Search results for: open access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5955

Search results for: open access

5865 Access to Higher Education in Nigeria: The University of Calabar Pre-Degree Programme Experience

Authors: Eni I. Eni, James Okon, Ashang J. Ashang

Abstract:

The pre-degree programme of the University of Calabar was introduced to help increase access to tertiary Education in science related courses. This has become necessary due to population increase and public awareness. Its main objective was to provide access to candidates from educationally less developed states (ELDS) and states within its catchment area. To find out if this objective of the programme has been achieved, an impact evaluation of the programme was conducted, from where the aspect of providing access to University Education was reported here. It was reasoned that if this objective of the programme was properly implemented, there should be an evidence of increase in the access to University Education. To achieve the purpose of this study, two research questions were formulated; expost-facto research design and purposive sampling technique were adopted for the study. Data was collected from the Faculty of Science and analyzed using descriptive statistics in terms of frequencies and percentages. The result of data analysis showed that the pre-degree programme of the University of Calabar has provided educational access to Nigerians especially those from educationally less developed states in science related courses. It was therefore recommended that the programme be sustained and further be improved upon to facilitate its continued provision of access to University Education in Nigeria.

Keywords: higher education, pre-degree programme, University of Calabar, educationally less developed states

Procedia PDF Downloads 302
5864 An Empirical Study Comparing Industry Segments as Regards Organisation Management in Open Innovation - Based on a Questionnaire of the Pharmaceutical Industry and IT Component Industry Segment

Authors: Fumihiko Isada, Yuriko Isada

Abstract:

The aim of this research is to clarify the difference by industry segment or product characteristics as regards organisation management for an open innovation to raise R&D performance. In particular, the trait of the pharmaceutical industry is defined in comparison with IT component industry segment. In considering open innovation, both inter-organisational relation and the management in an organisation are important issues. As methodology, a questionnaire was conducted. In conclusion, suitable organisation management according to the difference in industry segment or product characteristics became clear.

Keywords: empirical study, industry segment, open innovation, product-development organisation pattern

Procedia PDF Downloads 387
5863 A Test Methodology to Measure the Open-Loop Voltage Gain of an Operational Amplifier

Authors: Maninder Kaur Gill, Alpana Agarwal

Abstract:

It is practically not feasible to measure the open-loop voltage gain of the operational amplifier in the open loop configuration. It is because the open-loop voltage gain of the operational amplifier is very large. In order to avoid the saturation of the output voltage, a very small input should be given to operational amplifier which is not possible to be measured practically by a digital multimeter. A test circuit for measurement of open loop voltage gain of an operational amplifier has been proposed and verified using simulation tools as well as by experimental methods on breadboard. The main advantage of this test circuit is that it is simple, fast, accurate, cost effective, and easy to handle even on a breadboard. The test circuit requires only the device under test (DUT) along with resistors. This circuit has been tested for measurement of open loop voltage gain for different operational amplifiers. The underlying goal is to design testable circuits for various analog devices that are simple to realize in VLSI systems, giving accurate results and without changing the characteristics of the original system. The DUTs used are LM741CN and UA741CP. For LM741CN, the simulated gain and experimentally measured gain (average) are calculated as 89.71 dB and 87.71 dB, respectively. For UA741CP, the simulated gain and experimentally measured gain (average) are calculated as 101.15 dB and 105.15 dB, respectively. These values are found to be close to the datasheet values.

Keywords: Device Under Test (DUT), open loop voltage gain, operational amplifier, test circuit

Procedia PDF Downloads 401
5862 Turbulence Measurement Over Rough and Smooth Bed in Open Channel Flow

Authors: Kirti Singh, Kesheo Prasad

Abstract:

A 3D Acoustic Doppler velocimeter was used in the current investigation to quantify the mean and turbulence characteristics in non-uniform open-channel flows. Results are obtained from studies done in the laboratory, analysing the behavior of sand particles under turbulent open channel flow conditions flowing through rough, porous beds. Data obtained from ADV is used to calculate turbulent flow characteristics, Reynolds stresses and turbulent kinetic energy. Theoretical formulations for the distribution of Reynolds stress and the vertical velocity have been constructed using the Reynolds equation and the continuity equation of 2D open-channel flow. The measured Reynolds stress profile and the vertical velocity are comparable with the derived expressions. This study uses the Navier-Stokes equations for analysing the behavior of the vertical velocity profile in the dominant region of full-fledged turbulent flows in open channels, and it gives a new origination of the profile. For both wide and narrow open channels, this origination can estimate the time-averaged primary velocity in the turbulent boundary layer's outer region.

Keywords: turbulence, bed roughness, logarithmic law, shear stress correlations, ADV, Reynolds shear stress

Procedia PDF Downloads 55
5861 Creation and Evaluation of an Academic Blog of Tools for the Self-Correction of Written Production in English

Authors: Brady, Imelda Katherine, Da Cunha Fanego, Iria

Abstract:

Today's university students are considered digital natives and the use of Information Technologies (ITs) forms a large part of their study and learning. In the context of language studies, applications that help with revisions of grammar or vocabulary are particularly useful, especially if they are open access. There are studies that show the effectiveness of this type of application in the learning of English as a foreign language and that using IT can help learners become more autonomous in foreign language acquisition, given that these applications can enhance awareness of the learning process; this means that learners are less dependent on the teacher for corrective feedback. We also propose that the exploitation of these technologies also enhances the work of the language instructor wishing to incorporate IT into his/her practice. In this context, the aim of this paper is to present the creation of a repository of tools that provide support in the writing and correction of texts in English and the assessment of their usefulness on behalf of university students enrolled in the English Studies Degree. The project seeks to encourage the development of autonomous learning through the acquisition of skills linked to the self-correction of written work in English. To comply with the above, our methodology follows five phases. First of all, a selection of the main open-access online applications available for the correction of written texts in English is made: AutoCrit, Hemingway, Grammarly, LanguageTool, OutWrite, PaperRater, ProWritingAid, Reverso, Slick Write, Spell Check Plus and Virtual Writing Tutor. Secondly, the functionalities of each of these tools (spelling, grammar, style correction, etc.) are analyzed. Thirdly, explanatory materials (texts and video tutorials) are prepared on each tool. Fourth, these materials are uploaded into a repository of our university in the form of an institutional blog, which is made available to students and the general public. Finally, a survey was designed to collect students’ feedback. The survey aimed to analyse the usefulness of the blog and the quality of the explanatory materials as well as the degree of usefulness that students assigned to each of the tools offered. In this paper, we present the results of the analysis of data received from 33 students in the 1st semester of the 21-22 academic year. One result we highlight in our paper is that the students have rated this resource very highly, in addition to offering very valuable information on the perceived usefulness of the applications provided for them to review. Our work, carried out within the framework of a teaching innovation project funded by our university, emphasizes that teachers need to design methodological strategies that help their students improve the quality of their productions written in English and, by extension, to improve their linguistic competence.

Keywords: academic blog, open access tools, online self-correction, written production in English, university learning

Procedia PDF Downloads 67
5860 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations

Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang

Abstract:

Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.

Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security

Procedia PDF Downloads 330
5859 Open Jet Testing for Buoyant and Hybrid Buoyant Aerial Vehicles

Authors: A. U. Haque, W. Asrar, A. A. Omar, E. Sulaeman, J. S Mohamed Ali

Abstract:

Open jet testing is a valuable testing technique which provides the desired results with reasonable accuracy. It has been used in past for the airships and now has recently been applied for the hybrid ones, having more non-buoyant force coming from the wings, empennage and the fuselage. In the present review work, an effort has been done to review the challenges involved in open jet testing. In order to shed light on the application of this technique, the experimental results of two different configurations are presented. Although, the aerodynamic results of such vehicles are unique to its own design; however, it will provide a starting point for planning any future testing. Few important testing areas which need more attention are also highlighted. Most of the hybrid buoyant aerial vehicles are unconventional in shape and there experimental data is generated, which is unique to its own design.

Keywords: open jet testing, aerodynamics, hybrid buoyant aerial vehicles, airships

Procedia PDF Downloads 537
5858 Analyzing the Technology Affecting on the Social Integration of Students at University

Authors: Sujit K. Basak, Simon Collin

Abstract:

The aim of this paper is to examine the technology access and use on the affecting social integration of local students at university. This aim is achieved by designing a structural equation modeling (SEM) in terms of integration with peers, integration with faculty, faculty support and on the other hand, examining the socio demographic impact on the technology access and use. The collected data were analyzed using the WarpPLS 5.0 software. This study was survey based and it was conducted at a public university in Canada. The results of the study indicated that technology has a strong impact on integration with faculty, faculty support, but technology does not have an impact on integration with peers. However, the social demographic has also an impact on the technology access and use.

Keywords: faculty, integration, peer, technology access and use

Procedia PDF Downloads 474
5857 Implementation of an Open Source ERP for SMEs in the Automotive Sector in Peru: A Case Study

Authors: Gerson E. Cornejo, Luis A. Gamarra, David S. Mauricio

Abstract:

The Enterprise Resource Planning Systems (ERP) allows the integration of all the business processes of the functional areas of the companies, in order to automate and standardize the processes, obtain accurate information and improve decision making in time real. In Peru, 79% of medium and small companies (SMEs) do not use any management software, this is because it is believed that ERPs are expensive, complex and difficult to implement. However, for more than 20 years there have been Open Source ERPs, which are more accessible and have the same benefit as proprietary ERPs, but there is little information on the implementation process. In this work is made a case of study, in order to show the implementation process of an Open Source ERP, Odoo, based on the ASAP methodology (Accelerated SAP) and applied to a company of corrective and preventive maintenance services of vehicles. The ERP allowed the SME to standardize its business processes, increase its productivity, reducing up to 40% certain processes. The study of this case shows that it is feasible and profitable to implement an Open Source ERP in SMEs in the Automotive Sector of Peru. In addition, it is shown that the ASAP methodology is adequate to carry out Open Source ERPs implementation projects.

Keywords: ASAP, automotive sector, ERP implementation, open source

Procedia PDF Downloads 298
5856 Access to Health Data in Medical Records in Indonesia in Terms of Personal Data Protection Principles: The Limitation and Its Implication

Authors: Anny Retnowati, Elisabeth Sundari

Abstract:

This research aims to elaborate the meaning of personal data protection principles on patient access to health data in medical records in Indonesia and its implications. The method uses normative legal research by examining health law in Indonesia regarding the patient's right to access their health data in medical records. The data will be analysed qualitatively using the interpretation method to elaborate on the limitation of the meaning of personal data protection principles on patients' access to their data in medical records. The results show that patients only have the right to obtain copies of their health data in medical records. There is no right to inspect directly at any time. Indonesian health law limits the principle of patients' right to broad access to their health data in medical records. This restriction has implications for the reduction of personal data protection as part of human rights. This research contribute to show that a limitaion of personal data protection may abuse the human rights.

Keywords: access, health data, medical records, personal data, protection

Procedia PDF Downloads 55
5855 Cybersecurity Challenges in the Era of Open Banking

Authors: Krish Batra

Abstract:

The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.

Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices

Procedia PDF Downloads 15
5854 Strategies of Spatial Optimization for Open Space in the Old-Age Friendly City: An Investigation of the Behavior of the Elderly in Xicheng Square in Hangzhou

Authors: Yunxiang Fang

Abstract:

With the aging trend continuing to accelerate, open space is important for the daily life of the elderly, and its old-age friendliness is worthy of attention. Based on behavioral observation and literature research, this paper studies the behavior of the elderly in urban open space. Through the investigation, classification and quantitative analysis of the activity types, time characteristics and spatial behavior order of the elderly in Xicheng Square in Hangzhou, it summarizes the square space suitable for the psychological needs, physiology and activity needs of the elderly, combined with the basis of literature research. Finally, the suggestions for the improvement of the old-age friendship of Xicheng Square are put forward, from the aspects of microclimate, safety and accessibility, space richness and service facility quality.

Keywords: behavior characteristics, old-age friendliness, open space, square

Procedia PDF Downloads 138
5853 Green Open Space in Sustainable Housing and Islamic Values Perspectives – Case Study Kampung Kauman Malang

Authors: Nunik Junara, Sugeng Triyadi

Abstract:

Sustainable Housing in Islamic perspective, can be defined as a multi-dimensional process that seeks to achieve a balance between economic and socio-cultural aspects on the side, and environmental aspect on the other. There are many quotes verses in the Quran and Hadith that leads to the belief that Islam as a Rahmatan lil Alamin, where men are encouraged to act wisely in treating nature and all living things in it. One aspect of the natural environment that closed to human is plants. In the settlement, the availability of plants or also called green open space is highly recommended. The availability of green open space in the neighborhood, both the public and private green open spaces is expected to reduce the effects of global warming that has engulfed various parts of the world. Green open space that can be viewed from the angle of eco-aestetic and eco-medical in sustainable architecture, is expected to increase the temperature and provide aesthetic impression to the surrounding environment. This paper attempts to discuss the principles of Islamic values related to the natural environment as a major resource for sustainability. This paper also aims to raise awareness of the importance of the theme of sustainability in settlements, especially in big cities. Analysis of the availability of green open space in kampung Kauman Malang is one example of the effort to apply the principles of sustainable housing.

Keywords: green open space, sustainable housing, Islamic values, Kampung Kauman Malang

Procedia PDF Downloads 385
5852 Awareness, Use and Searching Behavior of 'Virtua' Online Public Access Catalog Users

Authors: Saira Soroya, Khalid Mahmood

Abstract:

Library catalogs open the door to the library collection. OPAC (Online Public Access Catalog) are one of the services offered by automated libraries. The present study aims to explore user’s awareness, the level of use and their searching behavior of OPAC with a purpose to give suggestions and ways to improve user-friendly features of library OPAC. The population consisted of OPAC users of Lahore University of Management Sciences (LUMS). Convenient sampling technique was carried out. Total sample size was 100 OPAC users. Quantitative research design, based on survey method used to carry out the study. The data collection instrument was adopted. Data was analyzed using SPSS. Results revealed that a considerable number of users were not aware of OPAC i.e. (30%); however, those who were aware were using basic features of the OPAC. It was found that lack of knowledge was considered the frequent reason for not using all features of OPAC. In this regard, it is strongly recommended that compulsory information literacy programme should be established.

Keywords: catalog, OPAC, library automation, usability study, university library

Procedia PDF Downloads 306
5851 Low Students' Access to University Education in Nigeria: Causes and Remedy

Authors: Robert Ogbanje Okwori

Abstract:

The paper explained the causes low students’ access to university education in Nigeria and how it can be remedied. It is discovered that low students’ access to university education in Nigeria is evident despite these number of universities in the country. In 2006/2007 academic session, 806,089 sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 123,626 (15.3%) were admitted while 2011/2012 academic session, a total of 1,493,604 candidates sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 65,073 (43.57%) were admitted. This necessitates for the research. Therefore, the study posed the following research questions. What are causes of low students’ access to university education in Nigeria? What are the challenges of students’ access to university education in Nigeria? How can students’ access to university education in Nigeria be improved? Sample survey research design was adopted for the study. A structured questionnaire was used to gather data for the study. Six hundred and eighty (680) respondents which comprised of 100 level university students; JAMB Officers and University administrators (Vice Chancellors, Registrars and Admission Officers) were used for the study. Stratified random sampling was applied for adequate representation of respondents from universities in the six geopolitical zones of Nigeria. Mean was used to answer research questions while Kuder-Richardson formula 20 was used to check the internal consistency of the instrument. The correlation coefficient of the instrument was 0.87. The major findings include the carrying capacity of each university contributes to low students’ access to university education and academic staff were inadequate. From the analysis of the study, it is concluded that the rate of access to university education is low, therefore, every university should establish distance learning programme to reduce university admission crisis. The training infrastructure in the universities should be improved upon by the owners to increase the carrying capacity of each university.

Keywords: access, causes, low, university

Procedia PDF Downloads 433
5850 Evaluation of Massive Open Online Course in a Rural Marginalized Area: Case Study of Alice Community, Eastern Cape, South Africa

Authors: Dare Ebenezer Fatumo, Olusesan Emmanuel Adelabu

Abstract:

Online learning has taken another dimension through the introduction of Massive Open Online Courses (MOOCs), it has also become an important resource base for teaching and learning. This research aimed at investigating the use of Massive Open Online Course in a rural marginalized area. The survey research design of descriptive nature was adopted to evaluate the awareness and usage of Massive Open Online Course (MOOCs) in Alice community, Eastern Cape, South Africa. This study also employed quantitative approach by using self-structured questionnaire to evoke information from the respondents. The data collected were analyzed by Statistical Package for Social Sciences (SPSS). The findings revealed amongst others the efficacy of Massive Open Online Course (MOOCs) in fostering teaching and learning in rural marginalized areas. This study concludes that MOOCs is a veritable medium for busy or less privileged individual to acquire a degree or certification. Therefore, the study recommends MOOCs platform to be fully embraced by people in rural marginalized areas, awareness programs about its usefulness should be propagated across the municipalities nationwide.

Keywords: distance learning, information and communication technology, massive open online course, online learning, teaching and learning

Procedia PDF Downloads 138
5849 Analysis of Performance of 3T1D Dynamic Random-Access Memory Cell

Authors: Nawang Chhunid, Gagnesh Kumar

Abstract:

On-chip memories consume a significant portion of the overall die space and power in modern microprocessors. On-chip caches depend on Static Random-Access Memory (SRAM) cells and scaling of technology occurring as per Moore’s law. Unfortunately, the scaling is affecting stability, performance, and leakage power which will become major problems for future SRAMs in aggressive nanoscale technologies due to increasing device mismatch and variations. 3T1D Dynamic Random-Access Memory (DRAM) cell is a non-destructive read DRAM cell with three transistors and a gated diode. In 3T1D DRAM cell gated diode (D1) acts as a storage device and also as an amplifier, which leads to fast read access. Due to its high tolerance to process variation, high density, and low cost of memory as compared to 6T SRAM cell, it is universally used by the advanced microprocessor for on chip data and program memory. In the present paper, it has been shown that 3T1D DRAM cell can perform better in terms of fast read access as compared to 6T, 4T, 3T SRAM cells, respectively.

Keywords: DRAM Cell, Read Access Time, Retention Time, Average Power dissipation

Procedia PDF Downloads 281
5848 Technical Efficiency and Challenges of Smallholder Horticultural Farmers in Ghana: A Wake-Up Call for Policy Implementers

Authors: Freda E. Asem, R. D. Osei, D. B. Sarpong, J. K. Kuwornu

Abstract:

While market access remains important, Ghana’s major handicap is her inability to sustain export growth on the open market. The causes of these could be attributed to inefficiency, lack of competitiveness and supply-side constraints. This study examined the challenges faced by smallholder horticultural farmers and how it relates to their technical efficiency. The study employed mixed methods to address the problem. Using the Millennium Development Account (MiDA) Farmer Based Organization survey data on farm households in 23 districts in Ghana, the study assessed the technical efficiency of smallholder horticultural farmers (taking into account production risks). Focus group discussions (FGDs) and in-depth interviews were also conducted on smallholder mango, pineapple, and chilli pepper farmers selected districts in Ghana. Results revealed the constraints faced by smallholder horticultural farmers to be marketing, training, funding, accessibility, and affordability of inputs, land, access to credit, and the disconnect between themselves and policy makers and implementers.

Keywords: productivity, gender, policy, efficiency, constraints

Procedia PDF Downloads 443
5847 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System

Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji

Abstract:

Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.

Keywords: Biba model, break the glass, context, cross-domain, fine-grained

Procedia PDF Downloads 513
5846 Vertebral Transverse Open Wedge Osteotomy in Correction of Thoracolumbar Kyphosis Resulting from Ankylosing Spondylitis

Authors: S. AliReza Mirghasemi, Amin Mohamadi, Zameer Hussain, Narges Rahimi Gabaran, Mir Mostafa Sadat, Shervin Rashidinia

Abstract:

In progressive cases of Ankylosing Spondylitis, patients will have high degrees of kyphosis leading to severe disabilities. Several operative techniques have been used in this stage, but little knowledge exists on the indications for and outcome of these methods. In this study, we examined the efficacy of monosegmental transverse open wedge osteotomy of L3 in 11 patients with progressive spinal kyphosis. The average correction was 36̊ (20 to 42) with no loss of correction after operation. The average operating time was 120 minutes (100 to 130) and the mean blood loss was 1500 ml (1100 to 2000). Osteotomy corrected all patients sufficiently to allow them to see ahead and their posture was improved. There were no fatal complications but one patient had paraplegia after the operation.

Keywords: ankylosing spondylitis, thoracolumbar kyphosis, open wedge osteotomy, L3 transverse open wedge osteotomy

Procedia PDF Downloads 351
5845 A QoE-driven Cross-layer Resource Allocation Scheme for High Traffic Service over Open Wireless Network Downlink

Authors: Liya Shan, Qing Liao, Qinyue Hu, Shantao Jiang, Tao Wang

Abstract:

In this paper, a Quality of Experience (QoE)-driven cross-layer resource allocation scheme for high traffic service over Open Wireless Network (OWN) downlink is proposed, and the related problem about the users in the whole cell including the users in overlap region of different cells has been solved.A method, in which assess models of the BestEffort service and the no-reference assess algorithm for video service are adopted, to calculate the Mean Opinion Score (MOS) value for high traffic service has been introduced. The cross-layer architecture considers the parameters in application layer, media access control layer and physical layer jointly. Based on this architecture and the MOS value, the Binary Constrained Particle Swarm Optimization (B_CPSO) algorithm is used to solve the cross-layer resource allocation problem. In addition,simulationresults show that the proposed scheme significantly outperforms other schemes in terms of maximizing average users’ MOS value for the whole system as well as maintaining fairness among users.

Keywords: high traffic service, cross-layer resource allocation, QoE, B_CPSO, OWN

Procedia PDF Downloads 518
5844 Leading with Skill Development: A Collaborative and Community Based Approach to Ending Open Defecation in Rural India via Computerized Technical Vocational Education and Training

Authors: Srividya Sheshadri, Christopher Coley, Roa. R. Bhavani

Abstract:

India currently accounts for 60 percent of the open defecation that is practiced globally. While research in the domain of sanitation development makes it apparent that girls and women living in rural India are disproportionately affected, interventions to address this dilemma are lacking. An important but relatively unexplored connection with poor sanitation is that women living in rural India are not only the largest marginalized group without access to adequate sanitation facilities, they also represent a majority of India’s unskilled workers. By training women to build their own toilets, through an approach that has demonstrated success in empowering marginalized communities through technical and vocational education and training (TVET), a collaborative dynamic emerges that can engage entire communities in the movement towards total sanitation. Designed and implemented by Amrita University, this technology-enhanced, community-based approach to skill development, known as Amrita computerized Vocational Education and Training (or Amrita cVET), has begun to show promise in addressing the struggle to end open defecation, and raise sanitation awareness, as well as strengthen personal and community development among women living in rural India. While Amrita cVET project, known as Women Empowerment: Sanitation, is currently in implementation in seven states throughout India, this paper will discuss early stages of the intervention in rural villages within the Indian states of: Karnataka and Goa, where previous sanitation efforts have failed to take hold.

Keywords: community based development, empowerment studies, sanitation in India, computerized vocational training

Procedia PDF Downloads 347
5843 Improvement of the Traditional Techniques of Artistic Casting through the Development of Open Source 3D Printing Technologies Based on Digital Ultraviolet Light Processing

Authors: Drago Diaz Aleman, Jose Luis Saorin Perez, Cecile Meier, Itahisa Perez Conesa, Jorge De La Torre Cantero

Abstract:

Traditional manufacturing techniques used in artistic contexts compete with highly productive and efficient industrial procedures. The craft techniques and associated business models tend to disappear under the pressure of the appearance of mass-produced products that compete in all niche markets, including those traditionally reserved for the work of art. The surplus value derived from the prestige of the author, the exclusivity of the product or the mastery of the artist, do not seem to be sufficient reasons to preserve this productive model. In the last years, the adoption of open source digital manufacturing technologies in small art workshops can favor their permanence by assuming great advantages such as easy accessibility, low cost, and free modification, adapting to specific needs of each workshop. It is possible to use pieces modeled by computer and made with FDM (Fused Deposition Modeling) 3D printers that use PLA (polylactic acid) in the procedures of artistic casting. Models printed by PLA are limited to approximate minimum sizes of 3 cm, and optimal layer height resolution is 0.1 mm. Due to these limitations, it is not the most suitable technology for artistic casting processes of smaller pieces. An alternative to solve size limitation, are printers from the type (SLS) "selective sintering by laser". And other possibility is a laser hardens, by layers, metal powder and called DMLS (Direct Metal Laser Sintering). However, due to its high cost, it is a technology that is difficult to introduce in small artistic foundries. The low-cost DLP (Digital Light Processing) type printers can offer high resolutions for a reasonable cost (around 0.02 mm on the Z axis and 0.04 mm on the X and Y axes), and can print models with castable resins that allow the subsequent direct artistic casting in precious metals or their adaptation to processes such as electroforming. In this work, the design of a DLP 3D printer is detailed, using backlit LCD screens with ultraviolet light. Its development is totally "open source" and is proposed as a kit made up of electronic components, based on Arduino and easy to access mechanical components in the market. The CAD files of its components can be manufactured in low-cost FDM 3D printers. The result is less than 500 Euros, high resolution and open-design with free access that allows not only its manufacture but also its improvement. In future works, we intend to carry out different comparative analyzes, which allow us to accurately estimate the print quality, as well as the real cost of the artistic works made with it.

Keywords: traditional artistic techniques, DLP 3D printer, artistic casting, electroforming

Procedia PDF Downloads 115
5842 Combined Surface Tension and Natural Convection of Nanofluids in a Square Open Cavity

Authors: Habibis Saleh, Ishak Hashim

Abstract:

Combined surface tension and natural convection heat transfer in an open cavity is studied numerically in this article. The cavity is filled with water-{Cu} nanofluids. The left wall is kept at low temperature, the right wall at high temperature and the bottom and top walls are adiabatic. The top free surface is assumed to be flat and non--deformable. Finite difference method is applied to solve the dimensionless governing equations. It is found that the insignificant effect of adding the nanoparticles were obtained about $Ma_{bf}=250$.

Keywords: natural convection, marangoni convection, nanofluids, square open cavity

Procedia PDF Downloads 517
5841 Channels Splitting Strategy for Optical Local Area Networks of Passive Star Topology

Authors: Peristera Baziana

Abstract:

In this paper, we present a network configuration for a WDM LANs of passive star topology that assume that the set of data WDM channels is split into two separate sets of channels, with different access rights over them. Especially, a synchronous transmission WDMA access algorithm is adopted in order to increase the probability of successful transmission over the data channels and consequently to reduce the probability of data packets transmission cancellation in order to avoid the data channels collisions. Thus, a control pre-transmission access scheme is followed over a separate control channel. An analytical Markovian model is studied and the average throughput is mathematically derived. The performance is studied for several numbers of data channels and various values of control phase duration.

Keywords: access algorithm, channels division, collisions avoidance, wavelength division multiplexing

Procedia PDF Downloads 259
5840 A New Bound on the Average Information Ratio of Perfect Secret-Sharing Schemes for Access Structures Based on Bipartite Graphs of Larger Girth

Authors: Hui-Chuan Lu

Abstract:

In a perfect secret-sharing scheme, a dealer distributes a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of the participants in any unqualified subset is statistically independent of the secret. The access structure of the scheme refers to the collection of all qualified subsets. In a graph-based access structures, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing a given access structure is the ratio of the average length of the shares given to the participants to the length of the secret. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing an access structure is called the optimal average information ratio of that access structure. We study the optimal average information ratio of the access structures based on bipartite graphs. Based on some previous results, we give a bound on the optimal average information ratio for all bipartite graphs of girth at least six. This bound is the best possible for some classes of bipartite graphs using our approach.

Keywords: secret-sharing scheme, average information ratio, star covering, deduction, core cluster

Procedia PDF Downloads 330
5839 Digital Demands: Addressing the Digital Divide in Basic Education and Its Relation to Academic Performance and Aspirations

Authors: Jose Rodrigo Zubiri, Sofia Carmen Tomacruz

Abstract:

Amidst an increasingly digitalized society, information and communication technologies have been seamlessly integrated into the economic, social, and political life of individuals. Information has been regarded as a primary good, essential to the wellbeing and self-respect of individuals in society. The digital engagements of an individual play a key role in a variety of life outcomes ranging from academic performance to entrepreneurial success to health service uptake. As a result of varying degrees of access to the Internet and ICTs across populations and individuals, a digital divide emerges. Education, a sector pivotal to directing individual life trajectories, has been radically transformed with regards to the learning process and access to information and thus faces the implications of the digital divide, as new waves of inequalities are introduced in the classroom. As the period of basic education is critical to transitioning into civic life or higher education, digital inequalities are capable of aggravating pre-existing social inequalities. Through survey-questionnaires, conducted on 152 high school students from a Philippine public school, the study reveals the correlation of academic performance and aspirations (for their highest academic qualification) to access to digital technologies and the Internet, according to Van Dijk’s four measurements of digital poverty, namely: motivational access, material access, skills access, and usage access. The findings reveal a positive correlation for academic performance whereas no correlation was found between aspirations and digital access. In the study, significant correlational differences were also found between genders, specifically, in terms of skills access and academic performance.

Keywords: digital divide, ICTs, inequality, education, life trajectories

Procedia PDF Downloads 237
5838 Research and Development of Net-Centric Information Sharing Platform

Authors: Wang Xiaoqing, Fang Youyuan, Zheng Yanxing, Gu Tianyang, Zong Jianjian, Tong Jinrong

Abstract:

Compared with traditional distributed environment, the net-centric environment brings on more demanding challenges for information sharing with the characteristics of ultra-large scale and strong distribution, dynamic, autonomy, heterogeneity, redundancy. This paper realizes an information sharing model and a series of core services, through which provides an open, flexible and scalable information sharing platform.

Keywords: net-centric environment, information sharing, metadata registry and catalog, cross-domain data access control

Procedia PDF Downloads 537
5837 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 389
5836 Identify Users Behavior from Mobile Web Access Logs Using Automated Log Analyzer

Authors: Bharat P. Modi, Jayesh M. Patel

Abstract:

Mobile Internet is acting as a major source of data. As the number of web pages continues to grow the Mobile web provides the data miners with just the right ingredients for extracting information. In order to cater to this growing need, a special term called Mobile Web mining was coined. Mobile Web mining makes use of data mining techniques and deciphers potentially useful information from web data. Web Usage mining deals with understanding the behavior of users by making use of Mobile Web Access Logs that are generated on the server while the user is accessing the website. A Web access log comprises of various entries like the name of the user, his IP address, a number of bytes transferred time-stamp etc. A variety of Log Analyzer tools exists which help in analyzing various things like users navigational pattern, the part of the website the users are mostly interested in etc. The present paper makes use of such log analyzer tool called Mobile Web Log Expert for ascertaining the behavior of users who access an astrology website. It also provides a comparative study between a few log analyzer tools available.

Keywords: mobile web access logs, web usage mining, web server, log analyzer

Procedia PDF Downloads 336