Search results for: smart devices security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5949

Search results for: smart devices security

2619 Resilient Manufacturing in Times of Mass Customisation: Using Augmented Reality to Improve Training and Operating Practices of EV’s Battery Assembly

Authors: Lorena Caires Moreira, Marcos Kauffman

Abstract:

This paper outlines the results of experimental research on deploying an emerging augmented reality (AR) system for real-time task assistance of highly customized and high-risk manual operations. The focus is on operators’ training capabilities and the aim is to test if such technologies can support achieving higher levels of knowledge retention and accuracy of task execution to improve health and safety (H and S) levels. The proposed solution is tested and validated using a real-world case study of electric vehicles’ battery module assembly. The experimental results revealed that the proposed AR method improved the training practices by increasing the knowledge retention levels from 40% to 84% and improved the accuracy of task execution from 20% to 71%, compared to the traditional paper-based method. The results of this research can be used as a demonstration of how emerging technologies are advancing the choice of manual, hybrid, or fully automated processes by promoting the connected worker (Industry 5.0) and supporting manufacturing in becoming more resilient in times of constant market changes.

Keywords: augmented reality, extended reality, connected worker, XR-assisted operator, manual assembly, industry 5.0, smart training, battery assembly

Procedia PDF Downloads 115
2618 Impact of Green Marketing Mix Strategy and CSR on Organizational Performance: An Empirical Study of Manufacturing Sector of Pakistan

Authors: Syeda Shawana Mahasan, Muhammad Farooq Akhtar

Abstract:

The objective of this study is to analyze the influence of the green marketing mix strategy and corporate social responsibility (CSR) on the performance of an organization, taking into account the mediating effect of corporate image. The impact of frugal innovation and corporate activism is being examined. The data was gathered from executives at various levels of management, including top, middle, and lower-level managers, from a total of 550 manufacturing enterprises of different sizes, ranging from small to medium to large. The collected replies are processed and analyzed using SMART PLS version 4.0.0.0. The application of PLS-SEM demonstrates that the green marketing mix strategy and corporate social responsibility have a significant impact on organizational performance. Therefore, it is imperative for organizations to effectively adopt environmentally sustainable and socially conscious methods within their operations. The results indicate that the corporate image has a key role in mediating the relationship between the green marketing mix strategy, corporate social responsibility, and organizational performance. This demonstrates the imperative for organizations to actively enhance their favorable reputation among stakeholders. The combination of frugal innovation and corporate activism enhances the connection between corporate image and organizational performance. The current study assists managers in recognizing the significance of these particular constructs in maintaining the long-term performance of the organization.

Keywords: green marketing mix strategy, CSR, corporate image, organizational performance, frugal innovation, corporate activism

Procedia PDF Downloads 27
2617 Influence of a Pulsatile Electroosmotic Flow on the Dispersivity of a Non-Reactive Solute through a Microcapillary

Authors: Jaime Muñoz, José Arcos, Oscar Bautista Federico Méndez

Abstract:

The influence of a pulsatile electroosmotic flow (PEOF) at the rate of spread, or dispersivity, for a non-reactive solute released in a microcapillary with slippage at the boundary wall (modeled by the Navier-slip condition) is theoretically analyzed. Based on the flow velocity field developed under such conditions, the present study implements an analytical scheme of scaling known as the Theory of Homogenization, in order to obtain a mathematical expression for the dispersivity, valid at a large time scale where the initial transients have vanished and the solute spreads under the Taylor dispersion influence. Our results show the dispersivity is a function of a slip coefficient, the amplitude of the imposed electric field, the Debye length and the angular Reynolds number, highlighting the importance of the latter as an enhancement/detrimental factor on the dispersivity, which allows to promote the PEOF as a strong candidate for chemical species separation at lab-on-a-chip devices.

Keywords: dispersivity, microcapillary, Navier-slip condition, pulsatile electroosmotic flow, Taylor dispersion, Theory of Homogenization

Procedia PDF Downloads 209
2616 Design and Performance Analysis of a Hydro-Power Rim-Driven Superconducting Synchronous Generator

Authors: A. Hassannia, S. Ramezani

Abstract:

The technology of superconductivity has developed in many power system devices such as transmission cable, transformer, current limiter, motor and generator. Superconducting wires can carry high density current without loss, which is the capability that is used to design the compact, lightweight and more efficient electrical machines. Superconducting motors have found applications in marine and air propulsion systems as well as superconducting generators are considered in low power hydraulic and wind generators. This paper presents a rim-driven superconducting synchronous generator for hydraulic power plant. The rim-driven concept improves the performance of hydro turbine. Furthermore, high magnetic field that is produced by superconducting windings allows replacing the rotor core. As a consequent, the volume and weight of the machine is decreased significantly. In this paper, a 1 MW coreless rim-driven superconducting synchronous generator is designed. Main performance characteristics of the proposed machine are then evaluated using finite elements method and compared to an ordinary similar size synchronous generator.

Keywords: coreless machine, electrical machine design, hydraulic generator, rim-driven machine, superconducting generator

Procedia PDF Downloads 169
2615 Rescue Emergency Drone for Fast Response to Medical Emergencies Due to Traffic Accidents

Authors: Anders S. Kristensen, Dewan Ahsan, Saqib Mehmood, Shakeel Ahmed

Abstract:

Traffic accidents are a result of the convergence of hazards, malfunctioning of vehicles and human negligence that have adverse economic and health impacts and effects. Unfortunately, avoiding them completely is very difficult, but with quick response to rescue and first aid, the mortality rate of inflicted persons can be reduced significantly. Smart and innovative technologies can play a pivotal role to respond faster to traffic crash emergencies comparing conventional means of transportation. For instance, Rescue Emergency Drone (RED) can provide faster and real-time crash site risk assessment to emergency medical services, thereby helping them to quickly and accurately assess a situation, dispatch the right equipment and assist bystanders to treat inflicted person properly. To conduct a research in this regard, the case of a traffic roundabout that is prone to frequent traffic accidents on the outskirts of Esbjerg, a town located on western coast of Denmark is hypothetically considered. Along with manual calculations, Emergency Disaster Management Simulation (EDMSIM) has been used to verify the response time of RED from a fire station of the town to the presumed crash site. The results of the study demonstrate the robustness of RED into emergency services to help save lives. 

Keywords: automated external defibrillator, medical emergency, response time, unmanned aerial system

Procedia PDF Downloads 224
2614 On the Influence of Sleep Habits for Predicting Preterm Births: A Machine Learning Approach

Authors: C. Fernandez-Plaza, I. Abad, E. Diaz, I. Diaz

Abstract:

Births occurring before the 37th week of gestation are considered preterm births. A threat of preterm is defined as the beginning of regular uterine contractions, dilation and cervical effacement between 23 and 36 gestation weeks. To author's best knowledge, the factors that determine the beginning of the birth are not completely defined yet. In particular, the incidence of sleep habits on preterm births is weekly studied. The aim of this study is to develop a model to predict the factors affecting premature delivery on pregnancy, based on the above potential risk factors, including those derived from sleep habits and light exposure at night (introduced as 12 variables obtained by a telephone survey using two questionnaires previously used by other authors). Thus, three groups of variables were included in the study (maternal, fetal and sleep habits). The study was approved by Research Ethics Committee of the Principado of Asturias (Spain). An observational, retrospective and descriptive study was performed with 481 births between January 1, 2015 and May 10, 2016 in the University Central Hospital of Asturias (Spain). A statistical analysis using SPSS was carried out to compare qualitative and quantitative variables between preterm and term delivery. Chi-square test qualitative variable and t-test for quantitative variables were applied. Statistically significant differences (p < 0.05) between preterm vs. term births were found for primiparity, multi-parity, kind of conception, place of residence or premature rupture of membranes and interruption during nights. In addition to the statistical analysis, machine learning methods to look for a prediction model were tested. In particular, tree based models were applied as the trade-off between performance and interpretability is especially suitable for this study. C5.0, recursive partitioning, random forest and tree bag models were analysed using caret R-package. Cross validation with 10-folds and parameter tuning to optimize the methods were applied. In addition, different noise reduction methods were applied to the initial data using NoiseFiltersR package. The best performance was obtained by C5.0 method with Accuracy 0.91, Sensitivity 0.93, Specificity 0.89 and Precision 0.91. Some well known preterm birth factors were identified: Cervix Dilation, maternal BMI, Premature rupture of membranes or nuchal translucency analysis in the first trimester. The model also identifies other new factors related to sleep habits such as light through window, bedtime on working days, usage of electronic devices before sleeping from Mondays to Fridays or change of sleeping habits reflected in the number of hours, in the depth of sleep or in the lighting of the room. IF dilation < = 2.95 AND usage of electronic devices before sleeping from Mondays to Friday = YES and change of sleeping habits = YES, then preterm is one of the predicting rules obtained by C5.0. In this work a model for predicting preterm births is developed. It is based on machine learning together with noise reduction techniques. The method maximizing the performance is the one selected. This model shows the influence of variables related to sleep habits in preterm prediction.

Keywords: machine learning, noise reduction, preterm birth, sleep habit

Procedia PDF Downloads 139
2613 Using Action Research to Digitize Theses and Journal Articles at the Main Library, Sultan Qaboos University, Oman

Authors: Nabhan H. N. Al-Harrasi

Abstract:

Action Research (AR) plays an important role in improving the problematical situation. It is a process that enhances thinking and practise and bridges the gap between abstract and concrete thinking. Nowadays, AR as a methodology is wildly used to implement projects based on understanding the needs of owners, considering the organizational culture, meeting the requirements, encouraging partnership, representing different viewpoints, and building the project. This research describes the whole processes of digitizing Post-graduate theses and all articles published in 6 Journals at Sultan Qaboos University. AR implemented to respond to the university needs to enhance accessibilities to its information resources and make them available through the national repository. In order to prepare the action plan, the library administration met to discuss several points related to the proposed project, the most important of which are: • Providing digitalization devices. • Locating a specific part of the Library as a Digitization Unit. • Choosing a team. • Defining tasks. • Implementing the proposed project and evaluating the whole processes.

Keywords: action research, digitization, Theses, Journal articles, open access, Oman

Procedia PDF Downloads 175
2612 Effects of Reversible Watermarking on Iris Recognition Performance

Authors: Andrew Lock, Alastair Allen

Abstract:

Fragile watermarking has been proposed as a means of adding additional security or functionality to biometric systems, particularly for authentication and tamper detection. In this paper we describe an experimental study on the effect of watermarking iris images with a particular class of fragile algorithm, reversible algorithms, and the ability to correctly perform iris recognition. We investigate two scenarios, matching watermarked images to unmodified images, and matching watermarked images to watermarked images. We show that different watermarking schemes give very different results for a given capacity, highlighting the importance of investigation. At high embedding rates most algorithms cause significant reduction in recognition performance. However, in many cases, for low embedding rates, recognition accuracy is improved by the watermarking process.

Keywords: biometrics, iris recognition, reversible watermarking, vision engineering

Procedia PDF Downloads 449
2611 Effect of Vibration Amplitude and Welding Force on Weld Strength of Ultrasonic Metal Welding

Authors: Ziad. Sh. Al Sarraf

Abstract:

Ultrasonic metal welding has been the subject of ongoing research and development, most recently concentrating on metal joining in miniature devices, for example to allow solder-free wire bonding. As well as at the small scale, there are also opportunities to research the joining of thicker sheet metals and to widen the range of similar and dissimilar materials that can be successfully joined using this technology. This study presents the design, characterisation and test of a lateral-drive ultrasonic metal spot welding device. The ultrasonic metal spot welding horn is modelled using finite element analysis (FEA) and its vibration behaviour is characterised experimentally to ensure ultrasonic energy is delivered effectively to the weld coupon. The welding stack and fixtures are then designed and mounted on a test machine to allow a series of experiments to be conducted for various welding and ultrasonic parameters. Weld strength is subsequently analysed using tensile-shear tests. The results show how the weld strength is particularly sensitive to the combination of clamping force and ultrasonic vibration amplitude of the welding tip, but there are optimal combinations of these and also limits that must be clearly identified.

Keywords: ultrasonic welding, vibration amplitude, welding force, weld strength

Procedia PDF Downloads 359
2610 Functionally Graded MEMS Piezoelectric Energy Harvester with Magnetic Tip Mass

Authors: M. Derayatifar, M. Packirisamy, R.B. Bhat

Abstract:

Role of piezoelectric energy harvesters has gained interest in supplying power for micro devices such as health monitoring sensors. In this study, in order to enhance the piezoelectric energy harvesting in capturing energy from broader range of excitation and to improve the mechanical and electrical responses, bimorph piezoelectric energy harvester beam with magnetic mass attached at the end is presented. In view of overcoming the brittleness of piezo-ceramics, functionally graded piezoelectric layers comprising of both piezo-ceramic and piezo-polymer is employed. The nonlinear equations of motions are derived using energy method and then solved analytically using perturbation scheme. The frequency responses of the forced vibration case are obtained for the near resonance case. The nonlinear dynamic responses of the MEMS scaled functionally graded piezoelectric energy harvester in this paper may be utilized in different design scenarios to increase the efficiency of the harvester.

Keywords: energy harvesting, functionally graded piezoelectric material, magnetic force, MEMS (micro-electro-mechanical systems) piezoelectric, perturbation method

Procedia PDF Downloads 184
2609 A New PWM Command for Cascaded H-Bridge Multilevel Increasing the Quality and Reducing Harmonics

Authors: Youssef Babkrani, S. Hiyani, A. Naddami, K. Choukri, M. Hilal

Abstract:

Power Quality has been a problem ever since electrical power was invented and in recent years, it has become the main interest of researchers who are still concerned about finding ways to reduce its negative influence on electrical devices. In this paper we aim to improve the power quality output for H- bridge multilevel inverter used with solar Photovoltaic (PV) panels, we propose a new switching technique that uses a pulse width modulation method (PWM) aiming to reduce the harmonics. This new method introduces a sinusoidal wave compared with modified trapezoidal carriers used to generate the pulses. This new trapezoid carrier waveform is being implemented with different sinusoidal PWM dispositions such as phase disposition (PWM PD), phase opposition disposition (PWM POD), and (PWM APOD) alternative phase opposition disposition and compared with the conventional ones. Using Matlab Simulink R2014a the line voltage and total harmonic distortions (THD) simulated and the quality are increased in spite of variations of DC introduced.

Keywords: carrier waveform, phase disposition (PD), phase opposition disposition (POD), alternative phase opposition disposition (APOD), total harmonics distortion (THD)

Procedia PDF Downloads 278
2608 Convention Refugees in New Zealand: Being Trapped in Immigration Limbo without the Right to Obtain a Visa

Authors: Saska Alexandria Hayes

Abstract:

Multiple Convention Refugees in New Zealand are stuck in a state of immigration limbo due to a lack of defined immigration policies. The Refugee Convention of 1951 does not give the right to be issued a permanent right to live and work in the country of asylum. A gap in New Zealand's immigration law and policy has left Convention Refugees without the right to obtain a resident or temporary entry visa. The significant lack of literature on this topic suggests that the lack of visa options for Convention Refugees in New Zealand is a widely unknown or unacknowledged issue. Refugees in New Zealand enjoy the right of non-refoulement contained in Article 33 of the Refugee Convention 1951, whether lawful or unlawful. However, a number of rights contained in the Refugee Convention 1951, such as the right to gainful employment and social security, are limited to refugees who maintain lawful immigration status. If a Convention Refugee is denied a resident visa, the only temporary entry visa a Convention Refugee can apply for in New Zealand is discretionary. The appeal cases heard at the Immigration Protection Tribunal establish that Immigration New Zealand has declined resident and discretionary temporary entry visa applications by Convention Refugees for failing to meet the health or character immigration instructions. The inability of a Convention Refugee to gain residency in New Zealand creates a dependence on the issue of discretionary temporary entry visas to maintain lawful status. The appeal cases record that this reliance has led to Convention Refugees' lawful immigration status being in question, temporarily depriving them of the rights contained in the Refugee Convention 1951 of lawful refugees. In one case, the process of applying for a discretionary temporary entry visa led to a lawful Convention Refugee being temporarily deprived of the right to social security, breaching Article 24 of the Refugee Convention 1951. The judiciary has stated a constant reliance on the issue of discretionary temporary entry visas for Convention Refugees can lead to a breach of New Zealand's international obligations under Article 7 of the International Covenant on Civil and Political Rights. The appeal cases suggest that, despite successful judicial proceedings, at least three persons have been made to rely on the issue of discretionary temporary entry visas potentially indefinitely. The appeal cases establish that a Convention Refugee can be denied a discretionary temporary entry visa and become unlawful. Unlawful status could ultimately breach New Zealand's obligations under Article 33 of the Refugee Convention 1951 as it would procedurally deny Convention Refugees asylum. It would force them to choose between the right of non-refoulement or leaving New Zealand to seek the ability to access all the human rights contained in the Universal Declaration of Human Rights elsewhere. This paper discusses how the current system has given rise to these breaches and emphasizes a need to create a designated temporary entry visa category for Convention Refugees.

Keywords: domestic policy, immigration, migration, New Zealand

Procedia PDF Downloads 91
2607 Temporal and Spacial Adaptation Strategies in Aerodynamic Simulation of Bluff Bodies Using Vortex Particle Methods

Authors: Dario Milani, Guido Morgenthal

Abstract:

Fluid dynamic computation of wind caused forces on bluff bodies e.g light flexible civil structures or high incidence of ground approaching airplane wings, is one of the major criteria governing their design. For such structures a significant dynamic response may result, requiring the usage of small scale devices as guide-vanes in bridge design to control these effects. The focus of this paper is on the numerical simulation of the bluff body problem involving multiscale phenomena induced by small scale devices. One of the solution methods for the CFD simulation that is relatively successful in this class of applications is the Vortex Particle Method (VPM). The method is based on a grid free Lagrangian formulation of the Navier-Stokes equations, where the velocity field is modeled by particles representing local vorticity. These vortices are being convected due to the free stream velocity as well as diffused. This representation yields the main advantages of low numerical diffusion, compact discretization as the vorticity is strongly localized, implicitly accounting for the free-space boundary conditions typical for this class of FSI problems, and a natural representation of the vortex creation process inherent in bluff body flows. When the particle resolution reaches the Kolmogorov dissipation length, the method becomes a Direct Numerical Simulation (DNS). However, it is crucial to note that any solution method aims at balancing the computational cost against the accuracy achievable. In the classical VPM method, if the fluid domain is discretized by Np particles, the computational cost is O(Np2). For the coupled FSI problem of interest, for example large structures such as long-span bridges, the aerodynamic behavior may be influenced or even dominated by small structural details such as barriers, handrails or fairings. For such geometrically complex and dimensionally large structures, resolving the complete domain with the conventional VPM particle discretization might become prohibitively expensive to compute even for moderate numbers of particles. It is possible to reduce this cost either by reducing the number of particles or by controlling its local distribution. It is also possible to increase the accuracy of the solution without increasing substantially the global computational cost by computing a correction of the particle-particle interaction in some regions of interest. In this paper different strategies are presented in order to extend the conventional VPM method to reduce the computational cost whilst resolving the required details of the flow. The methods include temporal sub stepping to increase the accuracy of the particles convection in certain regions as well as dynamically re-discretizing the particle map to locally control the global and the local amount of particles. Finally, these methods will be applied on a test case and the improvements in the efficiency as well as the accuracy of the proposed extension to the method are presented. The important benefits in terms of accuracy and computational cost of the combination of these methods will be thus presented as long as their relevant applications.

Keywords: adaptation, fluid dynamic, remeshing, substepping, vortex particle method

Procedia PDF Downloads 256
2606 Students’ Perceptions of Communication Design in Media: Case Study of Portuguese and Spanish Communication Students

Authors: Fátima Gonçalves, Joaquim Brigas, Jorge Gonçalves

Abstract:

The proliferation of mobile devices in society enables the media to disseminate information and knowledge more rapidly. Higher education students access these contents and share them with each other, in the most diverse platforms, allowing the ubiquity in access to information. This article presents the results and respective quantitative analysis of a survey applied to communication students of two higher education institutions: one in Portugal and another in Spain. The results show that, in this sample, higher education students regularly access news content believing traditional news sources to be more credible. Regarding online sources, it was verified that the access was mostly to free news contents. This study intends to promote the knowledge about the changes that occur in the relationship of higher education students with the media, characterizing how news consumption is processed by these students, considering the resulting effects of the digital media evolution. It is intended to present not only the news sources they use, but also to know some of their habits and relationship with the news media.

Keywords: students' perceptions, communication design, mass media, higher education, digital media

Procedia PDF Downloads 239
2605 ISIS Women Recruitment in Spain and De-Radicalization Programs in Prisons

Authors: Inmaculada Yuste Martinez

Abstract:

Since July 5, 2014, Abubaker al Bagdadi, leader of the Islamic State since 2010 climbed the pulpit of the Great Mosque of Al Nuri of Mosul and proclaimed the Caliphate, the number of fighters who have travelled to Syria to join the Caliphate has increased as never before. Although it is true that the phenomenon of foreign fighters is not a new phenomenon, as it occurred after the Spanish Civil War, Republicans from Ireland and the conflict of the Balkans among others, it is highly relevant the fact that in this case, it has reached figures unknown in Europe until now. The approval of the resolution 2178 (2014) of the Security Council, foreign terrorist fighters placed the subject a priority position on the International agenda. The available data allow us to affirm that women have increasingly assumed operative functions in jihadist terrorism and in the activities linked to it in the development of attacks in the European Union, including minors and young adults. In the case of Spain, one in four of the detainees in 2016 were women, a significant increase compared to 2015. This contrasts with the fact that until 2014 no woman had been prosecuted in Spain for terrorist activities of a jihadist nature. It is fundamental when we talk about the prevention of radicalization and counterterrorism that we do not underestimate the potential threat to the security of countries like Spain that women from the West can assume to the global jihadist movement. This work aims to deepen the radicalization processes of these women and their profiles influencing the female inmate population. It also wants to focus on the importance of creating de-radicalization programs for these inmates since women are a crucial element in radicalization processes. A special focus it is made on young radicalized female inmate population as this target group is the most recoverable and on which it would result more fruitful to intervene. De-radicalization programs must also be designed to fit their profiles and circumstances; a sensitive environment will be prisons and juvenile centers, areas that until now had been unrelated to this problem and which are already hosting the first convicted in judicial offices in Spanish territory. A qualitative research and an empirical and analytical method has been implemented in this work, focused on the cases that took place in Spain of young women and the imaginary that the Islamic State uses for the processes of radicalization for this target group and how it does not fit with their real role in the Jihad, as opposed to other movements in which women do have a real and active role in the armed conflict as YPJ do it as a part of the armed wing of the Democratic Union Party of Syria.

Keywords: caliphate, de-radicalization, foreign fighter, gender perspective, ISIS, jihadism, recruitment

Procedia PDF Downloads 166
2604 Optimal Sizes of Energy Storage for Economic Operation Management

Authors: Rohalla Moghimi, Sirus Mohammadi

Abstract:

Batteries for storage of electricity from solar and wind generation farms are a key element in the success of sustainability. In recent years, due to large integration of Renewable Energy Sources (RESs) like wind turbine and photovoltaic unit into the Micro-Grid (MG), the necessity of Battery Energy Storage (BES) has increased dramatically. The BES has several benefits and advantages in the MG-based applications such as short term power supply, power quality improvement, facilitating integration of RES, ancillary service and arbitrage. This paper presents the cost-based formulation to determine the optimal size of the BES in the operation management of MG. Also, some restrictions, i.e. power capacity of Distributed Generators (DGs), power and energy capacity of BES, charge/discharge efficiency of BES, operating reserve and load demand satisfaction should be considered as well. In this paper, a methodology is proposed for the optimal allocation and economic analysis of ESS in MGs on the basis of net present value (NPV). As the optimal operation of an MG strongly depends on the arrangement and allocation of its ESS, economic operation strategies and optimal allocation methods of the ESS devices are required for the MG.

Keywords: microgrid, energy storage system, optimal sizing, net present value

Procedia PDF Downloads 552
2603 Affective Adaptation Design for Better Gaming Experiences

Authors: Ollie Hall, Salma ElSayed

Abstract:

Affective adaptation is a novel way for game designers to add an extra layer of engagement to their productions. When player’s emotions factor in game design, endless possibilities for creative gameplay emerge. Whilst gaining popularity, existing affective game research mostly runs controlled experiments carried in restrictive settings and relies on one or more specialist devices for measuring a player’s emotional state. These conditions, albeit effective, are not necessarily realistic. Moreover, the simplified narrative and intrusive wearables may not be suitable for the average player. This exploratory study investigates delivering an immersive affective experience in the wild with minimal requirements in an attempt for the average developer to reach the average player. A puzzle game is created with a rich narrative and creative mechanics. It employs both explicit and implicit adaptation and only requires a web camera. Participants played the game on their own machines in various settings. Whilst it was rated feasible, very engaging, and enjoyable, it remains questionable whether a fully immersive experience was delivered due to the limited sample size.

Keywords: affective games, dynamic adaptation, emotion recognition, game design

Procedia PDF Downloads 142
2602 Optimized Approach for Secure Data Sharing in Distributed Database

Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal

Abstract:

In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.

Keywords: ER-schema, electronic record, P2P framework, API, query formulation

Procedia PDF Downloads 327
2601 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment

Authors: Y. Xu, L. Xiong, Z. Xu

Abstract:

In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.

Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing

Procedia PDF Downloads 476
2600 Football Smart Coach: Analyzing Corner Kicks Using Computer Vision

Authors: Arth Bohra, Marwa Mahmoud

Abstract:

In this paper, we utilize computer vision to develop a tool for youth coaches to formulate set-piece tactics for their players. We used the Soccernet database to extract the ResNet features and camera calibration data for over 3000 corner kick across 500 professional matches in the top 6 European leagues (English Premier League, UEFA Champions League, Ligue 1, La Liga, Serie A, Bundesliga). Leveraging the provided homography matrix, we construct a feature vector representing the formation of players on these corner kicks. Additionally, labeling the videos manually, we obtained the pass-trajectory of each of the 3000+ corner kicks by segmenting the field into four zones. Next, after determining the localization of the players and ball, we used event data to give the corner kicks a rating on a 1-4 scale. By employing a Convolutional Neural Network, our model managed to predict the success of a corner kick given the formations of players. This suggests that with the right formations, teams can optimize the way they approach corner kicks. By understanding this, we can help coaches formulate set-piece tactics for their own teams in order to maximize the success of their play. The proposed model can be easily extended; our method could be applied to even more game situations, from free kicks to counterattacks. This research project also gives insight into the myriad of possibilities that artificial intelligence possesses in transforming the domain of sports.

Keywords: soccer, corner kicks, AI, computer vision

Procedia PDF Downloads 167
2599 Design, Modeling and Analysis of 2×2 Microstrip Patch Antenna Array System for 5G Applications

Authors: Vinay Kumar K. S., Shravani V., Spoorthi G., Udith K. S., Divya T. M., Venkatesha M.

Abstract:

In this work, the mathematical modeling, design and analysis of a 2×2 microstrip patch antenna array (MSPA) antenna configuration is presented. Array utilizes a tiny strip antenna module with two vertical slots for 5G applications at an operating frequency of 5.3 GHz. The proposed array of antennas where the phased array antenna systems (PAAS) are used ubiquitously everywhere, from defense radar applications to commercial applications like 5G/6G. Microstrip patch antennae with slot arrays for linear polarisation parallel and perpendicular to the axis, respectively, are fed through transverse slots in the side wall of the circular waveguide and fed through longitudinal slots in the small wall of the rectangular waveguide. The microstrip patch antenna is developed using Ansys HFSS (High-Frequency Structure Simulator), this simulation tool. The maximum gain of 6.14 dB is achieved at 5.3 GHz for a single MSPA. For 2×2 array structure, a gain of 7.713 dB at 5.3 GHz is observed. Such antennas find many applications in 5G devices and technology.

Keywords: Ansys HFSS, gain, return loss, slot array, microstrip patch antenna, 5G antenna

Procedia PDF Downloads 105
2598 Proposal of Non-Destructive Inspection Function Based on Internet of Things Technology Using Drone

Authors: Byoungjoon Yu, Jihwan Park, Sujung Sin, Junghyun Im, Minsoo Park, Sehwan Park, Seunghee Park

Abstract:

In this paper, we propose a technology to monitor the soundness of an Internet-based bridge using a non-conductive inspection function. There has been a collapse accident due to the aging of the bridge structure, and it is necessary to prepare for the deterioration of the bridge. The NDT/SHM system for maintenance of existing bridge structures requires a large number of inspection personnel and expensive inspection costs, and access of expensive and large equipment to measurement points is required. Because current drone inspection equipment can only be inspected through camera, it is difficult to inspect inside damage accurately, and the results of an internal damage evaluation are subjective, and it is difficult for non-specialists to recognize the evaluation results. Therefore, it is necessary to develop NDT/SHM techniques for maintenance of new-concept bridge structures that allow for free movement and real-time evaluation of measurement results. This work is financially supported by Korea Ministry of Land, Infrastructure, and Transport (MOLIT) as 'Smart City Master and Doctor Course Grant Program' and a grant (14SCIP-B088624-01) from Construction Technology Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.

Keywords: Structural Health Monitoring, SHM, non-contact sensing, nondestructive testing, NDT, Internet of Things, autonomous self-driving drone

Procedia PDF Downloads 260
2597 Reasons of Change in Security Prices and Price Volatility: An Analysis of the European Carbon Futures Market

Authors: Boulis M. Ibrahim, Iordanis A. Kalaitzoglou

Abstract:

A micro structural pricing model is proposed in which price components account for learning by incorporating changing expectations of the trading intensity and the risk level of incoming trades. An analysis of European carbon futures transactions finds expected trading intensity to increase the information component and decrease the liquidity component of price changes, but at different rates. Among the results, the expected persistence in trading intensity explains the majority of the auto correlations in the level and the conditional volatility of price changes, helps predict hourly patterns in the bid–ask spread and differentiates between the impact of buy versus sell and continuing versus reversing trades.

Keywords: CO2 emission allowances, market microstructure, duration, price discovery

Procedia PDF Downloads 401
2596 The Impact of Artificial Intelligence in the Development of Textile and Fashion Industry

Authors: Basem Kamal Abasakhiroun Farag

Abstract:

Fashion, like many other areas of design, has undergone numerous developments over the centuries. The aim of the article is to recognize and evaluate the importance of advanced technologies in fashion design and to examine how they are transforming the role of contemporary fashion designers by transforming the creative process. It also discusses how contemporary culture is involved in such developments and how it influences fashion design in terms of conceptualization and production. The methodology used is based on examining various examples of the use of technology in fashion design and drawing parallels between what was feasible then and what is feasible today. Comparison of case studies, examples of existing fashion designs and experiences with craft methods; We therefore observe patterns that help us predict the direction of future developments in this area. Discussing the technological elements in fashion design helps us understand the driving force behind the trend. The research presented in the article shows that there is a trend towards significantly increasing interest and progress in the field of fashion technology, leading to the emergence of hybrid artisanal methods. In summary, as fashion technologies advance, their role in clothing production is becoming increasingly important, extending far beyond the humble sewing machine.

Keywords: fashion, identity, such, textiles ambient intelligence, proximity sensors, shape memory materials, sound sensing garments, wearable technology bio textiles, fashion trends, nano textiles, new materials, smart textiles, techno textiles fashion design, functional aesthetics, 3D printing.

Procedia PDF Downloads 54
2595 Fault-Detection and Self-Stabilization Protocol for Wireless Sensor Networks

Authors: Ather Saeed, Arif Khan, Jeffrey Gosper

Abstract:

Sensor devices are prone to errors and sudden node failures, which are difficult to detect in a timely manner when deployed in real-time, hazardous, large-scale harsh environments and in medical emergencies. Therefore, the loss of data can be life-threatening when the sensed phenomenon is not disseminated due to sudden node failure, battery depletion or temporary malfunctioning. We introduce a set of partial differential equations for localizing faults, similar to Green’s and Maxwell’s equations used in Electrostatics and Electromagnetism. We introduce a node organization and clustering scheme for self-stabilizing sensor networks. Green’s theorem is applied to regions where the curve is closed and continuously differentiable to ensure network connectivity. Experimental results show that the proposed GTFD (Green’s Theorem fault-detection and Self-stabilization) protocol not only detects faulty nodes but also accurately generates network stability graphs where urgent intervention is required for dynamically self-stabilizing the network.

Keywords: Green’s Theorem, self-stabilization, fault-localization, RSSI, WSN, clustering

Procedia PDF Downloads 69
2594 Artificially Intelligent Context Aware Personal Computer Assistant (ACPCA)

Authors: Abdul Mannan Akhtar

Abstract:

In this paper a novel concept of a self learning smart personalized computer assistant (ACPCA) is established which is a context aware system. Based on user habits, moods, and other routines/situational reactions the system will manage various services and suggestions at appropriate times including what schedule to follow, what to watch, what software to be used, what should be deleted etc. This system will utilize a hybrid fuzzyNeural model to predict what the user will do next and support his actions. This will be done by establishing fuzzy sets of user activities, choices, preferences etc. and utilizing their combinations to predict his moods and immediate preferences. Various application of context aware systems exist separately e.g. on certain websites for music or multimedia suggestions but a personalized autonomous system that could adapt to user’s personality does not exist at present. Due to the novelty and massiveness of this concept, this paper will primarily focus on the problem establishment, product features and its functionality; however a small mini case is also implemented on MATLAB to demonstrate some of the aspects of ACPCA. The mini case involves prediction of user moods, activity, routine and food preference using a hybrid fuzzy-Neural soft computing technique.

Keywords: context aware systems, APCPCA, soft computing techniques, artificial intelligence, fuzzy logic, neural network, mood detection, face detection, activity detection

Procedia PDF Downloads 460
2593 An Overview of the Risk for HIV/AIDS among Young Women in South Africa: Gender Based Violence

Authors: Shaneil Taylor

Abstract:

Gender-based violence is a reflection of the inequalities that are associated within a society between the men and women that affects the health, dignity, security and autonomy of its victims. There are various determinants that contribute to the health risk of young women who have experienced sexual violence, in countries that have a high prevalence rate for HIV. For instance, in South Africa, where the highest prevalence rate for HIV is among young women, their susceptibility to the virus has been increased by sexual violence and cultural inequalities. Therefore, this study is a review of literature that explores how gender-based violence increases the possibility for HIV/AIDS among young women in South Africa.

Keywords: gender-based violence, HIV/AIDS transmission, risky sexual behavior, young women

Procedia PDF Downloads 523
2592 Maintaining Parenthood: Challenges for Mothers Who Are Victims of Domestic Violence

Authors: Druzhinenko-Silhan Daria, Metz Claire

Abstract:

In this paper, we introduce the findings of the "Conjugal violence: mothers' parenting and court decisions" (VIC-PADEJ) study, focusing on the motherhood experiences of domestic violence victims. Utilizing a longitudinal research protocol that encompassed clinical interviews, projective methods, and various questionnaires, we detail the outcomes derived from seven clinical interviews with mothers alongside a comprehensive analysis. The findings reveal a pronounced decline in security and an imperative need for structuring both social and internal realities. The convergence of these findings indicates that parenting, post-experiencing domestic violence, may become an unattainable task due to the deficiency of internal resources.

Keywords: domestic violence, parenthood, mothers victims, projective methods, longitudinal research, alceste analysis

Procedia PDF Downloads 41
2591 Human Rights Abuse in the Garment Factory in Bekasi Indonesia

Authors: Manotar Tampubolon

Abstract:

Although the Indonesian human rights protection has increased in recent years, but human rights violations still occur in the industrial sector. Crimes against human rights continue to occur and go unnoticed in spite of the government's legislation on human rights, employment law in addition to an international treaty that has been ratified by Indonesia. The increasing number of garment companies in Bekasi, also give rise to increased human rights violations since the government does not have a commitment to protect it. The Indonesian government and industry owners should pay attention to and protect the human rights of workers and treat them accordingly. This paper will review the human rights violations experienced by workers at garment factories in the context of the law, as well as ideas to improve the protection of workers' rights.

Keywords: human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 447
2590 Anomaly Detection with ANN and SVM for Telemedicine Networks

Authors: Edward Guillén, Jeisson Sánchez, Carlos Omar Ramos

Abstract:

In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.

Keywords: anomaly detection, back-propagation neural networks, network intrusion detection systems, support vector machines

Procedia PDF Downloads 351