Search results for: daily internet usage time
22012 Effectiveness of Internet Psychological Counseling in Reducing Social Shyness Symptoms among Students of University of Tabuk
Authors: Khawla Saad Albalawi
Abstract:
The aim of this research was to explore the effectiveness of the internet counseling in reducing social shyness among the university's students. The sample consisted of 40 students and was divided into two groups: an experimental group and a control group. The social shyness scale (SSS) was administered to both groups before applying the counseling to the experimental group (as a pre-test). After that, the internet counseling was applied to the experimental group. Next, the SSS was administered to both groups (as a post-test). Finally, the SSS was administered to the experimental group (as an iterative application). Results suggest that: 1. There is a significant difference between the two groups in the post-test in all dimensions and the total score of the (SSS) in favor of the experimental group in all cases. 2. There is a significant difference between the pre- and the post-test of the experimental group in all dimensions and the total score of the (SSS) in favor of the post-test in all cases. 3. There is no significant difference between the post-test and the iterative application of the experimental group in all dimensions and the total score of the (SSS). The above results were discussed in light of previous research. Recommendations and future researches were suggested.Keywords: internet psychological clinics, social interaction disorders, shyness, Twitter, Facebook
Procedia PDF Downloads 49722011 Nitrous Oxide Wastage: Putting Strategies “In the Pipeline” to Reduce Carbon Emissions from Nitrous Oxide
Authors: F. Gallop, C. Ward, M. Zaky, M. Vaghela, R. Sabaratnam
Abstract:
Nitrous oxide (N₂O) has been used in anaesthesia for over 150 years owing to advantageous physical and pharmacological properties. However, with a global warming potential of 310, we have an urgent responsibility to reduce its usage and emission. Anecdotal evidence in our hospital trust suggests minimal N₂O usage, yet our theatres receive a staggering supply. This warranted further investigation. We used a data collection tool to prospectively capture quantitative and qualitative data regarding N₂O cases during one week: this recorded demographics, N₂O indications, clinical management, and total N₂O consumption in litres. In addition, N₂O usage in dental sedation suites and paediatric theatres was separately quantified. Pipeline supply data was acquired from British Oxygen Company accounts. We captured 490 cases. 4% (n=19) used N₂O, 63% (n=12) of these in dental theatres. Common N₂0 indications were induction speed (37%) and rapidly increasing anaesthesia depth (32%). In adult cases, N₂O was always used intraoperatively rather than solely at induction. 74% (n=14) of anaesthetists reported environmental concern over using N₂O. The week’s total N₂O usage was 8109 litres, amounting to 421,668 litres annually. However, the annual N₂O pipeline supply is 2,997,000 litres; an enormous 1.8 million Kg of CO₂. Our results supportively demonstrate that the N₂O pipeline supply greatly exceeds its clinical use. Acknowledging clinical areas not audited, the discrepancy between supply and usage suggests approximately 2.5 million litres of yearly wastage. We consequently recommend terminating the N₂O pipeline supply in minimally used areas, eliminating 1.5 million Kg of CO₂ emissions. High usage clinical areas could consider portable N₂O cylinders as an alternative. In Sweden, N₂O destruction technology is routinely used to minimise CO₂ emissions. Our results support National Health System investment in similar infrastructure.Keywords: anaesthesia, environment, medical gases, nitrous oxide, sustainability
Procedia PDF Downloads 13822010 The Tradition of Drinking Tuak in Batak Society againts the Law of Alcohol Usage in Indonesia
Authors: Siti Hazar Sitorus, Marini Kristina Situmeang, Mukhammad Fatkhullah, Arfan Fadli
Abstract:
This study aims to examine how the Batak tribe in the Village Lumban Sitorus Parmaksian District, Toba Samosir (Tobasa) interpret the culture of drinking Tuak as a social interaction. This research uses qualitative method with case study approach. Through this approach, the researchers obtained primary data by looking at and observing the social interaction that occurs when the activity of drinking tuak takes place on the daily life of the Batak Toba community in the village of Lumban Sitorus. The technique of data collecting is done by observation and in-depth interview. This study focuses on Batak Toba community, especially men who daily drink tuak. The results obtained from this study is Batak Toba society has a habit of drinking Tuak (a type of alcoholic beverage derived from water sapphire juice that is fermented). In Batak Toba society, tuak is not only considered as an alcoholic drink which is usually drunk in the afternoon at lapotuak (tuak shop), but tuak is also understood as a drink of honor in a traditional party at Toba Batak society. On the other hand, the activity of drinking of tuak was also considered as a medium or a means of connecting the formation of a sense of solidarity among the people of LumbanSitorous Village. In its existence, drinking tuak is defined as a mean that can facilitate the establishment to open communication with fellow members of Batak Toba community, such as at leisure, birth party, death or as medicine. Specifically, tuak in a special sense in Batak Toba society is also a symbol of intimacy, gratitude, and respect which is manifested in the activity of daily drinking tuak. In Indonesia, if we refer to the Criminal Code in articles 300 and 536 it is clear that whoever intentionally sells and consumes intoxicating / alcoholic drinks will be subject to a maximum jail term of one year. It became interesting then when looking at Indonesia as a country that has a diversity of cultures in which the law implies the prohibition of alcoholic / intoxicating beverages. However, the existence of drinking of tuak as a drink that categorized intoxicating in Batak Toba society still continues to.Keywords: tradition of drinking tuak, meaning of tuak, Batak society, cultural studies
Procedia PDF Downloads 22522009 A Generalization of Option Pricing with Discrete Dividends to Markets with Daily Price Limits
Authors: Jiahau Guo, Yihe Zhang
Abstract:
This paper proposes solutions for pricing options on stocks paying discrete dividends in markets with daily price limits. We first extend the intraday density function of Guo and Chang (2020) to a multi-day one and use the framework of Haug et al. (2003) to value European options on stocks paying discrete dividends. Next, we adopt the fast Fourier transform (FFT) to derive accurate and efficient formulae for American options and further employ the three-point Richardson extrapolation to accelerate the computation. Finally, the accuracy of our proposed methods is verified by simulations.Keywords: daily price limit, discrete dividend, early exercise, fast Fourier transform, multi-day density function, Richardson extrapolation
Procedia PDF Downloads 16422008 Parallel Tracking and Mapping of a Fleet of Quad-Rotor
Authors: M. Bazin, I. Bouguir, D. Combe, V. Germain, G. Lassade
Abstract:
The problem of managing a fleet of quad-rotor drones in a completely unknown environment is analyzed in the present paper. This work is following the footsteps of other studies about how should be managed the movements of a swarm of elements that have to stay gathered throughout their activities. In this paper we aim to demonstrate the limitations of a system where absolutely all the calculations and physical movements of our elements are done by one single external element. The strategy of control is an adaptive approach which takes into account the explored environment. This is made possible thanks to a set of command rules which can guide the drones through various missions with defined goal. The result of the mission is independent of the nature of environment and the number of drones in the fleet. This strategy is based on a simultaneous usage of different data: obstacles positions, real-time positions of all drones and relative positions between the different drones. The present work is made with the Robot Operating System and used several open-source projects on localization and usage of drones.Keywords: cooperative guidance, distributed control, unmanned aerial vehicle, obstacle avoidance
Procedia PDF Downloads 30222007 An Engineer-Oriented Life Cycle Assessment Tool for Building Carbon Footprint: The Building Carbon Footprint Evaluation System in Taiwan
Authors: Hsien-Te Lin
Abstract:
The purpose of this paper is to introduce the BCFES (building carbon footprint evaluation system), which is a LCA (life cycle assessment) tool developed by the Low Carbon Building Alliance (LCBA) in Taiwan. A qualified BCFES for the building industry should fulfill the function of evaluating carbon footprint throughout all stages in the life cycle of building projects, including the production, transportation and manufacturing of materials, construction, daily energy usage, renovation and demolition. However, many existing BCFESs are too complicated and not very designer-friendly, creating obstacles in the implementation of carbon reduction policies. One of the greatest obstacle is the misapplication of the carbon footprint inventory standards of PAS2050 or ISO14067, which are designed for mass-produced goods rather than building projects. When these product-oriented rules are applied to building projects, one must compute a tremendous amount of data for raw materials and the transportation of construction equipment throughout the construction period based on purchasing lists and construction logs. This verification method is very cumbersome by nature and unhelpful to the promotion of low carbon design. With a view to provide an engineer-oriented BCFE with pre-diagnosis functions, a component input/output (I/O) database system and a scenario simulation method for building energy are proposed herein. Most existing BCFESs base their calculations on a product-oriented carbon database for raw materials like cement, steel, glass, and wood. However, data on raw materials is meaningless for the purpose of encouraging carbon reduction design without a feedback mechanism, because an engineering project is not designed based on raw materials but rather on building components, such as flooring, walls, roofs, ceilings, roads or cabinets. The LCBA Database has been composited from existing carbon footprint databases for raw materials and architectural graphic standards. Project designers can now use the LCBA Database to conduct low carbon design in a much more simple and efficient way. Daily energy usage throughout a building's life cycle, including air conditioning, lighting, and electric equipment, is very difficult for the building designer to predict. A good BCFES should provide a simplified and designer-friendly method to overcome this obstacle in predicting energy consumption. In this paper, the author has developed a simplified tool, the dynamic Energy Use Intensity (EUI) method, to accurately predict energy usage with simple multiplications and additions using EUI data and the designed efficiency levels for the building envelope, AC, lighting and electrical equipment. Remarkably simple to use, it can help designers pre-diagnose hotspots in building carbon footprint and further enhance low carbon designs. The BCFES-LCBA offers the advantages of an engineer-friendly component I/O database, simplified energy prediction methods, pre-diagnosis of carbon hotspots and sensitivity to good low carbon designs, making it an increasingly popular carbon management tool in Taiwan. To date, about thirty projects have been awarded BCFES-LCBA certification and the assessment has become mandatory in some cities.Keywords: building carbon footprint, life cycle assessment, energy use intensity, building energy
Procedia PDF Downloads 13922006 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection
Authors: Muhammad Ali
Abstract:
Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection
Procedia PDF Downloads 12522005 Impact of ICT on Efficient Services Providing to Users by LIPs in NCR India
Authors: Mani Gupta
Abstract:
This study deals with question: i) Whether ICT plays a positive role in improvement of efficiency of LIPs in terms of providing efficient services to the Users in LICs? and ii) Role of finance in terms of required technological logistics and infrastructure for usage of ICT based services to comfort in accessing databases by Users in LICs. This is based on primary data which are collected from various libraries and Information Centers of NCR Delhi. The survey conducted during December 15 and 31, 2010 on 496 respondents across 96 libraries and information centers in NCR Delhi through electronic data collection method. There is positive and emphatic relationship between ICT and its effect on improving the level of efficient services providing by LIPs in LICs in NCR Delhi. This is divided into 6 sub-headings and finally the outcomes.Keywords: modern globalization, linear correlation, efficient service, internet revolution, logistics
Procedia PDF Downloads 35722004 Development of a Real Time Axial Force Measurement System and IoT-Based Monitoring for Smart Bearing
Authors: Hassam Ahmed, Yuanzhi Liu, Yassine Selami, Wei Tao, Hui Zhao
Abstract:
The purpose of this research is to develop a real time axial force measurement system for a smart bearing through the use of strain-gauges, whereby the data acquisition is performed by an Arduino microcontroller due to its easy manipulation and low-cost. The measured signal is acquired and then discretized using a Wheatstone Bridge and an Analog-Digital Converter (ADC) respectively. For bearing monitoring, a real time monitoring system based on Internet of things (IoT) and Bluetooth were developed. Experimental tests were performed on a bearing within a force range up to 600 kN. The experimental results show that there is a proportional linear relationship between the applied force and the output voltage, and the error R squared is within 0.9878 based on the regression analysis.Keywords: bearing, force measurement, IoT, strain gauge
Procedia PDF Downloads 14222003 Internet of Things for Smart Dedicated Outdoor Air System in Buildings
Authors: Dararat Tongdee, Surapong Chirarattananon, Somchai Maneewan, Chantana Punlek
Abstract:
Recently, the Internet of Things (IoT) is the important technology that connects devices to the network and people can access real-time communication. This technology is used to report, collect, and analyze the big data for achieving a purpose. For a smart building, there are many IoT technologies that enable management and building operators to improve occupant thermal comfort, indoor air quality, and building energy efficiency. In this research, we propose monitoring and controlling performance of a smart dedicated outdoor air system (SDOAS) based on IoT platform. The SDOAS was specifically designed with the desiccant unit and thermoelectric module. The designed system was intended to monitor, notify, and control indoor environmental factors such as temperature, humidity, and carbon dioxide (CO₂) level. The SDOAS was tested under the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE 62.2) and indoor air quality standard. The system will notify the user by Blynk notification when the status of the building is uncomfortable or tolerable limits are reached according to the conditions that were set. The user can then control the system via a Blynk application on a smartphone. The experimental result indicates that the temperature and humidity of indoor fresh air in the comfort zone are approximately 26 degree Celsius and 58% respectively. Furthermore, the CO₂ level was controlled lower than 1000 ppm by indoor air quality standard condition. Therefore, the proposed system can efficiently work and be easy to use for buildings.Keywords: internet of things, indoor air quality, smart dedicated outdoor air system, thermal comfort
Procedia PDF Downloads 19922002 Rest Behavior and Restoration: Searching for Patterns through a Textual Analysis
Authors: Sandra Christina Gressler
Abstract:
Resting is essentially the physical and mental relaxation. So, can behaviors that go beyond the merely physical relaxation to some extent be understood as a behavior of restoration? Studies on restorative environments emphasize the physical, mental and social benefits that some environments can provide and suggest that activities in natural environments reduce the stress of daily lives, promoting recovery against the daily wear. These studies, though specific in their results, do not unify the different possibilities of restoration. Considering the importance of restorative environments by promoting well-being, this research aims to verify the applicability of the theory on restorative environments in a Brazilian context, inquiring about the environment/behavior of rest. The research sought to achieve its goals by; a) identifying daily ways of how participants interact/connect with nature; b) identifying the resting environments/behavior; c) verifying if rest strategies match the restorative environments suggested by restorative studies; and d) verifying different rest strategies related to time. Workers from different companies in which certain functions require focused attention, and high school students from different schools, participated in this study. An interview was used to collect data and information. The data obtained were compared with studies of attention restoration theory and stress recovery. The collected data were analyzed through the basic descriptive inductive statistics and the use of the software ALCESTE® (Analyse Lexicale par Contexte d'un Ensemble de Segments de Texte). The open questions investigate perception of nature on a daily basis – analysis using ALCESTE; rest periods – daily, weekends and holidays – analysis using ALCESTE with tri-croisé; and resting environments and activities – analysis using a simple descriptive statistics. According to the results, environments with natural characteristics that are compatible with personal desires (physical aspects and distance) and residential environments when they fulfill the characteristics of refuge, safety, and self-expression, characteristics of primary territory, meet the requirements of restoration. Analyzes suggest that the perception of nature has a wide range that goes beyond the objects nearby and possible to be touched, as well as observation and contemplation of details. The restoration processes described in the studies of attention restoration theory occur gradually (hierarchically), starting with being away, following compatibility, fascination, and extent. They are also associated with the time that is available for rest. The relation between rest behaviors and the bio-demographic characteristics of the participants are noted. It reinforces, in studies of restoration, the need to insert not only investigations regarding the physical characteristics of the environment but also behavior, social relationship, subjective reactions, distance and time available. The complexity of the theme indicates the necessity for multimethod studies. Practical contributions provide subsidies for developing strategies to promote the welfare of the population.Keywords: attention restoration theory, environmental psychology, rest behavior, restorative environments
Procedia PDF Downloads 19322001 Geospatial Information for Smart City Development
Authors: Simangele Dlamini
Abstract:
Smart city development is seen as a way of facing the challenges brought about by the growing urban population the world over. Research indicates that cities have a role to play in combating urban challenges like crime, waste disposal, greenhouse gas emissions, and resource efficiency. These solutions should be such that they do not make city management less sustainable but should be solutions-driven, cost and resource-efficient, and smart. This study explores opportunities on how the City of Johannesburg, South Africa, can use Geographic Information Systems, Big Data and the Internet of Things (IoT) in identifying opportune areas to initiate smart city initiatives such as smart safety, smart utilities, smart mobility, and smart infrastructure in an integrated manner. The study will combine Big Data, using real-time data sources to identify hotspot areas that will benefit from ICT interventions. The GIS intervention will assist the city in avoiding a silo approach in its smart city development initiatives, an approach that has led to the failure of smart city development in other countries.Keywords: smart cities, internet of things, geographic information systems, johannesburg
Procedia PDF Downloads 14822000 Evaluation of Water Efficiency in Farming: Empirical Evidence from a Semi-Arid Region
Authors: Laura Piedra-Munoz, Angeles Godoy-Duran, Emilio Galdeano-Gomez, Juan C. Perez-Mesa
Abstract:
Spain is very sensitive to water management issues due to its climatic characteristics and the deficit of this resource in many areas of its territory. This study examines the characteristics of the family farms that are more efficient in the use of water, focusing on a semi-arid area located in Almeria, southeast of Spain. In the case of irrigated agriculture, water usage efficiency usually indicates water productivity in terms of yield (kg/m³), or in economic terms (euros/m³). These two water usage indicators were considered to analyse water usage efficiency according to other studies on water efficiency in the horticultural area under analysis. This work also takes into account other water usage characteristics such as water supplied, innovative irrigation practices, water-efficient technology, and water-saving practices. The results show that the most water efficient farms have technical advisors and use irrigation on demand, that measures the water needs of the crops and are considered the most technological irrigation system. These farms are more technological and less labor intensive. They are also aware of water scarcity and the need to conserve the environment. This approach allow managers to identify the principal factors and best practices related to water efficiency in order to promote and implement them in inefficient farms and promote sustainability.Keywords: cluster analysis, family farms, Spain, sustainability, water-use efficiency
Procedia PDF Downloads 28521999 Impact of Electronic Guest Relationship Management (e-GRM) on Brand Loyalty: The Case of Croatian Hotels
Authors: Marina Laškarin, Vlado Galičić
Abstract:
Quick adoption of e-business and emerging influence of “Electronic Word of Mouth e-WOM” communication on guests made leading hotel brands successful examples of electronic guest relationship management. Main reasons behind such success are well established procedures in collection, analysis and usage of highly valuable data available on the Internet, generated through some form of e-GRM programme. E-GRM is more than just a technology solution. It’s a system which balance respective guest demands, hotel technological capabilities and organizational culture of employees, discharging the universal approach in guest relations “same for all”. The purpose of this research derives from the necessity of determining the importance of monitoring and applying e-WOM communication as one of the methods used in managing guest relations. This paper analyses and compares different hotelier’s opinions on e-WOM communication.Keywords: brand loyalty, e-WOM communication, GRM programmes, organizational culture
Procedia PDF Downloads 29021998 Emerging Threats and Adaptive Defenses: Navigating the Future of Cybersecurity in a Hyperconnected World
Authors: Olasunkanmi Jame Ayodeji, Adebayo Adeyinka Victor
Abstract:
In a hyperconnected world, cybersecurity faces a continuous evolution of threats that challenge traditional defence mechanisms. This paper explores emerging cybersecurity threats like malware, ransomware, phishing, social engineering, and the Internet of Things (IoT) vulnerabilities. It delves into the inadequacies of existing cybersecurity defences in addressing these evolving risks and advocates for adaptive defence mechanisms that leverage AI, machine learning, and zero-trust architectures. The paper proposes collaborative approaches, including public-private partnerships and information sharing, as essential to building a robust defence strategy to address future cyber threats. The need for continuous monitoring, real-time incident response, and adaptive resilience strategies is highlighted to fortify digital infrastructures in the face of escalating global cyber risks.Keywords: cybersecurity, hyperconnectivity, malware, adaptive defences, zero-trust architecture, internet of things vulnerabilities
Procedia PDF Downloads 2021997 Interoperable Platform for Internet of Things at Home Applications
Authors: Fabiano Amorim Vaz, Camila Gonzaga de Araujo
Abstract:
With the growing number of personal devices such as smartphones, tablets, smart watches, among others, in addition to recent devices designed for IoT, it is observed that residential environment has potential to generate important information about our daily lives. Therefore, this work is focused on showing and evaluating a system that integrates all these technologies considering the context of a smart house. To achieve this, we define an architecture capable of supporting the amount of data generated and consumed at a residence and, mainly, the variety of this data presents. We organize it in a particular cloud containing information about robots, recreational vehicles, weather, in addition to data from the house, such as lighting, energy, security, among others. The proposed architecture can be extrapolated to various scenarios and applications. Through the core of this work, we can define new functionality for residences integrating them with more resources.Keywords: cloud computing, IoT, robotics, smart house
Procedia PDF Downloads 38121996 Factors Influencing University Students' Online Disinhibition Behavior: The Moderating Effects of Deterrence and Social Identity
Authors: Wang, Kuei-Ing, Jou-Fan Shih
Abstract:
This study adopts deterrence theory as well as social identities as moderators, and explores their moderating affects on online toxic disinhibition. Survey and Experimental methodologies are applied to test the research model and four hypotheses are developed in this study. The controllability of identity positively influenced the behavior of toxic disinhibition both in experimental and control groups while the fluidity of the identity did not have significant influences on online disinhibition. Punishment certainty, punishment severity as well as social identity negatively moderated the relation between the controllability of the identity and the toxic disinhibition. The result of this study shows that internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the inappropriate behavior will be found and punished severely, the inappropriate behavior then will be weakened.Keywords: seductive properties of internet, online disinhibition, punishment certainty, punishment severity, social identity
Procedia PDF Downloads 50821995 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 34521994 A Model for Language Intervention: Toys & Picture-Books as Early Pedagogical Props for the Transmission of Lazuri
Authors: Peri Ozlem Yuksel-Sokmen, Irfan Cagtay
Abstract:
Oral languages are destined to disappear rapidly in the absence of interventions aimed at encouraging their usage by young children. The seminal language preservation model proposed by Fishman (1991) stresses the importance of multiple generations using the endangered L1 while engaged in daily routines with younger children. Over the last two decades Fishman (2001) has used his intergenerational transmission model in documenting the revitalization of Basque languages, providing evidence that families are transmitting Euskara as a first language to their children with success. In our study, to motivate usage of Lazuri, we asked caregivers to speak the language while engaged with their toddlers (12 to 48 months) in semi-structured play, and included both parents (N=32) and grandparents (N=30) as play partners. This unnatural prompting to speak only in Lazuri was greeted with reluctance, as 90% of our families indicated that they had stopped using Lazuri with their children. Nevertheless, caregivers followed instructions and produced 67% of their utterances in Lazuri, with another 14% of utterances using a combination of Lazuri and Turkish (Codeswitch). Although children spoke mostly in Turkish (83% of utterances), frequencies of caregiver utterances in Lazuri or Codeswitch predicted the extent to which their children used the minority language in return. This trend suggests that home interventions aimed at encouraging dyads to communicate in a non-preferred, endangered language can effectively increase children’s usage of the language. Alternatively, this result suggests than any use of the minority language on the part of the children will promote its further usage by caregivers. For researchers examining links between play, culture, and child development, structured play has emerged as a critical methodology (e.g., Frost, Wortham, Reifel, 2007, Lilliard et al., 2012; Sutton-Smith, 1986; Gaskins & Miller, 2009), allowing investigation of cultural and individual variation in parenting styles, as well as the role of culture in constraining the affordances of toys. Toy props, as well as picture-books in native languages, can be used as tools in the transmission and preservation of endangered languages by allowing children to explore adult roles through enactment of social routines and conversational patterns modeled by caregivers. Through adult-guided play children not only acquire scripts for culturally significant activities, but also develop skills in expressing themselves in culturally relevant ways that may continue to develop over their lives through community engagement. Further pedagogical tools, such as language games and e-learning, will be discussed in this proposed oral talk.Keywords: language intervention, pedagogical tools, endangered languages, Lazuri
Procedia PDF Downloads 32921993 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 8721992 Vision-Based Daily Routine Recognition for Healthcare with Transfer Learning
Authors: Bruce X. B. Yu, Yan Liu, Keith C. C. Chan
Abstract:
We propose to record Activities of Daily Living (ADLs) of elderly people using a vision-based system so as to provide better assistive and personalization technologies. Current ADL-related research is based on data collected with help from non-elderly subjects in laboratory environments and the activities performed are predetermined for the sole purpose of data collection. To obtain more realistic datasets for the application, we recorded ADLs for the elderly with data collected from real-world environment involving real elderly subjects. Motivated by the need to collect data for more effective research related to elderly care, we chose to collect data in the room of an elderly person. Specifically, we installed Kinect, a vision-based sensor on the ceiling, to capture the activities that the elderly subject performs in the morning every day. Based on the data, we identified 12 morning activities that the elderly person performs daily. To recognize these activities, we created a HARELCARE framework to investigate into the effectiveness of existing Human Activity Recognition (HAR) algorithms and propose the use of a transfer learning algorithm for HAR. We compared the performance, in terms of accuracy, and training progress. Although the collected dataset is relatively small, the proposed algorithm has a good potential to be applied to all daily routine activities for healthcare purposes such as evidence-based diagnosis and treatment.Keywords: daily activity recognition, healthcare, IoT sensors, transfer learning
Procedia PDF Downloads 13221991 Empowering and Educating Young People Against Cybercrime by Playing: The Rayuela Method
Authors: Jose L. Diego, Antonio Berlanga, Gregorio López, Diana López
Abstract:
The Rayuela method is a success story, as it is part of a project selected by the European Commission to face the challenge launched by itself for achieving a better understanding of human factors, as well as social and organisational aspects that are able to solve issues in fighting against crime. Rayuela's method specifically focuses on the drivers of cyber criminality, including approaches to prevent, investigate, and mitigate cybercriminal behavior. As the internet has become an integral part of young people’s lives, they are the key target of the Rayuela method because they (as a victim or as a perpetrator) are the most vulnerable link of the chain. Considering the increased time spent online and the control of their internet usage and the low level of awareness of cyber threats and their potential impact, it is understandable the proliferation of incidents due to human mistakes. 51% of Europeans feel not well informed about cyber threats, and 86% believe that the risk of becoming a victim of cybercrime is rapidly increasing. On the other hand, Law enforcement has noted that more and more young people are increasingly committing cybercrimes. This is an international problem that has considerable cost implications; it is estimated that crimes in cyberspace will cost the global economy $445B annually. Understanding all these phenomena drives to the necessity of a shift in focus from sanctions to deterrence and prevention. As a research project, Rayuela aims to bring together law enforcement agencies (LEAs), sociologists, psychologists, anthropologists, legal experts, computer scientists, and engineers, to develop novel methodologies that allow better understanding the factors affecting online behavior related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity and technologies. Rayuela’s main goal is to better understand the drivers and human factors affecting certain relevant ways of cyber criminality, as well as empower and educate young people in the benefits, risks, and threats intrinsically linked to the use of the Internet by playing, thus preventing and mitigating cybercriminal behavior. In order to reach that goal it´s necessary an interdisciplinary consortium (formed by 17 international partners) carries out researches and actions like Profiling and case studies of cybercriminals and victims, risk assessments, studies on Internet of Things and its vulnerabilities, development of a serious gaming environment, training activities, data analysis and interpretation using Artificial intelligence, testing and piloting, etc. For facilitating the real implementation of the Rayuela method, as a community policing strategy, is crucial to count on a Police Force with a solid background in trust-building and community policing in order to do the piloting, specifically with young people. In this sense, Valencia Local Police is a pioneer Police Force working with young people in conflict solving, through providing police mediation and peer mediation services and advice. As an example, it is an official mediation institution, so agreements signed by their police mediators have once signed by the parties, the value of a judicial decision.Keywords: fight against crime and insecurity, avert and prepare young people against aggression, ICT, serious gaming and artificial intelligence against cybercrime, conflict solving and mediation with young people
Procedia PDF Downloads 12821990 Radio Frequency Energy Harvesting Friendly Self-Clocked Digital Low Drop-Out for System-On-Chip Internet of Things
Authors: Christos Konstantopoulos, Thomas Ussmueller
Abstract:
Digital low drop-out regulators, in contrast to analog counterparts, provide an architecture of sub-1 V regulation with low power consumption, high power efficiency, and system integration. Towards an optimized integration in the ultra-low-power system-on-chip Internet of Things architecture that is operated through a radio frequency energy harvesting scheme, the D-LDO regulator should constitute the main regulator that operates the master-clock and rest loads of the SoC. In this context, we present a D-LDO with linear search coarse regulation and asynchronous fine regulation, which incorporates an in-regulator clock generation unit that provides an autonomous, self-start-up, and power-efficient D-LDO design. In contrast to contemporary D-LDO designs that employ ring-oscillator architecture which start-up time is dependent on the frequency, this work presents a fast start-up burst oscillator based on a high-gain stage with wake-up time independent of coarse regulation frequency. The design is implemented in a 55-nm Global Foundries CMOS process. With the purpose to validate the self-start-up capability of the presented D-LDO in the presence of ultra-low input power, an on-chip test-bench with an RF rectifier is implemented as well, which provides the RF to DC operation and feeds the D-LDO. Power efficiency and load regulation curves of the D-LDO are presented as extracted from the RF to regulated DC operation. The D-LDO regulator presents 83.6 % power efficiency during the RF to DC operation with a 3.65 uA load current and voltage regulator referred input power of -27 dBm. It succeeds 486 nA maximum quiescent current with CL 75 pF, the maximum current efficiency of 99.2%, and 1.16x power efficiency improvement compared to analog voltage regulator counterpart oriented to SoC IoT loads. Complementary, the transient performance of the D-LDO is evaluated under the transient droop test, and the achieved figure-of-merit is compared with state-of-art implementations.Keywords: D-LDO, Internet of Things, RF energy harvesting, voltage regulators
Procedia PDF Downloads 14521989 Map Matching Performance under Various Similarity Metrics for Heterogeneous Robot Teams
Authors: M. C. Akay, A. Aybakan, H. Temeltas
Abstract:
Aerial and ground robots have various advantages of usage in different missions. Aerial robots can move quickly and get a different sight of view of the area, but those vehicles cannot carry heavy payloads. On the other hand, unmanned ground vehicles (UGVs) are slow moving vehicles, since those can carry heavier payloads than unmanned aerial vehicles (UAVs). In this context, we investigate the performances of various Similarity Metrics to provide a common map for Heterogeneous Robot Team (HRT) in complex environments. Within the usage of Lidar Odometry and Octree Mapping technique, the local 3D maps of the environment are gathered. In order to obtain a common map for HRT, informative theoretic similarity metrics are exploited. All types of these similarity metrics gave adequate as allowable simulation time and accurate results that can be used in different types of applications. For the heterogeneous multi robot team, those methods can be used to match different types of maps.Keywords: common maps, heterogeneous robot team, map matching, informative theoretic similarity metrics
Procedia PDF Downloads 16721988 Analysis of Financial Time Series by Using Ornstein-Uhlenbeck Type Models
Authors: Md Al Masum Bhuiyan, Maria C. Mariani, Osei K. Tweneboah
Abstract:
In the present work, we develop a technique for estimating the volatility of financial time series by using stochastic differential equation. Taking the daily closing prices from developed and emergent stock markets as the basis, we argue that the incorporation of stochastic volatility into the time-varying parameter estimation significantly improves the forecasting performance via Maximum Likelihood Estimation. While using the technique, we see the long-memory behavior of data sets and one-step-ahead-predicted log-volatility with ±2 standard errors despite the variation of the observed noise from a Normal mixture distribution, because the financial data studied is not fully Gaussian. Also, the Ornstein-Uhlenbeck process followed in this work simulates well the financial time series, which aligns our estimation algorithm with large data sets due to the fact that this algorithm has good convergence properties.Keywords: financial time series, maximum likelihood estimation, Ornstein-Uhlenbeck type models, stochastic volatility model
Procedia PDF Downloads 24021987 Internet Protocol Television: A Research Study of Undergraduate Students Analyze the Effects
Authors: Sabri Serkan Gulluoglu
Abstract:
The study is aimed at examining the effects of internet marketing with IPTV on human beings. Internet marketing with IPTV is emerging as an integral part of business strategies in today’s technologically advanced world and the business activities all over the world are influences with the emergence of this modern marketing tool. As the population of the Internet and on-line users’ increases, new research issues have arisen concerning the demographics and psychographics of the on-line user and the opportunities for a product or service. In recent years, we have seen a tendency of various services converging to the ubiquitous Internet Protocol based networks. Besides traditional Internet applications such as web browsing, email, file transferring, and so forth, new applications have been developed to replace old communication networks. IPTV is one of the solutions. In the future, we expect a single network, the IP network, to provide services that have been carried by different networks today. For finding some important effects of a video based technology market web site on internet, we determine to apply a questionnaire on university students. Recently some researches shows that in Turkey the age of people 20 to 24 use internet when they buy some electronic devices such as cell phones, computers, etc. In questionnaire there are ten categorized questions to evaluate the effects of IPTV when shopping. There were selected 30 students who are filling the question form after watching an IPTV channel video for 10 minutes. This sample IPTV channel is “buy.com”, it look like an e-commerce site with an integrated IPTV channel on. The questionnaire for the survey is constructed by using the Likert scale that is a bipolar scaling method used to measure either positive or negative response to a statement (Likert, R) it is a common system that is used is the surveys. By following the Likert Scale “the respondents are asked to indicate their degree of agreement with the statement or any kind of subjective or objective evaluation of the statement. Traditionally a five-point scale is used under this methodology”. For this study also the five point scale system is used and the respondents were asked to express their opinions about the given statement by picking the answer from the given 5 options: “Strongly disagree, Disagree, Neither agree Nor disagree, Agree and Strongly agree”. These points were also rates from 1-5 (Strongly disagree, Disagree, Neither disagree Nor agree, Agree, Strongly agree). On the basis of the data gathered from the questionnaire some results are drawn in order to get the figures and graphical representation of the study results that can demonstrate the outcomes of the research clearly.Keywords: IPTV, internet marketing, online, e-commerce, video based technology
Procedia PDF Downloads 24021986 A Study to Understand the Factors Influencing the Behavioral Intentions of Individuals Towards Using Metaverse
Authors: Suktisuddha Goswami, Surekha Chukkali
Abstract:
Metaverse is a real time rendered 3D world which is an extension of the virtual reality, augmented reality, mixed reality, and holographic reality. While using the metaverse can enhance various aspects of our lives, it might also create certain challenges. However, since the concept of the metaverse is very new, there is a lack of research on factors influencing the individual’s behavioural intentions to use it. To address this gap, this quantitative research study was conducted to understand the factors influencing the behavioural intention of individuals towards metaverse usage. This research was conducted through a large-scale questionnaire survey of 325 Indian students at three major engineering colleges. The questionnaire was adequately customized for the present study. It was found that behavioral intention towards metaverse usage differs among individuals. There were few individuals who had no intention of using metaverse in near future, while some of them were already using it and a few were significantly inclined towards using it. The findings of this study have suggested that behavioural intention was significantly and positively related to performance expectancy and effort expectancy of individuals.Keywords: behavioral intention, effort expectancy, performance expectancy, technology, metaverse
Procedia PDF Downloads 11321985 The Impact of Artificial Intelligence on Agricultural Machines and Plant Nutrition
Authors: Kirolos Gerges Yakoub Gerges
Abstract:
Self-sustaining agricultural machines act in stochastic surroundings and therefore, should be capable of perceive the surroundings in real time. This notion can be done using image sensors blended with superior device learning, mainly Deep mastering. Deep convolutional neural networks excel in labeling and perceiving colour pix and since the fee of RGB-cameras is low, the hardware cost of accurate notion relies upon heavily on memory and computation power. This paper investigates the opportunity of designing lightweight convolutional neural networks for semantic segmentation (pixel clever class) with reduced hardware requirements, to allow for embedded usage in self-reliant agricultural machines. The usage of compression techniques, a lightweight convolutional neural community is designed to carry out actual-time semantic segmentation on an embedded platform. The community is skilled on two big datasets, ImageNet and Pascal Context, to apprehend as much as four hundred man or woman instructions. The 400 training are remapped into agricultural superclasses (e.g. human, animal, sky, road, area, shelterbelt and impediment) and the capacity to provide correct actual-time perception of agricultural environment is studied. The network is carried out to the case of self-sufficient grass mowing the usage of the NVIDIA Tegra X1 embedded platform. Feeding case-unique pics to the community consequences in a fully segmented map of the superclasses within the picture. As the network remains being designed and optimized, handiest a qualitative analysis of the technique is entire on the abstract submission deadline. intending this cut-off date, the finalized layout is quantitatively evaluated on 20 annotated grass mowing pictures. Light-weight convolutional neural networks for semantic segmentation can be implemented on an embedded platform and show aggressive performance on the subject of accuracy and speed. It’s miles viable to offer value-efficient perceptive capabilities related to semantic segmentation for autonomous agricultural machines.Keywords: centrifuge pump, hydraulic energy, agricultural applications, irrigationaxial flux machines, axial flux applications, coreless machines, PM machinesautonomous agricultural machines, deep learning, safety, visual perception
Procedia PDF Downloads 2621984 Policy Implications of Cashless Banking on Nigeria’s Economy
Authors: Oluwabiyi Adeola Ayodele
Abstract:
This study analysed the Policy and general issues that have arisen over time in Nigeria’ Cashless banking environment as a result of the lack of a Legal framework on Electronic banking in Nigeria. It undertook an in-depth study of the cashless banking system. It discussed the evolution, growth and development of cashless banking in Nigeria; It revealed the expected benefits of the cashless banking system; It appraised regulatory issues and other prevalent problems on cashless banking in Nigeria; and made appropriate recommendations where necessary. The study relied on primary and secondary sources of information. The primary sources included the Constitution of the Federal Republic of Nigeria, Statutes, Conventions and Judicial decisions, while the secondary sources included Books, Journals Articles, Newspapers and Internet Materials. The study revealed that cashless banking has been adopted in Nigeria but still at the developing stage. It revealed that there is no law for the regulation of cashless banking in Nigeria, what Nigeria relies on for regulation is the Central Bank of Nigeria’s Cashless Policy, 2014. The Banks and Other Financial Institutions Act Chapter B3, LFN, 2004 of Nigeria lack provision to accommodate issues on Internet banking. However, under the general principles of legality in criminal law, and by the provisions of the Nigerian Constitution, a person can only be punished for conducts that have been defined to be criminal by written laws with the penalties specifically stated in the law. Although Nigeria has potent laws for the regulation of paper banking, these laws cannot be substituted for paperless transactions. This is because the issues involved in both transactions vary. The study also revealed that the absence of law in the cashless banking environment in Nigeria will subject consumers to endless risks. This study revealed that the creation of banking markets via the Internet relies on both available technologies and appropriate laws and regulations. It revealed however that Law of some of the countries considered on cashless banking has taken care of most of the legal issues and other problems prevalent in the cashless banking environment. The study also revealed some other problems prevalent in the Nigerian cashless banking environment. The study concluded that for Nigeria to find solutions to the legal issues raised in its cashless banking environment and other problems of cashless banking, it should have a viable legal Frame work for internet banking. The study concluded that the Central Bank of Nigeria’s Policy on Cashless banking is not potent enough to tackle the challenges posed to cashless banking in Nigeria because policies only have a persuasive effect and not a binding effect. There is, therefore, a need for appropriate Laws for the regulation of cashless Banking in Nigeria. The study also concluded that there is a need to create more awareness of the system among Nigerians and solve infrastructural problems like prevalent power outage which often have been creating internet network problem.Keywords: cashless-banking, Nigeria, policies, laws
Procedia PDF Downloads 48921983 Energy Management Techniques in Mobile Robots
Authors: G. Gurguze, I. Turkoglu
Abstract:
Today, the developing features of technological tools with limited energy resources have made it necessary to use energy efficiently. Energy management techniques have emerged for this purpose. As with every field, energy management is vital for robots that are being used in many areas from industry to daily life and that are thought to take up more spaces in the future. Particularly, effective power management in autonomous and multi robots, which are getting more complicated and increasing day by day, will improve the performance and success. In this study, robot management algorithms, usage of renewable and hybrid energy sources, robot motion patterns, robot designs, sharing strategies of workloads in multiple robots, road and mission planning algorithms are discussed for efficient use of energy resources by mobile robots. These techniques have been evaluated in terms of efficient use of existing energy resources and energy management in robots.Keywords: energy management, mobile robot, robot administration, robot management, robot planning
Procedia PDF Downloads 266