Search results for: multimedia IoT applications
6280 Locative Media Apps for Re-Building Urban Experience: Discovering Cities Through Technology
Authors: Kerem Rızvanoglu, Serhat Güney, Betül Aydoğan, Emre Kızılkaya, Ayşegül Boyalı, Onurcan Güden
Abstract:
This study investigates the urban experience of international students coming to Istanbul with exchange programs and reveals how locative media applications accompany their urban experiences. The sample of the research consists of international students who lived, perceived, and conceived the city on a daily basis during the academic year of 2022. Focusing on this particular sample would demonstrate the opportunities and authentic experiences offered by the city as well as the prevalent urban problems for the foreigners. In this regard, international students' urban experience in Istanbul, the blockages they encounter as resident tourists, the hotspots that the city offers, and the role of locative media in enriching the urban experience are the main axes to be evaluated. In the first step of the multi-staged research, we conduct an online qualitative survey with a sample; then, we evaluate the data obtained from the survey using cluster analysis to identify the urban experience, consumption habits, and tastes. In the final stage, digital ethnographic fieldwork will be carried out with representative personas identified by the cluster analysis. With this field research on the urban experience accompanied by locative media applications, suggestions will be developed by evaluating the opportunities these applications offer to enrich the urban practice of foreigners.Keywords: digital ethnography, international students, locative media applications, urban experience
Procedia PDF Downloads 1406279 The Influence of a Vertical Rotation on the Fluid Dynamics of Compositional Plumes
Authors: Khaled Suleiman Mohammed Al-Mashrafi
Abstract:
A compositional plume is a fluid flow in a directional channel of finite width in another fluid of different material composition. The study of the dynamics of compositional plumes plays an essential role in many real-life applications like industrial applications (e.g., iron casting), environmental applications (e.g., salt fingers and sea ice), and geophysical applications (e.g., solidification at the inner core boundary (ICB) of the Earth, and mantle plumes). The dynamics of compositional plumes have been investigated experimentally and theoretically. The experimental works observed that the plume flow seems to be stable, although some experiments showed that it can be unstable. At the same time, the theoretical investigations showed that the plume flow is unstable. This is found to be true even if the plume is subject to rotation or/and in the presence of a magnetic field and even if another plume of different composition is also present. It is noticeable that all the theoretical studies on the dynamics of compositional plumes are conducted in unbounded domains. The present work is to investigate theoretically the influence of vertical walls (boundaries) on the dynamics of compositional plumes in the absence/presence of a rotation field. The mathematical model of the dynamics of compositional plumes used the equations of continuity, motion, heat, concentration of light material, and state. It is found that the presence of boundaries has a strong influence on the basic state solution as well as the stability of the plume, particularly when the plume is close to the boundary, but the compositional plume remains unstable.Keywords: compositional plumes, stability, bounded domain, vertical boundaries
Procedia PDF Downloads 316278 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016
Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto
Abstract:
The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss
Procedia PDF Downloads 1416277 Excel-VBA as Modelling Platform for Thermodynamic Optimisation of an R290/R600a Cascade Refrigeration System
Authors: M. M. El-Awad
Abstract:
The availability of computers and educational software nowadays helps engineering students acquire better understanding of engineering principles and their applications. With these facilities, students can perform sensitivity and optimisation analyses which were not possible in the past by using slide-rules and hand calculators. Standard textbooks in engineering thermodynamics also use software such as Engineering Equation Solver (EES) and Interactive Thermodynamics (IT) for solving calculation-intensive and design problems. Unfortunately, engineering students in most developing countries do not have access to such applications which are protected by intellectual-property rights. This paper shows how Microsoft ExcelTM and VBA (Visual Basic for Applications), which are normally distributed with personal computers and laptops, can be used as an alternative modelling platform for thermodynamic analyses and optimisation. The paper describes the VBA user-defined-functions developed for determining the refrigerants properties with Excel. For illustration, the combination is used to model and optimise the intermediate temperature for a propane/iso-butane cascade refrigeration system.Keywords: thermodynamic optimisation, engineering education, excel, VBA, cascade refrigeration system
Procedia PDF Downloads 4346276 An Integrated Cloud Service of Application Delivery in Virtualized Environments
Authors: Shuen-Tai Wang, Yu-Ching Lin, Hsi-Ya Chang
Abstract:
Virtualization technologies are experiencing a renewed interest as a way to improve system reliability, and availability, reduce costs, and provide flexibility. This paper presents the development on leverage existing cloud infrastructure and virtualization tools. We adopted some virtualization technologies which improve portability, manageability and compatibility of applications by encapsulating them from the underlying operating system on which they are executed. Given the development of application virtualization, it allows shifting the user’s applications from the traditional PC environment to the virtualized environment, which is stored on a remote virtual machine rather than locally. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for online cloud service. Users no longer need to burden the platform maintenance and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible and web-based application virtualization service represent the next significant step to the mobile workplace, and it lets user executes their applications from virtually anywhere.Keywords: cloud service, application virtualization, virtual machine, elastic environment
Procedia PDF Downloads 2826275 Performance-Based Quality Evaluation of Database Conceptual Schemas
Authors: Janusz Getta, Zhaoxi Pan
Abstract:
Performance-based quality evaluation of database conceptual schemas is an important aspect of database design process. It is evident that different conceptual schemas provide different logical schemas and performance of user applications strongly depends on logical and physical database structures. This work presents the entire process of performance-based quality evaluation of conceptual schemas. First, we show format. Then, the paper proposes a new specification of object algebra for representation of conceptual level database applications. Transformation of conceptual schemas and expression of object algebra into implementation schema and implementation in a particular database system allows for precise estimation of the processing costs of database applications and as a consequence for precise evaluation of performance-based quality of conceptual schemas. Then we describe an experiment as a proof of concept for the evaluation procedure presented in the paper.Keywords: conceptual schema, implementation schema, logical schema, object algebra, performance evaluation, query processing
Procedia PDF Downloads 2926274 Applications for Tracking Close Contact with COVID-19 Patients in Malaysia
Authors: Bih Ni Lee
Abstract:
This paper discusses the unending coronavirus (Covid-19) pandemic. The activity of detecting, testing those with symptoms, and isolating their contacts is the most effective method of stopping the chain of coronavirus infection. The number of cases of coronavirus continues to increase with some reporting a cure, but not a few die. Efforts to treat and prevent continue to fight COVID-19 with flu-like symptoms. The importance of the study is to identify smartphone applications that can track the movement of individuals in an effort to curb the spread of COVID-19, especially in Malaysia. This research method used a literature review, which included new insights into the quality of action and scientific papers. It synthesized information gleaned from a variety of sources. The findings of the study are that the Government of Malaysia has launched three main applications to track the movement of individuals, namely Gerak Malaysia, MyTrace, MySejahtera. Similarly, every state in Malaysia has its own state government application to track individual movements. Overall, Malaysia is one of the countries in the world that has successfully curbed the spread of COVID-19; Covid-19 cases in Malaysia are under control.Keywords: COVID-19 app, national security council, Gerak Malaysia, MyTrace, MySejahtera
Procedia PDF Downloads 1316273 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review
Authors: Rashid Mahmood, Muhammad Junaid Sarwar
Abstract:
Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.Keywords: MANET, IDS, intrusions, signature, detection, prevention
Procedia PDF Downloads 3786272 A Hybrid Watermarking Model Based on Frequency of Occurrence
Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis
Abstract:
Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.Keywords: authentication, copyright protection, information hiding, ownership, watermarking
Procedia PDF Downloads 5656271 Optimization of a Hand-Fan Shaped Microstrip Patch Antenna by Means of Orthogonal Design Method of Design of Experiments for L-Band and S-Band Applications
Authors: Jaswinder Kaur, Nitika, Navneet Kaur, Rajesh Khanna
Abstract:
A hand-fan shaped microstrip patch antenna (MPA) for L-band and S-band applications is designed, and its characteristics have been reconnoitered. The proposed microstrip patch antenna with double U-slot defected ground structure (DGS) is fabricated on an FR4 substrate which is a very readily available and inexpensive material. The suggested antenna is optimized using Orthogonal Design Method (ODM) of Design of Experiments (DOE) to cover the frequency range from 0.91-2.82 GHz for L-band and S-band applications. The L-band covers the frequency range of 1-2 GHz, which is allocated to telemetry, aeronautical, and military systems for passive satellite sensors, weather radars, radio astronomy, and mobile communication. The S-band covers the frequency range of 2-3 GHz, which is used by weather radars, surface ship radars and communication satellites and is also reserved for various wireless applications such as Worldwide Interoperability for Microwave Access (Wi-MAX), super high frequency radio frequency identification (SHF RFID), industrial, scientific and medical bands (ISM), Bluetooth, wireless broadband (Wi-Bro) and wireless local area network (WLAN). The proposed method of optimization is very time efficient and accurate as compared to the conventional evolutionary algorithms due to its statistical strategy. Moreover, the antenna is tested, followed by the comparison of simulated and measured results.Keywords: design of experiments, hand fan shaped MPA, L-Band, orthogonal design method, S-Band
Procedia PDF Downloads 1346270 Towards Natively Context-Aware Web Services
Authors: Hajer Taktak, Faouzi Moussa
Abstract:
With the ubiquitous computing’s emergence and the evolution of enterprises’ needs, one of the main challenges is to build context-aware applications based on Web services. These applications have become particularly relevant in the pervasive computing domain. In this paper, we introduce our approach that optimizes the use of Web services with context notions when dealing with contextual environments. We focus particularly on making Web services autonomous and natively context-aware. We implement and evaluate the proposed approach with a pedagogical example of a context-aware Web service treating temperature values.Keywords: context-aware, CXF framework, ubiquitous computing, web service
Procedia PDF Downloads 3616269 Agile Software Development Implementation in Developing a Diet Tracker Mobile Application
Authors: Dwi Puspita Sari, Gulnur Baltabayeva, Nadia Salman, Maxut Toleuov, Vijay Kanabar
Abstract:
Technology era drives people to use mobile phone to support their daily life activities. Technology development has a rapid phase which pushes the IT company to adjust any technology changes in order to fulfill customer’s satisfaction. As a result of that, many companies in the USA emerged from systematics software development approach to agile software development approach in developing systems and applications to develop many mobile phone applications in a short phase to fulfill user’s needs. As a systematic approach is considered as time consuming, costly, and too risky, agile software development has become a more popular approach to use for developing software including mobile applications. This paper reflects a short-term project to develop a diet tracker mobile application using agile software development that focused on applying scrum framework in the development process.Keywords: agile software development, scrum, diet tracker, mobile application
Procedia PDF Downloads 2576268 Mathematics Bridging Theory and Applications for a Data-Driven World
Authors: Zahid Ullah, Atlas Khan
Abstract:
In today's data-driven world, the role of mathematics in bridging the gap between theory and applications is becoming increasingly vital. This abstract highlights the significance of mathematics as a powerful tool for analyzing, interpreting, and extracting meaningful insights from vast amounts of data. By integrating mathematical principles with real-world applications, researchers can unlock the full potential of data-driven decision-making processes. This abstract delves into the various ways mathematics acts as a bridge connecting theoretical frameworks to practical applications. It explores the utilization of mathematical models, algorithms, and statistical techniques to uncover hidden patterns, trends, and correlations within complex datasets. Furthermore, it investigates the role of mathematics in enhancing predictive modeling, optimization, and risk assessment methodologies for improved decision-making in diverse fields such as finance, healthcare, engineering, and social sciences. The abstract also emphasizes the need for interdisciplinary collaboration between mathematicians, statisticians, computer scientists, and domain experts to tackle the challenges posed by the data-driven landscape. By fostering synergies between these disciplines, novel approaches can be developed to address complex problems and make data-driven insights accessible and actionable. Moreover, this abstract underscores the importance of robust mathematical foundations for ensuring the reliability and validity of data analysis. Rigorous mathematical frameworks not only provide a solid basis for understanding and interpreting results but also contribute to the development of innovative methodologies and techniques. In summary, this abstract advocates for the pivotal role of mathematics in bridging theory and applications in a data-driven world. By harnessing mathematical principles, researchers can unlock the transformative potential of data analysis, paving the way for evidence-based decision-making, optimized processes, and innovative solutions to the challenges of our rapidly evolving society.Keywords: mathematics, bridging theory and applications, data-driven world, mathematical models
Procedia PDF Downloads 756267 A Goms Model for Blind Users Website Navigation
Authors: Suraina Sulong
Abstract:
Keyboard support is one of the main accessibility requirements for web pages and web applications for blind user. But it is not sufficient that the blind user can perform all actions on the page using the keyboard. In addition, designers of web sites or web applications have to make sure that keyboard users can use their pages with acceptable performance. We present GOMS models for navigation in web pages with specific task given to the blind user to accomplish. These models can be used to construct the user model for accessible website.Keywords: GOMS analysis, usability factor, blind user, human computer interaction
Procedia PDF Downloads 1506266 The Museum of Museums: A Mobile Augmented Reality Application
Authors: Qian Jin
Abstract:
Museums have been using interactive technology to spark visitor interest and improve understanding. These technologies can play a crucial role in helping visitors understand more about an exhibition site by using multimedia to provide information. Google Arts and Culture and Smartify are two very successful digital heritage products. They used mobile augmented reality to visualise the museum's 3D models and heritage images but did not include 3D models of the collection and audio information. In this research, service-oriented mobile augmented reality application was developed for users to access collections from multiple museums(including V and A, the British Museum, and British Library). The third-party API (Application Programming Interface) is requested to collect metadata (including images, 3D models, videos, and text) of three museums' collections. The acquired content is then visualized in AR environments. This product will help users who cannot visit the museum offline due to various reasons (inconvenience of transportation, physical disability, time schedule).Keywords: digital heritage, argument reality, museum, flutter, ARcore
Procedia PDF Downloads 786265 Business Challenges and Opportunities of Mobile Applications for Equity Trading in India
Authors: Helee Dave
Abstract:
Globalization has helped in the growth and change of the Indian economy to a great extent. The purchasing power of Indians has increased. IT Infrastructure has considerably improved in India. There is an increase in the usage of smartphones. The smartphones facilitate all sorts of work now a day, from getting groceries to planning a tour; it is just one click away. Similar is the case with equity trading. The traders in equity market can now deal with their stocks through mobile applications eliminating the middle man. The traders do not have an option but to open a dematerialization account with the banks which are compulsory enough irrespective of their mode of transaction that is online or offline. Considering that India is a young country having more than 50% of its population below the age of 25 and 65% of its population below the age of 35; this youth is comfortable with the usage of smartphones. The banking industry is also providing a virtual platform supporting equity market industry. Yet equity trading through online applications is at an infant stage. This paper primarily attempts to understand challenges and opportunities faced by equity trading through mobile apps in India.Keywords: BPO, business process outsourcing, de-materialization account, equity, ITES, information technology enabled services
Procedia PDF Downloads 3116264 Frequency of Occurrence Hybrid Watermarking Scheme
Authors: Hamza A. Ali, Adnan H. M. Al-Helali
Abstract:
Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication
Procedia PDF Downloads 3686263 Development of High-Performance Conductive Polybenzoxazine/Graphite-Copper Nanoomposite for Electromagnetic Interference Shielding Applications
Authors: Noureddine Ramdani
Abstract:
In recent years, extensive attention has been given to the study of conductive nanocomposites due to their unique properties, which are dependent on their size and shape. The potential applications of these materials include electromagnetic interference shielding, energy storage, photovoltaics, and others. These outstanding properties have led to increased interest and research in this field. In this work, a conductive poly benzoxazine nanocomposite, PBZ/Gr-Cu, was synthesized through a compression molding technique to achieve a high-performance material suitable for electromagnetic interference (EMI) shielding applications. The microstructure of the nanocomposites was analyzed using scanning electron microscopy (SEM) and Fourier transform infrared spectroscopy (FTIR). The thermal stability, electrical conductivity, and EMI shielding properties of the nanocomposites were evaluated using thermogravimetric analysis, a four-point probe, and a VNA analyzer, respectively. The TGA results revealed that the thermal stability and electrical conductivity of the nanocomposites were significantly enhanced by the incorporation of Gr/Cu nanoparticles. The nanocomposites exhibited a low percolation threshold of about 3.5 wt.% and an increase in carrier concentration and mobility of the carriers with increasing hybrid nanofiller content, causing the composites to behave as n-type semiconductors. These nanocomposites also displayed a high dielectric constant and a high dissipation factor in the frequency range of 8-12 GHz, resulting in higher EMI shielding effectiveness (SE) of 25-44 dB. These characteristics make them promising candidates for lightweight EMI shielding materials in aerospace and radar evasion applications.Keywords: polybenzoxazine matrix, conductive nanocomposites, electrical conductivity, EMI shielding
Procedia PDF Downloads 866262 Approximately Similarity Measurement of Web Sites Using Genetic Algorithms and Binary Trees
Authors: Doru Anastasiu Popescu, Dan Rădulescu
Abstract:
In this paper, we determine the similarity of two HTML web applications. We are going to use a genetic algorithm in order to determine the most significant web pages of each application (we are not going to use every web page of a site). Using these significant web pages, we will find the similarity value between the two applications. The algorithm is going to be efficient because we are going to use a reduced number of web pages for comparisons but it will return an approximate value of the similarity. The binary trees are used to keep the tags from the significant pages. The algorithm was implemented in Java language.Keywords: Tag, HTML, web page, genetic algorithm, similarity value, binary tree
Procedia PDF Downloads 3556261 Performance Analysis of BLDC Motors for Flywheel Energy Storage Applications with Nonmagnetic vs. Magnetic Core Stator using Finite Element Time Stepping Method
Authors: Alok Kumar Pasa, Krs Raghavan
Abstract:
This paper presents a comparative analysis of Brushless DC (BLDC) motors for flywheel applications with a focus on the choice of stator core materials. The study employs a Finite Element Method (FEM) in time domain to investigate the performance characteristics of BLDC motors equipped with nonmagnetic and magnetic type stator core materials. Preliminary results reveal significant differences in motor efficiency, torque production, and electromagnetic properties between the two configurations. This research sheds light on the advantages of utilizing nonmagnetic materials in BLDC motors for flywheel applications, offering potential advantages in terms of efficiency, weight reduction and cost-effectiveness.Keywords: finite element time stepping method, high-speed BLDC motor, flywheel energy storage system, coreless BLDC motors
Procedia PDF Downloads 26260 Over the Air Programming Method for Learning Wireless Sensor Networks
Authors: K. Sangeeth, P. Rekha, P. Preeja, P. Divya, R. Arya, R. Maneesha
Abstract:
Wireless sensor networks (WSN) are small or tiny devices that consists of different sensors to sense physical parameters like air pressure, temperature, vibrations, movement etc., process these data and sends it to the central data center to take decisions. The WSN domain, has wide range of applications such as monitoring and detecting natural hazards like landslides, forest fire, avalanche, flood monitoring and also in healthcare applications. With such different applications, it is being taught in undergraduate/post graduate level in many universities under department of computer science. But the cost and infrastructure required to purchase WSN nodes for having the students getting hands on expertise on these devices is expensive. This paper gives overview about the remote triggered lab that consists of more than 100 WSN nodes that helps the students to remotely login from anywhere in the world using the World Wide Web, configure the nodes and learn the WSN concepts in intuitive way. It proposes new way called over the air programming (OTAP) and its internals that program the 100 nodes simultaneously and view the results without the nodes being physical connected to the computer system, thereby allowing for sparse deployment.Keywords: WSN, over the air programming, virtual lab, AT45DB
Procedia PDF Downloads 3776259 Static and Dynamic Tailings Dam Monitoring with Accelerometers
Authors: Cristiana Ortigão, Antonio Couto, Thiago Gabriel
Abstract:
In the wake of Samarco Fundão’s failure in 2015 followed by Vale’s Brumadinho disaster in 2019, the Brazilian National Mining Agency started a comprehensive dam safety programmed to rank dam safety risks and establish monitoring and analysis procedures. This paper focuses on the use of accelerometers for static and dynamic applications. Static applications may employ tiltmeters, as an example shown later in this paper. Dynamic monitoring of a structure with accelerometers yields its dynamic signature and this technique has also been successfully used in Brazil and this paper gives an example of tailings dam.Keywords: instrumentation, dynamic, monitoring, tailings, dams, tiltmeters, automation
Procedia PDF Downloads 1466258 Investigating Unplanned Applications and Admissions to Hospitals of Children with Cancer
Authors: Hacer Kobya Bulut, Ilknur Kahriman, Birsel C. Demirbag
Abstract:
Introduction and Purpose: The lives of children with cancer are affected by long term hospitalizations in a negative way due to complications arising from diagnosis or treatment. However, the children's parents are known to have difficulties in meeting their children’s needs and providing home care after cancer treatment or during remission process. Supporting these children and their parents by giving a planned discharge training starting from the hospital and home care leads to reducing hospital applications, hospitalizations, hospital costs, shortening the length of hospital stay and increasing the satisfaction of the children with cancer and their families. This study was conducted to investigate the status of children and their parents' unplanned application to hospital and re-hospitalization. Methods: The study was carried out with 65 children with hematological malignancy in 0-17 age group and their families in a hematology clinic and polyclinic of a university hospital in Trabzon. Data were collected with survey methodology between August-November, 2015 through face to face interview using numbers, percentage and chi-square test in the evaluation. Findings: Most of the children were leukemia (90.8%) and 49.2% had been ill over 13 months. Few of the parents (32.3%) stated that they had received discharge and home care training (24.6%) but most of them (69.2%) found themselves enough in providing home care. Very few parents (6.2%) received home care training after their children being discharged and the majority of parents (61.5%) faced difficulties in home care and had no one to call around them. The parents expressed that in providing care to their children with hematological malignance, they faced difficulty in feeding them (74.6%), explaining their disease (50.0%), giving their oral medication (47.5%), providing hygiene (43.5%) and providing oral care (39.3%). The question ‘What are the emergency situations in which you have to bring your children to a doctor immediately?' was replied as fever (89.2%), severe nausea and vomiting (87.7%), hemorrhage (86.2%) and pain (81.5%). The study showed that 50.8% of the children had unplanned applications to hospitals and 33.8% of them identified as unplanned hospitalization and the first causes of this were fever and pain. The study showed that the frequency of applications (%78.8) and hospitalizations (%81.8) was higher for boys and a statistically significant difference was found between gender and unplanned applications (X=4.779; p=0.02). Applications (48.5%) and hospitalizations (40.9%) were found lower for the parents who had received hospital discharge training, and a significant difference was determined between receiving training and unplanned hospitalizations (X=8.021; p=0.00). Similarly, applications (30.3%) and hospitalizations (40.9%) was found lower for the ones who had received home care training, and a significant difference was determined between receiving home care training and unplanned hospitalizations (X=4.758; p=0.02). Conclusion: It was found out that caregivers of children with cancer did not receive training related to home care and complications about treatment after discharging from hospital, so they faced difficulties in providing home care and this led to an increase in unplanned hospital applications and hospitalizations.Keywords: cancer, children, unplanned application, unplanned hospitalization
Procedia PDF Downloads 2686257 Visual Representation of Ancient Chinese Rites with Digitalization Technology: A Case of Confucius Worship Ceremony
Authors: Jihong Liang, Huiling Feng, Linqing Ma, Tianjiao Qi
Abstract:
Confucius is the first sage in Chinese culture. Confucianism, the theories represented by Confucius, has long been at the core of Chinese traditional society, as the dominating political ideology of centralized feudal monarchy for more than two thousand years. Confucius Worship Ceremony held in the Confucian Temple in Qufu (Confucius’s birthplace), which is dedicated to commemorate Confucius and other 170 elites in Confucianism with a whole set of formal rites, pertains to “Auspicious Rites”, which worship heaven and earth, humans and ghosts. It was first a medium-scaled ritual activity but then upgraded to the supreme one at national level in the Qing Dynasty. As a national event, it was celebrated by Emperor as well as common intellectuals in traditional China. The Ceremony can be solemn and respectful, with prescribed and complicated procedures, well-prepared utensil and matched offerings operated in rhythm with music and dances. Each participant has his place, and everyone follows the specified rules. This magnificent ritual Ceremony, while embedded with rich culture connotation, actually symbolizes the social acknowledgment for orthodox culture represented by Confucianism. Rites reflected in this Ceremony, is one of the most important features of Chinese culture, serving as the key bond in the identification and continuation of Chinese culture. These rites and ritual ceremonies, as culture memories themselves, are not only treasures of China, but of the whole world. However, while the ancient Chinese Rite has been one of the thorniest and most complicated topics for academics, the more regrettable is that due to their interruption in practice and historical changes, these rites and ritual ceremonies have already become a vague language in today’s academic discourse and strange terms of the past for common people. Luckily, we, today, by virtue of modern digital technology, may be able to reproduce these ritual ceremonies, as most of them can still be found in ancient manuscripts, through which Chinese ancestors tell the beauty and gravity of their dignified rites and more importantly, their spiritual pursuits with vivid language and lively pictures. This research, based on review and interpretation of the ancient literature, intends to construct the ancient ritual ceremonies, with the Confucius Worship Ceremony as a case and by use of digital technology. Using 3D technology, the spatial scenes in the Confucian Temple can be reconstructed by virtual reality; the memorial tablet exhibited in the temple by GIS and different rites in the ceremonies by animation technology. With reference to the lyrics, melodies and lively pictures recorded in ancient scripts, it is also possible to reproduce the live dancing site. Also, image rendering technology can help to show the life experience and accomplishments of Confucius. Finally, lining up all the elements in a multimedia narrative form, a complete digitalized Confucius Worship Ceremony can be reproduced, which will provide an excellent virtual experience that goes beyond time and space by bringing its audience back to that specific historical time. This digital project, once completed, will play an important role in the inheritance and dissemination of cultural heritage.Keywords: Confucius worship ceremony, multimedia narrative form, GIS, visual representation
Procedia PDF Downloads 2596256 Modified Step Size Patch Array Antenna for UWB Wireless Applications
Authors: Hamid Aslani, Ahmed Radwan
Abstract:
In this paper, a single element microstrip antenna is presented for UWB applications by using techniques as partial ground plane and modified the shape of the patch. The antenna is properly designed to have a compact size and constant gain against frequency. The simulated results have done using two EM software and show good agreement with the measured results for the fabricated antenna. Then a designing of two elements patch antenna array for UWB in the frequency band of 3.1-10 GHz is presented in this paper. The array is constructed by means of feeding two omni-directional modified circular patch elements with a modified power divider. Experimental results show that the array has a stable radiation pattern and low return loss over a broad bandwidth of 64% (3.1–10 GHz). Due to its planar profile, physically compact size, wide impedance bandwidth, directive performance over a wide bandwidth proposed antenna is a good candidate for portable UWB applications and other UWB integrated circuits.Keywords: ultra wide band, radiation performance, microstrip antenna, size miniaturized antenna
Procedia PDF Downloads 2586255 Small Scale Solar-Photovoltaic and Wind Pump-Storage Hydroelectric System for Remote Residential Applications
Authors: Seshi Reddy Kasu, Florian Misoc
Abstract:
The use of hydroelectric pump-storage system at large scale, MW-size systems, is already widespread around the world. Designed for large scale applications, pump-storage station can be scaled-down for small, remote residential applications. Given the cost and complexity associated with installing a substation further than 100 miles from the main transmission lines, a remote, independent and self-sufficient system is by far the most feasible solution. This article is aiming at the design of wind and solar power generating system, by means of pumped-storage to replace the wind and/or solar power systems with a battery bank energy storage. Wind and solar pumped-storage power generating system can reduce the cost of power generation system, according to the user's electricity load and resource condition and also can ensure system reliability of power supply. Wind and solar pumped-storage power generation system is well suited for remote residential applications with intermittent wind and/or solar energy. This type of power systems, installed in these locations, could be a very good alternative, with economic benefits and positive social effects. The advantage of pumped storage power system, where wind power regulation is calculated, shows that a significant smoothing of the produced power is obtained, resulting in a power-on-demand system’s capability, concomitant to extra economic benefits.Keywords: battery bank, photo-voltaic, pump-storage, wind energy
Procedia PDF Downloads 5956254 The Effects of Zinc Oxide Nanoparticles Loaded with Indole-3-Acetic Acid and Indole-3-Butyric Acid on in vitro Rooting of Apple Microcuttings
Authors: Shabnam Alizadeh, Hatice Dumanoglu
Abstract:
Plant tissue culture is a substantial plant propagation technique for mass clonal production throughout the year, regardless of time in fruit species. However, the rooting achievement must be enhanced in the difficult-to-root genotypes. Classical auxin applications in clonal propagation of these genotypes are inadequate to solve the rooting problem. Nanoparticles having different physical and chemical properties from bulk material could enhance the rooting success of controlled release of these substances when loaded with auxin due to their ability to reach the active substance up to the target cells as a carrier system.The purpose of this study is to investigate the effects of zinc oxide nanoparticles loaded with indole-3-acetic acid (IAA-nZnO) and indole-3-butyric acid (IBA-nZnO) on in vitro rooting of microcuttings in a difficult-to-root apple genotype (Malus domestica Borkh.). Rooting treatments consisted of IBA or IAA at concentrations of 0.5, 1.0, 2.0, 3.0 mg/L; nZnO, IAA-nZnO and IBA-nZnO at doses of 0.0, 1.0, 2.0, 3.0, 4.0, 5.0, 6.0 mg/L were used. All components were added to the Murashige and Skoog (MS) basal medium at strength ½ with 2% sucrose and 0.7% agar before autoclaving. In the study, no rooting occurred in control and nZnO applications. Especially, 1.0 mg/L and 2.0 mg/L IBA-nZnO nanoparticle applications (containing 0.5 mg/L and 0.9 mg/L IBA), respectively with rooting rates of 40.3% and 70.4%, rooting levels of 2.0±0.4 and 2.3±0.4, 2.6±0.7 and 2.5±0.6 average root numbers and 20.4±1.6 mm and 20.2±3.4 mm average root lengths put forward as effective applications.Keywords: Auxin, Malus, nanotechnology, zinc oxide nanoparticles
Procedia PDF Downloads 1446253 Implementation and Demonstration of Software-Defined Traffic Grooming
Authors: Lei Guo, Xu Zhang, Weigang Hou
Abstract:
Since the traditional network is closed and it has no architecture to create applications, it has been unable to evolve with changing demands under the rapid innovation in services. Additionally, due to the lack of the whole network profile, the quality of service cannot be well guaranteed in the traditional network. The Software Defined Network (SDN) utilizes global resources to support on-demand applications/services via open, standardized and programmable interfaces. In this paper, we implement the traffic grooming application under a real SDN environment, and the corresponding analysis is made. In our SDN: 1) we use OpenFlow protocol to control the entire network by using software applications running on the network operating system; 2) several virtual switches are combined into the data forwarding plane through Open vSwitch; 3) An OpenFlow controller, NOX, is involved as a logically centralized control plane that dynamically configures the data forwarding plane; 4) The traffic grooming based on SDN is demonstrated through dynamically modifying the idle time of flow entries. The experimental results demonstrate that the SDN-based traffic grooming effectively reduces the end-to-end delay, and the improvement ratio arrives to 99%.Keywords: NOX, OpenFlow, Software Defined Network (SDN), traffic grooming
Procedia PDF Downloads 2516252 Simplifying the Migration of Architectures in Embedded Applications Introducing a Pattern Language to Support the Workforce
Authors: Farha Lakhani, Michael J. Pont
Abstract:
There are two main architectures used to develop software for modern embedded systems: these can be labelled as “event-triggered” (ET) and “time-triggered” (TT). The research presented in this paper is concerned with the issues involved in migration between these two architectures. Although TT architectures are widely used in safety-critical applications they are less familiar to developers of mainstream embedded systems. The research presented in this paper began from the premise that–for a broad class of systems that have been implemented using an ET architecture–migration to a TT architecture would improve reliability. It may be tempting to assume that conversion between ET and TT designs will simply involve converting all event-handling software routines into periodic activities. However, the required changes to the software architecture are, in many cases rather more profound. The main contribution of the work presented in this paper is to identify ways in which the significant effort involved in migrating between existing ET architectures and “equivalent” (and effective) TT architectures could be reduced. The research described in this paper has taken an innovative step in this regard by introducing the use of ‘Design patterns’ for this purpose for the first time.Keywords: embedded applications, software architectures, reliability, pattern
Procedia PDF Downloads 3296251 Blended Cloud Based Learning Approach in Information Technology Skills Training and Paperless Assessment: Case Study of University of Cape Coast
Authors: David Ofosu-Hamilton, John K. E. Edumadze
Abstract:
Universities have come to recognize the role Information and Communication Technology (ICT) skills plays in the daily activities of tertiary students. The ability to use ICT – essentially, computers and their diverse applications – are important resources that influence an individual’s economic and social participation and human capital development. Our society now increasingly relies on the Internet, and the Cloud as a means to communicate and disseminate information. The educated individual should, therefore, be able to use ICT to create and share knowledge that will improve society. It is, therefore, important that universities require incoming students to demonstrate a level of computer proficiency or trained to do so at a minimal cost by deploying advanced educational technologies. The training and standardized assessment of all in-coming first-year students of the University of Cape Coast in Information Technology Skills (ITS) have become a necessity as students’ most often than not highly overestimate their digital skill and digital ignorance is costly to any economy. The one-semester course is targeted at fresh students and aimed at enhancing the productivity and software skills of students. In this respect, emphasis is placed on skills that will enable students to be proficient in using Microsoft Office and Google Apps for Education for their academic work and future professional work whiles using emerging digital multimedia technologies in a safe, ethical, responsible, and legal manner. The course is delivered in blended mode - online and self-paced (student centered) using Alison’s free cloud-based tutorial (Moodle) of Microsoft Office videos. Online support is provided via discussion forums on the University’s Moodle platform and tutor-directed and assisted at the ICT Centre and Google E-learning laboratory. All students are required to register for the ITS course during either the first or second semester of the first year and must participate and complete it within a semester. Assessment focuses on Alison online assessment on Microsoft Office, Alison online assessment on ALISON ABC IT, Peer assessment on e-portfolio created using Google Apps/Office 365 and an End of Semester’s online assessment at the ICT Centre whenever the student was ready in the cause of the semester. This paper, therefore, focuses on the digital culture approach of hybrid teaching, learning and paperless examinations and the possible adoption by other courses or programs at the University of Cape Coast.Keywords: assessment, blended, cloud, paperless
Procedia PDF Downloads 248