Search results for: store atmospherics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 398

Search results for: store atmospherics

248 Integrating ICT in Teaching and Learning English in the Algerian Classroom

Authors: A. Tahar Djebbar

Abstract:

Modern technologies have penetrated all spheres of human life, education being one of them. This paper focuses the attention on the integration of technology-based education in the Algerian classroom in teaching foreign languages. It sheds light on a specific area of ICT application: ICT in English learning and teaching. Some Algerian teachers or tutors of English face many challenges among which the lack of teaching materials which are indispensable for transmitting knowledge to learners. Thus, they find themselves compelled to use online e-books or download them in PDF form to support their lessons. Teachers even download such teaching materials like pictures, videos, audios, podcasts, and flash cards from the internet and store them in their Flash USBs to shape up the teaching-learning conditions. They use computers, data shows, and the internet so as to facilitate the teaching–learning process in the classroom. Hence, technology has become a must in the Algerian classroom especially in teaching English which has become a very important language in a national and an international level. This study aims at showing that Algerian tutors/teachers who take up the challenge of getting involved in the technology-enhanced language learning and teaching in the Algerian schools and universities face many obstacles.

Keywords: computer, communication, English, internet, learners, language acquisition, teaching, technology

Procedia PDF Downloads 601
247 Evaluating the Total Costs of a Ransomware-Resilient Architecture for Healthcare Systems

Authors: Sreejith Gopinath, Aspen Olmsted

Abstract:

This paper is based on our previous work that proposed a risk-transference-based architecture for healthcare systems to store sensitive data outside the system boundary, rendering the system unattractive to would-be bad actors. This architecture also allows a compromised system to be abandoned and a new system instance spun up in place to ensure business continuity without paying a ransom or engaging with a bad actor. This paper delves into the details of various attacks we simulated against the prototype system. In the paper, we discuss at length the time and computational costs associated with storing and retrieving data in the prototype system, abandoning a compromised system, and setting up a new instance with existing data. Lastly, we simulate some analytical workloads over the data stored in our specialized data storage system and discuss the time and computational costs associated with running analytics over data in a specialized storage system outside the system boundary. In summary, this paper discusses the total costs of data storage, access, and analytics incurred with the proposed architecture.

Keywords: cybersecurity, healthcare, ransomware, resilience, risk transference

Procedia PDF Downloads 109
246 Machine Learning Data Architecture

Authors: Neerav Kumar, Naumaan Nayyar, Sharath Kashyap

Abstract:

Most companies see an increase in the adoption of machine learning (ML) applications across internal and external-facing use cases. ML applications vend output either in batch or real-time patterns. A complete batch ML pipeline architecture comprises data sourcing, feature engineering, model training, model deployment, model output vending into a data store for downstream application. Due to unclear role expectations, we have observed that scientists specializing in building and optimizing models are investing significant efforts into building the other components of the architecture, which we do not believe is the best use of scientists’ bandwidth. We propose a system architecture created using AWS services that bring industry best practices to managing the workflow and simplifies the process of model deployment and end-to-end data integration for an ML application. This narrows down the scope of scientists’ work to model building and refinement while specialized data engineers take over the deployment, pipeline orchestration, data quality, data permission system, etc. The pipeline infrastructure is built and deployed as code (using terraform, cdk, cloudformation, etc.) which makes it easy to replicate and/or extend the architecture to other models that are used in an organization.

Keywords: data pipeline, machine learning, AWS, architecture, batch machine learning

Procedia PDF Downloads 31
245 The Factors Influencing Consumer Behavior of Beverage in Retail Stores Chiang Mai Province

Authors: Winita Kitisak, Boontarika Panyomoon, Siriyakorn Nilpoun, Nithit Yosit, Peeraya Somsak

Abstract:

The purpose of this study will affect the marketing mix that influences the consumers’ behavior towards beverage purchasing from retail stores. It aims to study the consumers and to better understand their behaviors and factors influencing their decision making on buying beverage in retail stores. We study the example of 400 consumers in Chiang Mai. The study shows that most of the respondents were male, 50 percent is 20-30 year old, and 36.66 percent is 31-40 year old, only 2.66 percent is upper 50 years old, bachelor’s degree holders, working in business field and student with 10,001-15,000 Baht income. Most buyers spend 4-6 times a week buying cheap beverage from retail stores. The consumer bought alcoholic beverages, green tea drinks, and soft drinks, but the mainly purchased product was beer. The results indicate that the brand of the product motivates more on consumers’ demand. While shelf displays, products presentation, and sales promotion affect the most on the consumers’ decision to purchase from the retail stores, the promotions moderately impact the consumers’ decision on purchasing from retail stores.

Keywords: consumer behavior, beverage, retail stores, convenience store

Procedia PDF Downloads 195
244 UNIX Source Code Leak: Evaluation and Feasible Solutions

Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar

Abstract:

Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.

Keywords: data transmission, Linux, source code, operating system

Procedia PDF Downloads 217
243 An Analysis of Non-Elliptic Curve Based Primality Tests

Authors: William Wong, Zakaria Alomari, Hon Ching Lai, Zhida Li

Abstract:

Modern-day information security depends on implementing Diffie-Hellman, which requires the generation of prime numbers. Because the number of primes is infinite, it is impractical to store prime numbers for use, and therefore, primality tests are indispensable in modern-day information security. A primality test is a test to determine whether a number is prime or composite. There are two types of primality tests, which are deterministic tests and probabilistic tests. Deterministic tests are adopting algorithms that provide a definite answer whether a given number is prime or composite. While in probabilistic tests, a probabilistic result would be provided, there is a degree of uncertainty. In this paper, we review three probabilistic tests: the Fermat Primality Test, the Miller-Rabin Test, and the Baillie-PSW Test, as well as one deterministic test, the Agrawal-Kayal-Saxena (AKS) Test. Furthermore, we do an analysis of these tests. All of the reviews discussed are not based on the Elliptic Curve. The analysis demonstrates that, in the majority of real-world scenarios, the Baillie- PSW test’s favorability stems from its typical operational complexity of O(log 3n) and its capacity to deliver accurate results for numbers below 2^64.

Keywords: primality tests, Fermat’s primality test, Miller-Rabin primality test, Baillie-PSW primality test, AKS primality test

Procedia PDF Downloads 54
242 Development of Non-frozen Vegan Burger Patty Using Tender Jackfruit (Artocarpus Heterophyllus) as a Meat Substitute: Evaluation of Textural, Physico-Chemical, and Sensory Characteristics

Authors: O. D. A. N. Perera, H. G. Wanigasinghe

Abstract:

Tender jackfruit is an underutilized biomass, which still has a good consumer demand. Valorization of this ingredient into meat analog would obtain greater consumer acceptance due to concerns about health, the environment, and living sustainably of mankind have increased significantly in this decade, opening the market for meat substitutes. The objective of this research was to create a plant-based meat substitute with a structure similar to meat products. In this study, three different combinations of tender jackfruit were used to create vegan burger patties, which were then examined for their textural, physico-chemical, and sensory qualities. The developed burger patties have been compared with store-bought chicken patties. The developed vegan burger patties P1, P2, and P3 had a comparable flavor preference to the control and demonstrated considerable general acceptability (p >.05). P3 has a high quantity of protein (17.10 ± 0.02%) and fiber (6.40 ± 0.06%). At the same time, the vegan burger patty resulted in less fat, high fiber, and high protein which meets the vegan consumer requirements.

Keywords: underutilized, high fibre, soya protein isolate, cooking yield

Procedia PDF Downloads 35
241 Modeling Usage Patterns of Mobile App Service in App Market Using Hidden Markov Model

Authors: Yangrae Cho, Jinseok Kim, Yongtae Park

Abstract:

Mobile app service ecosystem has been abruptly emerged, explosively grown, and dynamically transformed. In contrast with product markets in which product sales directly cause increment in firm’s income, customer’s usage is less visible but more valuable in service market. Especially, the market situation with cutthroat competition in mobile app store makes securing and keeping of users as vital. Although a few service firms try to manage their apps’ usage patterns by fitting on S-curve or applying other forecasting techniques, the time series approaches based on past sequential data are subject to fundamental limitation in the market where customer’s attention is being moved unpredictably and dynamically. We therefore propose a new conceptual approach for detecting usage pattern of mobile app service with Hidden Markov Model (HMM) which is based on the dual stochastic structure and mainly used to clarify unpredictable and dynamic sequential patterns in voice recognition or stock forecasting. Our approach could be practically utilized for app service firms to manage their services’ lifecycles and academically expanded to other markets.

Keywords: mobile app service, usage pattern, Hidden Markov Model, pattern detection

Procedia PDF Downloads 306
240 Radio Frequency Identification System and Its Effect on Retailing Sector

Authors: Ayşe Çoban, Orhan Çoban, Murat Birekul

Abstract:

In this study, the effects of radio frequency identification system on the retailing sector were theoretically analysed. The technology of Radio Frequency Identification (RFID) is a method enabling to identify the objects individually and automatically, using radio frequency. RFID generally consists of a tag and reader. RFID tags can be programmed to receive, store, and send the information of object such as Electronic Product Code (EPC). Having read the tags placed on product by the reader, the information associated with the management of supply chain can be automatically recorded and replaced. Recently, RFID technology used in many areas has particularly important effects on the businesses that are active in the retailing sector. The most important disadvantage of this technology is that the cost of installation and operation is higher compared to its alternatives. However, it provides important advantages to the business enterprises in the application process. At present, it is especially adopted by the large sized enterprises and with chain stores in the international areas. The application results point out that RFID technology provides business enterprises with the important competitive advantage.

Keywords: RFID, retailing sector, RFID technologies, electronic product code

Procedia PDF Downloads 358
239 A New Complex Method for Integrated Warehouse Design in Aspect of Dynamic and Static Capacity

Authors: Tamas Hartvanyi, Zoltan Andras Nagy, Miklos Szabo

Abstract:

The dynamic and static capacity are two opposing aspect of warehouse design. Static capacity optimization aims to maximize the space-usage for goods storing, while dynamic capacity needs more free place to handling them. They are opposing by the building structure and the area utilization. According to Pareto principle: the 80% of the goods are the 20% of the variety. From the origin of this statement, it worth to store the big amount of same products by fulfill the space with minimal corridors, meanwhile the rest 20% of goods have the 80% variety of the whole range, so there is more important to be fast-reachable instead of the space utilizing, what makes the space fulfillment numbers worse. The warehouse design decisions made in present practice by intuitive and empiric impressions, the planning method is formed to one selected technology, making this way the structure of the warehouse homogeny. Of course the result can’t be optimal for the inhomogeneous demands. A new innovative model based on our research will be introduced in this paper to describe the technic capacities, what makes possible to define optimal cluster of technology. It is able to optimize the space fulfillment and the dynamic operation together with this cluster application.

Keywords: warehouse, warehouse capacity, warehouse design method, warehouse optimization

Procedia PDF Downloads 103
238 Hydraulic Performance of Urban Drainage System Using SWMM: A Case Study of Siti Khadijah Retention Pond in Palembang City

Authors: Muhammad B. Al Amin, Nyimas S. Rika, Dwi F. Yanto, Marcelina

Abstract:

Siti Khadijah retention pond is located beside of Siti Khadijah Islamic Hospital on Demang Lebar Daun Street in Palembang City. This retention pond is functioned as storage for runoff from drainage channels in the surrounding area before entering Sekanak River, which is one of Musi River tributaries. However, in recent years, the developments in the surrounding area into paved area trigger to increase runoff discharge that causes the pond can no longer store it adequately. This study aimed to investigate the hydraulic performance of drainage system in the area around Siti Khadijah retention pond. A SWMM model was used to simulate runoff discharge into the pond and out from the pond, so the water level fluctuation within the pond and its capacity could be determined. Besides that, the water depth within drainage channels was simulated as well. The results showed that capacity of retention pond and some drainage channels already inadequate, so the area around it potentially to be flooded. Thus, it is necessary to increase the capacity of the retention pond and drainage channels.

Keywords: flood, retention pond, SWMM, urban drainage system

Procedia PDF Downloads 414
237 Deployment of Electronic Healthcare Records and Development of Big Data Analytics Capabilities in the Healthcare Industry: A Systematic Literature Review

Authors: Tigabu Dagne Akal

Abstract:

Electronic health records (EHRs) can help to store, maintain, and make the appropriate handling of patient histories for proper treatment and decision. Merging the EHRs with big data analytics (BDA) capabilities enable healthcare stakeholders to provide effective and efficient treatments for chronic diseases. Though there are huge opportunities and efforts that exist in the deployment of EMRs and the development of BDA, there are challenges in addressing resources and organizational capabilities that are required to achieve the competitive advantage and sustainability of EHRs and BDA. The resource-based view (RBV), information system (IS), and non- IS theories should be extended to examine organizational capabilities and resources which are required for successful data analytics in the healthcare industries. The main purpose of this study is to develop a conceptual framework for the development of healthcare BDA capabilities based on past works so that researchers can extend. The research question was formulated for the search strategy as a research methodology. The study selection was made at the end. Based on the study selection, the conceptual framework for the development of BDA capabilities in the healthcare settings was formulated.

Keywords: EHR, EMR, Big data, Big data analytics, resource-based view

Procedia PDF Downloads 104
236 Hard Carbon Derived From Dextrose as High-Performance Anode Material for Sodium-Ion Batteries

Authors: Rupan Das Chakraborty, Surendra K. Martha

Abstract:

Hard carbons (HCs) are extensively used as anode materials for sodium-ion batteries due to their availability, low cost, and ease of synthesis. It possesses the ability to store Na ion between stacked sp2 carbon layers and micropores. In this work, hard carbons are synthesized from different concentrations (0.5M to 5M) of dextrose solutions by hydrothermal synthesis followed by high-temperature calcination at 1100 ⁰C in an inert atmosphere. Dextrose has been chosen as a precursor material as it is a eco-friendly and renewable source. Among all hard carbon derived from different concentrations of dextrose solutions, hard carbon derived from 3M dextrose solution delivers superior electrochemical performance compared to other hard carbons. Hard carbon derived from 3M dextrose solution (Dextrose derived Hard Carbon-3M) provides an initial reversible capacity of 257 mAh g-1 with a capacity retention of 83 % at the end of 100 cycles at 30 mA g-1). The carbons obtained from different dextrose concentration show very similar Cyclic Voltammetry and chargedischarging behavior at a scan rate of 0.05 mV s-1 the Cyclic Voltammetry curve indicate that solvent reduction and the solid electrolyte interface (SEI) formation start at E < 1.2 V (vs Na/Na+). Among all 3M dextrose derived electrode indicate as a promising anode material for Sodium-ion batteries (SIBs).

Keywords: dextrose derived hard carbon, anode, sodium-ion battery, electrochemical performance

Procedia PDF Downloads 75
235 A Dynamical Approach for Relating Energy Consumption to Hybrid Inventory Level in the Supply Chain

Authors: Benga Ebouele, Thomas Tengen

Abstract:

Due to long lead time, work in process (WIP) inventory can manifest within the supply chain of most manufacturing system. It implies that there are lesser finished good on hand and more in the process because the work remains in the factory too long and cannot be sold to either customers The supply chain of most manufacturing system is then considered as inefficient as it take so much time to produce the finished good. Time consumed in each operation of the supply chain has an associated energy costs. Such phenomena can be harmful for a hybrid inventory system because a lot of space to store these semi-finished goods may be needed and one is not sure about the final energy cost of producing, holding and delivering the good to customers. The principle that reduces waste of energy within the supply chain of most manufacturing firms should therefore be available to all inventory managers in pursuit of profitability. Decision making by inventory managers in this condition is a modeling process, whereby a dynamical approach is used to depict, examine, specify and even operationalize the relationship between energy consumption and hybrid inventory level. The relationship between energy consumption and inventory level is established, which indicates a poor level of control and hence a potential for energy savings.

Keywords: dynamic modelling, energy used, hybrid inventory, supply chain

Procedia PDF Downloads 231
234 Raman and Dielectric Relaxation Investigations of Polyester-CoFe₂O₄ Nanocomposites

Authors: Alhulw H. Alshammari, Ahmed Iraqi, S. A. Saad, T. A. Taha

Abstract:

In this work, we present for the first time the study of Raman spectra and dielectric relaxation of polyester polymer-CoFe₂O₄ (5.0, 10.0, 15.0, and 20.0 wt%) nanocomposites. Raman spectroscopy was applied as a sensitive structural identification technique to characterize the polyester-CoFe₂O₄ nanocomposites. The images of AFM confirmed the uniform distribution of CoFe₂O₄ inside the polymer matrix. Dielectric relaxation was employed as an important analytical technique to obtain information about the ability of the polymer nanocomposites to store and filter electrical signals. The dielectric relaxation analyses were carried out on the polyester-CoFe₂O₄ nanocomposites at different temperatures. An increase in dielectric constant ε₁ was observed for all samples with increasing temperatures due to the alignment of the electric dipoles with the applied electric field. In contrast, ε₁ decreased with increasing frequency. This is attributed to the difficulty for the electric dipoles to follow the electric field. The α relaxation peak that appeared at a high frequency shifted to higher frequencies when increasing the temperature. The activation energies for Maxwell-Wagner Sillar (MWS) changed from 0.84 to 1.01 eV, while the activation energies for α relaxations were 0.54 – 0.94 eV. The conduction mechanism for the polyester- CoFe₂O₄ nanocomposites followed the correlated barrier hopping (CBH) model.

Keywords: AC conductivity, activation energy, dielectric permittivity, polyester nanocomposites

Procedia PDF Downloads 81
233 Blockchain for IoT Security and Privacy in Healthcare Sector

Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab

Abstract:

The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.

Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data

Procedia PDF Downloads 142
232 Synthesis of 2-Aminoisocoumarinoselenazoles via Transition Metal-Free Alkylation and Ru(II)-Catalyzed [4+2] Alkyne Annulation

Authors: Sunil Kumar, Sandip Dhole, Deepak Salunke, Chung-ming Sun

Abstract:

Heterocycles bearing nitrogen, oxygen, and selenium are present in innumerable biologically active compounds. For instance, coumarin containing dicoumarol acts as naturally occurring anticoagulant. 2-Acylamido selenazole works as Store-Operated Calcium (SOC) channel regulator. Therefore, due to biologically significance of selenazole and coumarin and our quest to develop efficient methodologies for the synthesis of complex heterocycles, the trisubstituted angular isocoumarinoselenazole synthesis was proposed and achieved by starting from nitrobenzoic acid derivative, available commercially. Synthetic procedure involves three steps: i) the construction of 2-aminobenzoselenazoles, ii) their regioselective N-alkylation at position-2 and iii) alkyne insertion via Ru catalyzed C-H activation. Transition metal free synthesis of benzoselenazoles was successfully brought about by the addition/elimination reaction via intramolecular C-Se bond formation. In the next step, N-alkylation of selenazole furnished two regioisomers. Both the isomers exhibited different reactivity towards [4+2] alkyne annulation reaction. The fusion of α-pyrone ring on the benzo[1,3-d]selenazole skeleton was achieved via Ru(II)-catalyzed C-H activation and alkyne insertion. As evident from mechanism, the selenazole 'N' plays an important role for the experiential selectivity.

Keywords: alkylation, alkyne insertion, coumarin, selenazole

Procedia PDF Downloads 96
231 Trading Volume on the Tunisian Financial Market: An Approach Explaining the Hypothesis of Investors Overconfidence

Authors: Fatma Ismailia, Malek Saihi

Abstract:

This research provides an explanation of exchange incentives on the Tunis stock market from a behavioural point of view. The elucidation of the anomalies of excessive volume of transactions and that of excessive volatility cannot be done without the recourse to the psychological aspects of investors. The excessive confidence has been given the predominant role for the explanation of these phenomena. Indeed, when investors store increments, they become more confident about the precision of their private information and their exchange activities then become more aggressive on the subsequent periods. These overconfident investors carry out the intensive exchanges leading to an increase of securities volatility. The objective of this research is to identify whether the trading volume and the excessive volatility of securities observed on the Tunisian stock market come from the excessive exchange of overconfident investors. We use a sample of daily observations over the period January 1999 - October 2007 and we relied on various econometric tests including the VAR model. Our results provide evidence on the importance to consider the bias of overconfidence in the analysis of Tunis stock exchange specificities. The results reveal that the excess of confidence has a major impact on the trading volume while using daily temporal intervals.

Keywords: overconfidence, trading volume, efficiency, rationality, anomalies, behavioural finance, cognitive biases

Procedia PDF Downloads 387
230 A Method for Harvesting Atmospheric Lightning-Energy and Utilization of Extra Generated Power of Nuclear Power Plants during the Low Energy Demand Periods

Authors: Akbar Rahmani Nejad, Pejman Rahmani Nejad, Ahmad Rahmani Nejad

Abstract:

we proposed the arresting of atmospheric lightning and passing the electrical current of lightning-bolts through underground water tanks to produce Hydrogen and restoring Hydrogen in reservoirs to be used later as clean and sustainable energy. It is proposed to implement this method for storage of extra electrical power (instead of lightning energy) during low energy demand periods to produce hydrogen as a clean energy source to store in big reservoirs and later generate electricity by burning the stored hydrogen at an appropriate time. This method prevents the complicated process of changing the output power of nuclear power plants. It is possible to pass an electric current through sodium chloride solution to produce chlorine and sodium or human waste to produce Methane, etc. however atmospheric lightning is an accidental phenomenon, but using this free energy just by connecting the output of lightning arresters to the output of power plant during low energy demand period which there is no significant change in the design of power plant or have no cost, can be considered completely an economical design

Keywords: hydrogen gas, lightning energy, power plant, resistive element

Procedia PDF Downloads 109
229 Internet of Assets: A Blockchain-Inspired Academic Program

Authors: Benjamin Arazi

Abstract:

Blockchain is the technology behind cryptocurrencies like Bitcoin. It revolutionizes the meaning of trust in the sense of offering total reliability without relying on any central entity that controls or supervises the system. The Wall Street Journal states: “Blockchain Marks the Next Step in the Internet’s Evolution”. Blockchain was listed as #1 in Linkedin – The Learning Blog “most in-demand hard skills needed in 2020”. As stated there: “Blockchain’s novel way to store, validate, authorize, and move data across the internet has evolved to securely store and send any digital asset”. GSMA, a leading Telco organization of mobile communications operators, declared that “Blockchain has the potential to be for value what the Internet has been for information”. Motivated by these seminal observations, this paper presents the foundations of a Blockchain-based “Internet of Assets” academic program that joins under one roof leading application areas that are characterized by the transfer of assets over communication lines. Two such areas, which are pillars of our economy, are Fintech – Financial Technology and mobile communications services. The next application in line is Healthcare. These challenges are met based on available extensive professional literature. Blockchain-based assets communication is based on extending the principle of Bitcoin, starting with the basic question: If digital money that travels across the universe can ‘prove its own validity’, can this principle be applied to digital content. A groundbreaking positive answer here led to the concept of “smart contract” and consequently to DLT - Distributed Ledger Technology, where the word ‘distributed’ relates to the non-existence of reliable central entities or trusted third parties. The terms Blockchain and DLT are frequently used interchangeably in various application areas. The World Bank Group compiled comprehensive reports, analyzing the contribution of DLT/Blockchain to Fintech. The European Central Bank and Bank of Japan are engaged in Project Stella, “Balancing confidentiality and auditability in a distributed ledger environment”. 130 DLT/Blockchain focused Fintech startups are now operating in Switzerland. Blockchain impact on mobile communications services is treated in detail by leading organizations. The TM Forum is a global industry association in the telecom industry, with over 850 member companies, mainly mobile operators, that generate US$2 trillion in revenue and serve five billion customers across 180 countries. From their perspective: “Blockchain is considered one of the digital economy’s most disruptive technologies”. Samples of Blockchain contributions to Fintech (taken from a World Bank document): Decentralization and disintermediation; Greater transparency and easier auditability; Automation & programmability; Immutability & verifiability; Gains in speed and efficiency; Cost reductions; Enhanced cyber security resilience. Samples of Blockchain contributions to the Telco industry. Establishing identity verification; Record of transactions for easy cost settlement; Automatic triggering of roaming contract which enables near-instantaneous charging and reduction in roaming fraud; Decentralized roaming agreements; Settling accounts per costs incurred in accordance with agreement tariffs. This clearly demonstrates an academic education structure where fundamental technologies are studied in classes together with these two application areas. Advanced courses, treating specific implementations then follow separately. All are under the roof of “Internet of Assets”.

Keywords: blockchain, education, financial technology, mobile telecommunications services

Procedia PDF Downloads 150
228 Techno-Economic Analysis of Offshore Hybrid Energy Systems with Hydrogen Production

Authors: Anna Crivellari, Valerio Cozzani

Abstract:

Even though most of the electricity produced in the entire world still comes from fossil fuels, new policies are being implemented in order to promote a more sustainable use of energy sources. Offshore renewable resources have become increasingly attractive thanks to the huge entity of power potentially obtained. However, the intermittent nature of renewables often limits the capacity of the systems and creates mismatches between supply and demand. Hydrogen is foreseen to be a promising vector to store and transport large amounts of excess renewable power by using existing oil and gas infrastructure. In this work, an offshore hybrid energy system integrating wind energy conversion with hydrogen production was conceptually defined and applied to offshore gas platforms. A techno-economic analysis was performed by considering two different locations for the installation of the innovative power system, i.e., the North Sea and the Adriatic Sea. The water depth, the distance of the platform from the onshore gas grid, the hydrogen selling price and the green financial incentive were some of the main factors taken into account in the comparison. The results indicated that the use of well-defined indicators allows to capture specifically different cost and revenue features of the analyzed systems, as well as to evaluate their competitiveness in the actual and future energy market.

Keywords: cost analysis, energy efficiency assessment, hydrogen production, offshore wind energy

Procedia PDF Downloads 104
227 Modeling of Hydraulic Networking of Water Supply Subsystem Case of Addis Ababa

Authors: Solomon Weldegebriel Gebrelibanos

Abstract:

Water is one of the most important substances in human life that can give a human liberality with its cost and availability. Water comes from rainfall and runoff and reaches the ground as runoff that is stored in a river, ponds, and big water bodies, including sea and ocean and the remaining water portion is infiltrated into the ground to store in the aquifer. Water can serve human beings in various ways, including irrigation, water supply, hydropower and soon. Water supply is the main pillar of the water service to the human being. Water supply distribution in Addis Ababa arises from Legedadi, Akakai, and Gefersa. The objective of the study is to measure the performance of the water supply distribution in Addis Ababa city. The water supply distribution model is developed by computer-aided design software. The model can analyze the operational change, loss of water, and performance of the network. The two design criteria that have been employed to analyze the network system are velocity and pressure. The result shows that the customers are using the water at high pressure with low demand. The water distribution system is older than the expected service life with more leakage. Hence the study recommended that fixing Pressure valves and new distribution facilities can resolve the performance of the water supply system

Keywords: distribution, model, pressure, velocity

Procedia PDF Downloads 87
226 Analytic Network Process in Location Selection and Its Application to a Real Life Problem

Authors: Eylem Koç, Hasan Arda Burhan

Abstract:

Location selection presents a crucial decision problem in today’s business world where strategic decision making processes have critical importance. Thus, location selection has strategic importance for companies in boosting their strength regarding competition, increasing corporate performances and efficiency in addition to lowering production and transportation costs. A right choice in location selection has a direct impact on companies’ commercial success. In this study, a store location selection problem of Carglass Turkey which operates in vehicle glass branch is handled. As this problem includes both tangible and intangible criteria, Analytic Network Process (ANP) was accepted as the main methodology. The model consists of control hierarchy and BOCR subnetworks which include clusters of actors, alternatives and criteria. In accordance with the management’s choices, five different locations were selected. In addition to the literature review, a strict cooperation with the actor group was ensured and maintained while determining the criteria and during whole process. Obtained results were presented to the management as a report and its feasibility was confirmed accordingly.

Keywords: analytic network process (ANP), BOCR, multi-actor decision making, multi-criteria decision making, real-life problem, location selection

Procedia PDF Downloads 442
225 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 48
224 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 221
223 Characterising Stable Model by Extended Labelled Dependency Graph

Authors: Asraful Islam

Abstract:

Extended dependency graph (EDG) is a state-of-the-art isomorphic graph to represent normal logic programs (NLPs) that can characterize the consistency of NLPs by graph analysis. To construct the vertices and arcs of an EDG, additional renaming atoms and rules besides those the given program provides are used, resulting in higher space complexity compared to the corresponding traditional dependency graph (TDG). In this article, we propose an extended labeled dependency graph (ELDG) to represent an NLP that shares an equal number of nodes and arcs with TDG and prove that it is isomorphic to the domain program. The number of nodes and arcs used in the underlying dependency graphs are formulated to compare the space complexity. Results show that ELDG uses less memory to store nodes, arcs, and cycles compared to EDG. To exhibit the desirability of ELDG, firstly, the stable models of the kernel form of NLP are characterized by the admissible coloring of ELDG; secondly, a relation of the stable models of a kernel program with the handles of the minimal, odd cycles appearing in the corresponding ELDG has been established; thirdly, to our best knowledge, for the first time an inverse transformation from a dependency graph to the representing NLP w.r.t. ELDG has been defined that enables transferring analytical results from the graph to the program straightforwardly.

Keywords: normal logic program, isomorphism of graph, extended labelled dependency graph, inverse graph transforma-tion, graph colouring

Procedia PDF Downloads 181
222 Religious Discrimination Against Small Business Owners: Evidence from the 1875 Cadastral Survey of Istanbul

Authors: Burak Unveren, Ecem Uygun, Özdemi̇r Teke

Abstract:

A large body of literature documents how the Ottoman Empire's economic decline in relation to Western Europe was exacerbated by the unequal legal treatment of its subjects based on creed. Motivated by this debate, we empirically explore whether property taxes collected from businesses in Istanbul discriminated against or favored non-Muslims after the cadastral survey of the capital in 1875. The survey was conducted to determine the property taxes. And the process was potentially susceptible to the biased views of the surveyors who calculated the taxes payable via their subjective appraisals of all real properties. According to our results, in contrast to widely held beliefs regarding 19th-century Istanbul, the number of Muslim shop owners is higher than that of non-Muslims. Moreover, we find evidence for taxes collected from non-Muslim shop and store owners to be higher compared to Muslims, even after controlling for all physical features (e.g., size, location, etc.). These results directly pertain to the fiscal capacity of the Ottoman state and its economic divergence from Europe in the 19th century. Surprisingly, the data also indicates no statistically different tax differentials between male and female property owners.

Keywords: economic history, taxation, small business, discrimination

Procedia PDF Downloads 38
221 Objective vs. Perceived Quality in the Cereal Industry

Authors: Albena Ivanova, Jill Kurp, Austin Hampe

Abstract:

Cereal products in the US contain rich information on the front of the package (FOP) as well as point-of-purchase (POP) summaries provided by the store. These summaries frequently are confusing and misleading to the consumer. This study explores the relationship between perceived quality, objective quality, price, and value in the cold cereal industry. A total of 270 cold cereal products were analyzed and the price, quality and value for different summaries were compared using ANOVA tests. The results provide evidence that the United States Department of Agriculture Organic FOP/POP are related to higher objective quality, higher price, but not to a higher value. Whole grain FOP/POP related to a higher objective quality, lower or similar price, and higher value. Heart-healthy POP related to higher objective quality, similar price, and higher value. Gluten-free FOP/POP related to lower objective quality, higher price, and lower value. Kid's cereals were of lower objective quality, same price, and lower value compared to family and adult markets. The findings point to a disturbing tendency of companies to continue to produce lower quality products for the kids’ market, pricing them the same as high-quality products. The paper outlines strategies that marketers and policymakers can utilize to contribute to the increased objective quality and value of breakfast cereal products in the United States.

Keywords: cereals, certifications, front-of-package claims, consumer health.

Procedia PDF Downloads 99
220 Emotional Artificial Intelligence and the Right to Privacy

Authors: Emine Akar

Abstract:

The majority of privacy-related regulation has traditionally focused on concepts that are perceived to be well-understood or easily describable, such as certain categories of data and personal information or images. In the past century, such regulation appeared reasonably suitable for its purposes. However, technologies such as AI, combined with ever-increasing capabilities to collect, process, and store “big data”, not only require calibration of these traditional understandings but may require re-thinking of entire categories of privacy law. In the presentation, it will be explained, against the background of various emerging technologies under the umbrella term “emotional artificial intelligence”, why modern privacy law will need to embrace human emotions as potentially private subject matter. This argument can be made on a jurisprudential level, given that human emotions can plausibly be accommodated within the various concepts that are traditionally regarded as the underlying foundation of privacy protection, such as, for example, dignity, autonomy, and liberal values. However, the practical reasons for regarding human emotions as potentially private subject matter are perhaps more important (and very likely more convincing from the perspective of regulators). In that respect, it should be regarded as alarming that, according to most projections, the usefulness of emotional data to governments and, particularly, private companies will not only lead to radically increased processing and analysing of such data but, concerningly, to an exponential growth in the collection of such data. In light of this, it is also necessity to discuss options for how regulators could address this emerging threat.

Keywords: AI, privacy law, data protection, big data

Procedia PDF Downloads 61
219 Intervention of Self-Limiting L1 Inner Speech during L2 Presentations: A Study of Bangla-English Bilinguals

Authors: Abdul Wahid

Abstract:

Inner speech, also known as verbal thinking, self-talk or private speech, is characterized by the subjective language experience in the absence of overt or audible speech. It is a psychological form of verbal activity which is being rehearsed without the articulation of any sound wave. In Psychology, self-limiting speech means the type of speech which contains information that inhibits the development of the self. People, in most cases, experience inner speech in their first language. It is very frequent in Bangladesh where the Bangla (L1) speaking students lose track of speech during their presentations in English (L2). This paper investigates into the long pauses (more than 0.4 seconds long) in English (L2) presentations by Bangla speaking students (18-21 year old) and finds the intervention of Bangla (L1) inner speech as one of its causes. The overt speeches of the presenters are placed on Audacity Audio Editing software where the length of pauses are measured in milliseconds. Varieties of inner speech questionnaire (VISQ) have been conducted randomly amongst the participants out of whom 20 were selected who have similar phenomenology of inner speech. They have been interviewed to describe the type and content of the voices that went on in their head during the long pauses. The qualitative interview data are then codified and converted into quantitative data. It was observed that in more than 80% cases students experience self-limiting inner speech/self-talk during their unwanted pauses in L2 presentations.

Keywords: Bangla-English Bilinguals, inner speech, L1 intervention in bilingualism, motor schema, pauses, phonological loop, phonological store, working memory

Procedia PDF Downloads 125