Search results for: information technology program
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19390

Search results for: information technology program

15460 A Conceptual Framework for Integrating Musical Instrument Digital Interface Composition in the Music Classroom

Authors: Aditi Kashi

Abstract:

While educational technologies have taken great strides, especially in Musical Instrument Digital Interface (MIDI) composition, teachers across the world are still adjusting to incorporate such technology into their curricula. While using MIDI in the classroom has become more common, limited class time and a strong focus on performance have made composition a lesser priority. The balance between music theory, performance time, and composition learning is delicate and difficult to maintain for many music educators. This makes including MIDI in the classroom. To address this issue, this paper aims to outline a general conceptual framework centered around a key element of music theory to integrate MIDI composition into the music classroom to not only introduce students to digital composition but also enhance their understanding of music theory and its applicability.

Keywords: educational framework, education technology, MIDI, music education

Procedia PDF Downloads 86
15459 The Role of Social Media in Growing Small and Medium Enterprises: An Empirical Study in Jordan

Authors: Hanady Al-Zagheer

Abstract:

The purpose of this paper research is to introduce the role of the social media (face book) in growing small and medium enterprises in Jordan, Today’s developments of information technologies are dazzling. Using information technologies results in having advantages in competition, decreasing costs, gaining time, and getting and sharing information. Now it is possible to state that there are different types of usage within the information technologies. Small and medium enterprises have been grown rapidly in recent years and continue to grow. Jordanian females have played a large role in the growth of entrepreneurship and have made an impact on household economics. Virtual storefronts have allowed these women to balance roles assigned by tradition and culture while becoming successful providers. If you have a small business with a limited public relations and advertising budget, Facebook can be a cost effective way to promote your services because opening an account is free. However, this can work against you if you do not maintain the page. A Face book page without frequent updates can destroy your brand value and image. According to a 2009 Computerworld article by Lisa Hoover, having a Facebook page that looks abandoned is worse than having no page at all. You might need to hire someone or pay an employee to update your business’s Facebook page.

Keywords: social media, social media small, medium enterprises, Jordan

Procedia PDF Downloads 329
15458 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services

Authors: A. Al Drees, A. Alahmari, R. Almuwayshir

Abstract:

The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.

Keywords: e-banking, account aggregation, security, enterprise development

Procedia PDF Downloads 328
15457 Monocular Depth Estimation Benchmarking with Thermal Dataset

Authors: Ali Akyar, Osman Serdar Gedik

Abstract:

Depth estimation is a challenging computer vision task that involves estimating the distance between objects in a scene and the camera. It predicts how far each pixel in the 2D image is from the capturing point. There are some important Monocular Depth Estimation (MDE) studies that are based on Vision Transformers (ViT). We benchmark three major studies. The first work aims to build a simple and powerful foundation model that deals with any images under any condition. The second work proposes a method by mixing multiple datasets during training and a robust training objective. The third work combines generalization performance and state-of-the-art results on specific datasets. Although there are studies with thermal images too, we wanted to benchmark these three non-thermal, state-of-the-art studies with a hybrid image dataset which is taken by Multi-Spectral Dynamic Imaging (MSX) technology. MSX technology produces detailed thermal images by bringing together the thermal and visual spectrums. Using this technology, our dataset images are not blur and poorly detailed as the normal thermal images. On the other hand, they are not taken at the perfect light conditions as RGB images. We compared three methods under test with our thermal dataset which was not done before. Additionally, we propose an image enhancement deep learning model for thermal data. This model helps extract the features required for monocular depth estimation. The experimental results demonstrate that, after using our proposed model, the performance of these three methods under test increased significantly for thermal image depth prediction.

Keywords: monocular depth estimation, thermal dataset, benchmarking, vision transformers

Procedia PDF Downloads 32
15456 Exploring the Effective Learning Strategies for the Adult Learners in India: An Exploratory Study of Malcolm Knowls Principles and Their Use in the Education Policies of India with a Special Focus on the New India Literacy Programme

Authors: Km Tanu

Abstract:

It has been widely accepted that the learning style of adults and children is different, the learning motivation among adults vary, and even their learning preferences cannot be predetermined. In India, where the population is widely diverse and socio-economic and cultural disparities are there, the learning strategies should also be according to their needs and preferences. The present study explores the concept of adult learners in India in order to understand their needs and styles better. The adult learning principles of Malcolm Knowles have been analyzed, and its presence in the different policies and programs has been traced. To what extent these principles and other such concepts would be beneficial for the Indian population and for effective learning strategies, and what contextual understanding is needed, has been argued in the study. Descriptive research methodology, along with content and thematic analyses, has been used for the paper. It has been argued that there are four areas that play crucial roles in making learning effective. These are the learner, the facilitator, the resources and the policy. The prior experiences of the learners, their motivation, the group to which they belong (i.e., the learning styles and the strategies can be varied for the group of farmers and migrant laborers), and their expected outcome play an important role in making any adult education program successful but along with this, the role of facilitator or the educator is also very important as it is not easy to deal with the adult learners, the understanding that the task is not to teach the adult learners but to make them learn and to use their prior knowledge is a task in itself, proper training is needed for that matter. Many times, it has been seen that adult education programs are poorly funded, or even if they are funded, the fund is not utilized well; the unavailability of the resources is one of the reasons for the failure of adult education programs, and if we see these four points as a triangle, at the bottom, there is a policy document. A well-stated and described doable policy document is also equally important.

Keywords: adult education, Indian adult learner, effective learning styles, Malcolm Knowles learning principles, adult education policies and program

Procedia PDF Downloads 66
15455 Integration of the Battery Passport into the eFTI Platform to Improve Digital Data Exchange in the Context of Battery Transport

Authors: Max Plotnikov, Arkadius Schier

Abstract:

To counteract climate change, the European Commission adopted the European Green Deal (EDG) in 2019. Some of the main objectives of the EDG are climate neutrality by 2050, decarbonization, sustainable mobility, and the shift from a linear economy to a circular economy in the European Union. The mobility turnaround envisages, among other things, the switch from classic internal combustion vehicles to electromobility. The aforementioned goals are therefore accompanied by increased demand for lithium-ion batteries (LIBs) and the associated logistics. However, this inevitably gives rise to challenges that need to be addressed. Depending on whether the LIB is transported by road, rail, air, or sea, there are different regulatory frameworks in the European Union that relevant players in the value chain must adhere to. LIBs are classified as Dangerous Goods Class 9, and against this backdrop, there are various restrictions that need to be adhered to when transporting them for various actors. Currently, the exchange of information in the value chain between the various actors is almost entirely paper-based. Especially in the transport of dangerous goods, this often leads to a delay in the transport or to incorrect data. The exchange of information with the authorities is particularly essential in this context. A solution for the digital exchange of information is currently being developed. Electronic freight transport information (eFTI) enables fast and secure exchange of information between the players in the freight transport process. This concept is to be used within the supply chain from 2025. Another initiative that is expected to improve the monitoring of LIB in this context, among other things, is the battery pass. In July 2023, the latest battery regulation was adopted in the Official Journal of the European Union. This battery pass gives different actors static as well as dynamic information about the batteries depending on their access rights. This includes master data such as battery weight or battery category or information on the state of health or the number of negative events that the battery has experienced. The integration of the battery pass with the eFTI platform will be investigated for synergy effects in favor of the actors for battery transport.

Keywords: battery logistics, battery passport, data sharing, eFTI, sustainability

Procedia PDF Downloads 81
15454 Charge Transport of Individual Thermoelectric Bi₂Te₃ Core-Poly(3,4-Ethylenedioxythiophene):Polystyrenesulfonate Shell Nanowires Determined Using Conductive Atomic Force Microscopy and Spectroscopy

Authors: W. Thongkham, K. Sinthiptharakoon, K. Tantisantisom, A. Klamchuen, P. Khanchaitit, K. Jiramitmongkon, C. Lertsatitthanakorn, M. Liangruksa

Abstract:

Due to demands of sustainable energy, thermoelectricity converting waste heat into electrical energy has become one of the intensive fields of worldwide research. However, such harvesting technology has shown low device performance in the temperature range below 150℃. In this work, a hybrid nanowire of inorganic bismuth telluride (Bi₂Te₃) and organic poly(3,4-ethylenedioxythiophene):polystyrenesulfonate (PEDOT:PSS) synthesized using a simple in-situ one-pot synthesis, enhancing efficiency of the nanowire-incorporated PEDOT:PSS-based thermoelectric converter is highlighted. Since the improvement is ascribed to the increased electrical conductivity of the thermoelectric host material, the individual hybrid nanowires are investigated using voltage-dependent conductive atomic force microscopy (CAFM) and spectroscopy (CAFS) considering that the electrical transport measurement can be performed either on insulating or conducting areas of the sample. Correlated with detailed chemical information on the crystalline structure and compositional profile of the nanowire core-shell structure, an electrical transporting pathway through the nanowire and the corresponding electronic-band structure have been determined, in which the native oxide layer on the Bi₂Te₃ surface is not considered, and charge conduction on the topological surface states of Bi₂Te₃ is suggested. Analyzing the core-shell nanowire synthesized using the conventional mixing of as-prepared Bi₂Te₃ nanowire with PEDOT:PSS for comparison, the oxide-removal effect of the in-situ encapsulating polymeric layer is further supported. The finding not only provides a structural information for mechanistic determination of the thermoelectricity, but it also encourages new approach toward more appropriate encapsulation and consequently higher efficiency of the nanowire-based thermoelectric generation.

Keywords: electrical transport measurement, hybrid Bi₂Te₃-PEDOT:PSS nanowire, nanoencapsulation, thermoelectricity, topological insulator

Procedia PDF Downloads 205
15453 Analytical Investigation of Viscous and Non-Viscous Fluid Particles in a Restricted Region Using Diffusion Magnetic Resonance Imaging Equation

Authors: Yusuf, S. I., Saba, A., Olaoye, D. O., Ibrahim J. A., Yahaya H. M., Jatto A. O

Abstract:

Nuclear Magnetic Resonance (NMR) technology has been applied in several ways to provide vital information about petro-physical properties of reservoirs. However, due to the need to study the molecular behaviours of particles of the fluids in different restricted media, diffusion magnetic resonance equation is hereby applied in spherical coordinates and solved analytically using the method of separation of variables and solution of Legendre equation by Frobenius method. The viscous fluid considered in this research work is unused oil while the non-viscous fluid is water. The results obtained show that water begins to manifest appreciable change at radial adjustment value of 10 and Magnetization of 2.31191995400015x1014 and relaxes finally at 2.30x1014 at radial adjustment value of 1. On the other hand, unused engine oil begins to manifest its changes at radial adjustment value of 40 and Magnetization of 1.466557018x1014and relaxes finally at 1.48x1014 at radial adjustment value of 5.

Keywords: viscous and non-viscous fluid, restricted medium, relaxation times, coefficient of diffusion

Procedia PDF Downloads 83
15452 Learning, Teaching and Assessing Students’ ESP Skills via Exe and Hot Potatoes Software Programs

Authors: Naira Poghosyan

Abstract:

In knowledge society the content of the studies, the methods used and the requirements for an educator’s professionalism regularly undergo certain changes. It follows that in knowledge society the aim of education is not only to educate professionals for a certain field but also to help students to be aware of cultural values, form human mutual relationship, collaborate, be open, adapt to the new situation, creatively express their ideas, accept responsibility and challenge. In this viewpoint, the development of communicative language competence requires a through coordinated approach to ensure proper comprehension and memorization of subject-specific words starting from high school level. On the other hand, ESP (English for Specific Purposes) teachers and practitioners are increasingly faced with the task of developing and exploiting new ways of assessing their learners’ literacy while learning and teaching ESP. The presentation will highlight the latest achievements in this field. The author will present some practical methodological issues and principles associated with learning, teaching and assessing ESP skills of the learners, using the two software programs of EXE 2.0 and Hot Potatoes 6. On the one hand the author will display the advantages of the two programs as self-learning and self-assessment interactive tools in the course of academic study and professional development of the CLIL learners, on the other hand, she will comprehensively shed light upon some methodological aspects of working out appropriate ways of selection, introduction, consolidation of subject specific materials via EXE 2.0 and Hot Potatoes 6. Then the author will go further to distinguish ESP courses by the general nature of the learners’ specialty identifying three large categories of EST (English for Science and Technology), EBE (English for Business and Economics) and ESS (English for the Social Sciences). The cornerstone of the presentation will be the introduction of the subject titled “The methodology of teaching ESP in non-linguistic institutions”, where a unique case of teaching ESP on Architecture and Construction via EXE 2.0 and Hot Potatoes 6 will be introduced, exemplifying how the introduction, consolidation and assessment can be used as a basis for feedback to the ESP learners in a particular professional field.

Keywords: ESP competences, ESP skill assessment/ self-assessment tool, eXe 2.0 / HotPotatoes software program, ESP teaching strategies and techniques

Procedia PDF Downloads 378
15451 Development of MEMS Based 3-Axis Accelerometer for Hand Movement Monitoring

Authors: Zohra Aziz Ali Manjiyani, Renju Thomas Jacob, Keerthan Kumar

Abstract:

This project develops a hand movement monitoring system, which feeds the data into the computer and gives the 3D image rotation according to the direction of the tilt and hence monitoring the movement of the hand in context to its tilt. Advancement of MEMS Technology has enabled us to get very small and low-cost accelerometer ICs which is based on capacitive principle. Accelerometer based Tilt sensor ADXL335 is used in this paper, based on MEMS technology and the project emphasis on the development of the MEMS-based accelerometer to measure the tilt, interfacing the hardware with the LabVIEW and showing the 3D rotation to the user, which is in his understandable form and tilt data can be saved in the computer. It provides an experience of working on emerging technologies like MEMS and design software like LabVIEW.

Keywords: MEMS accelerometer, tilt sensor ADXL335, LabVIEW simulation, 3D animation

Procedia PDF Downloads 516
15450 Power Reduction of Hall-Effect Sensor by Pulse Width Modulation of Spinning-Current

Authors: Hyungil Chae

Abstract:

This work presents a method to reduce spinning current of a Hall-effect sensor for low-power magnetic sensor applications. Spinning current of a Hall-effect sensor changes the direction of bias current periodically and can separate signals from DC-offset. The bias current is proportional to the sensor sensitivity but also increases the power consumption. To achieve both high sensitivity and low power consumption, the bias current can be pulse-width modulated. When the bias current duration Tb is reduced by a factor of N compared to the spinning current period of Tₛ/2, the total power consumption can be saved by N times. N can be large as long as the Hall-effect sensor settles down within Tb. The proposed scheme is implemented and simulated in a 0.18um CMOS process, and the power saving factor is 9.6 when N is 10. Acknowledgements: This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (20160001360022003, Development of Hall Semi-conductor for Smart Car and Device).

Keywords: chopper stabilization, Hall-effect sensor, pulse width modulation, spinning current

Procedia PDF Downloads 484
15449 Assessment of Obesity Parameters in Terms of Metabolic Age above and below Chronological Age in Adults

Authors: Orkide Donma, Mustafa M. Donma

Abstract:

Chronologic age (CA) of individuals is closely related to obesity and generally affects the magnitude of obesity parameters. On the other hand, close association between basal metabolic rate (BMR) and metabolic age (MA) is also a matter of concern. It is suggested that MA higher than CA is the indicator of the need to improve the metabolic rate. In this study, the aim was to assess some commonly used obesity parameters, such as obesity degree, visceral adiposity, BMR, BMR-to-weight ratio, in several groups with varying differences between MA and CA values. The study comprises adults, whose ages vary between 18 and 79 years. Four groups were constituted. Group 1, 2, 3 and 4 were composed of 55, 33, 76 and 47 adults, respectively. The individuals exhibiting -1, 0 and +1 for their MA-CA values were involved in Group 1, which was considered as the control group. Those, whose MA-CA values varying between -5 and -10 participated in Group 2. Those, whose MAs above their real ages were divided into two groups [Group 3 (MA-CA; from +5 to + 10) and Group 4 (MA-CA; from +11 to + 12)]. Body mass index (BMI) values were calculated. TANITA body composition monitor using bioelectrical impedance analysis technology was used to obtain values for obesity degree, visceral adiposity, BMR and BMR-to-weight ratio. The compiled data were evaluated statistically using a statistical package program; SPSS. Mean ± SD values were determined. Correlation analyses were performed. The statistical significance degree was accepted as p < 0.05. The increase in BMR was positively correlated with obesity degree. MAs and CAs of the groups were 39.9 ± 16.8 vs 39.9 ± 16.7 years for Group 1, 45.0 ± 15.3 vs 51.4 ± 15.7 years for Group 2, 47.2 ± 12.7 vs 40.0 ± 12.7 years for Group 3, and 53.6 ± 14.8 vs 42 ± 14.8 years for Group 4. BMI values of the groups were 24.3 ± 3.6 kg/m2, 23.2 ± 1.7 kg/m2, 30.3 ± 3.8 kg/m2, and 40.1 ± 5.1 kg/m2 for Group 1, 2, 3 and 4, respectively. Values obtained for BMR were 1599 ± 328 kcal in Group 1, 1463 ± 198 kcal in Group 2, 1652 ± 350 kcal in Group 3, and 1890 ± 360 kcal in Group 4. A correlation was observed between BMR and MA-CA values in Group 1. No correlation was detected in other groups. On the other hand, statistically significant correlations between MA-CA values and obesity degree, BMI as well as BMR/weight were found in Group 3 and in Group 4. It was concluded that upon consideration of these findings in terms of MA-CA values, BMR-to-weight ratio was found to be much more useful indicator of the severe increase in obesity development than BMR. Also, the lack of associations between MA and BMR as well as BMR-to-weight ratio emphasize the importance of consideration of MA-CA values rather than MA.

Keywords: basal metabolic rate, basal metabolic rate-to-weight-ratio, chronologic age, metabolic age, obesity degree

Procedia PDF Downloads 97
15448 Business Challenges and Opportunities of Mobile Applications for Equity Trading in India

Authors: Helee Dave

Abstract:

Globalization has helped in the growth and change of the Indian economy to a great extent. The purchasing power of Indians has increased. IT Infrastructure has considerably improved in India. There is an increase in the usage of smartphones. The smartphones facilitate all sorts of work now a day, from getting groceries to planning a tour; it is just one click away. Similar is the case with equity trading. The traders in equity market can now deal with their stocks through mobile applications eliminating the middle man. The traders do not have an option but to open a dematerialization account with the banks which are compulsory enough irrespective of their mode of transaction that is online or offline. Considering that India is a young country having more than 50% of its population below the age of 25 and 65% of its population below the age of 35; this youth is comfortable with the usage of smartphones. The banking industry is also providing a virtual platform supporting equity market industry. Yet equity trading through online applications is at an infant stage. This paper primarily attempts to understand challenges and opportunities faced by equity trading through mobile apps in India.

Keywords: BPO, business process outsourcing, de-materialization account, equity, ITES, information technology enabled services

Procedia PDF Downloads 312
15447 Pandemic-Era WIC Participation in Delaware, U.S.: Participants' Experiences and Challenges

Authors: McKenna Halverson, Allison Karpyn

Abstract:

Introduction: The COVID-19 pandemic posed unprecedented challenges for families with young children in the United States. The Special Supplemental Nutrition Program for Women, Infants, and Children (WIC), a federal nutrition assistance program that provides low-income mothers and young children with access to healthy foods (e.g., infant formula, milk, and peanut butter), mitigated some financial challenges for families. However, the U.S. experienced a national infant formula shortage and rising inflation rates during the pandemic, which likely impacted WIC participants’ shopping experiences and well-being. As such, this study aimed to characterize how the COVID-19 pandemic and related events impacted Delaware WIC participants’ in-store benefit redemption experiences and overall well-being. Method: The authors conducted semi-structured interviews with 51 WIC participants in Wilmington, Delaware. Survey measures included demographic questions and open-ended questions regarding participants’ experiences with WIC benefit redemption during the COVID-19 pandemic. Data were analyzed using a hybrid inductive and deductive coding approach. Findings: The COVID-19 pandemic significantly impacted WIC participants’ shopping experiences and well-being. Specifically, participants were forced to alter their shopping behaviors to account for rising food prices (e.g., used coupons, bought less food, used food banks). Additionally, WIC participants experienced significant distress during the national infant formula shortage resulting from difficulty finding formula to feed their children. Participants also struggled with in-store benefit redemption due to inconsistencies in shelf labelling, the WIC app, and low stock of WIC foods. These findings highlight the need to reexamine WIC operations and emergency food response policy in the United States during times of crisis to optimize public health and ensure federal nutrition assistance programs meeting the needs of low-income families with young children.

Keywords: benefit redemption, COVID-19 pandemic, infant formula shortage, inflation, shopping, WIC

Procedia PDF Downloads 75
15446 Catastrophic Health Expenditures: Evaluating the Effectiveness of Nepal's National Health Insurance Program Using Propensity Score Matching and Doubly Robust Methodology

Authors: Simrin Kafle, Ulrika Enemark

Abstract:

Catastrophic health expenditure (CHE) is a critical issue in low- and middle-income countries like Nepal, exacerbating financial hardship among vulnerable households. This study assesses the effectiveness of Nepal’s National Health Insurance Program (NHIP), launched in 2015, to reduce out-of-pocket (OOP) healthcare costs and mitigate CHE. Conducted in Pokhara Metropolitan City, the study used an analytical cross-sectional design, sampling 1276 households through a two-stage random sampling method. Data was collected via face-to-face interviews between May and October 2023. The analysis was conducted using SPSS version 29, incorporating propensity score matching to minimize biases and create comparable groups of enrolled and non-enrolled households in the NHIP. PSM helped reduce confounding effects by matching households with similar baseline characteristics. Additionally, a doubly robust methodology was employed, combining propensity score adjustment with regression modeling to enhance the reliability of the results. This comprehensive approach ensured a more accurate estimation of the impact of NHIP enrollment on CHE. Among the 1276 samples, 534 households (41.8%) were enrolled in NHIP. Of them, 84.3% of households renewed their insurance card, though some cited long waiting times, lack of medications, and complex procedures as barriers to renewal. Approximately 57.3% of households reported known diseases before enrollment, with 49.8% attending routine health check-ups in the past year. The primary motivation for enrollment was encouragement from insurance employees (50.2%). The data indicates that 12.5% of enrolled households experienced CHE versus 7.5% among non-enrolled. Enrollment into NHIP does not contribute to lower CHE (AOR: 1.98, 95% CI: 1.21-3.24). Key factors associated with increased CHE risk were presence of non-communicable diseases (NCDs) (AOR: 3.94, 95% CI: 2.10-7.39), acute illnesses/injuries (AOR: 6.70, 95% CI: 3.97-11.30), larger household size (AOR: 3.09, 95% CI: 1.81-5.28), and households below the poverty line (AOR: 5.82, 95% CI: 3.05-11.09). Other factors such as gender, education level, caste/ethnicity, presence of elderly members, and under-five children also showed varying associations with CHE, though not all were statistically significant. The study concludes that enrollment in the NHIP does not significantly reduce the risk of CHE. The reason for this could be inadequate coverage, where high-cost medicines, treatments, and transportation costs are not fully included in the insurance package, leading to significant out-of-pocket expenses. We also considered the long waiting time, lack of medicines, and complex procedures for the utilization of NHIP benefits, which might result in the underuse of covered services. Finally, gaps in enrollment and retention might leave certain households vulnerable to CHE despite the existence of NHIP. Key factors contributing to increased CHE include NCDs, acute illnesses, larger household sizes, and poverty. To improve the program’s effectiveness, it is recommended that NHIP benefits and coverage be expanded to better protect against high healthcare costs. Additionally, simplifying the renewal process, addressing long waiting times, and enhancing the availability of services could improve member satisfaction and retention. Targeted financial protection measures should be implemented for high-risk groups, and efforts should be made to increase awareness and encourage routine health check-ups to prevent severe health issues that contribute to CHE.

Keywords: catastrophic health expenditure, effectiveness, national health insurance program, Nepal

Procedia PDF Downloads 25
15445 A Cost Effective Approach to Develop Mid-Size Enterprise Software Adopted the Waterfall Model

Authors: Mohammad Nehal Hasnine, Md Kamrul Hasan Chayon, Md Mobasswer Rahman

Abstract:

Organizational tendencies towards computer-based information processing have been observed noticeably in the third-world countries. Many enterprises are taking major initiatives towards computerized working environment because of massive benefits of computer-based information processing. However, designing and developing information resource management software for small and mid-size enterprises under budget costs and strict deadline is always challenging for software engineers. Therefore, we introduced an approach to design mid-size enterprise software by using the Waterfall model, which is one of the SDLC (Software Development Life Cycles), in a cost effective way. To fulfill research objectives, in this study, we developed mid-sized enterprise software named “BSK Management System” that assists enterprise software clients with information resource management and perform complex organizational tasks. Waterfall model phases have been applied to ensure that all functions, user requirements, strategic goals, and objectives are met. In addition, Rich Picture, Structured English, and Data Dictionary have been implemented and investigated properly in engineering manner. Furthermore, an assessment survey with 20 participants has been conducted to investigate the usability and performance of the proposed software. The survey results indicated that our system featured simple interfaces, easy operation and maintenance, quick processing, and reliable and accurate transactions.

Keywords: end-user application development, enterprise software design, information resource management, usability

Procedia PDF Downloads 438
15444 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 124
15443 Centrality and Patent Impact: Coupled Network Analysis of Artificial Intelligence Patents Based on Co-Cited Scientific Papers

Authors: Xingyu Gao, Qiang Wu, Yuanyuan Liu, Yue Yang

Abstract:

In the era of the knowledge economy, the relationship between scientific knowledge and patents has garnered significant attention. Understanding the intricate interplay between the foundations of science and technological innovation has emerged as a pivotal challenge for both researchers and policymakers. This study establishes a coupled network of artificial intelligence patents based on co-cited scientific papers. Leveraging centrality metrics from network analysis offers a fresh perspective on understanding the influence of information flow and knowledge sharing within the network on patent impact. The study initially obtained patent numbers for 446,890 granted US AI patents from the United States Patent and Trademark Office’s artificial intelligence patent database for the years 2002-2020. Subsequently, specific information regarding these patents was acquired using the Lens patent retrieval platform. Additionally, a search and deduplication process was performed on scientific non-patent references (SNPRs) using the Web of Science database, resulting in the selection of 184,603 patents that cited 37,467 unique SNPRs. Finally, this study constructs a coupled network comprising 59,379 artificial intelligence patents by utilizing scientific papers co-cited in patent backward citations. In this network, nodes represent patents, and if patents reference the same scientific papers, connections are established between them, serving as edges within the network. Nodes and edges collectively constitute the patent coupling network. Structural characteristics such as node degree centrality, betweenness centrality, and closeness centrality are employed to assess the scientific connections between patents, while citation count is utilized as a quantitative metric for patent influence. Finally, a negative binomial model is employed to test the nonlinear relationship between these network structural features and patent influence. The research findings indicate that network structural features such as node degree centrality, betweenness centrality, and closeness centrality exhibit inverted U-shaped relationships with patent influence. Specifically, as these centrality metrics increase, patent influence initially shows an upward trend, but once these features reach a certain threshold, patent influence starts to decline. This discovery suggests that moderate network centrality is beneficial for enhancing patent influence, while excessively high centrality may have a detrimental effect on patent influence. This finding offers crucial insights for policymakers, emphasizing the importance of encouraging moderate knowledge flow and sharing to promote innovation when formulating technology policies. It suggests that in certain situations, data sharing and integration can contribute to innovation. Consequently, policymakers can take measures to promote data-sharing policies, such as open data initiatives, to facilitate the flow of knowledge and the generation of innovation. Additionally, governments and relevant agencies can achieve broader knowledge dissemination by supporting collaborative research projects, adjusting intellectual property policies to enhance flexibility, or nurturing technology entrepreneurship ecosystems.

Keywords: centrality, patent coupling network, patent influence, social network analysis

Procedia PDF Downloads 54
15442 A Comparative Study between Different Techniques of Off-Page and On-Page Search Engine Optimization

Authors: Ahmed Ishtiaq, Maeeda Khalid, Umair Sajjad

Abstract:

In the fast-moving world, information is the key to success. If information is easily available, then it makes work easy. The Internet is the biggest collection and source of information nowadays, and with every single day, the data on internet increases, and it becomes difficult to find required data. Everyone wants to make his/her website at the top of search results. This can be possible when you have applied some techniques of SEO inside your application or outside your application, which are two types of SEO, onsite and offsite SEO. SEO is an abbreviation of Search Engine Optimization, and it is a set of techniques, methods to increase users of a website on World Wide Web or to rank up your website in search engine indexing. In this paper, we have compared different techniques of Onpage and Offpage SEO, and we have suggested many things that should be changed inside webpage, outside web page and mentioned some most powerful and search engine considerable elements and techniques in both types of SEO in order to gain high ranking on Search Engine.

Keywords: auto-suggestion, search engine optimization, SEO, query, web mining, web crawler

Procedia PDF Downloads 150
15441 Bio-Electro Chemical Catalysis: Redox Interactions, Storm and Waste Water Treatment

Authors: Michael Radwan Omary

Abstract:

Context: This scientific innovation demonstrate organic catalysis engineered media effective desalination of surface and groundwater. The author has developed a technology called “Storm-Water Ions Filtration Treatment” (SWIFTTM) cold reactor modules designed to retrofit typical urban street storm drains or catch basins. SWIFT triggers biochemical redox reactions with water stream-embedded toxic total dissolved solids (TDS) and electrical conductivity (EC). SWIFTTM Catalysts media unlock the sub-molecular bond energy, break down toxic chemical bonds, and neutralize toxic molecules, bacteria and pathogens. Research Aim: This research aims to develop and design lower O&M cost, zero-brine discharge, energy input-free, chemical-free water desalination and disinfection systems. The objective is to provide an effective resilient and sustainable solution to urban storm-water and groundwater decontamination and disinfection. Methodology: We focused on the development of organic, non-chemical, no-plugs, no pumping, non-polymer and non-allergenic approaches for water and waste water desalination and disinfection. SWIFT modules operate by directing the water stream to flow freely through the electrically charged media cold reactor, generating weak interactions with a water-dissolved electrically conductive molecule, resulting in the neutralization of toxic molecules. The system is powered by harvesting sub-molecular bonds embedded in energy. Findings: The SWIFTTM Technology case studies at CSU-CI and CSU-Fresno Water Institute, demonstrated consistently high reduction of all 40 detected waste-water pollutants including pathogens to levels below a state of California Department of Water Resources “Drinking Water Maximum Contaminants Levels”. The technology has proved effective in reducing pollutants such as arsenic, beryllium, mercury, selenium, glyphosate, benzene, and E. coli bacteria. The technology has also been successfully applied to the decontamination of dissolved chemicals, water pathogens, organic compounds and radiological agents. Theoretical Importance: SWIFT technology development, design, engineering, and manufacturing, offer cutting-edge advancement in achieving clean-energy source bio-catalysis media solution, an energy input free water and waste water desalination and disinfection. A significant contribution to institutions and municipalities achieving sustainable, lower cost, zero-brine and zero CO2 discharges clean energy water desalination. Data Collection and Analysis Procedures: The researchers collected data on the performance of the SWIFTTM technology in reducing the levels of various pollutants in water. The data was analyzed by comparing the reduction achieved by the SWIFTTM technology to the Drinking Water Maximum Contaminants Levels set by the state of California. The researchers also conducted live oral presentations to showcase the applications of SWIFTTM technology in storm water capture and decontamination as well as providing clean drinking water during emergencies. Conclusion: The SWIFTTM Technology has demonstrated its capability to effectively reduce pollutants in water and waste water to levels below regulatory standards. The Technology offers a sustainable solution to groundwater and storm-water treatments. Further development and implementation of the SWIFTTM Technology have the potential to treat storm water to be reused as a new source of drinking water and an ambient source of clean and healthy local water for recharge of ground water.

Keywords: catalysis, bio electro interactions, water desalination, weak-interactions

Procedia PDF Downloads 68
15440 A Low-Power, Low-Noise and High Linearity 60 GHz LNA for WPAN Applications

Authors: Noha Al Majid, Said Mazer, Moulhime El Bekkali, Catherine Algani, Mahmoud Mehdi

Abstract:

A low noise figure (NF) and high linearity V-band Low Noise Amplifier (LNA) is reported in this article. The LNA compromises a three-stage cascode configuration. This LNA will be used as a part of a WPAN (Wireless Personal Area Network) receiver in the millimeter-wave band at 60 GHz. It is designed according to the MMIC technology (Monolithic Microwave Integrated Circuit) in PH 15 process from UMS foundry and uses a 0.15 μm GaAs PHEMT (Pseudomorphic High Electron Mobility Transistor). The particularity of this LNA compared to other LNAs in literature is its very low noise figure which is equal to 1 dB and its high linearity (IIP3 is about 22 dB). The LNA consumes 0.24 Watts, achieving a high gain which is about 23 dB, an input return loss better than -10 dB and an output return loss better than -8 dB.

Keywords: low noise amplifier, V-band, MMIC technology, LNA, amplifier, cascode, pseudomorphic high electron mobility transistor (PHEMT), high linearity

Procedia PDF Downloads 515
15439 Personalized Intervention through Causal Inference in mHealth

Authors: Anna Guitart Atienza, Ana Fernández del Río, Madhav Nekkar, Jelena Ljubicic, África Periáñez, Eura Shin, Lauren Bellhouse

Abstract:

The use of digital devices in healthcare or mobile health (mHealth) has increased in recent years due to the advances in digital technology, making it possible to nudge healthy behaviors through individual interventions. In addition, mHealth is becoming essential in poor-resource settings due to the widespread use of smartphones in areas where access to professional healthcare is limited. In this work, we evaluate mHealth interventions in low-income countries with a focus on causal inference. Counterfactuals estimation and other causal computations are key to determining intervention success and assisting in empirical decision-making. Our main purpose is to personalize treatment recommendations and triage patients at the individual level in order to maximize the entire intervention's impact on the desired outcome. For this study, collected data includes mHealth individual logs from front-line healthcare workers, electronic health records (EHR), and external variables data such as environmental, demographic, and geolocation information.

Keywords: causal inference, mHealth, intervention, personalization

Procedia PDF Downloads 132
15438 Implementation of Distributed Randomized Algorithms for Resilient Peer-to-Peer Networks

Authors: Richard Tanaka, Ying Zhu

Abstract:

This paper studies a few randomized algorithms in application-layer peer-to-peer networks. The significant gain in scalability and resilience that peer-to-peer networks provide has made them widely used and adopted in many real-world distributed systems and applications. The unique properties of peer-to-peer networks make them particularly suitable for randomized algorithms such as random walks and gossip algorithms. Instead of simulations of peer-to-peer networks, we leverage the Docker virtual container technology to develop implementations of the peer-to-peer networks and these distributed randomized algorithms running on top of them. We can thus analyze their behaviour and performance in realistic settings. We further consider the problem of identifying high-risk bottleneck links in the network with the objective of improving the resilience and reliability of peer-to-peer networks. We propose a randomized algorithm to solve this problem and evaluate its performance by simulations.

Keywords: distributed randomized algorithms, peer-to-peer networks, virtual container technology, resilient networks

Procedia PDF Downloads 216
15437 Thiourea: Single Crystal with Non Linear Optical Characteristics

Authors: Kishor C. Poria, Deepak Adroja, Arvind Bajaj

Abstract:

During the last few decades, the growth of single crystals has attained enormous importance for both academic research and technology. Single crystals are pillars of modern technology. In recent emerging trends of photonics and optoelectronics technology, there has been increased need for organic and semi organic materials for Non-Linear Optical (NLO) applications. The paper dealt with the initiation of good single crystals of thiourea and metal doped thiourea. The authors have successfully grown thiourea (pure) and metal doped thiourea crystals using relatively simple and inexpensive slow evaporation of aqueous solution technique. Pure thiourea crystals were grown with different light intensities and frequencies as there growth conditions. Metals (Cu, Co, Ni, Fe) doped crystals were grown using a simple evaporation technique. The paper explains growth methods and associated grown parameters in detail. The average size of the crystal is varied in size from 40 mm x 1mm to 1.5 mm x 1.5 mm to 0.5 mm. Crystals obtained are hexagonal, tetragonal, and rectangular in shape with different optical qualities. All grown crystals are characterized using X-Ray Diffraction Analysis (XRD), Ultra Violet Visible analysis, and Fourier Transform Infrared Spectrometry. Their non-linear optical characteristics were determined by Second Harmonic Generation (SHG) and their Laser Dispersive analysis. The grown crystals are characterized using Nd:YAG laser and the highest conversion efficiency of the signal pass light are calculated. It shows 58 % of standard values for KDP crystals. All results are summarized in this work.

Keywords: crystal, metal-doped thiourea, non-linear optical, NLO, thiourea

Procedia PDF Downloads 142
15436 Unsupervised Assistive and Adaptative Intelligent Agent in Smart Enviroment

Authors: Sebastião Pais, João Casal, Ricardo Ponciano, Sérgio Lorenço

Abstract:

The adaptation paradigm is a basic defining feature for pervasive computing systems. Adaptation systems must work efficiently in a smart environment while providing suitable information relevant to the user system interaction. The key objective is to deduce the information needed information changes. Therefore relying on fixed operational models would be inappropriate. This paper presents a study on developing an Intelligent Personal Assistant to assist the user in interacting with their Smart Environment. We propose an Unsupervised and Language-Independent Adaptation through Intelligent Speech Interface and a set of methods of Acquiring Knowledge, namely Semantic Similarity and Unsupervised Learning.

Keywords: intelligent personal assistants, intelligent speech interface, unsupervised learning, language-independent, knowledge acquisition, association measures, symmetric word similarities, attributional word similarities

Procedia PDF Downloads 562
15435 Investigating the Effect of Artificial Intelligence on the Improvement of Green Supply Chain in Industry

Authors: Sepinoud Hamedi

Abstract:

Over the past few decades, companies have appeared developing concerns in connection to the natural affect of their fabricating exercises. Green supply chain administration has been considered by the producers as a attainable choice to decrease the natural affect of operations whereas at the same time moving forward their operational execution. Contemporaneously the coming of digitalization and globalization within the supply chain space has driven to a developing acknowledgment of the importance of data preparing methodologies, such as enormous information analytics and fake insights innovations, in improving and optimizing supply chain execution. Also, supply chain collaboration in part intervenes the relationship between manufactured innovation and supply chain execution Ponders appear that the use of BDA-AI advances includes a significant impact on natural handle integration and green supply chain collaboration conjointly underlines that both natural handle integration and green supply chain collaboration have a critical affect on natural execution. Correspondingly savvy supply chain contributes to green execution through overseeing green connections and setting up green operations.

Keywords: green supply chain, artificial intelligence, manufacturers, technology, environmental

Procedia PDF Downloads 74
15434 Schedule a New Production Plan by Heuristic Methods

Authors: Hanife Merve Öztürk, Sıdıka Dalgan

Abstract:

In this project, a capacity analysis study is done at TAT A. Ş. Maret Plant. Production capacity of products which generate 80% of sales amount are determined. Obtained data entered the LEKIN Scheduling Program and we get production schedules by using heuristic methods. Besides heuristic methods, as mathematical model, disjunctive programming formulation is adapted to flexible job shop problems by adding a new constraint to find optimal schedule solution.

Keywords: scheduling, flexible job shop problem, shifting bottleneck heuristic, mathematical modelling

Procedia PDF Downloads 401
15433 Analysis of Network Performance Using Aspect of Quantum Cryptography

Authors: Nisarg A. Patel, Hiren B. Patel

Abstract:

Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).

Keywords: cryptography, networking, quantum, encryption and decryption

Procedia PDF Downloads 184
15432 Weapon-Being: Weaponized Design and Object-Oriented Ontology in Hypermodern Times

Authors: John Dimopoulos

Abstract:

This proposal attempts a refabrication of Heidegger’s classic thing-being and object-being analysis in order to provide better ontological tools for understanding contemporary culture, technology, and society. In his work, Heidegger sought to understand and comment on the problem of technology in an era of rampant innovation and increased perils for society and the planet. Today we seem to be at another crossroads in this course, coming after postmodernity, during which dreams and dangers of modernity augmented with critical speculations of the post-war era take shape. The new era which we are now living in, referred to as hypermodernity by researchers in various fields such as architecture and cultural theory, is defined by the horizontal implementation of digital technologies, cybernetic networks, and mixed reality. Technology today is rapidly approaching a turning point, namely the point of no return for humanity’s supervision over its creations. The techno-scientific civilization of the 21st century creates a series of problems, progressively more difficult and complex to solve and impossible to ignore, climate change, data safety, cyber depression, and digital stress being some of the most prevalent. Humans often have no other option than to address technology-induced problems with even more technology, as in the case of neuron networks, machine learning, and AI, thus widening the gap between creating technological artifacts and understanding their broad impact and possible future development. As all technical disciplines and particularly design, become enmeshed in a matrix of digital hyper-objects, a conceptual toolbox that allows us to handle the new reality becomes more and more necessary. Weaponized design, prevalent in many fields, such as social and traditional media, urban planning, industrial design, advertising, and the internet in general, hints towards an increase in conflicts. These conflicts between tech companies, stakeholders, and users with implications in politics, work, education, and production as apparent in the cases of Amazon workers’ strikes, Donald Trump’s 2016 campaign, Facebook and Microsoft data scandals, and more are often non-transparent to the wide public’s eye, thus consolidating new elites and technocratic classes and making the public scene less and less democratic. The new category proposed, weapon-being, is outlined in respect to the basic function of reducing complexity, subtracting materials, actants, and parameters, not strictly in favor of a humanistic re-orientation but in a more inclusive ontology of objects and subjects. Utilizing insights of Object-Oriented Ontology (OOO) and its schematization of technological objects, an outline for a radical ontology of technology is approached.

Keywords: design, hypermodernity, object-oriented ontology, weapon-being

Procedia PDF Downloads 152
15431 Data Privacy: Stakeholders’ Conflicts in Medical Internet of Things

Authors: Benny Sand, Yotam Lurie, Shlomo Mark

Abstract:

Medical Internet of Things (MIoT), AI, and data privacy are linked forever in a gordian knot. This paper explores the conflicts of interests between the stakeholders regarding data privacy in the MIoT arena. While patients are at home during healthcare hospitalization, MIoT can play a significant role in improving the health of large parts of the population by providing medical teams with tools for collecting data, monitoring patients’ health parameters, and even enabling remote treatment. While the amount of data handled by MIoT devices grows exponentially, different stakeholders have conflicting understandings and concerns regarding this data. The findings of the research indicate that medical teams are not concerned by the violation of data privacy rights of the patients' in-home healthcare, while patients are more troubled and, in many cases, are unaware that their data is being used without their consent. MIoT technology is in its early phases, and hence a mixed qualitative and quantitative research approach will be used, which will include case studies and questionnaires in order to explore this issue and provide alternative solutions.

Keywords: MIoT, data privacy, stakeholders, home healthcare, information privacy, AI

Procedia PDF Downloads 102