Tunisian Atlas front is a weakly deformed wide zone developed during the Cenozoic inversion with a maximum calculated shortening in the order of 1000 m. The wide structure of this STAF has been influenced by a pre-existing large thickness of upper Jurassic-Aptian sediments related to the rifting episodes associated to the evolution of Tethys in the Maghreb. During Jurassic to Aptian period, the chotts area corresponded to a highly subsiding basin.

Keywords: Southern Tunisian Atlas Front, subsident sub- basin, wide deformation, balanced cross-sections.

Procedia PDF Downloads 140
2829 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 417
2828 Impact of Graduates’ Quality of Education and Research on ICT Adoption at Workplace

Authors: Mohammed Kafaji

Abstract:

This paper aims to investigate the influence of quality of education and quality of research, provided by local educational institutions, on the adoption of Information and Communication Technology (ICT) in managing business operations for companies in Saudi market. A model was developed and tested using data collected from 138 CEO’s of foreign companies in diverse business sectors. The data is analysed and managed using multivariate approaches through standard statistical packages. The results showed that educational quality has little contribution to the ICT adoption while research quality seems to play a more prominent role. These results are analysed in terms of business environment and market constraints and further extended to the perceived effectiveness of applied pedagogical approaches in schools and universities.

Keywords: quality of education, quality of research, mediation, domestic competition, ICT adoption

Procedia PDF Downloads 448
2827 Governance Challenges of Consolidated Destinations. The Case of Barcelona

Authors: Montserrat Crespi-Vallbona; Oscar Mascarilla-Miró

Abstract:

Mature destinations have different challenges trying to attract tourism and please its citizens. Hence, they have to maintain their touristic interest to standard demand and also not to undeceive those tourists with more advanced experiences. Second, they have to be concerned for the daily life of citizens and avoid the negative effects of touristification. This balance is quite delicate and often has to do with the sensitivity and commitment of the party in the local government. However, what is a general consensus is the need for destinations to differentiate from the homogeneous rest of regions and create new content, consumable resources or marketing events to guarantee their positioning. In this sense, the main responsibility of destinations is to satisfy users, tourists and citizens. Hence, its aim has to do with holistic experiences, which collect these wide approaches. Specifically, this research aims to analyze the volume and growth of tourist houses in the central touristic neighborhoods of Barcelona (this is Ciutat Vella) as the starting point to identify the behavior of tourists regarding their interests in searching for local heritage attractiveness and community atmosphere. Then, different cases are analyzed in order to show how Barcelona struggles to keep its attractive brand for the visitors, as well as for its inhabitants. Methodologically, secondary data used in this research comes from official registered tourist houses (Catalunya Government), Open Data (Barcelona municipality), the Airbnb tourist platform, from the Incasol Data and Municipal Register of Inhabitants. Primary data are collected through in-depth interviews with neighbors, social movement managers and political representatives from Turisme de Barcelona (local DMO, Destination Management Organization). Results show what the opportunities and priorities are for key actors to design policies to find a balance between all different interests.

Keywords: touristification, tourist houses, governance, tourism demand, airbnbfication

Procedia PDF Downloads 59
2826 3D Dentofacial Surgery Full Planning Procedures

Authors: Oliveira M., Gonçalves L., Francisco I., Caramelo F., Vale F., Sanz D., Domingues M., Lopes M., Moreia D., Lopes T., Santos T., Cardoso H.

Abstract:

The ARTHUR project consists of a platform that allows the virtual performance of maxillofacial surgeries, offering, in a photorealistic concept, the possibility for the patient to have an idea of the surgical changes before they are performed on their face. For this, the system brings together several image formats, dicoms and objs that, after loading, will generate the bone volume, soft tissues and hard tissues. The system also incorporates the patient's stereophotogrammetry, in addition to their data and clinical history. After loading and inserting data, the clinician can virtually perform the surgical operation and present the final result to the patient, generating a new facial surface that contemplates the changes made in the bone and tissues of the maxillary area. This tool acts in different situations that require facial reconstruction, however this project focuses specifically on two types of use cases: bone congenital disfigurement and acquired disfiguration such as oral cancer with bone attainment. Being developed a cloud based solution, with mobile support, the tool aims to reduce the decision time window of patient. Because the current simulations are not realistic or, if realistic, need time due to the need of building plaster models, patient rates on decision, rely on a long time window (1,2 months), because they don’t identify themselves with the presented surgical outcome. On the other hand, this planning was performed time based on average estimated values of the position of the maxilla and mandible. The team was based on averages of the facial measurements of the population, without specifying racial variability, so the proposed solution was not adjusted to the real individual physiognomic needs.

Keywords: 3D computing, image processing, image registry, image reconstruction

Procedia PDF Downloads 199
2825 Cluster Analysis of Customer Churn in Telecom Industry

Authors: Abbas Al-Refaie

Abstract:

The research examines the factors that affect customer churn (CC) in the Jordanian telecom industry. A total of 700 surveys were distributed. Cluster analysis revealed three main clusters. Results showed that CC and customer satisfaction (CS) were the key determinants in forming the three clusters. In two clusters, the center values of CC were high, indicating that the customers were loyal and SC was expensive and time- and energy-consuming. Still, the mobile service provider (MSP) should enhance its communication (COM), and value added services (VASs), as well as customer complaint management systems (CCMS). Finally, for the third cluster the center of the CC indicates a poor level of loyalty, which facilitates customers churn to another MSP. The results of this study provide valuable feedback for MSP decision makers regarding approaches to improving their performance and reducing CC.

Keywords: cluster analysis, telecom industry, switching cost, customer churn

Procedia PDF Downloads 321
2824 Influence of Gold Nanoparticles on NiAlZr Type Layered Double Hydroxide for the Catalytic Transfer Oxidation of Biomass Derived Aldehydes

Authors: Nihel Dib, Redouane Bachir, Ghezlane Berrahou, Chaima Zoulikha Tabet Zatla, Sumeya Bedrane, Ginessa Blanco Montilla, Jose Juan Calvino Gamez

Abstract:

In recent decades, the world’s population has rapidly increased annually, resulting in the consumption of huge amounts of conventional non-renewable petroleum-based resources at an alarming rate. The scarcity of such resources will shut down the corresponding industries and consequently have negative effects on the well-being of humanity. Accordingly, to combat the forthcoming crises and to serve the ever-growing demands, seeking potentially sustainable resources such as geothermal, wind, solar, and biomass has become an active field of study. Currently, lignocellulosic biomass, one of the world’s most plentiful resources, is acknowledged as a cost-effective material that has drawn great interest from many researchers since it has substantial energy potential as well as containing useful C5 and C6 sugars. These C5 and C6 sugars are the key reactants for the production of the valuable 16-platform chemicals such as 5-hydroxymethyl furfural, furfural, levulinic acid, succinic acid, and fumaric acid, all of which are crucial intermediates for synthesizing high-value bio-based chemicals and polymers. Succinic acid (SA) has been predicted to make a significant contribution to the global bio-based economy soon since it serves as a C4 building block that is used in a wide spectrum of industries, including biopolymers, solvents, and pharmaceuticals. In the present work, we modify the HDL MgAl with Zr to try to create acid sites on the supports and deposit gold by deposition precipitation with urea with a low gold content (0.25%). The catalyst was used to produce succinic acid by selective oxidation of furfuraldehyde with hydrogen peroxide under mild reaction conditions.

Keywords: hydrotalcite, catalysis, gold, biomass, furfural, oxidation

Procedia PDF Downloads 64
2823 Unraveling Language Contact through Syntactic Dynamics of ‘Also’ in Hong Kong and Britain English

Authors: Xu Zhang

Abstract:

This article unveils an indicator of language contact between English and Cantonese in one of the Outer Circle Englishes, Hong Kong (HK) English, through an empirical investigation into 1000 tokens from the Global Web-based English (GloWbE) corpus, employing frequency analysis and logistic regression analysis. It is perceived that Cantonese and general Chinese are contextually marked by an integral underlying thinking pattern. Chinese speakers exhibit a reliance on semantic context over syntactic rules and lexical forms. This linguistic trait carries over to their use of English, affording greater flexibility to formal elements in constructing English sentences. The study focuses on the syntactic positioning of the focusing subjunct ‘also’, a linguistic element used to add new or contrasting prominence to specific sentence constituents. The English language generally allows flexibility in the relative position of 'also’, while there is a preference for close marking relationships. This article shifts attention to Hong Kong, where Cantonese and English converge, and 'also' finds counterparts in Cantonese ‘jaa’ and Mandarin ‘ye’. Employing a corpus-based data-driven method, we investigate the syntactic position of 'also' in both HK and GB English. The study aims to ascertain whether HK English exhibits a greater 'syntactic freedom,' allowing for a more distant marking relationship with 'also' compared to GB English. The analysis involves a random extraction of 500 samples from both HK and GB English from the GloWbE corpus, forming a dataset (N=1000). Exclusions are made for cases where 'also' functions as an additive conjunct or serves as a copulative adverb, as well as sentences lacking sufficient indication that 'also' functions as a focusing particle. The final dataset comprises 820 tokens, with 416 for GB and 404 for HK, annotated according to the focused constituent and the relative position of ‘also’. Frequency analysis reveals significant differences in the relative position of 'also' and marking relationships between HK and GB English. Regression analysis indicates a preference in HK English for a distant marking relationship between 'also' and its focused constituent. Notably, the subject and other constituents emerge as significant predictors of a distant position for 'also.' Together, these findings underscore the nuanced linguistic dynamics in HK English and contribute to our understanding of language contact. It suggests that future pedagogical practice should consider incorporating the syntactic variation within English varieties, facilitating leaners’ effective communication in diverse English-speaking environments and enhancing their intercultural communication competence.

Keywords: also, Cantonese, English, focus marker, frequency analysis, language contact, logistic regression analysis

Procedia PDF Downloads 46
2822 Factors Affecting Time Performance in Building Construction Projects

Authors: Ibraheem A. K. Mahameed

Abstract:

The aim of this study is to identify the risks affecting time performance of building construction projects in the West Bank in Palestine from contractors’ viewpoint. 38 risks that might affect time performance of building construction projects were defined through a detailed literature review. These risks have been classified into 6 groups: project, managerial, consultant, financial, external, and construction items. A questionnaire survey was performed to rank the considered risks in terms of severity and frequency. The analysis of the survey indicated that the top five risks affecting time performance of building construction projects in Palestine are: award project to the lowest price, political situation, poor communication and coordination between construction parties, change orders, and financial status of contractor.

Keywords: delay, time performance, construction, building

Procedia PDF Downloads 460
2821 Genres as Time Machines: Hong Kong Cinema's Ways of Historicizing

Authors: Chin Pang Lei

Abstract:

Colonized by the UK, handed over to China, and now as a global financial city, Hong Kong’s history is never easy to write under the dominant discourses of colonialism, nationalism and globalization. In this plight, cinema, regarded as Hong Kong’s most representative cultural form, is used for writing, exploring and questioning the local history of the city. In their writing of the past, Hong Kong directors such as Wong Kar-wai, Stanley Kwan and Tsui Hark have demonstrated alternative ways of historicizing Hong Kong. Despite their interests in different periods of time (Wong is obsessed with the 1960s; Kwan is attracted to the 1930s; Tsui often goes back to the early 20th century), all these directors use genres as their time machines to revisit the past. As a popular cultural form, genres always come with a series of ideologies which define our lives and explain the society. Hence, in a changing society, genres change and complicate themselves with different packages of meanings. Genres function as open-ended and corrigible schemata which can contain multiple themes and various meanings. In Hong Kong, genres, often seen as highly commercial and overly market-oriented, are opportunities for alternative history writing and the exploration of local identities. This paper examines how these Hong Kong directors use the popular forms of genres, such as melodrama, martial art and gangster films, to present the past, and how the stories of the fictional characters, such as prostitutes, martial artists and jobless hooligans mobilize imagination of history. These texts show that genre is a crucial platform for Hong Kong’s post-colonial self-writing. Via genres, history in these films is against official and canonical history as well as grand narrative. Genres as time machines articulate a voice for Hong Kong.

Keywords: Hong Kong cinema, genre, historicizing, local history, Wong Kar-Wai

Procedia PDF Downloads 358
2820 TutorBot+: Automatic Programming Assistant with Positive Feedback based on LLMs

Authors: Claudia Martínez-Araneda, Mariella Gutiérrez, Pedro Gómez, Diego Maldonado, Alejandra Segura, Christian Vidal-Castro

Abstract:

The purpose of this document is to showcase the preliminary work in developing an EduChatbot-type tool and measuring the effects of its use aimed at providing effective feedback to students in programming courses. This bot, hereinafter referred to as tutorBot+, was constructed based on chatGPT and is tasked with assisting and delivering timely positive feedback to students in the field of computer science at the Universidad Católica de Concepción. The proposed working method consists of four stages: (1) Immersion in the domain of Large Language Models (LLMs), (2) Development of the tutorBot+ prototype and integration, (3) Experiment design, and (4) Intervention. The first stage involves a literature review on the use of artificial intelligence in education and the evaluation of intelligent tutors, as well as research on types of feedback for learning and the domain of chatGPT. The second stage encompasses the development of tutorBot+, and the final stage involves a quasi-experimental study with students from the Programming and Database labs, where the learning outcome involves the development of computational thinking skills, enabling the use and measurement of the tool's effects. The preliminary results of this work are promising, as a functional chatBot prototype has been developed in both conversational and non-conversational versions integrated into an open-source online judge and programming contest platform system. There is also an exploration of the possibility of generating a custom model based on a pre-trained one tailored to the domain of programming. This includes the integration of the created tool and the design of the experiment to measure its utility.

Keywords: assessment, chatGPT, learning strategies, LLMs, timely feedback

Procedia PDF Downloads 63
2819 A Study on How Insider Fraud Impacts FinTechs

Authors: Claire Norman-Maillet

Abstract:

Insider fraud is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including Board members and part-time staff. Insider fraud can take many forms, including an employee working alone or in collusion with others. Insider fraud has been on the rise since the Coronavirus pandemic and shows no signs of slowing. The objective of the research is to better understand how FinTechs are impacted by insider fraud and, therefore, how to stop it. This research will make an original contribution to the financial crime field, given the timing of this research being intertwined with the cost-of-living crisis in the UK and the global Coronavirus pandemic. This research focuses on insider fraud within FinTechs specifically, as they are arguably a modern phenomenon in the financial institutions space and have cutting-edge technology at their disposal. To achieve the research objective, the researcher held semi-structured interviews with over 20 individuals who deal with insider fraud perpetration in a practitioner, recruitment, or advisory capacity. The interviews were subsequently transcribed and analysed thematically. Main findings in the research suggest that FinTechs are arguably in the best position to combat insider fraud, given their focus on using recent technologies, as this can be used to combat the threat. However, insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer, as well as the idea that external fraud is the most important threat. The research concludes that, whilst the technology is understandably prioritised by FinTechs for providing an agreeable customer experience, insider fraud needs to be given a platform upon which to be recognised as a significant threat to any company. Moreover, insider fraud needs to be given the same level of weighting and attention by Executive Committees and Boards as the customer experience.

Keywords: insider fraud, occupational fraud, COVID-19, COVID, Coronavirus, pandemic, internal fraud, financial crime, economic crime

Procedia PDF Downloads 54
2818 Hybrid Precoder Design Based on Iterative Hard Thresholding Algorithm for Millimeter Wave Multiple-Input-Multiple-Output Systems

Authors: Ameni Mejri, Moufida Hajjaj, Salem Hasnaoui, Ridha Bouallegue

Abstract:

The technology advances have most lately made the millimeter wave (mmWave) communication possible. Due to the huge amount of spectrum that is available in MmWave frequency bands, this promising candidate is considered as a key technology for the deployment of 5G cellular networks. In order to enhance system capacity and achieve spectral efficiency, very large antenna arrays are employed at mmWave systems by exploiting array gain. However, it has been shown that conventional beamforming strategies are not suitable for mmWave hardware implementation. Therefore, new features are required for mmWave cellular applications. Unlike traditional multiple-input-multiple-output (MIMO) systems for which only digital precoders are essential to accomplish precoding, MIMO technology seems to be different at mmWave because of digital precoding limitations. Moreover, precoding implements a greater number of radio frequency (RF) chains supporting more signal mixers and analog-to-digital converters. As RF chain cost and power consumption is increasing, we need to resort to another alternative. Although the hybrid precoding architecture has been regarded as the best solution based on a combination between a baseband precoder and an RF precoder, we still do not get the optimal design of hybrid precoders. According to the mapping strategies from RF chains to the different antenna elements, there are two main categories of hybrid precoding architecture. Given as a hybrid precoding sub-array architecture, the partially-connected structure reduces hardware complexity by using a less number of phase shifters, whereas it sacrifices some beamforming gain. In this paper, we treat the hybrid precoder design in mmWave MIMO systems as a problem of matrix factorization. Thus, we adopt the alternating minimization principle in order to solve the design problem. Further, we present our proposed algorithm for the partially-connected structure, which is based on the iterative hard thresholding method. Through simulation results, we show that our hybrid precoding algorithm provides significant performance gains over existing algorithms. We also show that the proposed approach reduces significantly the computational complexity. Furthermore, valuable design insights are provided when we use the proposed algorithm to make simulation comparisons between the hybrid precoding partially-connected structure and the fully-connected structure.

Keywords: alternating minimization, hybrid precoding, iterative hard thresholding, low-complexity, millimeter wave communication, partially-connected structure

Procedia PDF Downloads 316