Search results for: user compliance
2641 Using LTE-Sim in New Hanover Decision Algorithm for 2-Tier Macrocell-Femtocell LTE Network
Authors: Umar D. M., Aminu A. M., Izaddeen K. Y.
Abstract:
Deployments of mini macrocell base stations also referred to as femtocells, improve the quality of service of indoor and outdoor users. Nevertheless, mobility management remains a key issue with regards to their deployment. This paper is leaned towards this issue, with an in-depth focus on the most important aspect of mobility management -handover. In handover management, making a handover decision in the LTE two-tier macrocell femtocell network is a crucial research area. Decision algorithms in this research are classified and comparatively analyzed according to received signal strength, user equipment speed, cost function, and interference. However, it was observed that most of the discussed decision algorithms fail to consider cell selection with hybrid access policy in a single macrocell multiple femtocell scenario, another observation was a majority of these algorithms lack the incorporation of user equipment residence parameter. Not including this parameter boosts the number of unnecessary handover occurrence. To deal with these issues, a sophisticated handover decision algorithm is proposed. The proposed algorithm considers the user’s velocity, received signal strength, residence time, as well as the femtocell base station’s access policy. Simulation results have shown that the proposed algorithm reduces the number of unnecessary handovers when compared to conventional received signal strength-based handover decision algorithm.Keywords: user-equipment, radio signal service, long term evolution, mobility management, handoff
Procedia PDF Downloads 1242640 Outline of a Technique for the Recommendation of Tourism Products in Cuba Using GIS
Authors: Jesse D. Cano, Marlon J. Remedios
Abstract:
Cuban tourism has developed so much in the last 30 years to the point of becoming one of the engines of the Cuban economy. With such a development, Cuban companies opting for e-tourism as a way to publicize their products and attract customers has also grown. Despite this fact, the majority of Cuban tourism-themed websites simply provide information on the different products and services they offer which results in many cases, in the user getting overwhelmed with the amount of information available which results in the user abandoning the search before he can find a product that fits his needs. Customization has been recognized as a critical factor for successful electronic tourism business and the use of recommender systems is the best approach to address the problem of personalization. This paper aims to outline a preliminary technique to obtain predictions about which products a particular user would give a better evaluation; these products would be those which the website would show in the first place. To achieve this, the theoretical elements of the Cuban tourism environment are discussed; recommendation systems and geographic information systems as tools for information representation are also discussed. Finally, for each structural component identified, we define a set of rules that allows obtaining an electronic tourism system that handles the personalization of the service provided effectively.Keywords: geographic information system, technique, tourism products, recommendation
Procedia PDF Downloads 5032639 A Comparative Analysis of the Application and Use of Information and Communication Technologies (ICTS) in Selected Manufacturing Industries for Development in Nigeria
Authors: Kolawole Taiwo Olabode
Abstract:
This is a comparative study of ICTs adoption and use in selected manufacturing industries in for development. This study was carried out 2004 and was repeated 2013 (nine years after) using the same selected manufacturing industries to assess the level, improvement and extent ICT facilities used in these companies. The theory of modernization was explored to explain some developmental issues in this study. The same semi-structured questionnaire and IDI were used to elicit data on the subject matter. About 24.9% of the total workers (1,247) were sampled for this study using quota sampling technique. SPSS was used to analysis the quantitative data. The qualitative data was used to buttress the quantitative data. Findings indicated that Seven-Up Bottling Company and Frigoglass Glass Industry still remained Intensive ICT Users while only Niger Match Nigeria Limited still remained Non-Intensive ICT User while unfortunately, Askar Paint Nigeria Limited has gone liquidated. It is also important to discover that only the Intensive ICT users improved on relevant ICT facilities. The existing problems of ICT adoption and used in these companies remained the same in Niger Match Limited. The study concluded that for a society to be developed, management and government at all levels must do all things necessary to ensure that all existing organisations must be ICT compliance for workers and organisational performance and to enhance nation’s development in order to compete with other companies for global standard or recognition.Keywords: ICT, intensive ICT-users, entrepreneurial, manufacturing industries, industries and development
Procedia PDF Downloads 3022638 Association of Daily Physical Activity with Diabetes Control in Patients with Type II Diabetes
Authors: Chia-Hsun Chang
Abstract:
Background: Combination of drug treatment, dietary management, and regular exercise can effectively control type II diabetes mellitus (T2DM). Performing daily physical activities other than structured exercise is much easier and whether daily physical activities including work, walking, housework, gardening, leisure exercise, or transportation have a similar effect on diabetes control is not well studied.Aims and Objectives: This study aims to determine whether daily physical activity undertaken by patients with T2DM is associated with their diabetes control. Design: A correlation study with prospective design. Methods: Purposive sampling of 206 patients with T2DM was recruited from a medical center in Central Taiwan. The International Physical Activity Questionnaire was used to assess daily levels of physical activities, and the Diabetes Compliance Questionnaire was used to assess medication and dietary compliance. Data of diabetes control (hemoglobin A1c, HbA1c)were followed up every three months for one year after recruitment. Results: In this study, the average age of the participants was 62.5 years (±10.4 years), and the average duration of diabetes since diagnosis was 13.2 years (±7.8), 112 of the participants were women (54.4%) and 94 of the participants were men (45.6%). The mean HbA1c level was 7.8% (±1.4), and 78.2% of the participants presented with unsatisfactory diabetes control. Because the participants were distributed across a wide age range, and their physical health, activity levels, and comorbidities might have varied with age, the participants were divided into two groups: 121 participants who were younger than 65 years (58.7%) and 85 participants who were older than 65 years (41.3%). Both younger (< 65 years) and older (> 65 years) patients with diabetes engaged in more moderate and low levels of physical activity (89.3% and 87%, respectively). Results showed that the levels of daily physical activity were not significantly associated with diabetes control after adjustment for medication and dietary compliance in both groups. Conclusion: Performing daily physical activity is not significantly correlated with diabetes control. Daily physical activity cannot completely replace exercise. Relevance to Clinical Practice: Health personnel must encourage patients to engage in exercise that is planned, structured, and repetitive for improving diabetes control.Keywords: daily physical activity, diabetes control, international physical activity questionnaire (IPAQ), type II diabetes mellitus (T2DM)
Procedia PDF Downloads 1692637 Surgical Team Perceptions of the Surgical Safety Checklist in a Tertiary Hospital in Jordan: A Descriptive Qualitative Study
Authors: Rania Albsoul, Muhammad Ahmed Alshyyab, Baraa Ayed Al Odat, Nermeen Borhan Al Dwekat, Batool Emad Al-masri, Fatima Abdulsattar Alkubaisi, Salsabil Awni Flefil, Majd Hussein Al-Khawaldeh, Ragad Ayman Sa’ed, Maha Waleed Abu Ajamieh, Gerard Fitzgerald
Abstract:
Purpose: The purpose of this paper is to explore the perceptions of operating room staff towards the use of the World Health Organization Surgical Safety Checklist in a tertiary hospital in Jordan. Design/methodology/approach: This was a qualitative descriptive study. Semi-structured interviews were conducted with a purposeful sample of 21 healthcare staff employed in the operating room (nurses, residents, surgeons, and anaesthesiologists). The interviews were conducted in the period from October to December 2021. Thematic analysis was used to analyse the data. Findings: Three main themes emerged from data analysis, namely compliance with the surgical safety checklist, the impact of the surgical safety checklist, and barriers and facilitators to the use of the surgical safety checklist. The use of the checklist was seen as enabling staff to communicate effectively and thus accomplish patient safety and positive outcomes. The perceived barriers to compliance included excessive workload, congestion, and lack of training and awareness. Enhanced training and education were thought to improve the utilization of the surgical safety checklist and help enhance awareness about its importance. Originality/value: While steps to utilize the surgical safety checklist by the operation room personnel may seem simple, the quality of its administration is not necessarily robust. There are several challenges to consistent, complete, and effective administration of the surgical safety checklist by the surgical team members. Healthcare managers must employ interventions to eliminate barriers to and offer facilitators of adherence to the application of the surgical safety checklist, therefore promoting quality healthcare and patient safety.Keywords: patient safety, surgical safety checklist, compliance, utility, operating room, quality healthcare, communication, teamwork
Procedia PDF Downloads 1092636 Environmental, Social and Corporate Governance Reporting With Regard to Best Practices of Companies Listed on the Warsaw Stock Exchange - Selected Problems
Authors: Katarzyna Olejko
Abstract:
The need to redefine the goals and adapt the operational activities carried out in accordance with the concept of sustainable management to these goals results in the increasing importance of information on the company's activities perceived from the perspective of the effectiveness and efficiency of environmental goals implementation. The narrow scope of reporting data on a company's impact on the environment is not adequate to meet the information needs of modern investors. Reporting obligations are therefore imposed on companies in order to increase the effectiveness of corporate governance and to improve the process of assessing the achievement of environmental goals. The non-financial reporting obligations introduced in Polish legislation increased the scope of reported information. However, the lack of detailed guidelines on the method of reporting resulted in a large diversification of the scope of non-financial information, making it impossible to compare the data presented by companies. The source of information regarding the level of the implementation of standards in Environmental, social and corporate governance (ESG) is the report on compliance with best practices published by the Warsaw Stock Exchange. The document Best Practices of Warsaw Stock Exchange (WSE) Listed Companies (2021), amended by the WSE in 2021, includes the rules applicable to this area (ESG). The aim of this article is to present the level of compliance with good practices in the area of ESG by selected companies listed on the Warsaw Stock Exchange The research carried out as part of this study, which was based on information from reports on the compliance with good practices of companies listed on the Warsaw Stock Exchange that was made available in the good practice scanner, have revealed that good practices in the ESG area are implemented by companies to a limited extent. The level of their application in comparison with other rules is definitely lower. The lack of experience and clear guidelines on ESG reporting may cause some confusion, which is why conscious investors and reporting companies themselves are pinning their hopes on the Corporate Sustainability Reporting Directive (CSRD) adopted by European Parliament.Keywords: reporting, ESG, corporate governance, best practices
Procedia PDF Downloads 732635 The Use of Artificial Intelligence in Language Learning and Teaching: A New Frontier in Education
Authors: Abdulaziz Fageeh
Abstract:
This study investigates the integration of artificial intelligence (AI) within the landscape of language learning and teaching, exploring its potential benefits and challenges. Employing a mixed-methods approach, the research draws upon a comprehensive literature review, case studies, user reviews, and in-depth interviews with educators and students. Findings demonstrate that AI tools, including language learning apps and writing assistants, can enhance personalization, improve writing skills, and increase accessibility to language learning resources. However, the study also highlights concerns regarding over-reliance on AI, potential accuracy and reliability issues, and ethical implications such as data privacy and potential bias. User and educator perspectives emphasize the importance of balancing AI with traditional teaching methods, fostering critical thinking skills, and addressing potential misuse. The study concludes by underscoring the need for ongoing research and development to ensure responsible AI integration in language learning, focusing on pedagogical strategies, ethical frameworks, and the long-term impact of AI on learning outcomes.Keywords: artificial intelligence, language learning, education, technology, ethical considerations, user perceptions
Procedia PDF Downloads 152634 Quantifying User-Related, System-Related, and Context-Related Patterns of Smartphone Use
Authors: Andrew T. Hendrickson, Liven De Marez, Marijn Martens, Gytha Muller, Tudor Paisa, Koen Ponnet, Catherine Schweizer, Megan Van Meer, Mariek Vanden Abeele
Abstract:
Quantifying and understanding the myriad ways people use their phones and how that impacts their relationships, cognitive abilities, mental health, and well-being is increasingly important in our phone-centric society. However, most studies on the patterns of phone use have focused on theory-driven tests of specific usage hypotheses using self-report questionnaires or analyses of smaller datasets. In this work we present a series of analyses from a large corpus of over 3000 users that combine data-driven and theory-driven analyses to identify reliable smartphone usage patterns and clusters of similar users. Furthermore, we compare the stability of user clusters across user- and system-initiated sessions, as well as during the hypothesized ritualized behavior times directly before and after sleeping. Our results indicate support for some hypothesized usage patterns but present a more complete and nuanced view of how people use smartphones.Keywords: data mining, experience sampling, smartphone usage, health and well being
Procedia PDF Downloads 1632633 A Rapid Code Acquisition Scheme in OOC-Based CDMA Systems
Authors: Keunhong Chae, Seokho Yoon
Abstract:
We propose a code acquisition scheme called improved multiple-shift (IMS) for optical code division multiple access systems, where the optical orthogonal code is used instead of the pseudo noise code. Although the IMS algorithm has a similar process to that of the conventional MS algorithm, it has a better code acquisition performance than the conventional MS algorithm. We analyze the code acquisition performance of the IMS algorithm and compare the code acquisition performances of the MS and the IMS algorithms in single-user and multi-user environments.Keywords: code acquisition, optical CDMA, optical orthogonal code, serial algorithm
Procedia PDF Downloads 5392632 Indoor Visible Light Communication Channel Characterization for User Mobility: A Use-Case Study
Authors: Pooja Sanathkumar, Srinidhi Murali, Sethuraman TV, Saravanan M, Paventhan Arumugam, Ashwin Ashok
Abstract:
The last decade has witnessed a significant interest in visible light communication (VLC) technology, as VLC can potentially achieve high data rate links and secure communication channels. However, the use of VLC under mobile settings is fundamentally limited as its a line-of-sight (LOS) technology and there has been limited breakthroughs in realizing VLC for mobile settings. In this regard, this work targets to study the VLC channel under mobility. Through a use-case study analysis with experiment data traces this paper presents an empirical VLC channel study considering the application of VLC for smart lighting in an indoor room environment. This paper contributes a calibration study of a prototype VLC smart lighting system in an indoor environment and through the inferences gained from the calibration, and considering a user is carrying a mobile device fit with a VLC receiver, this work presents recommendations for user's position adjustments, with the goal to ensure maximum connectivity across the room.Keywords: visible light communication, mobility, empirical study, channel characterization
Procedia PDF Downloads 1262631 Value in Exchange: The Importance of Users Interaction as the Center of User Experiences
Authors: Ramlan Jantan, Norfadilah Kamaruddin, Shahriman Zainal Abidin
Abstract:
In this era of technology, the co-creation method has become a new development trend. In this light, most design businesses have currently transformed their development strategy from being goods-dominant into service-dominant where more attention is given to the end-users and their roles in the development process. As a result, the conventional development process has been replaced with a more cooperative one. Consequently, numerous studies have been conducted to explore the extension of co-creation method in the design development process and most studies have focused on issues found during the production process. In the meantime, this study aims to investigate potential values established during the pre-production process, which is also known as the ‘circumstances value creation’. User involvement is questioned and crucially debate at the entry level of pre-production process in value in-exchange jointly spheres; thus user experiences took place. Thus, this paper proposed a potential framework of the co-creation method for Malaysian interactive product development. The framework is formulated from both parties involved: the users and designers. The framework will clearly give an explanation of the value of the co-creation method, and it could assist relevant design industries/companies in developing a blueprint for the design process. This paper further contributes to the literature on the co-creation of value and digital ecosystems.Keywords: co-creation method, co-creation framework, co-creation, co-production
Procedia PDF Downloads 1782630 Open Source Cloud Managed Enterprise WiFi
Authors: James Skon, Irina Beshentseva, Michelle Polak
Abstract:
Wifi solutions come in two major classes. Small Office/Home Office (SOHO) WiFi, characterized by inexpensive WiFi routers, with one or two service set identifiers (SSIDs), and a single shared passphrase. These access points provide no significant user management or monitoring, and no aggregation of monitoring and control for multiple routers. The other solution class is managed enterprise WiFi solutions, which involve expensive Access Points (APs), along with (also costly) local or cloud based management components. These solutions typically provide portal based login, per user virtual local area networks (VLANs), and sophisticated monitoring and control across a large group of APs. The cost for deploying and managing such managed enterprise solutions is typically about 10 fold that of inexpensive consumer APs. Low revenue organizations, such as schools, non-profits, non-government organizations (NGO's), small businesses, and even homes cannot easily afford quality enterprise WiFi solutions, though they may need to provide quality WiFi access to their population. Using available lower cost Wifi solutions can significantly reduce their ability to provide reliable, secure network access. This project explored and created a new approach for providing secured managed enterprise WiFi based on low cost hardware combined with both new and existing (but modified) open source software. The solution provides a cloud based management interface which allows organizations to aggregate the configuration and management of small, medium and large WiFi solutions. It utilizes a novel approach for user management, giving each user a unique passphrase. It provides unlimited SSID's across an unlimited number of WiFI zones, and the ability to place each user (and all their devices) on their own VLAN. With proper configuration it can even provide user local services. It also allows for users' usage and quality of service to be monitored, and for users to be added, enabled, and disabled at will. As inferred above, the ultimate goal is to free organizations with limited resources from the expense of a commercial enterprise WiFi, while providing them with most of the qualities of such a more expensive managed solution at a fraction of the cost.Keywords: wifi, enterprise, cloud, managed
Procedia PDF Downloads 972629 User-Awareness from Eye Line Tracing During Specification Writing to Improve Specification Quality
Authors: Yoshinori Wakatake
Abstract:
Many defects after the release of software packages are caused due to omissions of sufficient test items in test specifications. Poor test specifications are detected by manual review, which imposes a high human load. The prevention of omissions depends on the end-user awareness of test specification writers. If test specifications were written while envisioning the behavior of end-users, the number of omissions in test items would be greatly reduced. The paper pays attention to the point that writers who can achieve it differ from those who cannot in not only the description richness but also their gaze information. It proposes a method to estimate the degree of user-awareness of writers through the analysis of their gaze information when writing test specifications. We conduct an experiment to obtain the gaze information of a writer of the test specifications. Test specifications are automatically classified using gaze information. In this method, a Random Forest model is constructed for the classification. The classification is highly accurate. By looking at the explanatory variables which turn out to be important variables, we know behavioral features to distinguish test specifications of high quality from others. It is confirmed they are pupil diameter size and the number and the duration of blinks. The paper also investigates test specifications automatically classified with gaze information to discuss features in their writing ways in each quality level. The proposed method enables us to automatically classify test specifications. It also prevents test item omissions, because it reveals writing features that test specifications of high quality should satisfy.Keywords: blink, eye tracking, gaze information, pupil diameter, quality improvement, specification document, user-awareness
Procedia PDF Downloads 642628 The Integration of Patient Health Record Generated from Wearable and Internet of Things Devices into Health Information Exchanges
Authors: Dalvin D. Hill, Hector M. Castro Garcia
Abstract:
A growing number of individuals utilize wearable devices on a daily basis. The usage and functionality of these wearable devices vary from user to user. One popular usage of said devices is to track health-related activities that are typically stored on a device’s memory or uploaded to an account in the cloud; based on the current trend, the data accumulated from the wearable device are stored in a standalone location. In many of these cases, this health related datum is not a factor when considering the holistic view of a user’s health lifestyle or record. This health-related data generated from wearable and Internet of Things (IoT) devices can serve as empirical information to a medical provider, as the standalone data can add value to the holistic health record of a patient. This paper proposes a solution to incorporate the data gathered from these wearable and IoT devices, with that a patient’s Personal Health Record (PHR) stored within the confines of a Health Information Exchange (HIE).Keywords: electronic health record, health information exchanges, internet of things, personal health records, wearable devices, wearables
Procedia PDF Downloads 1282627 User-Perceived Quality Factors for Certification Model of Web-Based System
Authors: Jamaiah H. Yahaya, Aziz Deraman, Abdul Razak Hamdan, Yusmadi Yah Jusoh
Abstract:
One of the most essential issues in software products is to maintain it relevancy to the dynamics of the user’s requirements and expectation. Many studies have been carried out in quality aspect of software products to overcome these problems. Previous software quality assessment models and metrics have been introduced with strengths and limitations. In order to enhance the assurance and buoyancy of the software products, certification models have been introduced and developed. From our previous experiences in certification exercises and case studies collaborating with several agencies in Malaysia, the requirements for user based software certification approach is identified and demanded. The emergence of social network applications, the new development approach such as agile method and other varieties of software in the market have led to the domination of users over the software. As software become more accessible to the public through internet applications, users are becoming more critical in the quality of the services provided by the software. There are several categories of users in web-based systems with different interests and perspectives. The classifications and metrics are identified through brain storming approach with includes researchers, users and experts in this area. The new paradigm in software quality assessment is the main focus in our research. This paper discusses the classifications of users in web-based software system assessment and their associated factors and metrics for quality measurement. The quality model is derived based on IEEE structure and FCM model. The developments are beneficial and valuable to overcome the constraints and improve the application of software certification model in future.Keywords: software certification model, user centric approach, software quality factors, metrics and measurements, web-based system
Procedia PDF Downloads 4052626 Distributed Cost-Based Scheduling in Cloud Computing Environment
Authors: Rupali, Anil Kumar Jaiswal
Abstract:
Cloud computing can be defined as one of the prominent technologies that lets a user change, configure and access the services online. it can be said that this is a prototype of computing that helps in saving cost and time of a user practically the use of cloud computing can be found in various fields like education, health, banking etc. Cloud computing is an internet dependent technology thus it is the major responsibility of Cloud Service Providers(CSPs) to care of data stored by user at data centers. Scheduling in cloud computing environment plays a vital role as to achieve maximum utilization and user satisfaction cloud providers need to schedule resources effectively. Job scheduling for cloud computing is analyzed in the following work. To complete, recreate the task calculation, and conveyed scheduling methods CloudSim3.0.3 is utilized. This research work discusses the job scheduling for circulated processing condition also by exploring on this issue we find it works with minimum time and less cost. In this work two load balancing techniques have been employed: ‘Throttled stack adjustment policy’ and ‘Active VM load balancing policy’ with two brokerage services ‘Advanced Response Time’ and ‘Reconfigure Dynamically’ to evaluate the VM_Cost, DC_Cost, Response Time, and Data Processing Time. The proposed techniques are compared with Round Robin scheduling policy.Keywords: physical machines, virtual machines, support for repetition, self-healing, highly scalable programming model
Procedia PDF Downloads 1682625 Development of a Real-Time Brain-Computer Interface for Interactive Robot Therapy: An Exploration of EEG and EMG Features during Hypnosis
Authors: Maryam Alimardani, Kazuo Hiraki
Abstract:
This study presents a framework for development of a new generation of therapy robots that can interact with users by monitoring their physiological and mental states. Here, we focused on one of the controversial methods of therapy, hypnotherapy. Hypnosis has shown to be useful in treatment of many clinical conditions. But, even for healthy people, it can be used as an effective technique for relaxation or enhancement of memory and concentration. Our aim is to develop a robot that collects information about user’s mental and physical states using electroencephalogram (EEG) and electromyography (EMG) signals and performs costeffective hypnosis at the comfort of user’s house. The presented framework consists of three main steps: (1) Find the EEG-correlates of mind state before, during, and after hypnosis and establish a cognitive model for state changes, (2) Develop a system that can track the changes in EEG and EMG activities in real time and determines if the user is ready for suggestion, and (3) Implement our system in a humanoid robot that will talk and conduct hypnosis on users based on their mental states. This paper presents a pilot study in regard to the first stage, detection of EEG and EMG features during hypnosis.Keywords: hypnosis, EEG, robotherapy, brain-computer interface (BCI)
Procedia PDF Downloads 2562624 Short Text Classification for Saudi Tweets
Authors: Asma A. Alsufyani, Maram A. Alharthi, Maha J. Althobaiti, Manal S. Alharthi, Huda Rizq
Abstract:
Twitter is one of the most popular microblogging sites that allows users to publish short text messages called 'tweets'. Increasing the number of accounts to follow (followings) increases the number of tweets that will be displayed from different topics in an unclassified manner in the timeline of the user. Therefore, it can be a vital solution for many Twitter users to have their tweets in a timeline classified into general categories to save the user’s time and to provide easy and quick access to tweets based on topics. In this paper, we developed a classifier for timeline tweets trained on a dataset consisting of 3600 tweets in total, which were collected from Saudi Twitter and annotated manually. We experimented with the well-known Bag-of-Words approach to text classification, and we used support vector machines (SVM) in the training process. The trained classifier performed well on a test dataset, with an average F1-measure equal to 92.3%. The classifier has been integrated into an application, which practically proved the classifier’s ability to classify timeline tweets of the user.Keywords: corpus creation, feature extraction, machine learning, short text classification, social media, support vector machine, Twitter
Procedia PDF Downloads 1552623 Compass Bar: A Visualization Technique for Out-of-View-Objects in Head-Mounted Displays
Authors: Alessandro Evangelista, Vito M. Manghisi, Michele Gattullo, Enricoandrea Laviola
Abstract:
In this work, we propose a custom visualization technique for Out-Of-View-Objects in Virtual and Augmented Reality applications using Head Mounted Displays. In the last two decades, Augmented Reality (AR) and Virtual Reality (VR) technologies experienced a remarkable growth of applications for navigation, interaction, and collaboration in different types of environments, real or virtual. Both environments can be potentially very complex, as they can include many virtual objects located in different places. Given the natural limitation of the human Field of View (about 210° horizontal and 150° vertical), humans cannot perceive objects outside this angular range. Moreover, despite recent technological advances in AR e VR Head-Mounted Displays (HMDs), these devices still suffer from a limited Field of View, especially regarding Optical See-Through displays, thus greatly amplifying the challenge of visualizing out-of-view objects. This problem is not negligible when the user needs to be aware of the number and the position of the out-of-view objects in the environment. For instance, during a maintenance operation on a construction site where virtual objects serve to improve the dangers' awareness. Providing such information can enhance the comprehension of the scene, enable fast navigation and focused search, and improve users' safety. In our research, we investigated how to represent out-of-view-objects in HMD User Interfaces (UI). Inspired by commercial video games such as Call of Duty Modern Warfare, we designed a customized Compass. By exploiting the Unity 3D graphics engine, we implemented our custom solution that can be used both in AR and VR environments. The Compass Bar consists of a graduated bar (in degrees) at the top center of the UI. The values of the bar range from -180 (far left) to +180 (far right), the zero is placed in front of the user. Two vertical lines on the bar show the amplitude of the user's field of view. Every virtual object within the scene is represented onto the compass bar as a specific color-coded proxy icon (a circular ring with a colored dot at its center). To provide the user with information about the distance, we implemented a specific algorithm that increases the size of the inner dot as the user approaches the virtual object (i.e., when the user reaches the object, the dot fills the ring). This visualization technique for out-of-view objects has some advantages. It allows users to be quickly aware of the number and the position of the virtual objects in the environment. For instance, if the compass bar displays the proxy icon at about +90, users will immediately know that the virtual object is to their right and so on. Furthermore, by having qualitative information about the distance, users can optimize their speed, thus gaining effectiveness in their work. Given the small size and position of the Compass Bar, our solution also helps lessening the occlusion problem thus increasing user acceptance and engagement. As soon as the lockdown measures will allow, we will carry out user-tests comparing this solution with other state-of-the-art existing ones such as 3D Radar, SidebARs and EyeSee360.Keywords: augmented reality, situation awareness, virtual reality, visualization design
Procedia PDF Downloads 1272622 Development of a Novel Ankle-Foot Orthotic Using a User Centered Approach for Improved Satisfaction
Authors: Ahlad Neti, Elisa Arch, Martha Hall
Abstract:
Studies have shown that individuals who use Ankle-Foot-Orthoses (AFOs) have a high level of dissatisfaction regarding their current AFOs. Studies point to the focus on technical design with little attention given to the user perspective as a source of AFO designs that leave users dissatisfied. To design a new AFO that satisfies users and thereby improves their quality of life, the reasons for their dissatisfaction and their wants and needs for an improved AFO design must be identified. There has been little research into the user perspective on AFO use and desired improvements, so the relationship between AFO design and satisfaction in daily use must be assessed to develop appropriate metrics and constraints prior to designing a novel AFO. To assess the user perspective on AFO design, structured interviews were conducted with 7 individuals (average age of 64.29±8.81 years) who use AFOs. All interviews were transcribed and coded to identify common themes using Grounded Theory Method in NVivo 12. Qualitative analysis of these results identified sources of user dissatisfaction such as heaviness, bulk, and uncomfortable material and overall needs and wants for an AFO. Beyond the user perspective, certain objective factors must be considered in the construction of metrics and constraints to ensure that the AFO fulfills its medical purpose. These more objective metrics are rooted in a common medical device market and technical standards. Given the large body of research concerning these standards, these objective metrics and constraints were derived through a literature review. Through these two methods, a comprehensive list of metrics and constraints accounting for both the user perspective on AFO design and the AFO’s medical purpose was compiled. These metrics and constraints will establish the framework for designing a new AFO that carries out its medical purpose while also improving the user experience. The metrics can be categorized into several overarching areas for AFO improvement. Categories of user perspective related metrics include comfort, discreteness, aesthetics, ease of use, and compatibility with clothing. Categories of medical purpose related metrics include biomechanical functionality, durability, and affordability. These metrics were used to guide an iterative prototyping process. Six concepts were ideated and compared using system-level analysis. From these six concepts, two concepts – the piano wire model and the segmented model – were selected to move forward into prototyping. Evaluation of non-functional prototypes of the piano wire and segmented models determined that the piano wire model better fulfilled the metrics by offering increased stability, longer durability, fewer points for failure, and a strong enough core component to allow a sock to cover over the AFO while maintaining the overall structure. As such, the piano wire AFO has moved forward into the functional prototyping phase, and healthy subject testing is being designed and recruited to conduct design validation and verification.Keywords: ankle-foot orthotic, assistive technology, human centered design, medical devices
Procedia PDF Downloads 1562621 Increasing Abundance of Jellyfish in the Shorelines of Bangladesh: Analyzing the Policy Framework for Facing the Challenges
Authors: Md Mizanur Rahman, M. Aslam Alam, Muhammad Abu Yusuf
Abstract:
The abundance of Jellyfish across the coasts of the Bay of Bengal is increasing sharply due to marine pollution, increased sea acidification and climate change. Jellyfish draws our attention to address the local and global stressors. This also indicates that something wrong is happening in this bay behind the scenes. This study aimed to investigate how the policy framework governing the sea can be reformed. To do so, this study evaluated the existing policy, regulatory and institutional framework. Empirical data were collected from the middle coastal zone of Bangladesh. The secondary literature on policy, legal documents, and institutional arrangements were reviewed. The causes of poor coordination among different public sectors and non-compliance of laws were identified. The key findings show that despite the existing of Department of Environment, poor coordination with other departments, and lack of logistics and technical staffs have resulted in severe marine pollution and degradation of coastal and marine living resources. The existing policies had no monitoring and evaluation mechanisms. Non-compliance of the existing laws has been fueling the problems. This study provides an integrated policy and a guideline for updating the legal and institutional mechanism to manage coastal and marine living resources sustainably in Bangladesh to achieve Sustainable Development Goal 14.Keywords: legal, institutional, framework, jellyfish
Procedia PDF Downloads 1252620 Design and Implementation of Remote Application Virtualization in Cloud Environments
Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang
Abstract:
Cloud computing is a paradigm of computing that shifts the way computing has been done in the past. The users can use cloud resources such as application software or storage space from the cloud without needing to own them. This paper is focused on solutions that are anticipated to introduce IaaS idea to build cloud base services and enable the individual remote user's applications in cloud environments, which appear as if they are running on the end user's local computer. The available features of application delivery solution have been developed based on our previous research on the virtualization technology to offer applications independent of location so that the users can work online, offline, anywhere, with appropriate device and at any time. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud service. Users no longer need to burden the system managers and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote application virtualization service represents the next significant step to the mobile workplace, and it lets users access their applications remotely through cloud services anywhere. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.Keywords: cloud computing, IaaS, virtualization, application delivery
Procedia PDF Downloads 2812619 Searchable Encryption in Cloud Storage
Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu
Abstract:
Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption
Procedia PDF Downloads 3832618 Design and Implementation of an Image Based System to Enhance the Security of ATM
Authors: Seyed Nima Tayarani Bathaie
Abstract:
In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.Keywords: face detection algorithm, Haar features, security of ATM
Procedia PDF Downloads 4192617 Stories of Women With Cervical Cancer in Taiwan: A Narrative Analysis Research
Authors: Pei-Yu Lee
Abstract:
This study investigates the life experience and self-interpretation of female cervical cancer patients under Taiwanese cultural context. Through a Narrative Analysis Research approach, the study took six cervical cancer female patients with an average age of 58 years (ranging from 55-66 years) for an average of twice, 60 minutes each time, in-depth recorded interviews under their consent. After converting the interview recordings into transcripts, the study applied the Riessman approach to analyze the contents. The results revealed two major theme, including 1. The symbolic meaning of the cervix, and 2. Women's perseverance and compliance. Because of the illness metaphor of cervical cancer and the designation of women being family caregivers under the Chinese patriarchal culture, females with cervical cancer are not only patients but also responsible for being family and partner roles, in which contradictions of intimate relationships exist. Show the strength of perseverance and compliance in the course of life. On the other hand, they have to identify and recognize their roles in life and strive to determine the situation of coexisting with the disease to picture their life. The results showed that female cervical cancer patients not only need to combat the disease but also stand against the stigma and the traditional responsibility given to women. The researchers recommend that nurses should include cultural implications in their care of female cervical cancer patients.Keywords: female, cervical cancer, narrative analysis research, taiwan
Procedia PDF Downloads 982616 Health Belief Model to Predict Sharps Injuries among Health Care Workers at First Level Care Facilities in Rural Pakistan
Authors: Mohammad Tahir Yousafzai, Amna Rehana Siddiqui, Naveed Zafar Janjua
Abstract:
We assessed the frequency and predictors of sharp injuries (SIs) among health care workers (HCWs) at first level care facilities (FLCF) in rural Pakistan. HCWs working at public clinic (PC), privately owned licensed practitioners’ clinic (LPC) and non-licensed practitioners’ clinic (NLC) were interviewed on universal precautions (UPs) and constructs of health belief model (HBM) to assess their association with SIs through negative-binomial regression. From 365 clinics, 485 HCWs were interviewed. Overall annual rate of Sis was 192/100 HCWs/year; 78/100 HCWs among licensed prescribers, 191/100 HCWs among non-licensed prescribers, 248/100 HCWs among qualified assistants, and 321/100 HCWs among non-qualified assistants. Increasing knowledge score about bloodborne pathogens (BBPs) transmission (rate-ratio (RR): 0.93; 95%CI: 0.89–0.96), fewer years of work experience, being a non-licensed prescriber (RR: 2.02; 95%CI: 1.36–2.98) licensed (RR: 2.86; 9%CI: 1.81–4.51) or non-licensed assistant (RR: 2.78; 95%CI: 1.72–4.47) compared to a licensed prescriber, perceived barriers (RR: 1.06;95%CI: 1.03–1.08), and compliance with UPs scores (RR: 0.93; 95%CI: 0.87–0.97) were significant predictors of SIs. Improved knowledge about BBPs, compliance with UPs and reduced barriers to follow UPs could reduce SIs to HCWs.Keywords: health belief model, sharp injuries, needle stick injuries, healthcare workers
Procedia PDF Downloads 3102615 Storage Tank Overfill Protection in Compliance with Functional Safety Standard: IEC 61511
Authors: Hassan Alsada
Abstract:
Tank overfill accidents are major concerns for industries handling large volumes of hydrocarbons. Buncefield, Jaipur, Puerto Rico, and West Virginia are just a few accidents with catastrophic consequences. Thus, it is very important for any industry to take the right safety measures for overfill prevention. Moreover, one of the main causative factors in the overfill accidents was inadequate risk analysis and, subsequently, inadequate design. This study aims to provide a full assessment in accordance with the Functional safety standard: “IEC 615 11 – Safety instrumented systems for the process industry” to the tank overfill scenario according to the standard’s Safety Life Cycle (SLC), which includes: the analysis phase, the implementation phase, and the operation phase. The paper discusses in depth the tank overfills Independent Protection Layers (IPLs) with systematic analysis to avoid the safety risks of under-design and the financial risk of facility overdesign. The result shows a clear and systematic assessment in compliance with the standards that can help to assist existing tank overfilling setup or a guide to support designing new storage facilities overfill protection.Keywords: IEC 61511, PHA, LOPA, process safety, safety, health, environment, safety instrumented systems, safety instrumented function, functional safety, safety life cycle
Procedia PDF Downloads 902614 Intrinsic Contradictions in Entrepreneurship Development and Self-Development
Authors: Revaz Gvelesiani
Abstract:
The problem of compliance between the state economic policy and entrepreneurial policy of businesses is primarily manifested in the contradictions related to the congruence between entrepreneurship development and self-development strategies. Among various types (financial, monetary, social, etc.) of the state economic policy aiming at the development of entrepreneurship, economic order policy is of special importance. Its goal is to set the framework for both public and private economic activities and achieve coherence between the societal value system and the formation of the economic order framework. Economic order policy, in its turn, involves intrinsic contradiction between the social and the competitive order. Competitive order is oriented on the principle of success, while social order _ on the criteria of need satisfaction, which contradicts, at least partly, to the principles of success. Thus within the economic order policy, on the one hand, the state makes efforts to form social order and expand its frontiers, while, on the other hand, market is determined to establish functioning competitive order and ensure its realization. Locating the adequate spaces for and setting the rational border between the state (social order) and the private (competitive order) activities, represents the phenomenon of the decisive importance from the entrepreneurship development strategy standpoint. In the countries where the above mentioned spaces and borders are “set” correctly, entrepreneurship agents (small, medium-sized and large businesses) achieve great success by means of seizing the respective segments and maintaining the leading positions in the internal, the European and the world markets for a long time. As for the entrepreneurship self-development strategy, above all, it involves: •market identification; •interactions with consumers; •continuous innovations; •competition strategy; •relationships with partners; •new management philosophy, etc. The analysis of compliance between the entrepreneurship strategy and entrepreneurship culture should be the reference point for any kind of internationalization in order to avoid shocks of cultural nature and the economic backwardness. Stabilization can be achieved only when the employee actions reflect the existing culture and the new contents of culture (targeted culture) is turned into the implicit consciousness of the personnel. The future leaders should learn how to manage different cultures. Entrepreneurship can be managed successfully if its strategy and culture are coherent. However, not rarely enterprises (organizations) show various forms of violation of both personal and team actions. If personal and team non-observances appear as the form of influence upon the culture, it will lead to global destruction of the system and structure. This is the entrepreneurship culture pathology that complicates to achieve compliance between the entrepreneurship strategy and entrepreneurship culture. Thus, the intrinsic contradictions of entrepreneurship development and self-development strategies complicate the task of reaching compliance between the state economic policy and the company entrepreneurship policy: on the one hand, there is a contradiction between the social and the competitive order within economic order policy and on the other hand, the contradiction exists between entrepreneurship strategy and entrepreneurship culture within entrepreneurship policy.Keywords: economic order policy, entrepreneurship, development contradictions, self-development contradictions
Procedia PDF Downloads 3282613 Analyse of User Interface Design in Mobile Teaching Apps
Authors: Asma Ashoul
Abstract:
Nowadays, smartphones are playing a major role in our lives, by communicating with family, friends or using them to learn different things in life. Using smartphones to learn and teach today is something common to see in places like schools or colleges. Therefore, thinking about developing an app that teaches Arabic language may help some categories in society to learn a second language. For example, kids under the age of five or older would learn fast by using smartphones. The problem is based on the Arabic language, which is most like to be not used anymore. The developer assumed to develop an app that would help the younger generation on their learning the Arabic language. A research was completed about user interface design to help the developer choose appropriate layouts and designs. Developing the artefact contained different stages. First, analyzing the requirements with the client, which is needed to be developed. Secondly, designing the user interface design based on the literature review. Thirdly, developing and testing the application after it is completed contacting all the tools that have been used. Lastly, evaluation and future recommendation, which contained the overall view about the application followed by the client’s feedback. Gathering the requirements after having client meetings based on the interface design. The project was done following an agile development methodology. Therefore, this methodology helped the developer to manage to finish the work on time.Keywords: developer, application, interface design, layout, Agile, client
Procedia PDF Downloads 1152612 Compliance Of Dialysis patients With Nutrition Guidelines: Insights From A Questionnaire
Authors: Zeiler M., Stadler D., Schmaderer C.
Abstract:
Over the years of dialysis treatment, most patients experience significant weight loss. The primary emphasis in earlier research was the underlying mechanism of protein energy wasting and the subsequent malnutrition inflammation syndrome. In the interest to provide an effective and rapid solution for the patients, the aim of this study is identifying individual influences of their assumed reduced dietary intake, such as nausea, appetite loss and taste changes, and to determine whether the patients adhere to their nutrition guidelines. A prospective, controlled study with 38 end-stage renal disease patients was performed using a questionnaire to reflect their diet within the last 12 months. Thereby, the daily intake for the most important macro-and micronutrients was calculated to be compared with the individual KDQOI-guideline value, as well as controls matched in age and gender. The majority of the study population did not report symptoms commonly associated with dialysis, such as nausea or inappetence, and denied any change in dietary behavior since receiving renal replacement therapy. The patients’ daily intake of energy (3080kcal ± 1266) and protein (89,9g [53,4-142,0]) did not differ significantly from the controls (energy intake: 3233kcal ± 1046, p=0,597; protein intake: 103,7g [90,1-125,5], p=0,120). The average difference to the individual calculated KDQOI-guideline was +176,0kcal ± 1156 (p=0,357) for energy intake and -1,75g ± 45,9 (p=0,491) for protein intake. However, there was an observed imbalance in the distribution of macronutrients, with a preference for fats over proteins. The patients’ daily intake of sodium (5,4g [ 2,95-10,1]) was higher than in the controls (4,1g [2,04-5,99], p= 0,058) whereas both values for potassium (3,7g ± 1,84) and phosphorous (1,79g ± 0,91) went significantly below the controls’ values (potassium intake: 4,89g ± 1,74, p=0,014; phosphorous intake: 2,04g ± 0,64, p=0,038). Thus, the values exceeded the calculated KDQOI-recommendation by + 3,3g [0,63-7,90] (p<0,001) for sodium, +1,49g ± 1,84 (p<0,001) for potassium and +0,89g ± 0,91 (p<0,001) for phosphorous. Contrary to the assumption, the patients did not under-eat. Nevertheless, their diets did not align with the recommended values. These findings highlight the need for intervention and education among patients and that regular dietary monitoring could prevent unhealthy nutrition habits. The elaboration of individual references instead of standardized guidelines could increase the compliance to the advised diet so that interdisciplinary comorbidities do not develop or worsen.Keywords: compliance, dialysis, end-stage renal disease, KDQOI, malnutrition, nutrition guidelines, questionnaire, salt intake
Procedia PDF Downloads 68