Search results for: location privacy
2237 The Impact of Developing Tourism on the Spatial Pattern in Jordan
Authors: Khries Sawsan
Abstract:
the phenomenon of urbanization is considered as one of the most important tourism resources that differ from one country to another and from one region to another in the same country. Our concern in tourism accommodation is explained by the fact that their location is directly related to the movement to tourist sites .Besides, these constructions comport security considered as the most important motivation for tourists in their choice of any destination. Hotels are the most representative expression of tourism. This is due to their physical prominence in the landscape and being the sole urban component totally unique to tourism. This study sheds light on the impact of tourism development on the spatial pattern in Jordan. It describes the linkages between existing tourism development policies and the spatial development patterns that have occurred as a result throughout Jordan, particularly looking at the impact that tourism has had on the physical environment of major tourism destinations. It puts an illustrative plan of the impact of the augmentation of tourism accommodations in Jordan in the past 40 years ago. The findings of this study help us to understand better the operation of Jordan’ dynamic changes in the location An intensive analysis is then applied on a representative case study in three regions: Amman, Petra and Aqaba. The study proceeds from an historical perspective to, show the evolution of the current development patterns an increase of tourism’s impact on spatial, in the presence of factors as political and economic stability, is expected.Keywords: spatial patterns, urbanisation, spatial transformations, tourism planning, Jordan
Procedia PDF Downloads 5482236 One-Way Electric Vehicle Carsharing in an Urban Area with Vehicle-To-Grid Option
Authors: Cem Isik Dogru, Salih Tekin, Kursad Derinkuyu
Abstract:
Electric vehicle (EV) carsharing is an alternative method to tackle urban transportation problems. This method can be applied by several options. One of the options is the one-way carsharing, which allow an EV to be taken at a designated location and leaving it on another specified location customer desires. Although it may increase users’ satisfaction, the issues, namely, demand dissatisfaction, relocation of EVs and charging schedules, must be dealt with. Also, excessive electricity has to be stored in batteries of EVs. To cope with aforementioned issues, two-step mixed integer programming (MIP) model is proposed. In first step, the integer programming model is used to determine amount of electricity to be sold to the grid in terms of time periods for extra profit. Determined amounts are provided from the batteries of EVs. Also, this step works in day-ahead electricity markets with forecast of periodical electricity prices. In second step, other MIP model optimizes daily operations of one-way carsharing: charging-discharging schedules, relocation of EVs to serve more demand and renting to maximize the profit of EV fleet owner. Due to complexity of the models, heuristic methods are introduced to attain a feasible solution and different price information scenarios are compared.Keywords: electric vehicles, forecasting, mixed integer programming, one-way carsharing
Procedia PDF Downloads 1302235 An Empirical Investigation of the Challenges of Secure Edge Computing Adoption in Organizations
Authors: Hailye Tekleselassie
Abstract:
Edge computing is a spread computing outline that transports initiative applications closer to data sources such as IoT devices or local edge servers, and possible happenstances would skull the action of new technologies. However, this investigation was attained to investigation the consciousness of technology and communications organization workers and computer users who support the service cloud. Surveys were used to achieve these objectives. Surveys were intended to attain these aims, and it is the functional using survey. Enquiries about confidence are also a key question. Problems like data privacy, integrity, and availability are the factors affecting the company’s acceptance of the service cloud.Keywords: IoT, data, security, edge computing
Procedia PDF Downloads 832234 Development of a Bus Information Web System
Authors: Chiyoung Kim, Jaegeol Yim
Abstract:
Bus service is often either main or the only public transportation available in cities. In metropolitan areas, both subways and buses are available whereas in the medium sized cities buses are usually the only type of public transportation available. Bus Information Systems (BIS) provide current locations of running buses, efficient routes to travel from one place to another, points of interests around a given bus stop, a series of bus stops consisting of a given bus route, and so on to users. Thanks to BIS, people do not have to waste time at a bus stop waiting for a bus because BIS provides exact information on bus arrival times at a given bus stop. Therefore, BIS does a lot to promote the use of buses contributing to pollution reduction and saving natural resources. BIS implementation costs a huge amount of budget as it requires a lot of special equipment such as road side equipment, automatic vehicle identification and location systems, trunked radio systems, and so on. Consequently, medium and small sized cities with a low budget cannot afford to install BIS even though people in these cities need BIS service more desperately than people in metropolitan areas. It is possible to provide BIS service at virtually no cost under the assumption that everybody carries a smartphone and there is at least one person with a smartphone in a running bus who is willing to reveal his/her location details while he/she is sitting in a bus. This assumption is usually true in the real world. The smartphone penetration rate is greater than 100% in the developed countries and there is no reason for a bus driver to refuse to reveal his/her location details while driving. We have developed a mobile app that periodically reads values of sensors including GPS and sends GPS data to the server when the bus stops or when the elapsed time from the last send attempt is greater than a threshold. This app detects the bus stop state by investigating the sensor values. The server that receives GPS data from this app has also been developed. Under the assumption that the current locations of all running buses collected by the mobile app are recorded in a database, we have also developed a web site that provides all kinds of information that most BISs provide to users through the Internet. The development environment is: OS: Windows 7 64bit, IDE: Eclipse Luna 4.4.1, Spring IDE 3.7.0, Database: MySQL 5.1.7, Web Server: Apache Tomcat 7.0, Programming Language: Java 1.7.0_79. Given a start and a destination bus stop, it finds a shortest path from the start to the destination using the Dijkstra algorithm. Then, it finds a convenient route considering number of transits. For the user interface, we use the Google map. Template classes that are used by the Controller, DAO, Service and Utils classes include BUS, BusStop, BusListInfo, BusStopOrder, RouteResult, WalkingDist, Location, and so on. We are now integrating the mobile app system and the web app system.Keywords: bus information system, GPS, mobile app, web site
Procedia PDF Downloads 2162233 Effects of Porosity Logs on Pore Connectivity and Volumetric Estimation
Authors: Segun S. Bodunde
Abstract:
In Bona Field, Niger Delta, two reservoirs across three wells were analyzed. The research aimed at determining the statistical dependence of permeability and oil volume in place on porosity logs. Of the three popular porosity logs, two were used; the sonic and density logs. The objectives of the research were to identify the porosity logs that vary more with location and direction, to visualize the depth trend of both logs and to determine the influence of these logs on pore connectivity determination and volumetric analysis. The focus was on density and sonic logs. It was observed that the sonic derived porosities were higher than the density derived porosities (in well two, across the two reservoir sands, sonic porosity averaged 30.8% while density derived porosity averaged 23.65%, and the same trend was observed in other wells.). The sonic logs were further observed to have lower co-efficient of variation when compared to the density logs (in sand A, well 2, sonic derived porosity had a co-efficient of variation of 12.15% compared to 22.52% from the density logs) indicating a lower tendency to vary with location and direction. The bulk density was observed to increase with depth while the transit time reduced with depth. It was also observed that for an 8.87% decrease in porosity, the pore connectivity was observed to decrease by about 38%.Keywords: pore connectivity, co-efficient of variation, density derived porosity, sonic derived porosity
Procedia PDF Downloads 1902232 An Analysis of Brand-Building Characteristics in the Iran Airline Websites
Authors: Pedram Behyar, Zahra Bayat
Abstract:
The internet and web are changing ways of “far reaching scope and potential for transformation of the marketing functions”. The web is developing in a faster rate than any previous new communication medium. The website of destination has become a crucial branding channel, that is why all businesses are changing their way to communicate with their customers to encounter their needs and wants in better ways. Website provides numerous opportunities for businesses to strengthen their relationship with their customers. One of these opportunities is website component that enables internet users to make two-way communication with the businesses.Keywords: marketing communication, brand image, usability, privacy and security, personalization and customization, responsiveness, customer online web experience
Procedia PDF Downloads 5032231 Artificial Intelligence in Ethiopian Higher Education: The Impact of Digital Readiness Support, Acceptance, Risk, and Trust on Adoption
Authors: Merih Welay Welesilassie
Abstract:
Understanding educators' readiness to incorporate AI tools into their teaching methods requires comprehensively examining the influencing factors. This understanding is crucial, given the potential of these technologies to personalise learning experiences, improve instructional effectiveness, and foster innovative pedagogical approaches. This study evaluated factors affecting teachers' adoption of AI tools in their English language instruction by extending the Technology Acceptance Model (TAM) to encompass digital readiness support, perceived risk, and trust. A cross-sectional quantitative survey was conducted with 128 English language teachers, supplemented by qualitative data collection from 15 English teachers. The structural mode analysis indicated that implementing AI tools in Ethiopian higher education was notably influenced by digital readiness support, perceived ease of use, perceived usefulness, perceived risk, and trust. Digital readiness support positively impacted perceived ease of use, usefulness, and trust while reducing safety and privacy risks. Perceived ease of use positively correlated with perceived usefulness but negatively influenced trust. Furthermore, perceived usefulness strengthened trust in AI tools, while perceived safety and privacy risks significantly undermined trust. Trust was crucial in increasing educators' willingness to adopt AI technologies. The qualitative analysis revealed that the teachers exhibited strong content and pedagogical knowledge but needed more technology-related knowledge. Moreover, It was found that the teachers did not utilise digital tools to teach English. The study identified several obstacles to incorporating digital tools into English lessons, such as insufficient digital infrastructure, a shortage of educational resources, inadequate professional development opportunities, and challenging policies and governance. The findings provide valuable guidance for educators, inform policymakers about creating supportive digital environments, and offer a foundation for further investigation into technology adoption in educational settings in Ethiopia and similar contexts.Keywords: digital readiness support, AI acceptance, perceived risc, AI trust
Procedia PDF Downloads 182230 Chemical Characteristics of Soils Based on Toposequence Under Wet Tropical Area Bukit Sarasah Padang
Authors: Y. Yulnafatmawita, H. Hermansah
Abstract:
Topography is a factor affecting soil characteristics. Chemical characteristics of a soil is a factor determining the productivity of the land. A research was conducted in Bukit Sarasah Padang, an area receiving > 5000 mm rainfall annually. The purpose of this research was to determine the chemical characteristics of soils at sequence topography in hill-slope of Bukit Sarasah. Soils were sampled at 3 different altitudes in the research area from 315 m – 515 m asl with 100 m interval. At each location, soil samples were taken from two depths (0-20 cm and 30-50 cm) for soil chemical characteristics (pH, CEC, organic-C, N-total, C/N, Ca-, Mg-, K-, Na-, Al-, and H-exchangeable). Based on the data resulted, it was found that there was a tendency of decreasing soil organic matter (SOC) content by increasing location from 315 to 515 m asl as well as from the top 0-20 cm to 30-50 cm soil depth. The same tendency was also found for the CEC, pH, N-total, and C/N ratio of the soil. On the other hand, exchangeable-Al and -H tended to increase by increasing elevation in Bukit Sarasah. There was no significant difference found for the concentration of exchangeable cations among the elevations and between the depths. The soil chemical characteristics on the top 20 cm were generally better than those on 30-50 cm soil depth, however, different elevation did not gave significant difference of the concentration.Keywords: soil chemical characteristics, soil depths, topo-sequence, wet tropical area
Procedia PDF Downloads 4862229 Failure and Stress Analysis of Super Heater Tubes of a 67 TPH Coke Dry Quenching Boiler
Authors: Subodh N. Patel, Abhijit Pusty, Manashi Adhikary, Sandip Bhattacharyya
Abstract:
The steam superheater (SH) is a coil type heat exchanger which is used to produce superheated steam or to convert the wet steam to dry steam (69.6 kg/cm² and 495°C), generated by a boiler. There were two superheaters in the system, SH I and SH II. SH II is a set of tubes that faces the initial interaction with flue gas at high temperature followed by SH I tubes. After a service life of 2100 hours, a tube in the SH II found to be punctured. Dye penetrant test revealed that out of 50 such tubes, 14 more tubes had severe cracks at a similar location. The failure was investigated in detail. The materials and scale were characterized by optical microscope and advance characterization technique. Scale, observed on fracture surface, was characterized under scanning electron microscope and Raman spectroscopy. Stresses acting on the tubes in working condition were analyzed by finite element method software, ANSYS. Cyclic stresses were observed in the simulation at the same prone location due to restriction in expansion of tubes. Based on scale characterization and stress analysis, it was concluded that the tube failed in thermo-mechanical fatigue. Finally, prevention and control measures were taken to avoid such failure in the future.Keywords: finite element analysis, oxide scale, superheater tube, thermomechanical fatigue
Procedia PDF Downloads 1172228 Impact of Firm Location and Organizational Structure on Receipt and Effectiveness of Social Assistance
Authors: Nalanda Matia, Julia Zhao, Amber Jaycocks, Divya Sinha
Abstract:
Social assistance programs for businesses are intended to improve their survival and growth in the face of catastrophic events like the COVID-19 pandemic. However, that goal remains unfulfilled when the mostwantingbusinesses fail to participate in such programs. Reasons for non-participation can include lack of information, inability to cope with applications and program compliance, as well as some programs’ non-entitlement status. Some of these factors may be associated with the organizational and locational characteristics of these businesses. This research investigates these organizational and locational factorsthat determine receipt and effectiveness of social assistance among the firms that receive it. of A sample of firms from the universe of 3 rounds of Small Business Administration backed Paycheck Protection Program recipient and similarly profiled non recipient businesses are used to analyze this question. Initial results show firm organizational factors like size and spatial factors like broadband coverage at firm location impact application for and subsequent receipt of assistance for digitally administered programs. Further, Line of business and wage structure of recipients’ impact effectiveness of the assistance dollars.Keywords: public economics, economics of social assistance, firm organizational structure, survival analysis
Procedia PDF Downloads 1682227 Map UI Design of IoT Application Based on Passenger Evacuation Behaviors in Underground Station
Authors: Meng-Cong Zheng
Abstract:
When the public space is in an emergency, how to quickly establish spatial cognition and emergency shelter in the closed underground space is the urgent task. This study takes Taipei Station as the research base and aims to apply the use of Internet of things (IoT) application for underground evacuation mobility design. The first experiment identified passengers' evacuation behaviors and spatial cognition in underground spaces by wayfinding tasks and thinking aloud, then defined the design conditions of User Interface (UI) and proposed the UI design. The second experiment evaluated the UI design based on passengers' evacuation behaviors by wayfinding tasks and think aloud again as same as the first experiment. The first experiment found that the design conditions that the subjects were most concerned about were "map" and hoping to learn the relative position of themselves with other landmarks by the map and watch the overall route. "Position" needs to be accurately labeled to determine the location in underground space. Each step of the escape instructions should be presented clearly in "navigation bar." The "message bar" should be informed of the next or final target exit. In the second experiment with the UI design, we found that the "spatial map" distinguishing between walking and non-walking areas with shades of color is useful. The addition of 2.5D maps of the UI design increased the user's perception of space. Amending the color of the corner diagram in the "escape route" also reduces the confusion between the symbol and other diagrams. The larger volume of toilets and elevators can be a judgment of users' relative location in "Hardware facilities." Fire extinguisher icon should be highlighted. "Fire point tips" of the UI design indicated fire with a graphical fireball can convey precise information to the escaped person. "Fire point tips" of the UI design indicated fire with a graphical fireball can convey precise information to the escaped person. However, "Compass and return to present location" are less used in underground space.Keywords: evacuation behaviors, IoT application, map UI design, underground station
Procedia PDF Downloads 2072226 Optimizing the Location of Parking Areas Adapted for Dangerous Goods in the European Road Transport Network
Authors: María Dolores Caro, Eugenio M. Fedriani, Ángel F. Tenorio
Abstract:
The transportation of dangerous goods by lorries throughout Europe must be done by using the roads conforming the European Road Transport Network. In this network, there are several parking areas where lorry drivers can park to rest according to the regulations. According to the "European Agreement concerning the International Carriage of Dangerous Goods by Road", parking areas where lorries transporting dangerous goods can park to rest, must follow several security stipulations to keep safe the rest of road users. At this respect, these lorries must be parked in adapted areas with strict and permanent surveillance measures. Moreover, drivers must satisfy several restrictions about resting and driving time. Under these facts, one may expect that there exist enough parking areas for the transport of this type of goods in order to obey the regulations prescribed by the European Union and its member countries. However, the already-existing parking areas are not sufficient to cover all the stops required by drivers transporting dangerous goods. Our main goal is, starting from the already-existing parking areas and the loading-and-unloading location, to provide an optimal answer to the following question: how many additional parking areas must be built and where must they be located to assure that lorry drivers can transport dangerous goods following all the stipulations about security and safety for their stops? The sense of the word “optimal” is due to the fact that we give a global solution for the location of parking areas throughout the whole European Road Transport Network, adjusting the number of additional areas to be as lower as possible. To do so, we have modeled the problem using graph theory since we are working with a road network. As nodes, we have considered the locations of each already-existing parking area, each loading-and-unloading area each road bifurcation. Each road connecting two nodes is considered as an edge in the graph whose weight corresponds to the distance between both nodes in the edge. By applying a new efficient algorithm, we have found the additional nodes for the network representing the new parking areas adapted for dangerous goods, under the fact that the distance between two parking areas must be less than or equal to 400 km.Keywords: trans-european transport network, dangerous goods, parking areas, graph-based modeling
Procedia PDF Downloads 2802225 Early Initiation of Breastfeeding and Its Determinants among Non-Caesarean Deliveries at Primary and Secondary Health Facilities: A Case Observational Study
Authors: Farhana Karim, Abdullah N. S. Khan, Mohiuddin A. K. Chowdhury, Nabila Zaka, Alexander Manu, Shams El Arifeen, Sk Masum Billah
Abstract:
Breastfeeding, an integral part of newborn care, can reduce 55-87% of all-cause neonatal mortality and morbidity. Early initiation of breastfeeding within 1 hour of birth can avert 22% of newborn mortality. Only 45% of world’s newborns and 42% of newborns in South-Asia are put to the breast within one hour of birth. In Bangladesh, only a half of the mothers practice early initiation of breastfeeding which is less likely to be practiced if the baby is born in a health facility. This study aims to generate strong evidence for early initiation of breastfeeding practices in the government health facilities and to explore the associated factors influencing the practice. The study was conducted in selected health facilities in three neighbouring districts of Northern Bangladesh. Total 249 normal vaginal delivery cases were observed for 24 hours since the time of birth. The outcome variable was initiation of breastfeeding within 1 hour while the explanatory variables included type of health facility, privacy, presence of support person, stage of labour at admission, need for augmentation of labour, complications during delivery, need for episiotomy, spontaneous cry of the newborn, skin-to-skin contact with mother, post-natal contact with the service provider, receiving a post-natal examination and counselling on breastfeeding during postnatal contact. The simple descriptive statistics were employed to see the distribution of samples according to socio-demographic characteristics. Kruskal-Wallis test was carried out for testing the equality of medians among two or more categories of each variable and P-value is reported. A series of simple logistic regressions were conducted with all the potential explanatory variables to identify the determining factors for breastfeeding within 1 hour in a health facility. Finally, multiple logistic regression was conducted including the variables found significant at bi-variate analyses. Almost 90% participants initiated breastfeeding at the health facility and median time to initiate breastfeeding was 38 minutes. However, delivering in a sub-district hospital significantly delayed the breastfeeding initiation in comparison to delivering in a district hospital. Maintenance of adequate privacy and presence of separate staff for taking care of newborn significantly reduced the time in early breastfeeding initiation. Initiation time was found longer if the mother had an augmented labour, obstetric complications, and the newborn needed resuscitation. However, the initiation time was significantly early if the baby was put skin-to-skin on mother’s abdomen and received a postnatal examination by a provider. After controlling for the potential confounders, the odds of initiating breastfeeding within one hour of birth is higher if mother gives birth in a district hospital (AOR 3.0: 95% CI 1.5, 6.2), privacy is well-maintained (AOR 2.3: 95% CI 1.1, 4.5), babies cry spontaneously (AOR 7.7: 95% CI 3.3, 17.8), babies are put to skin-to-skin contact with mother (AOR 4.6: 95% CI 1.9, 11.2) and if the baby is examined by a provider in the facility (AOR 4.4: 95% CI 1.4, 14.2). The evidence generated by this study will hopefully direct the policymakers to identify and prioritize the scopes for creating and supporting early initiation of breastfeeding in the health facilities.Keywords: Bangladesh, early initiation of breastfeeding, health facility, normal vaginal delivery, skin to skin contact
Procedia PDF Downloads 1532224 Intelligent Indoor Localization Using WLAN Fingerprinting
Authors: Gideon C. Joseph
Abstract:
The ability to localize mobile devices is quite important, as some applications may require location information of these devices to operate or deliver better services to the users. Although there are several ways of acquiring location data of mobile devices, the WLAN fingerprinting approach has been considered in this work. This approach uses the Received Signal Strength Indicator (RSSI) measurement as a function of the position of the mobile device. RSSI is a quantitative technique of describing the radio frequency power carried by a signal. RSSI may be used to determine RF link quality and is very useful in dense traffic scenarios where interference is of major concern, for example, indoor environments. This research aims to design a system that can predict the location of a mobile device, when supplied with the mobile’s RSSIs. The developed system takes as input the RSSIs relating to the mobile device, and outputs parameters that describe the location of the device such as the longitude, latitude, floor, and building. The relationship between the Received Signal Strengths (RSSs) of mobile devices and their corresponding locations is meant to be modelled; hence, subsequent locations of mobile devices can be predicted using the developed model. It is obvious that describing mathematical relationships between the RSSIs measurements and localization parameters is one option to modelling the problem, but the complexity of such an approach is a serious turn-off. In contrast, we propose an intelligent system that can learn the mapping of such RSSIs measurements to the localization parameters to be predicted. The system is capable of upgrading its performance as more experiential knowledge is acquired. The most appealing consideration to using such a system for this task is that complicated mathematical analysis and theoretical frameworks are excluded or not needed; the intelligent system on its own learns the underlying relationship in the supplied data (RSSI levels) that corresponds to the localization parameters. These localization parameters to be predicted are of two different tasks: Longitude and latitude of mobile devices are real values (regression problem), while the floor and building of the mobile devices are of integer values or categorical (classification problem). This research work presents artificial neural network based intelligent systems to model the relationship between the RSSIs predictors and the mobile device localization parameters. The designed systems were trained and validated on the collected WLAN fingerprint database. The trained networks were then tested with another supplied database to obtain the performance of trained systems on achieved Mean Absolute Error (MAE) and error rates for the regression and classification tasks involved therein.Keywords: indoor localization, WLAN fingerprinting, neural networks, classification, regression
Procedia PDF Downloads 3472223 Creation of a Care Robot Impact Assessment
Authors: Eduard Fosch-Villaronga
Abstract:
This paper pioneers Care Robot Impact Assessment (CRIA), a methodology used to identify, analyze, mitigate and eliminate the risks posed by the insertion of non-medical personal care robots (PCR) in medical care facilities. Its precedent instruments (Privacy and Surveillance Impact Assessment (PIA and SIA)) fall behind in coping with robots. Indeed, personal care robots change dramatically how care is delivered. The paper presents a specific risk-sector methodology, identifies which robots are under its scope and presents some of the challenges introduced by these robots.Keywords: ethics, impact assessment, law, personal care robots
Procedia PDF Downloads 5762222 Artificial Intelligence in Ethiopian Universities: The Influence of Technological Readiness, Acceptance, Perceived Risk, and Trust on Implementation - An Integrative Research Approach
Authors: Merih Welay Welesilassie
Abstract:
Understanding educators' readiness to incorporate AI tools into their teaching methods requires comprehensively examining the influencing factors. This understanding is crucial, given the potential of these technologies to personalise learning experiences, improve instructional effectiveness, and foster innovative pedagogical approaches. This study evaluated factors affecting teachers' adoption of AI tools in their English language instruction by extending the Technology Acceptance Model (TAM) to encompass digital readiness support, perceived risk, and trust. A cross-sectional quantitative survey was conducted with 128 English language teachers, supplemented by qualitative data collection from 15 English teachers. The structural mode analysis indicated that implementing AI tools in Ethiopian higher education was notably influenced by digital readiness support, perceived ease of use, perceived usefulness, perceived risk, and trust. Digital readiness support positively impacted perceived ease of use, usefulness, and trust while reducing safety and privacy risks. Perceived ease of use positively correlated with perceived usefulness but negatively influenced trust. Furthermore, perceived usefulness strengthened trust in AI tools, while perceived safety and privacy risks significantly undermined trust. Trust was crucial in increasing educators' willingness to adopt AI technologies. The qualitative analysis revealed that the teachers exhibited strong content and pedagogical knowledge but needed more technology-related knowledge. Moreover, It was found that the teachers did not utilise digital tools to teach English. The study identified several obstacles to incorporating digital tools into English lessons, such as insufficient digital infrastructure, a shortage of educational resources, inadequate professional development opportunities, and challenging policies and governance. The findings provide valuable guidance for educators, inform policymakers about creating supportive digital environments, and offer a foundation for further investigation into technology adoption in educational settings in Ethiopia and similar contexts.Keywords: digital readiness support, AI acceptance, risk, trust
Procedia PDF Downloads 152221 Analysis of Threats in Interoperability of Medical Devices
Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar
Abstract:
Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.Keywords: interoperability, threats, attacks, medical devices
Procedia PDF Downloads 3332220 Reliability and Probability Weighted Moment Estimation for Three Parameter Mukherjee-Islam Failure Model
Authors: Ariful Islam, Showkat Ahmad Lone
Abstract:
The Mukherjee-Islam Model is commonly used as a simple life time distribution to assess system reliability. The model exhibits a better fit for failure information and provides more appropriate information about hazard rate and other reliability measures as shown by various authors. It is possible to introduce a location parameter at a time (i.e., a time before which failure cannot occur) which makes it a more useful failure distribution than the existing ones. Even after shifting the location of the distribution, it represents a decreasing, constant and increasing failure rate. It has been shown to represent the appropriate lower tail of the distribution of random variables having fixed lower bound. This study presents the reliability computations and probability weighted moment estimation of three parameter model. A comparative analysis is carried out between three parameters finite range model and some existing bathtub shaped curve fitting models. Since probability weighted moment method is used, the results obtained can also be applied on small sample cases. Maximum likelihood estimation method is also applied in this study.Keywords: comparative analysis, maximum likelihood estimation, Mukherjee-Islam failure model, probability weighted moment estimation, reliability
Procedia PDF Downloads 2732219 Performance of On-site Earthquake Early Warning Systems for Different Sensor Locations
Authors: Ting-Yu Hsu, Shyu-Yu Wu, Shieh-Kung Huang, Hung-Wei Chiang, Kung-Chun Lu, Pei-Yang Lin, Kuo-Liang Wen
Abstract:
Regional earthquake early warning (EEW) systems are not suitable for Taiwan, as most destructive seismic hazards arise due to in-land earthquakes. These likely cause the lead-time provided by regional EEW systems before a destructive earthquake wave arrives to become null. On the other hand, an on-site EEW system can provide more lead-time at a region closer to an epicenter, since only seismic information of the target site is required. Instead of leveraging the information of several stations, the on-site system extracts some P-wave features from the first few seconds of vertical ground acceleration of a single station and performs a prediction of the oncoming earthquake intensity at the same station according to these features. Since seismometers could be triggered by non-earthquake events such as a passing of a truck or other human activities, to reduce the likelihood of false alarms, a seismometer was installed at three different locations on the same site and the performance of the EEW system for these three sensor locations were discussed. The results show that the location on the ground of the first floor of a school building maybe a good choice, since the false alarms could be reduced and the cost for installation and maintenance is the lowest.Keywords: earthquake early warning, on-site, seismometer location, support vector machine
Procedia PDF Downloads 2422218 The Mechanism of Design and Analysis Modeling of Performance of Variable Speed Wind Turbine and Dynamical Control of Wind Turbine Power
Authors: Mohammadreza Heydariazad
Abstract:
Productivity growth of wind energy as a clean source needed to achieve improved strategy in production and transmission and management of wind resources in order to increase quality of power and reduce costs. New technologies based on power converters that cause changing turbine speed to suit the wind speed blowing turbine improve extraction efficiency power from wind. This article introduces variable speed wind turbines and optimization of power, and presented methods to use superconducting inductor in the composition of power converter and is proposed the dc measurement for the wind farm and especially is considered techniques available to them. In fact, this article reviews mechanisms and function, changes of wind speed turbine according to speed control strategies of various types of wind turbines and examines power possible transmission and ac from producing location to suitable location for a strong connection integrating wind farm generators, without additional cost or equipment. It also covers main objectives of the dynamic control of wind turbines, and the methods of exploitation and the ways of using it that includes the unique process of these components. Effective algorithm is presented for power control in order to extract maximum active power and maintains power factor at the desired value.Keywords: wind energy, generator, superconducting inductor, wind turbine power
Procedia PDF Downloads 3272217 Formal Development of Electronic Identity Card System Using Event-B
Authors: Tomokazu Nagata, Jawid Ahmad Baktash
Abstract:
The goal of this paper is to explore the use of formal methods for Electronic Identity Card System. Nowadays, one of the core research directions in a constantly growing distributed environment is the improvement of the communication process. The responsibility for proper verification becomes crucial. Formal methods can play an essential role in the development and testing of systems. The thesis presents two different methodologies for assessing correctness. Our first approach employs abstract interpretation techniques for creating a trace based model for Electronic Identity Card System. The model was used for building a semi decidable procedure for verifying the system model. We also developed the code for the eID System and can cover three parts login to system sending of Acknowledgment from user side, receiving of all information from server side and log out from system. The new concepts of impasse and spawned sessions that we introduced led our research to original statements about the intruder’s knowledge and eID system coding with respect to secrecy. Furthermore, we demonstrated that there is a bound on the number of sessions needed for the analysis of System.Electronic identity (eID) cards promise to supply a universal, nation-wide mechanism for user authentication. Most European countries have started to deploy eID for government and private sector applications. Are government-issued electronic ID cards the proper way to authenticate users of online services? We use the eID project as a showcase to discuss eID from an application perspective. The new eID card has interesting design features, it is contact-less, it aims to protect people’s privacy to the extent possible, and it supports cryptographically strong mutual authentication between users and services. Privacy features include support for pseudonymous authentication and per service controlled access to individual data items. The article discusses key concepts, the eID infrastructure, observed and expected problems, and open questions. The core technology seems ready for prime time and government projects deploy it to the masses. But application issues may hamper eID adoption for online applications.Keywords: eID, event-B, Pro-B, formal method, message passing
Procedia PDF Downloads 2342216 Biomass Availability Matrix: Methodology to Define High Level Biomass Availability for Bioenergy Purposes, a Quebec Case Study
Authors: Camilo Perez Lee, Mark Lefsrud, Edris Madadian, Yves Roy
Abstract:
Biomass availability is one of the most important aspects to consider when determining the proper location of potential bioenergy plants. Since this aspect has a direct impact on biomass transportation and storage, biomass availability greatly influences the operational cost. Biomass availability is more than the quantity available on a specific region; other elements such as biomass accessibility and potential play an important role. Accessibility establishes if the biomass could be extracted and conveyed easily considering factors such as biomass availability, infrastructure condition and other operational issues. On the other hand, biomass potential is defined as the capacity of a specific region to scale the usage of biomass as an energy source, move from another energy source or to switch the type of biomass to increase their biomass availability in the future. This paper defines methodologies and parameters in order to determine the biomass availability within the administrative regions of the province of Quebec; firstly by defining the forestry, agricultural, municipal solid waste and energy crop biomass availability per administrative region, next its infrastructure accessibility and lastly defining the region potential. Thus, these data are processed to create a biomass availability matrix allowing to define the overall biomass availability per region and to determine the most optional candidates for bioenergy plant location.Keywords: biomass, availability, bioenergy, accessibility, biomass potential
Procedia PDF Downloads 3192215 A Lightweight Blockchain: Enhancing Internet of Things Driven Smart Buildings Scalability and Access Control Using Intelligent Direct Acyclic Graph Architecture and Smart Contracts
Authors: Syed Irfan Raza Naqvi, Zheng Jiangbin, Ahmad Moshin, Pervez Akhter
Abstract:
Currently, the IoT system depends on a centralized client-servant architecture that causes various scalability and privacy vulnerabilities. Distributed ledger technology (DLT) introduces a set of opportunities for the IoT, which leads to practical ideas for existing components at all levels of existing architectures. Blockchain Technology (BCT) appears to be one approach to solving several IoT problems, like Bitcoin (BTC) and Ethereum, which offer multiple possibilities. Besides, IoTs are resource-constrained devices with insufficient capacity and computational overhead to process blockchain consensus mechanisms; the traditional BCT existing challenge for IoTs is poor scalability, energy efficiency, and transaction fees. IOTA is a distributed ledger based on Direct Acyclic Graph (DAG) that ensures M2M micro-transactions are free of charge. IOTA has the potential to address existing IoT-related difficulties such as infrastructure scalability, privacy and access control mechanisms. We proposed an architecture, SLDBI: A Scalable, lightweight DAG-based Blockchain Design for Intelligent IoT Systems, which adapts the DAG base Tangle and implements a lightweight message data model to address the IoT limitations. It enables the smooth integration of new IoT devices into a variety of apps. SLDBI enables comprehensive access control, energy efficiency, and scalability in IoT ecosystems by utilizing the Masked Authentication Message (MAM) protocol and the IOTA Smart Contract Protocol (ISCP). Furthermore, we suggest proof-of-work (PoW) computation on the full node in an energy-efficient way. Experiments have been carried out to show the capability of a tangle to achieve better scalability while maintaining energy efficiency. The findings show user access control management at granularity levels and ensure scale up to massive networks with thousands of IoT nodes, such as Smart Connected Buildings (SCBDs).Keywords: blockchain, IOT, direct acyclic graphy, scalability, access control, architecture, smart contract, smart connected buildings
Procedia PDF Downloads 1222214 Aerodynamic Prediction and Performance Analysis for Mars Science Laboratory Entry Vehicle
Authors: Tang Wei, Yang Xiaofeng, Gui Yewei, Du Yanxia
Abstract:
Complex lifting entry was selected for precise landing performance during the Mars Science Laboratory entry. This study aims to develop the three-dimensional numerical method for precise computation and the surface panel method for rapid engineering prediction. Detailed flow field analysis for Mars exploration mission was performed by carrying on a series of fully three-dimensional Navier-Stokes computations. The static aerodynamic performance was then discussed, including the surface pressure, lift and drag coefficient, lift-to-drag ratio with the numerical and engineering method. Computation results shown that the shock layer is thin because of lower effective specific heat ratio, and that calculated results from both methods agree well with each other, and is consistent with the reference data. Aerodynamic performance analysis shows that CG location determines trim characteristics and pitch stability, and certain radially and axially shift of the CG location can alter the capsule lifting entry performance, which is of vital significance for the aerodynamic configuration des0ign and inner instrument layout of the Mars entry capsule.Keywords: Mars entry capsule, static aerodynamics, computational fluid dynamics, hypersonic
Procedia PDF Downloads 2992213 Vibration Analysis of a Solar Powered UAV
Authors: Kevin Anderson, Sukhwinder Singh Sandhu, Nouh Anies, Shilpa Ravichandra, Steven Dobbs, Donald Edberg
Abstract:
This paper presents the results of a Finite Element based vibration analysis of a solar powered Unmanned Aerial Vehicle (UAV). The purpose of this paper was to quantify the free vibration, forced vibration response due to differing point inputs in order to mimic the vibration induced by actuators (magnet in coil generators) used to aid in the flight of the UAV. A Fluid-Structure Interaction (FSI) study was performed in order to ascertain pertinent deigns stresses and deflections as well as aerodynamic parameters of the UAV airfoil. The 10 ft span airfoil is modeled using Mylar as the primary material. Results show that the free mode in bending is 4.8 Hz while the first forced bending mode is in the range of 16.2 to 16.7 Hz depending on the location of excitation. The free torsional bending mode is 28.3 Hz, and the first forced torsional mode is in the range of 26.4 to 27.8 Hz, depending on the location of excitation. The FSI results predict the coefficients of aerodynamic drag and lift of 0.0052 and 0.077, respectively, which matches hand-calculations used to validate the Finite Element based results. FSI based maximum von Mises stresses and deflections were found to be 0.282 MPa and 3.4 mm, respectively. Dynamic pressures on the airfoil range of 1.04 to 1.23 kPa corresponding to velocity magnitudes in the range of 22 to 66 m/s.Keywords: ANSYS, finite element, FSI, UAV, vibrations
Procedia PDF Downloads 5032212 Evaluating Global ‘Thing’ Security of Consumer Products
Authors: Achutha Raman
Abstract:
Today's brave new world features a bonanza of digitally interconnected products, or ‘things,’ that improve convenience, possibilities, and in some cases efficiency for consumers. Nonetheless, even as the market accelerates, this Internet of ‘things’ is subject to substantial leakage of consumer personal data. First defining the fluid concept of ‘things,’ this paper subsequently uses case studies taken from the EU, Asia, and the US, to highlight large gaps and comprehensively evaluate the state of security for consumer ‘things.’ Ultimately, this paper offers several ways of improving the present status quo, and especially focuses on an evaluative approach that augments the standard mechanism of Firmware Over the Air Updates, and ought to be easily implementable.Keywords: cybersecurity, FOTA, Internet of Things, transnational privacy
Procedia PDF Downloads 2182211 Impact of Organic Architecture in Building Design
Authors: Zainab Yahaya Suleiman
Abstract:
Physical fitness, as one of the most important keys to a healthy wellbeing, is the basis of dynamic and creative intellectual activity. As a result, the fitness world is expanding every day. It is believed that a fitness centre is a place of healing and also the natural environment is vital to speedy recovery. The aim of this paper is to propose and designs a suitable location for a fitness centre in Batagarawa metropolis. Batagarawa city is enriched with four tertiary institutions with diverse commerce and culture but lacks the facility of a well-equipped fitness centre. The proposed fitness centre intends to be an organically sound centre that will make use of principles of organic architecture to create a new pleasant environment between man and his environments. Organic architecture is the science of designing a building within pleasant natural resources and features surrounding the environment. It is regarded as visual poetry and reinterpretation of nature’s principles; as well as embodies a settlement of person, place, and materials. Using organic architecture, the design was interlaced with the dynamic, organic and monumental features surrounding the environment. The city has inadequate/no facility that is considered organic where one can keep fit in a friendly, conducive and adequate location. Thus, the need for establishing a fitness centre to cater for this need cannot be over-emphasised. Conclusively, a fitness centre will be an added advantage to this fast growing centre of learning.Keywords: organic architecture, fitness center, environment, natural resources, natural features, building design
Procedia PDF Downloads 4122210 Wearable Interface for Telepresence in Robotics
Authors: Uriel Martinez-Hernandez, Luke W. Boorman, Hamideh Kerdegari, Tony J. Prescott
Abstract:
In this paper, we present architecture for the study of telepresence, immersion and human-robot interaction. The architecture is built around a wearable interface, developed here, that provides the human with visual, audio and tactile feedback from a remote location. We have chosen to interface the system with the iCub humanoid robot, as it mimics many human sensory modalities, such as vision, with gaze control and tactile feedback. This allows for a straightforward integration of multiple sensory modalities, but also offers a more complete immersion experience for the human. These systems are integrated, controlled and synchronised by an architecture developed for telepresence and human-robot interaction. Our wearable interface allows human participants to observe and explore a remote location, while also being able to communicate verbally with humans located in the remote environment. Our approach has been tested from local, domestic and business venues, using wired, wireless and Internet based connections. This has involved the implementation of data compression to maintain data quality to improve the immersion experience. Initial testing has shown the wearable interface to be robust. The system will endow humans with the ability to explore and interact with other humans at remote locations using multiple sensing modalities.Keywords: telepresence, telerobotics, human-robot interaction, virtual reality
Procedia PDF Downloads 2902209 FPGA Implementation of the BB84 Protocol
Authors: Jaouadi Ikram, Machhout Mohsen
Abstract:
The development of a quantum key distribution (QKD) system on a field-programmable gate array (FPGA) platform is the subject of this paper. A quantum cryptographic protocol is designed based on the properties of quantum information and the characteristics of FPGAs. The proposed protocol performs key extraction, reconciliation, error correction, and privacy amplification tasks to generate a perfectly secret final key. We modeled the presence of the spy in our system with a strategy to reveal some of the exchanged information without being noticed. Using an FPGA card with a 100 MHz clock frequency, we have demonstrated the evolution of the error rate as well as the amounts of mutual information (between the two interlocutors and that of the spy) passing from one step to another in the key generation process.Keywords: QKD, BB84, protocol, cryptography, FPGA, key, security, communication
Procedia PDF Downloads 1832208 Mining Big Data in Telecommunications Industry: Challenges, Techniques, and Revenue Opportunity
Authors: Hoda A. Abdel Hafez
Abstract:
Mining big data represents a big challenge nowadays. Many types of research are concerned with mining massive amounts of data and big data streams. Mining big data faces a lot of challenges including scalability, speed, heterogeneity, accuracy, provenance and privacy. In telecommunication industry, mining big data is like a mining for gold; it represents a big opportunity and maximizing the revenue streams in this industry. This paper discusses the characteristics of big data (volume, variety, velocity and veracity), data mining techniques and tools for handling very large data sets, mining big data in telecommunication and the benefits and opportunities gained from them.Keywords: mining big data, big data, machine learning, telecommunication
Procedia PDF Downloads 409