Search results for: user empowerment
2276 Structured Access Control Mechanism for Mesh-based P2P Live Streaming Systems
Authors: Chuan-Ching Sue, Kai-Chun Chuang
Abstract:
Peer-to-Peer (P2P) live streaming systems still suffer a challenge when thousands of new peers want to join into the system in a short time, called flash crowd, and most of new peers suffer long start-up delay. Recent studies have proposed a slot-based user access control mechanism, which periodically determines a certain number of new peers to enter the system, and a user batch join mechanism, which divides new peers into several tree structures with fixed tree size. However, the slot-based user access control mechanism is difficult for accurately determining the optimal time slot length, and the user batch join mechanism is hard for determining the optimal tree size. In this paper, we propose a structured access control (SAC) mechanism, which constructs new peers to a multi-layer mesh structure. The SAC mechanism constructs new peer connections layer by layer to replace periodical access control, and determines the number of peers in each layer according to the system’s remaining upload bandwidth and average video rate. Furthermore, we propose an analytical model to represent the behavior of the system growth if the system can utilize the upload bandwidth efficiently. The analytical result has shown the similar trend in system growth as the SAC mechanism. Additionally, the extensive simulation is conducted to show the SAC mechanism outperforms two previously proposed methods in terms of system growth and start-up delay.Keywords: peer-to-peer, live video streaming system, flash crowd, start-up delay, access control
Procedia PDF Downloads 3172275 Generalization of Blom Key Predistribution Scheme
Authors: Abbas Cheraghi
Abstract:
A key predistribution scheme provides one method to distribute secret ahead of time. Blom’s scheme is a symmetric threshold key exchange protocol in cryptography. The scheme was proposed by the Swedish cryptographer Rolf Blom. In this kind of scheme, trusted authority gives each user a secret key and a public identifier, which enables any two users to create independently a shared key for communicating between each other. However, if an attacker can compromise the keys of at least Known numbers of users, he can break the scheme and reconstruct every shared key. In this paper generalized Blom’s Scheme by multivariate Lagrange interpolation formula. This scheme is a form of threshold secret sharing scheme. In this new scheme, the amount of information transmitted by the trusted authority is independent of the numbers of users. In addition, this scheme is unconditionally secure against any individual user.Keywords: key predistribution, blom’s scheme, secret sharing, unconditional secure
Procedia PDF Downloads 4362274 Smart Wheel Chair: A Design to Accommodate Vital Sign Monitoring
Authors: Stephanie Nihan, Jayson M. Fadrigalan, Pyay P. San, Steven M. Santos, Weihui Li
Abstract:
People of all ages who use wheelchairs are left with the inconvenience of not having an easy way to take their vital signs. Typically, patients are required to visit the hospital in order to take the vital signs. VitalGO is a wheel chair system that equipped with medical devices to take vital signs and then transmit data to a mobile application for convenient, long term health monitoring. The vital signs include oxygen saturation, heart rate, and blood pressure, breathing rate and body temperature. Oxygen saturation and heart rate are monitored through pulse oximeter. Blood pressure is taken through a radar sensor. Breathing rate is derived through thoracic impedance while body temperature is measured through an infrared thermometer. The application receives data through bluetooth and stores in a database for review in a simple graphical interface. The application will have the ability to display this data over various time intervals such as a day, week, month, 3 months, 6 months and a year. The final system for the mobile app can also provide an interface for both the user and their physician(s) to record notes or keep record of daily symptoms that a patient might be having. The user’s doctor will be granted access by the user to view the patient information for assistance with a more accurate diagnosis. Also, this wheelchair accessory conveniently includes a foldable table/desk as somewhere to place an electronic device that may be used to access the app. The foldable table will overall contribute to the wheelchair user’s increased comfort and will give them somewhere to place food, a book, or any other form of entertainment that would normally be hard to juggle on their lap.Keywords: wheel chair, vital sign, mobile application, telemedicine
Procedia PDF Downloads 3312273 Women Empowerment, Joint Income Ownership and Planning for Building Household Resilience on Climate Change: The Case of Kilimanjaro Region, Tanzania
Authors: S. I. Mwasha, Z. Robinson, M. Musgrave
Abstract:
Communities, especially in the global south, have been reported to have low adaptive capacity to cope with climate change impacts. As an attempt to improve adaptive capacity, most studies have focused on understanding the access of the household resources which can contribute to resilience against changes. However, little attention has been shown in uncovering how the household resources could be used and their implications to resilience against weather related shocks. By using a case study qualitative study, this project analyzed the trends in livelihoods practices and their implication to social equity. The study was done in three different villages within Kilimanjaro region. Each in different agro ecological zone. Two focus group discussions in two agro-ecological zones were done, one for women and another one for men except in the third zone where focus group participant were combined together (due to unforeseen circumstances). In the focus group discussion, several participatory rural appraisal tools were used to understand trend in crops and animal production and the use in which it is made: climate trends, soil fertility, trees and other livelihoods resources. Data were analyzed using thematic network analysis. Using an amalgam of magnitude (to note weather comments made were positive or negative) and descriptive coding (to note the topic), six basic themes were identified under social equity: individual ownership, family ownership, love and respect, women no education, women access to education as well as women access to loans. The results implied that despite mum and dad in the family providing labor in the agro pastoral activities, there were separations on who own what, as well as individual obligations in the family. Dad owned mostly income creating crops and mum, food crops. therefore, men controlled the economy which made some of them become arrogant and spend money to meet their interests sometimes not taking care of the family. Separation in ownership was reported to contribute to conflicts in the household as well as causing controversy on the use income is spent. Men were reported to use income to promote matriarchy system. However, as women were capacitated through access to education and loans they become closer to their husband and get access to own and plan the income together for the interest of the family. Joint ownership and planning on the household resources were reported to be important if families have to better adapt to climate change. The aim of this study is not to show women empowerment and joint ownership and planning as only remedy for low adaptive capacity. There is the need to understand other practices that either directly or indirectly impacts environmental integrity, food security and economic development for household resilience against changing climate.Keywords: adaptive capacity, climate change, resilience, women empowerment
Procedia PDF Downloads 1652272 Technical, Functional, and Behavioural Aspects and Their Attributes in Survey Questionnaire for Post Occupancy Evaluation of Residential Hostels
Authors: Meenal Kumar
Abstract:
The structure of a questionnaire becomes critical in gathering accurate feedback in a post-occupancy evaluation of a building. A survey instrument like this one consists of questions based on various aspects of a constructed facility. The questions and the qualities reflect the goals and determine the nature of the survey, which can be classified into several types. Therefore, a survey instrument uses appropriately described attributes. This ongoing research aims to provide an appropriate technique for framing the Questionnaire, taking into account the relevant aspects of the study and its defining features that analyze building performance from the user's perspective, which can further benefit the architects, planners, and designers in designing user-friendly spaces.Keywords: post occupancy evaluations, satisfaction, attributes, survey, building performance evaluations
Procedia PDF Downloads 622271 Towards Developing a Self-Explanatory Scheduling System Based on a Hybrid Approach
Authors: Jian Zheng, Yoshiyasu Takahashi, Yuichi Kobayashi, Tatsuhiro Sato
Abstract:
In the study, we present a conceptual framework for developing a scheduling system that can generate self-explanatory and easy-understanding schedules. To this end, a user interface is conceived to help planners record factors that are considered crucial in scheduling, as well as internal and external sources relating to such factors. A hybrid approach combining machine learning and constraint programming is developed to generate schedules and the corresponding factors, and accordingly display them on the user interface. Effects of the proposed system on scheduling are discussed, and it is expected that scheduling efficiency and system understandability will be improved, compared with previous scheduling systems.Keywords: constraint programming, factors considered in scheduling, machine learning, scheduling system
Procedia PDF Downloads 3242270 Emerging Methods as a Tool for Obtaining Subconscious Feedback in E-Commerce and Marketplace
Authors: J. Berčík, A. Mravcová, A. Rusková, P. Jurčišin, R. Virágh
Abstract:
The online world is changing every day. With this comes the emergence and development of new business models. One of them is the sale of several types of products in one place. This type of sales in the form of online marketplaces has undergone a positive development in recent years and represents a kind of alternative to brick-and-mortar shopping centres. The main philosophy is to buy several products under one roof. Examples of popular e-commerce marketplaces are Amazon, eBay, and Allegro. Their share of total e-commerce turnover is expected to even double in the coming years. The paper highlights possibilities for testing web applications and online marketplace using emerging methods like stationary eye cameras (eye tracking) and facial analysis (FaceReading).Keywords: emerging methods, consumer neuroscience, e-commerce, marketplace, user experience, user interface
Procedia PDF Downloads 712269 Participatory Approach: A Tool for Improving Food Security and Empowering a Local Community in Chitima, Mozambique
Authors: Matias Hargreaves, Martin Del Valle, Diego Rodriguez, Riveros Jose Luis
Abstract:
Trough years, all kind of social development projects have tried to solve social problems such as hunger, poverty, malnutrition, food insecurity, among others, with poor success. Both private and state initiatives have invested resources in several countries and communities. Nevertheless, most of these initiatives are scientific or external developers-centered, with a lack of local participation. This compromises the sustainability of any intervention and also leads to a poor empowerment of local community. The participatory approach aims to rescue and enhance the local knowledge since it recognizes that this kind of problems are better known by native actors. The objective of the study was to describe the role played by the community empowerment on food security improvement in the NGO “O Viveiro” (15°43'37.77"S; 32°46'27.53"E) and Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. A center for training in goat livestock and orchard was build. A community orchard was co-constructed between foreign technicians and local actors. The prototype was installed in February, 2016 by the technician team and local community with 16 m2 as a nursery garden. Two orchard workshops were conducted in order to design a sustainable productive model which mixes both local and technological approaches. Two goat meat workshops were conducted in order to describe local methods and train the community to conduce their own techniques with high sanitary and productive standards. Technician team stayed in Mozambique until May, 2016. The quorum for the orchard workshops was 20 and 14 persons respectively, which represents 100% and 70%of the total requested quorum (20). For the goat meat workshops were 4 and 5 persons, which representa80% and 100% of the total requested quorum (5). Until August, 2016, the orchard is 3.219 m2 and it grows several vegetables as beans, chili pepper, garlic, onion, tomatoes, lettuce, sweet potato, yuca potato, cabbage, eggplant, papaya trees, mango, and cassava. The process of increasing in size and diversification of vegetables grown was led entirely by the local community. In connection with this, the local community started to harvest and began to sell the vegetable products at the local market. At the meat goat workshops, local participants rescued a local knowledge by describing and practicing a traditional way to process goat meat by drying it outdoors and then doing a smoked treatment. This information might contribute to describe the level of empowerment of this community, and thus give evidence of acceptance of foreign intervention for improving their own proceedings and traditions.Keywords: children malnutrition, food security, Local community, participatory approach
Procedia PDF Downloads 2752268 Quality Assurance for the Climate Data Store
Authors: Judith Klostermann, Miguel Segura, Wilma Jans, Dragana Bojovic, Isadora Christel Jimenez, Francisco Doblas-Reyees, Judit Snethlage
Abstract:
The Climate Data Store (CDS), developed by the Copernicus Climate Change Service (C3S) implemented by the European Centre for Medium-Range Weather Forecasts (ECMWF) on behalf of the European Union, is intended to become a key instrument for exploring climate data. The CDS contains both raw and processed data to provide information to the users about the past, present and future climate of the earth. It allows for easy and free access to climate data and indicators, presenting an important asset for scientists and stakeholders on the path for achieving a more sustainable future. The C3S Evaluation and Quality Control (EQC) is assessing the quality of the CDS by undertaking a comprehensive user requirement assessment to measure the users’ satisfaction. Recommendations will be developed for the improvement and expansion of the CDS datasets and products. User requirements will be identified on the fitness of the datasets, the toolbox, and the overall CDS service. The EQC function of the CDS will help C3S to make the service more robust: integrated by validated data that follows high-quality standards while being user-friendly. This function will be closely developed with the users of the service. Through their feedback, suggestions, and contributions, the CDS can become more accessible and meet the requirements for a diverse range of users. Stakeholders and their active engagement are thus an important aspect of CDS development. This will be achieved with direct interactions with users such as meetings, interviews or workshops as well as different feedback mechanisms like surveys or helpdesk services at the CDS. The results provided by the users will be categorized as a function of CDS products so that their specific interests will be monitored and linked to the right product. Through this procedure, we will identify the requirements and criteria for data and products in order to build the correspondent recommendations for the improvement and expansion of the CDS datasets and products.Keywords: climate data store, Copernicus, quality, user engagement
Procedia PDF Downloads 1462267 Personas Help Understand Users’ Needs, Goals and Desires in an Online Institutional Repository
Authors: Maha ALjohani, James Blustein
Abstract:
Communicating users' needs, goals and problems help designers and developers overcome challenges faced by end users. Personas are used to represent end users’ needs. In our research, creating personas allowed the following questions to be answered: Who are the potential user groups? What do they want to achieve by using the service? What are the problems that users face? What should the service provide to them? To develop realistic personas, we conducted a focus group discussion with undergraduate and graduate students and also interviewed a university librarian. The personas were created to help evaluating the Institutional Repository that is based on the DSpace system. The profiles helped to communicate users' needs, abilities, tasks, and problems, and the task scenarios used in the heuristic evaluation were based on these personas. Four personas resulted of a focus group discussion with undergraduate and graduate students and from interviewing a university librarian. We then used these personas to create focused task-scenarios for a heuristic evaluation on the system interface to ensure that it met users' needs, goals, problems and desires. In this paper, we present the process that we used to create the personas that led to devise the task scenarios used in the heuristic evaluation as a follow up study of the DSpace university repository.Keywords: heuristic evaluation, institutional repositories, user experience, human computer interaction, user profiles, personas, task scenarios, heuristics
Procedia PDF Downloads 4992266 Population Stereotype Production, User Factors, and Icon Design for Underserved Communities of Rural India
Authors: Avijit Sengupta, Klarissa Ting Ting Cheng, Maffee Peng-Hui Wan
Abstract:
This study investigates the influence of user factors and referent characteristics on representation types generated using the stereotype production method for designing icons. Sixty-eight participants of farming communities were asked to draw images based on sixteen feature referents. Significant statistical differences were found between the types of representations generated for contextual and context-independent referents. Strong correlations were observed between years of formal education and total number of abstract representations produced for both contextual and context-independent referents. However, representation characteristics were not influenced by other user factors such as participants’ experience with mobile phone and years of farming experience. A statistically significant tendency of making concrete representations was observed for both contextual and context-independent referents. These findings provide insights on community members’ involvement in icon design and suggest a consolidated icon design strategy based on population stereotype, particularly for under-served rural communities of India.Keywords: abstract representation, concrete representation, participatory design, population stereotype
Procedia PDF Downloads 3752265 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions
Authors: Behnam Zahednejad, Saeed Kosari
Abstract:
Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif
Procedia PDF Downloads 1022264 Physics’s Practical Based on Android as a Motivator in Learning Physics
Authors: Yuni Rochmawati, Luluk Il Mukarromah
Abstract:
Android is a mobile operating system (OS) based on the linux kerrnel and currently developed by google. With a user interface based on direct manipulation, Android is designed primarily for touchscreen mobile deviced such as smartphone and tablet computer, with specialized user interface for television (Android TV), cars (Android Auto), and wrist watches (Android Wear). Now, almost all peoples using smartphone. Smartphone seems to be a must-have object, because smartphone has many benefits. In addition, of course smartphone have many benefits for education, like resume of lesson that form of e-book. However, this article is not about resume of lesson. This article is about practical based on android, exactly for physics. Therefore, we will explain our idea about physics’s practical based on android and for output, we wish many students will be like to studying physics and always remember about physics’s phenomenon by physics’s practical based on android.Keywords: android, smartphone, physics, practical
Procedia PDF Downloads 2422263 A Privacy Protection Scheme Supporting Fuzzy Search for NDN Routing Cache Data Name
Authors: Feng Tao, Ma Jing, Guo Xian, Wang Jing
Abstract:
Named Data Networking (NDN) replaces IP address of traditional network with data name, and adopts dynamic cache mechanism. In the existing mechanism, however, only one-to-one search can be achieved because every data has a unique name corresponding to it. There is a certain mapping relationship between data content and data name, so if the data name is intercepted by an adversary, the privacy of the data content and user’s interest can hardly be guaranteed. In order to solve this problem, this paper proposes a one-to-many fuzzy search scheme based on order-preserving encryption to reduce the query overhead by optimizing the caching strategy. In this scheme, we use hash value to ensure the user’s query safe from each node in the process of search, so does the privacy of the requiring data content.Keywords: NDN, order-preserving encryption, fuzzy search, privacy
Procedia PDF Downloads 4842262 Saudi Women Facing Challenges in a Mixed-Gender Work Environment
Authors: A. Aldawsari
Abstract:
The complex issue of women working in a mixed-gender work environment has its roots in social and cultural factors. This research was done to identify and explore the social and cultural challenges Saudi women face in a mixed-gender work environment in Saudi Arabia. Over the years, Saudi women in mixed-gender work environments in Saudi Arabia have been of interest in various research areas, especially within the context of a hospital work environment. This research, which involves a female researcher interacting one-on-one with Saudi women, will address this issue as well as the effect of the 2030 Vision in Saudi Arabia, and it will aim to include several new fields of work environments for women in Saudi Arabia. The aim of this research is to examine the perceptions of Saudi women who work in a mixed gender environment regarding the general empowerment of women in these settings. The objective of this research is to explore the cultural and social challenges that influence Saudi women's rights to work in a mixed-gender environment in Saudi Arabia. The significance of this research lies in the fact that there is an urgency to resolve issue of female employment in Saudi Arabia, where Saudi women still suffer from inequality in employment opportunity. Although the Saudi government is seeking to empower women by integrating them into a mixed-gender work environment, which is a key goal and prominent social change advocated for in the 2030 Vision, this same goal is one of the main challenges in the face of achieving female empowerment. The methodology section focuses on appropriate methods that can be used to study the effect of social and cultural challenges on the employment of women. It then determines the conditions and limitations of the research by applying a qualitative research approach to the investigation and analysing the data collected from the interviews. A statistical analysis tool, such as NVivo, will be used for the qualitative analysis of the interviews. The study found that the factor most responsible for creating social and cultural challenges is family—whether close family or distant family—more so than tribe or community.Keywords: women, work, mixed-gender, environment
Procedia PDF Downloads 1312261 Make Up Flash: Web Application for the Improvement of Physical Appearance in Images Based on Recognition Methods
Authors: Stefania Arguelles Reyes, Octavio José Salcedo Parra, Alberto Acosta López
Abstract:
This paper presents a web application for the improvement of images through recognition. The web application is based on the analysis of picture-based recognition methods that allow an improvement on the physical appearance of people posting in social networks. The basis relies on the study of tools that can correct or improve some features of the face, with the help of a wide collection of user images taken as reference to build a facial profile. Automatic facial profiling can be achieved with a deeper study of the Object Detection Library. It was possible to improve the initial images with the help of MATLAB and its filtering functions. The user can have a direct interaction with the program and manually adjust his preferences.Keywords: Matlab, make up, recognition methods, web application
Procedia PDF Downloads 1442260 From User's Requirements to UML Class Diagram
Authors: Zeineb Ben Azzouz, Wahiba Ben Abdessalem Karaa
Abstract:
The automated extraction of UML class diagram from natural language requirements is a highly challenging task. Many approaches, frameworks and tools have been presented in this field. Nonetheless, the experiments of these tools have shown that there is no approach that can work best all the time. In this context, we propose a new accurate approach to facilitate the automatic mapping from textual requirements to UML class diagram. Our new approach integrates the best properties of statistical Natural Language Processing (NLP) techniques to reduce ambiguity when analysing natural language requirements text. In addition, our approach follows the best practices defined by conceptual modelling experts to determine some patterns indispensable for the extraction of basic elements and concepts of the class diagram. Once the relevant information of class diagram is captured, a XMI document is generated and imported with a CASE tool to build the corresponding UML class diagram.Keywords: class diagram, user’s requirements, XMI, software engineering
Procedia PDF Downloads 4712259 The Visualizer for Real-Time Analysis of Internet Trends
Authors: Radek Malinský, Ivan Jelínek
Abstract:
The current web has become a modern encyclopedia, where people share their thoughts and ideas on various topics around them. Such kind of encyclopedia is very useful for other people who are looking for answers to their questions. However, with the growing popularity of social networking and blogging and ever expanding network services, there has also been a growing diversity of technologies along with different structure of individual websites. It is, therefore, difficult to directly find a relevant answer for a common Internet user. This paper presents a web application for the real-time end-to-end analysis of selected Internet trends; where the trend can be whatever the people post online. The application integrates fully configurable tools for data collection and analysis using selected webometric algorithms, and for its chronological visualization to user. It can be assumed that the application facilitates the users to evaluate the quality of various products that are mentioned online.Keywords: Trend, visualizer, web analysis, web 2.0.
Procedia PDF Downloads 2642258 Community Radio as a Catalyst for Local Empowerment and Development in Rivers State: A Case Study of Local Government Areas
Authors: Akpobome Harrison
Abstract:
Community radio serves as a potent vehicle for amplifying local voices and driving community progress worldwide. It facilitates grassroots communication, empowers residents, and significantly contributes to social, cultural, and economic development. This study investigates the pivotal roles of community radio in elevating local voices and advancing development within Emuoha, Obio-Akpor, and Ikwerre Local Government Areas in Rivers State. Employing a quantitative methodology, the research involved random sampling of respondents via questionnaires. The findings underscore the transformative power of community radio in promoting local voices and fostering development, particularly within Rivers State. Moreover, community radio platforms empower marginalized populations, providing them with a voice and an opportunity to actively participate in the media landscape, share their stories, and express their concerns. This empowerment holds the potential to enhance civic engagement and communal harmony. Community radio stations often prioritize local news, events, and subjects that may not receive adequate coverage in mainstream media, thus facilitating the dissemination of vital community information, including local news, weather updates, and emergency alerts. In light of these observations, this paper advocates for the encouragement of community radio by both the state government and private media entities to facilitate seamless information dissemination. Additionally, the paper highlights the significant role played by the use of Pidgin English as a communication tool, particularly in providing understanding and a voice to marginalized individuals in rural communities.Keywords: community radio, local voices, marginalized populations, information dissemination, pidgin english, grassroots communication
Procedia PDF Downloads 662257 Support for Refugee Entrepreneurs Through International Aid
Authors: Julien Benomar
Abstract:
The World Bank report published in April 2023 called “Migrants, Refugees and Society” allows us to first distinguish migrants in search of economic opportunities and refugees that flee a situation of danger and choose their destination based on their immediate need for safety. Amongst those two categories, the report distinguished people having professional skills adapted to the labor market of the host country and those who have not. Out of that distinction of four categories, we choose to focus our research on refugees that do not have professional skills adapted to the labor market of the host country. Given that refugees generally have no recourse to public assistance schemes and cannot count on the support of their entourage or support network, we propose to examine the extent to which external assistance, such as international humanitarian action, is likely to accompany refugees' transition to financial empowerment through entrepreneurship. To this end, we propose to carry out a case study structured in three stages: (i) an exchange with a Non-Governmental Organisation (NGO) active in supporting refugee populations from Congo and Burundi to Rwanda, enabling us to (i.i) define together a financial empowerment income, and (i. ii) learn about the content of the support measures taken for the beneficiaries of the humanitarian project; (ii) monitor the population of 118 beneficiaries, including 73 refugees and 45 Rwandans (reference population); (iii) conduct a participatory analysis to identify the level of performance of the project and areas for improvement. The case study thus involved the staff of an international NGO active in helping refugees from Rwanda since 2015 and the staff of a Luxembourg NGO that has been funding this economic aid project through entrepreneurship since 2021. The case study thus involved the staff of an international NGO active in helping refugees from Rwanda since 2015 and the staff of a Luxembourg NGO, which has been funding this economic aid through an entrepreneurship project since 2021, and took place over a 48-day period between April and May 2023. The main results are of two types: (i) the need to associate indicators for monitoring the impact of the project on the indirect beneficiaries of the project (refugee community) and (ii) the identification of success factors making it possible to bring concrete and relevant responses to the constraints encountered. The first result thus made it possible to identify the following indicators: Indicator of community potential ((jobs, training or mentoring) promoted by the activity of the entrepreneur), Indicator of social contribution (tax paid by the entrepreneur), Indicator of resilience (savings and loan capacity generated, and finally impact on social cohesion. The second result made it possible to identify that among the 7 success factors tested, the sector of activity chosen and the level of experience in the sector of the future activity are those that stand out the most clearly.Keywords: entrepreuneurship, refugees, financial empowerment, international aid
Procedia PDF Downloads 782256 Design of an Ensemble Learning Behavior Anomaly Detection Framework
Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia
Abstract:
Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing
Procedia PDF Downloads 1282255 Experience Report about the Inclusion of People with Disabilities in the Process of Testing an Accessible System for Learning Management
Authors: Marcos Devaner, Marcela Alves, Cledson Braga, Fabiano Alves, Wilton Bezerra
Abstract:
This article discusses the inclusion of people with disabilities in the process of testing an accessible system solution for distance education. The accessible system, team profile, methodologies and techniques covered in the testing process are presented. The testing process shown in this paper was designed from the experience with user. The testing process emerged from lessons learned from past experiences and the end user is present at all stages of the tests. Also, lessons learned are reported and how it was possible the maturing of the team and the methods resulting in a simple, productive and effective process.Keywords: experience report, accessible systems, software testing, testing process, systems, e-learning
Procedia PDF Downloads 3962254 A User Identification Technique to Access Big Data Using Cloud Services
Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy
Abstract:
Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.Keywords: design, implementation algorithms, performance, biometric approach
Procedia PDF Downloads 4752253 Combined Localization, Beamforming, and Interference Threshold Estimation in Underlay Cognitive System
Authors: Omar Nasr, Yasser Naguib, Mohamed Hafez
Abstract:
This paper aims at providing an innovative solution for blind interference threshold estimation in an underlay cognitive network to be used in adaptive beamforming by secondary user Transmitter and Receiver. For the task of threshold estimation, blind detection of modulation and SNR are used. For the sake of beamforming several localization algorithms are compared to settle on best one for cognitive environment. Beamforming algorithms as LCMV (Linear Constraint Minimum Variance) and MVDR (Minimum Variance Distortion less) are also proposed and compared. The idea of just nulling the primary user after knowledge of its location is discussed against the idea of working under interference threshold.Keywords: cognitive radio, underlay, beamforming, MUSIC, MVDR, LCMV, threshold estimation
Procedia PDF Downloads 5822252 A Theory of Aftercare for Human Trafficking Survivors: A Grounded Theory Analysis of Survivors and Aftercare Providers in South Africa
Authors: Robyn L. Curran, Joanne R. Naidoo, Gugu Mchunu
Abstract:
Along with the increasing awareness of human trafficking, is the acknowledgement that it is no longer just a social problem but also a significant public health problem that requires both increased knowledge and the specialist equipping of aftercare providers such as nurses who care for human trafficking survivors. Current discourse regarding aftercare of human trafficking survivors, is that approaches do not clearly explain the function or content of aftercare and what aftercare entails. Although psychological and medical aftercare are emphasized as important components, little practical attention is devoted to what these components actually involve and the effectiveness of current practice in aftercare. Review of the literature on the processes that take place from aftercare to empowerment, revealed the need for emphasis to be placed on the voices of survivors concerning their liberation from oppression. The aim of the study was to develop a theory for aftercare of human trafficking survivors, through analyzing the experiences of survivors and aftercare providers in shelters in three provinces in South Africa. Through using a Straussian grounded theory approach, the researcher developed a theory to inform care of human trafficking survivors in low resource settings using the voice of the survivors and those experienced in direct care of human trafficking survivors. Four human trafficking survivors and three aftercare providers from three shelters in three provinces in South Africa were individually interviewed in order for the theory to emerge. The findings of the study elicited a theoretical model of the renewed self, and the conditions that facilitate this process in care of human trafficking survivors. The process that human trafficking survivors navigate to empowerment require mutual collaboration of the aftercare provider and survivor as the survivor awakens vision, confronts reality, re-salvages autonomy and liberates self. Psychological resilience of the survivor facilitates the transition to renewed self. The recommendations of this study may improve the nursing care provided to human trafficking survivors and equip professionals with knowledge and skills to promote the process of renewing self for survivors.Keywords: aftercare, aftercare providers, grounded theory, human trafficking survivors
Procedia PDF Downloads 2762251 Software Defect Analysis- Eclipse Dataset
Authors: Amrane Meriem, Oukid Salyha
Abstract:
The presence of defects or bugs in software can lead to costly setbacks, operational inefficiencies, and compromised user experiences. The integration of Machine Learning(ML) techniques has emerged to predict and preemptively address software defects. ML represents a proactive strategy aimed at identifying potential anomalies, errors, or vulnerabilities within code before they manifest as operational issues. By analyzing historical data, such as code changes, feature im- plementations, and defect occurrences. This en- ables development teams to anticipate and mitigate these issues, thus enhancing software quality, reducing maintenance costs, and ensuring smoother user interactions. In this work, we used a recommendation system to improve the performance of ML models in terms of predicting the code severity and effort estimation.Keywords: software engineering, machine learning, bugs detection, effort estimation
Procedia PDF Downloads 862250 Modbus Gateway Design Using Arm Microprocessor
Authors: Semanur Savruk, Onur Akbatı
Abstract:
Integration of various communication protocols into an automation system causes a rise in setup and maintenance cost and make to control network devices in difficulty. The gateway becomes necessary for reducing complexity in network topology. In this study, Modbus RTU/Modbus TCP industrial ethernet gateway design and implementation are presented with ARM embedded system and FreeRTOS real-time operating system. The Modbus gateway can perform communication with Modbus RTU and Modbus TCP devices over itself. Moreover, the gateway can be adjustable with the user-interface application or messaging interface. Conducted experiments and the results are presented in the paper. Eventually, the proposed system is a complete, low-cost, real-time, and user-friendly design for monitoring and setting devices and useful for meeting remote control purposes.Keywords: gateway, industrial communication, modbus, network
Procedia PDF Downloads 1392249 E-learning resources for radiology training: Is an ideal program available?
Authors: Eric Fang, Robert Chen, Ghim Song Chia, Bien Soo Tan
Abstract:
Objective and Rationale: Training of radiology residents hinges on practical, on-the-job training in all facets and modalities of diagnostic radiology. Although residency is structured to be comprehensive, clinical exposure depends on the case mix available locally and during the posting period. To supplement clinical training, there are several e-learning resources available to allow for greater exposure to radiological cases. The objective of this study was to survey residents and faculty on the usefulness of these e-learning resources. Methods: E-learning resources were shortlisted with input from radiology residents, Google search and online discussion groups, and screened by their purported focus. Twelve e-learning resources were found to meet the criteria. Both radiology residents and experienced radiology faculty were then surveyed electronically. The e-survey asked for ratings on breadth, depth, testing capability and user-friendliness for each resource, as well as for rankings for the top 3 resources. Statistical analysis was performed using SAS 9.4. Results: Seventeen residents and fifteen faculties completed an e-survey. Mean response rate was 54% ± 8% (Range: 14- 96%). Ratings and rankings were statistically identical between residents and faculty. On a 5-point rating scale, breadth was 3.68 ± 0.18, depth was 3.95 ± 0.14, testing capability was 2.64 ± 0.16 and user-friendliness was 3.39 ± 0.13. Top-ranked resources were STATdx (first), Radiopaedia (second) and Radiology Assistant (third). 9% of responders singled out R-ITI as potentially good but ‘prohibitively costly’. Statistically significant predictive factors for higher rankings are familiarity with the resource (p = 0.001) and user-friendliness (p = 0.006). Conclusion: A good e-learning system will complement on-the-job training with a broad case base, deep discussion and quality trainee evaluation. Based on our study on twelve e-learning resources, no single program fulfilled all requirements. The perception and use of radiology e-learning resources depended more on familiarity and user-friendliness than on content differences and testing capability.Keywords: e-learning, medicine, radiology, survey
Procedia PDF Downloads 3332248 Investigating the Potential of VR in Language Education: A Study of Cybersickness and Presence Metrics
Authors: Sakib Hasn, Shahid Anwar
Abstract:
This study highlights the vital importance of assessing the Simulator Sickness Questionnaire and presence measures as virtual reality (VR) incorporation into language teaching gains popularity. To address user discomfort, which prevents efficient learning in VR environments, the measurement of SSQ becomes crucial. Additionally, evaluating presence metrics is essential to determine the level of engagement and immersion, both crucial for rich language learning experiences. This paper designs a VR-based Chinese language application and proposes a thorough test technique aimed at systematically analyzing SSQ and presence measures. Subjective tests and data analysis were carried out to highlight the significance of addressing user discomfort in VR language education. The results of this study shed light on the difficulties posed by user discomfort in VR language learning and offer insightful advice on how to improve VR language learning applications. Furthermore, the outcome of the research explores ‘VR-based language education,’ ‘inclusive language learning platforms," and "cross-cultural communication,’ highlighting the potential for VR to facilitate language learning across diverse cultural backgrounds. Overall, the analysis results contribute to the enrichment of language learning experiences in the virtual realm and underscore the need for continued exploration and improvement in this field.Keywords: virtual reality (VR), language education, simulator sickness questionnaire, presence metrics, VR-based Chinese language education
Procedia PDF Downloads 792247 Touch Interaction through Tagging Context
Authors: Gabriel Chavira, Jorge Orozco, Salvador Nava, Eduardo Álvarez, Julio Rolón, Roberto Pichardo
Abstract:
Ambient Intelligence promotes a shift in computing which involves fitting-out the environments with devices to support context-aware applications. One of main objectives is the reduction to a minimum of the user’s interactive effort, the diversity and quantity of devices with which people are surrounded with, in existing environments; increase the level of difficulty to achieve this goal. The mobile phones and their amazing global penetration, makes it an excellent device for delivering new services to the user, without requiring a learning effort. The environment will have to be able to perceive all of the interaction techniques. In this paper, we present the PICTAC model (Perceiving touch Interaction through TAgging Context), which similarly delivers service to members of a research group.Keywords: ambient intelligence, tagging context, touch interaction, touching services
Procedia PDF Downloads 384