Search results for: users
1946 Optimizing Electric Vehicle Charging with Charging Data Analytics
Authors: Tayyibah Khanam, Mohammad Saad Alam, Sanchari Deb, Yasser Rafat
Abstract:
Electric vehicles are considered as viable replacements to gasoline cars since they help in reducing harmful emissions and stimulate power generation through renewable energy sources, hence contributing to sustainability. However, one of the significant obstacles in the mass deployment of electric vehicles is the charging time anxiety among users and, thus, the subsequent large waiting times for available chargers at charging stations. Data analytics, on the other hand, has revolutionized the decision-making tasks of management and operating systems since its arrival. In this paper, we attempt to optimize the choice of EV charging stations for users in their vicinity by minimizing the time taken to reach the charging stations and the waiting times for available chargers. Time taken to travel to the charging station is calculated by the Google Maps API and the waiting times are predicted by polynomial regression of the historical data stored. The proposed framework utilizes real-time data and historical data from all operating charging stations in the city and assists the user in finding the best suitable charging station for their current situation and can be implemented in a mobile phone application. The algorithm successfully predicts the most optimal choice of a charging station and the minimum required time for various sample data sets.Keywords: charging data, electric vehicles, machine learning, waiting times
Procedia PDF Downloads 1931945 The Use of Orthodontic Pacifiers to Prevent Pacifier Induced Malocclusion - A Literature Review
Authors: Maliha Ahmed Suleman, Sidra Ahmed Suleman
Abstract:
Introduction: The use of pacifiers is common amongst infants and young children as a comforting behavior. These non-nutritive sucking habits can be detrimental to the developing occlusion should they persist while the permanent dentition is established. Orthodontic pacifiers have been recommended as an alternative to conventional pacifiers as they are considered to have less interference with orofacial development. However, there is a lack of consensus on whether this is true. Aim and objectives: To review the prevalence of malocclusion associated with the use of orthodontic pacifiers. Methodology: Literature was identified through a rigorous search of the Embase, Pubmed, CINAHL, and Cochrane Library databases. Articles published from 2000 onwards were included. In total, 5 suitable papers were identified. Results: One study showed that the use of orthodontic pacifiers increased the risk of malocclusion, as seen through a greater prevalence of accentuated overjet, posterior crossbites, and anterior open bites in comparison to individuals who did not use pacifiers. However, this study found that there was a clinically significant reduction in the prevalence of anterior open bites amongst orthodontic pacifier users in comparison to conventional pacifier users. Another study found that both types of pacifiers lead to malocclusion; however, they found no difference in the mean overjet and prevalence of anterior open bites amongst conventional and orthodontic pacifier users. In contrast, one study suggested that orthodontic pacifiers do not seem to be related to the development of malocclusions in the primary dentitions, and using them between the ages of 0-3 months was actually beneficial as it prevents thumb-sucking habits. One of the systemic reviews concluded that orthodontic pacifiers do not seem to reduce the occurrence of posterior crossbites; however, they could reduce the development of open bites by virtue of their thin neck design. Whereas another systematic review concluded that there were no differences as to the effects on the stomatognathic system when comparing conventional and orthodontic pacifiers. Conclusion: There is limited and conflicting evidence to support the notion that orthodontic pacifiers can reduce the prevalence of malocclusion when compared to conventional pacifiers. Well-designed randomized controlled trials are required in the future in order to thoroughly assess the effects of orthodontic pacifiers on the developing occlusion and orofacial structures.Keywords: orthodontics, pacifier, malocclusion, review
Procedia PDF Downloads 851944 Association of Serum Uric Acid Level and Bone Mineral Density of Menopausal Women
Authors: Soyeon Kang, Youn-Jee Chung, Jung Namkung
Abstract:
Objective: This retrospective study investigated the association between uric acid level and bone mineral density (BMD) in the postmenopausal period. Methods: The study included 328 menopausal women (mean age, 57.3 ± 6.5 years; mean serum uric acid level, 4.6 ± 1.0 mg/dL). Patients were divided into three groups by tertile of serum uric acid level. Patients who used hormone treatment (HT), bisphosphonates, or lipid-lowering agents were included. Results: Blood urea nitrogen, serum creatinine, and serum triglyceride levels were significantly higher in the upper uric acid tertiles. No significant difference was found in the mean uric acid levels between medication users and non-users. Distinct HT regimens showed different mean serum uric acid levels. In a cross-sectional analysis, higher serum uric acid levels showed a tendency toward increased BMD in the spine and femoral neck. Longitudinal analysis of 186 women who underwent follow-up examination at a mean interval of 14.6 months revealed a trend toward a smaller reduction in femoral neck BMD in women in the upper serum uric acid tertiles. Conclusion: A positive correlation exists between serum uric acid levels and BMD in menopausal women.Keywords: menopause, antioxidant, uric acid, bone mineral density
Procedia PDF Downloads 1291943 The Amount of Conformity of Persian Subject Headlines with Users' Social Tagging
Authors: Amir Reza Asnafi, Masoumeh Kazemizadeh, Najmeh Salemi
Abstract:
Due to the diversity of information resources in the web0.2 environment, which is increasing in number from time to time, the social tagging system should be used to discuss Internet resources. Studying the relevance of social tags to thematic headings can help enrich resources and make them more accessible to resources. The present research is of applied-theoretical type and research method of content analysis. In this study, using the listing method and content analysis, the level of accurate, approximate, relative, and non-conformity of social labels of books available in the field of information science and bibliography of Kitabrah website with Persian subject headings was determined. The exact matching of subject headings with social tags averaged 22 items, the approximate matching of subject headings with social tags averaged 36 items, the relative matching of thematic headings with social tags averaged 36 social items, and the average matching titles did not match the title. The average is 116. According to the findings, the exact matching of subject headings with social labels is the lowest and the most inconsistent. This study showed that the average non-compliance of subject headings with social labels is even higher than the sum of the three types of exact, relative, and approximate matching. As a result, the relevance of thematic titles to social labels is low. Due to the fact that the subject headings are in the form of static text and users are not allowed to interact and insert new selected words and topics, and on the other hand, in websites based on Web 2 and based on the social classification system, this possibility is available for users. An important point of the present study and the studies that have matched the syntactic and semantic matching of social labels with thematic headings is that the degree of conformity of thematic headings with social labels is low. Therefore, these two methods can complement each other and create a hybrid cataloging that includes subject headings and social tags. The low level of conformity of thematic headings with social tags confirms the results of backgrounds and writings that have compared the social tags of books with the thematic headings of the Library of Congress. It is not enough to match social labels with thematic headings. It can be said that these two methods can be complementary.Keywords: Web 2/0, social tags, subject headings, hybrid cataloging
Procedia PDF Downloads 1591942 Deep Learning to Improve the 5G NR Uplink Control Channel
Authors: Ahmed Krobba, Meriem Touzene, Mohamed Debeyche
Abstract:
The wireless communications system (5G) will provide more diverse applications and higher quality services for users compared to the long-term evolution 4G (LTE). 5G uses a higher carrier frequency, which suffers from information loss in 5G coverage. Most 5G users often cannot obtain high-quality communications due to transmission channel noise and channel complexity. Physical Uplink Control Channel (PUCCH-NR: Physical Uplink Control Channel New Radio) plays a crucial role in 5G NR telecommunication technology, which is mainly used to transmit link control information uplink (UCI: Uplink Control Information. This study based of evaluating the performance of channel physical uplink control PUCCH-NR under low Signal-to-Noise Ratios with various antenna numbers reception. We propose the artificial intelligence approach based on deep neural networks (Deep Learning) to estimate the PUCCH-NR channel in comparison with this approach with different conventional methods such as least-square (LS) and minimum-mean-square-error (MMSE). To evaluate the channel performance we use the block error rate (BLER) as an evaluation criterion of the communication system. The results show that the deep neural networks method gives best performance compared with MMSE and LSKeywords: 5G network, uplink (Uplink), PUCCH channel, NR-PUCCH channel, deep learning
Procedia PDF Downloads 821941 The Evolution of Amazon Alexa: From Voice Assistant to Smart Home Hub
Authors: Abrar Abuzaid, Maha Alaaeddine, Haya Alesayi
Abstract:
This project is centered around understanding the usage and impact of Alexa, Amazon's popular virtual assistant, in everyday life. Alexa, known for its integration into devices like Amazon Echo, offers functionalities such as voice interaction, media control, providing real-time information, and managing smart home devices. Our primary focus is to conduct a straightforward survey aimed at uncovering how people use Alexa in their daily routines. We plan to reach out to a wide range of individuals to get a diverse perspective on how Alexa is being utilized for various tasks, the frequency and context of its use, and the overall user experience. The survey will explore the most common uses of Alexa, its impact on daily life, features that users find most beneficial, and improvements they are looking for. This project is not just about collecting data but also about understanding the real-world applications of a technology like Alexa and how it fits into different lifestyles. By examining the responses, we aim to gain a practical understanding of Alexa's role in homes and possibly in workplaces. This project will provide insights into user satisfaction and areas where Alexa could be enhanced to meet the evolving needs of its users. It’s a step towards connecting technology with everyday life, making it more accessible and user-friendlyKeywords: Amazon Alexa, artificial intelligence, smart speaker, natural language processing
Procedia PDF Downloads 621940 Open Space Use in University Campuses with User Requirements Analysis: The Case of Eskişehir Osmangazi University Meşelik Campus
Authors: Aysen Celen Ozturk, Hatice Dulger
Abstract:
University may be defined as a teaching institution consisting of faculties, institutes, colleges, and units that have undergraduate and graduate education, scientific research and publications. It has scientific autonomy and public legal personality. Today, universities are not only the institutions in which students and lecturers experience education, training and scientific work. They also offer social, cultural and artistic activities that strengthen the link with the city. This also incorporates all city users into the campus borders. Thus, universities contribute to social and individual development of the country by providing science, art, socio-cultural development, communication and socialization with people of different cultural and social backgrounds. Moreover, universities provide an active social life, where the young population is the majority. This enables the sense of belonging to the users to develop, to increase the interaction between academicians and students, and to increase the learning / producing community by continuing academic sharing environments outside the classrooms. For this reason, besides academic spaces in university campuses, the users also need closed and open spaces where they can socialize, spend time together and relax. Public open spaces are the most important social spaces that individuals meet, express themselves and share. Individuals belonging to different socio-cultural structures and ethnic groups maintain their social experiences with the physical environment they are in, the outdoors, and their actions and sharing in these spaces. While university campuses are being designed for their individual and social development roles, user needs must be determined correctly and design should be realized in this direction. While considering that requirements may change over time, user satisfaction should be questioned at certain periods and new arrangements should be made in existing applications in the direction of current demands. This study aims to determine the user requirements through the case of Eskişehir Osmangazi University, Meşelik Campus / Turkey. Post Occupancy Evaluation (POE) questionnaire, cognitive mapping and deep interview methods are used in the research process. All these methods show that the students, academicians and other officials in the Meşelik Campus of Eskişehir Osmangazi University find way finding elements insufficient and are in need of efficient landscape design and social spaces. This study is important in terms of determining the needs of the users as a design input. This will help improving the quality of common space in Eskişehir Osmangazi University and in other similar universities.Keywords: university campuses, public open space, user requirement, post occupancy evaluation
Procedia PDF Downloads 2431939 Effect of Internet Addiction on Dietary Behavior and Lifestyle Characteristics among University Students
Authors: Hafsa Kamran, Asma Afreen, Zaheer Ahmed
Abstract:
Internet addiction, an emerging mental health disorder from last two decades, is manifested by the inability in the controlled use of internet leading to academics, social, physiological and/or psychological difficulties. The present study aimed to assess the levels of internet addiction among university students in Lahore and to explore the effects of internet addiction on their dietary behavior and lifestyle. It was an analytical cross-sectional study. Data was collected from October to December 2016 from students of four universities selected through two-stage sampling method. The numbers of participants were 500 and 13 questionnaires were rejected due to incomplete information. Levels of Internet Addiction (IA) were calculated using Young Internet Addiction Test (YIAT). Data was also collected on students’ demographics, lifestyle factors and dietary behavior using self-reported questionnaire. Data was analyzed using SPSS (version 21). Chi-square test was applied to evaluate the relationship between variables. Results of the study revealed that 10% of the population had severe internet addiction while moderate Internet Addiction was present in 42%. High prevalence was found among males (11% vs. 8%), private sector university students (p = 0.008) and engineering students (p = 0.000). The lifestyle habits of internet addicts were significantly of poorer quality than normal users (p = 0.05). Internet addiction was found associated with lesser physically activity (p = 0.025), had shorter duration of physical activity (p = 0.016), had more disorganized sleep pattern (p = 0.023), had less duration of sleep (p = 0.019), reported being more tired and sleepy in class (p = 0.033) and spending more time on internet as compared to normal users. Severe and moderate internet addicts also found to be more overweight and obese than normal users (p = 0.000). The dietary behavior of internet addicts was significantly poorer than normal users. Internet addicts were found to skip breakfast more than a normal user (p = 0.039). Common reasons for meal skipping were lack of time and snacking between meals (p = 0.000). They also had increased meal size (p = 0.05) and habit of snacking while using the internet (p = 0.027). Fast food (p = 0.016) and fried items (p = 0.05) were most consumed snacks, while carbonated beverages (p = 0.019) were most consumed beverages among internet addicts. Internet Addicts were found to consume less than recommended daily servings of dairy (p = 0.008) and fruits (p = 0.000) and more servings of meat group (p = 0.025) than their no internet addict counterparts. In conclusion, in this study, it was demonstrated that internet addicts have unhealthy dietary behavior and inappropriate lifestyle habits. University students should be educated regarding the importance of balanced diet and healthy lifestyle, which are critical for effectual primary prevention of numerous chronic degenerative diseases. Furthermore, it is necessary to raise awareness concerning adverse effects of internet addiction among youth and their parents.Keywords: dietary behavior, internet addiction, lifestyle, university students
Procedia PDF Downloads 2011938 The Impact of Brand-Related User-Generated Content on Brand Positioning: A Study on Private Higher Education Institutes in Vietnam
Authors: Charitha Harshani Perera, Rajkishore Nayak, Long Thang Van Nguyen
Abstract:
With the advent of social media, Vietnam has changed the way customers perceive the information about the brand. In the context of higher education, the adoption of social media has received attention with the increasing rate of social media usage among undergraduates. Brand-related user-generated content (UGC) on social media emphasizes the social ties between users and users’ participation, which promotes the communication to build and maintain the relationship with the brands. Although brand positioning offers a significant competitive advantage, the association with brand-related user-generated content in social media with brand positioning in the context of higher education is still an under-researched area. Accordingly, using social identity theory and social exchange theory, this research aims to deepen our understanding of the influence of brand-related user-generated content on brand positioning and purchase intention. Employing a quantitative survey design,384 Vietnamese undergraduates were selected based on purposive sampling. The findings suggest that brand-related user-generated content influence brand positioning and brand choice intention. However, there is a significant mediating effect of the reliability and understandability of the content.Keywords: brand positioning, brand-related user-generated content, emerging countries, higher education
Procedia PDF Downloads 1771937 Formal Specification of Web Services Applications for Digital Reference Services of Library Information System
Authors: Magaji Zainab Musa, Nordin M. A. Rahman, Julaily Aida Jusoh
Abstract:
This paper discusses the formal specification of web services applications for digital reference services (WSDRS). Digital reference service involves a user requesting for help from a reference librarian and a reference librarian responding to the request of a user all by electronic means. In most cases users do not get satisfied while using digital reference service due to delay of response of the librarians. Another may be due to no response or due to librarian giving an irrelevant solution to the problem submitted by the user. WDSRS is an informal model that claims to reduce the problems of digital reference services in libraries. It uses web services technology to provide efficient way of satisfying users’ need in the reference section of libraries. But informal model is in natural language which is inconsistent and ambiguous that may cause difficulties to the developers of the system. In order to solve this problem we decided to convert the informal specifications into formal specifications. This is supposed to reduce the overall development time and cost. Formal specification can be used to provide an unambiguous and precise supplement to natural language descriptions. It can be rigorously validated and verified leading to the early detection of specification errors. We use Z language to develop the formal model and verify it with Z/EVES theorem prover tool.Keywords: formal, specifications, web services, digital reference services
Procedia PDF Downloads 3761936 Digital Memory in Motion: (Re) Creating and (Re) Posting of “Gaja-gamini walk” Reels as a Collective Feminist Practices on Instagram
Authors: Gazal Khan
Abstract:
This paper investigates the phenomenon of (re) creating and (re) posting of what is popularly known as "gaja-gamini walk" on instagram as a form of digital feminism, examining how these reels (short videos) make meaning in digital spaces. The study analyzes xyz “gaja- gamini walk” reels created by Indian influencers and instagram users, employing qualitative textual analysis, close readings, and digital ethnography to analyze the interplay between media, memory and digital spaces. The research highlights how “gaja-gamini walk” reels, characterized by an assertive presentation, redefines female body aesthetics, re (orients) sexual gaze to provide layered, interwoven and contested narratives. These reels facilitate a unique form of engagement by allowing users to re-share and participate in feminist discourse and allowing reels to function as sites of memory. The paper also discusses the social dynamics of these reels, their intertextuality with cultural narratives, and the limitations of the format for sustained feminist action. Through this analysis, the paper contributes to understanding the role of digital memory in contemporary feminist movements in context of Indian feminism.Keywords: instagram, gaja-gamni walk, female gaze, digital feminism
Procedia PDF Downloads 331935 Use of Machine Learning in Data Quality Assessment
Authors: Bruno Pinto Vieira, Marco Antonio Calijorne Soares, Armando Sérgio de Aguiar Filho
Abstract:
Nowadays, a massive amount of information has been produced by different data sources, including mobile devices and transactional systems. In this scenario, concerns arise on how to maintain or establish data quality, which is now treated as a product to be defined, measured, analyzed, and improved to meet consumers' needs, which is the one who uses these data in decision making and companies strategies. Information that reaches low levels of quality can lead to issues that can consume time and money, such as missed business opportunities, inadequate decisions, and bad risk management actions. The step of selecting, identifying, evaluating, and selecting data sources with significant quality according to the need has become a costly task for users since the sources do not provide information about their quality. Traditional data quality control methods are based on user experience or business rules limiting performance and slowing down the process with less than desirable accuracy. Using advanced machine learning algorithms, it is possible to take advantage of computational resources to overcome challenges and add value to companies and users. In this study, machine learning is applied to data quality analysis on different datasets, seeking to compare the performance of the techniques according to the dimensions of quality assessment. As a result, we could create a ranking of approaches used, besides a system that is able to carry out automatically, data quality assessment.Keywords: machine learning, data quality, quality dimension, quality assessment
Procedia PDF Downloads 1481934 An Analysis of Innovative Cloud Model as Bridging the Gap between Physical and Virtualized Business Environments: The Customer Perspective
Authors: Asim Majeed, Rehan Bhana, Mak Sharma, Rebecca Goode, Nizam Bolia, Mike Lloyd-Williams
Abstract:
This study aims to investigate and explore the underlying causes of security concerns of customers emerged when WHSmith transformed its physical system to virtualized business model through NetSuite. NetSuite is essentially fully integrated software which helps transforming the physical system to virtualized business model. Modern organisations are moving away from traditional business models to cloud based models and consequently it is expected to have a better, secure and innovative environment for customers. The vital issue of the modern age race is the security when transforming virtualized through cloud based models and designers of interactive systems often misunderstand privacy and even often ignore it, thus causing concerns for users. The content analysis approach is being used to collect the qualitative data from 120 online bloggers including TRUSTPILOT. The results and finding provide useful new insights into the nature and form of security concerns of online users after they have used the WHSmith services offered online through their website. Findings have theoretical as well as practical implications for the successful adoption of cloud computing Business-to-Business model and similar systems.Keywords: innovation, virtualization, cloud computing, organizational flexibility
Procedia PDF Downloads 3841933 Artificial Bee Colony Optimization for SNR Maximization through Relay Selection in Underlay Cognitive Radio Networks
Authors: Babar Sultan, Kiran Sultan, Waseem Khan, Ijaz Mansoor Qureshi
Abstract:
In this paper, a novel idea for the performance enhancement of secondary network is proposed for Underlay Cognitive Radio Networks (CRNs). In Underlay CRNs, primary users (PUs) impose strict interference constraints on the secondary users (SUs). The proposed scheme is based on Artificial Bee Colony (ABC) optimization for relay selection and power allocation to handle the highlighted primary challenge of Underlay CRNs. ABC is a simple, population-based optimization algorithm which attains global optimum solution by combining local search methods (Employed and Onlooker Bees) and global search methods (Scout Bees). The proposed two-phase relay selection and power allocation algorithm aims to maximize the signal-to-noise ratio (SNR) at the destination while operating in an underlying mode. The proposed algorithm has less computational complexity and its performance is verified through simulation results for a different number of potential relays, different interference threshold levels and different transmit power thresholds for the selected relays.Keywords: artificial bee colony, underlay spectrum sharing, cognitive radio networks, amplify-and-forward
Procedia PDF Downloads 5811932 Effects of Cell Phone Usage on Psychological Health of Students
Authors: Avadhesh Kumar
Abstract:
Background: The cell phone has rapidly become an integral, and, for some, an essential communication tool that is being used worldwide. Their use without any knowledge of their harmful effects like cancers and other health effects is not ‘quite’ safe. Studies on cancers due to electromagnetic radiations from cell phones are available, but there is a need to research on the detrimental physical and psychological effects on users like students. This study focused on certain psychological or mental health effects of cell phone usage amongst students. Materials and methods: The present study will be carried out on all the students of Banaras Hindu University. Students of both sexes from urban and rural backgrounds were selected at random and administered a pre- tested questionnaire which included aspects related to few common adverse psychological health signs and symptoms attributed to cell phone over-usage. Results: Stress was found to be the commonest symptom (51.47%) followed by irritability/anger (43.79%). Other common mental symptoms included lack of concentration and academic performance, insomnia, anxiety etc. Suggestions: This study confirms that the younger generation, who are the most frequent cell phone users, needs to be aware of the adverse health effects of cell phone usage especially the mental aspects and take preventive measures to minimize and control the same. Less dependence on the device, a curtailing time period spent on talking, communicating more by texting, etc. are some of the practical measures suggested.Keywords: cell phones, psychological health effects, students, mental health
Procedia PDF Downloads 3091931 Comparative Efficacy of Angiotensin Converting Enzymes Inhibitors and Angiotensin Receptor Blockers in Patients with Heart Failure in Tanzania: A Prospective Cohort Study
Authors: Mark P. Mayala, Henry Mayala, Khuzeima Khanbhai
Abstract:
Background: Heart failure has been a rising concern in Tanzania. New drugs have been introduced, including the group of drugs called Angiotensin receptor Neprilysin Inhibitor (ARNI), but due to their high cost, angiotensin-converting enzymes inhibitors (ACEIs) and Angiotensin receptor blockers (ARBs) have been mostly used in Tanzania. However, according to our knowledge, the efficacy comparison of the two groups is yet to be studied in Tanzania. The aim of this study was to compare the efficacy of ACEIs and ARBs among patients with heart failure. Methodology: This was a hospital-based prospective cohort study done at Jakaya Kikwete Cardiac Institution (JKCI), Tanzania, from June to December 2020. Consecutive enrollment was done until fulfilling the inclusion criteria. Clinical details were measured at baseline. We assessed the relationship between ARBs and ACEIs users with N-terminal pro-brain natriuretic peptide (NT pro-BNP) levels at admission and at 1-month follow-up using a chi-square test. A Kaplan-Meier curve was used to estimate the survival time of the two groups. Results: 155 HF patients were enrolled, with a mean age of 48 years, whereby 52.3% were male, and their mean left ventricular ejection fraction (LVEF) was 37.3%. 52 (33.5%) heart failure patients were on ACEIs, 57 (36.8%) on ARBs, and 46 (29.7%) were neither using ACEIs nor ARBs. At least half of the patients did not receive a guideline-directed medical therapy (GDMT), with only 82 (52.9%) receiving a GDMT. A drop in NT pro-BNP levels was observed during admission and at 1-month follow-up on both groups, from 6389.2 pg/ml to 4000.1 pg/ml for ARB users and 5877.7 pg/ml to 1328.2 pg/ml for the ACEIs users. There was no statistical difference between the two groups when estimated by the Kaplan-Meier curve, though more deaths were observed in those who were neither on ACEIs nor ARBs, with a calculated P value of 0.01. Conclusion: This study demonstrates that ACEIs have more efficacy and overall better clinical outcome than ARBs, but this should be taken under the patient-based case, considering the side effects of ACEIs and patients’ adherence.Keywords: angiotensin converting enzymes inhibitors, angiotensin receptor blockers, guideline direct medical therapy, N-terminal pro-brain natriuretic peptide
Procedia PDF Downloads 851930 IoT Based Soil Moisture Monitoring System for Indoor Plants
Authors: Gul Rahim Rahimi
Abstract:
The IoT-based soil moisture monitoring system for indoor plants is designed to address the challenges of maintaining optimal moisture levels in soil for plant growth and health. The system utilizes sensor technology to collect real-time data on soil moisture levels, which is then processed and analyzed using machine learning algorithms. This allows for accurate and timely monitoring of soil moisture levels, ensuring plants receive the appropriate amount of water to thrive. The main objectives of the system are twofold: to keep plants fresh and healthy by preventing water deficiency and to provide users with comprehensive insights into the water content of the soil on a daily and hourly basis. By monitoring soil moisture levels, users can identify patterns and trends in water consumption, allowing for more informed decision-making regarding watering schedules and plant care. The scope of the system extends to the agriculture industry, where it can be utilized to minimize the efforts required by farmers to monitor soil moisture levels manually. By automating the process of soil moisture monitoring, farmers can optimize water usage, improve crop yields, and reduce the risk of plant diseases associated with over or under-watering. Key technologies employed in the system include the Capacitive Soil Moisture Sensor V1.2 for accurate soil moisture measurement, the Node MCU ESP8266-12E Board for data transmission and communication, and the Arduino framework for programming and development. Additionally, machine learning algorithms are utilized to analyze the collected data and provide actionable insights. Cloud storage is utilized to store and manage the data collected from multiple sensors, allowing for easy access and retrieval of information. Overall, the IoT-based soil moisture monitoring system offers a scalable and efficient solution for indoor plant care, with potential applications in agriculture and beyond. By harnessing the power of IoT and machine learning, the system empowers users to make informed decisions about plant watering, leading to healthier and more vibrant indoor environments.Keywords: IoT-based, soil moisture monitoring, indoor plants, water management
Procedia PDF Downloads 511929 Providing a Road Pricing and Toll Allocation Method for Toll Roads
Authors: Ali Babaei
Abstract:
There is a worldwide growing tendency toward construction of infrastructures with the possibility of private sector participation instead of free exploitation of public infrastructures. The construction and development of roads through private sector participation is performed by different countries because of appropriate results and benefits such as compensation of public budget deficit in road construction and maintenance and responding to traffic growth (demand). Toll is the most definite form of budget provision in road development. There are two issues in the toll rate assignment: A. costing of transport, B. Cost allocation and distribution of cost between different types of vehicles as each vehicle pay its own share. There can be different goals in toll collection and its extent is variable according to the strategy of toll collection. Costing principles in different countries are based on inclusion of the whole transport and not peculiar to the toll roads. For example, fuel tax policy functions where the road network users pay transportation cost (not just users of toll road). Whereas transportation infrastructures in Iran are free, these methods are not applicable. In Iran, different toll freeways have built by public investment and government provides participation in the road construction through encouragement of financial institutions. In this paper, the existing policies about the toll roads are studied and then the appropriate method of costing and cost allocation to different vehicles is introduced.Keywords: toll allocation, road pricing, transportation, financial and industrial systems
Procedia PDF Downloads 3631928 Including Local Economic and Anthropometric Parameters in the Design of an Stand up Wheelchair
Authors: Urrutia Fernando, López Jessica, Sánchez Carlos, San Antonio Thalía
Abstract:
Ecuador, as a signatory country of the convention of the rights of persons with disabilities (CRPD) has, in the recent years, strengthened the structures and legal framework required to protect this minority comprised of 13.2% of its total population. However, the reality is that this group has disproportionately low earnings and low educational attainment in comparison with the general population. The main struggles, to promote job placement of wheelchairs users, are environmental discrimination caused by accessibility in structures and transportation, this mainly due to the cost, for private and public entities, of performing the reasonable accommodation they require. It is widely known that product development and production is needed to support effective implementation of the CRPD and that walking and standing are the major life activities, in this context the objective of this investigation is to promote job placement of wheelchair user in the province of Tungurahua by means of the design, production and marketing of a customized stand up wheelchair. Exploratory interviews and measurements were performed in a representative sample of working age wheelchairs users that develop their disability after achieving their physical maturity and that are capable of performing professional activities with their upper limbs, this in order to detect the user’s preference and determine the local economic and anthropometric parameters to be included in the wheelchair design. The findings reveal factors that uniquely impact quality of life and development for people with a mobility disability within the context of the province, first that transportation is a big issue since public buses does not have accessibility for wheelchair users and the absence of curb cuts and the presence of trash bins over the sidewalks among other hinders an economic independent mobility, second that the proposal based in the idea of modifying the wheelchairs to make it able to overcome certain obstacles helps people in wheelchair to improve their independent living and by reducing the costs of modification for the employer could improve their chances of finding work.Keywords: anthropometrics, job placement, stand up wheelchair, user centered design
Procedia PDF Downloads 5551927 Understanding the Top Questions Asked about Hong Kong by Travellers Worldwide through a Corpus-Based Discourse Analytic Approach
Authors: Phoenix W. Y. Lam
Abstract:
As one of the most important service-oriented industries in contemporary society, tourism has increasingly seen the influence of the Internet on all aspects of travelling. Travellers nowadays habitually research online before making travel-related decisions. One platform on which such research is conducted is destination forums. The emergence of such online destination forums in the last decade has allowed tourists to share their travel experiences quickly and easily with a large number of online users around the world. As such, these destination forums also provide invaluable data for tourism bodies to better understand travellers’ views on their destinations. Collecting posts from the Hong Kong travel forum on the world’s largest travel website TripAdvisor®, the present study identifies the top questions asked by TripAdvisor users about Hong Kong through a corpus-based discourse analytic approach. Based on questions posted on the forum and their associated meta-data gathered in a one-year period, the study examines the top questions asked by travellers around the world to identify the key geographical locations in which users have shown the greatest interest in the city. Questions raised by travellers from different geographical locations are also compared to see if traveller communities by location vary in terms of their areas of interest. This analysis involves the study of key words and concordance of frequently-occurring items and a close reading of representative examples in context. Findings from the present study show that travellers who asked the most questions about Hong Kong are from North America and Asia, and that travellers from different locations have different concerns and interests, which are clearly reflected in the language of the questions asked on the travel forum. These findings can therefore provide tourism organisations with useful information about the key markets that should be targeted for promotional purposes, and can also allow such organisations to design advertising campaigns which better address the specific needs of such markets. The present study thus demonstrates the value of applying linguistic knowledge and methodologies to the domain of tourism to address practical issues.Keywords: corpus, hong kong, online travel forum, tourism, TripAdvisor
Procedia PDF Downloads 1771926 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability
Procedia PDF Downloads 1061925 Recent Developments in Artificial Intelligence and Information Communications Technology
Authors: Dolapo Adeyemo
Abstract:
Technology can be designed specifically for geriatrics and persons with disabilities or ICT accessibility solutions. Both solutions stand to benefit from advances in Artificial intelligence, which are computer systems that perform tasks that require human intelligence. Tasks such as decision making, visual perception, speech recognition, and even language translation are useful in both situation and will provide significant benefits to people with temporarily or permanent disabilities. This research’s goal is to review innovations focused on the use of artificial intelligence that bridges the accessibility gap in technology from a user-centered perspective. A mixed method approach that utilized a comprehensive review of academic literature on the subject combined with semi structure interviews of users, developers, and technology product owners. The internet of things and artificial intelligence technology is creating new opportunities in the assistive technology space and proving accessibility to existing technology. Device now more adaptable to the needs of the user by learning the behavior of users as they interact with the internet. Accessibility to devices have witnessed significant enhancements that continue to benefit people with disabilities. Examples of other advances identified are prosthetic limbs like robotic arms supported by artificial intelligence, route planning software for the visually impaired, and decision support tools for people with disabilities and even clinicians that provide care.Keywords: ICT, IOT, accessibility solutions, universal design
Procedia PDF Downloads 871924 Understanding the Selectional Preferences of the Twitter Mentions Network
Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das
Abstract:
Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.Keywords: information diffusion, personality and values, social network analysis, twitter mentions network
Procedia PDF Downloads 3741923 Political Communication in Twitter Interactions between Government, News Media and Citizens in Mexico
Authors: Jorge Cortés, Alejandra Martínez, Carlos Pérez, Anaid Simón
Abstract:
The presence of government, news media, and general citizenry in social media allows considering interactions between them as a form of political communication (i.e. the public exchange of contradictory discourses about politics). Twitter’s asymmetrical following model (users can follow, mention or reply to other users that do not follow them) could foster alternative democratic practices and have an impact on Mexican political culture, which has been marked by a lack of direct communication channels between these actors. The research aim is to assess Twitter’s role in political communication practices through the analysis of interaction dynamics between government, news media, and citizens by extracting and visualizing data from Twitter’s API to observe general behavior patterns. The hypothesis is that regardless the fact that Twitter’s features enable direct and horizontal interactions between actors, users repeat traditional dynamics of interaction, without taking full advantage of the possibilities of this medium. Through an interdisciplinary team including Communication Strategies, Information Design, and Interaction Systems, the activity on Twitter generated by the controversy over the presence of Uber in Mexico City was analysed; an issue of public interest, involving aspects such as public opinion, economic interests and a legal dimension. This research includes techniques from social network analysis (SNA), a methodological approach focused on the comprehension of the relationships between actors through the visual representation and measurement of network characteristics. The analysis of the Uber event comprised data extraction, data categorization, corpus construction, corpus visualization and analysis. On the recovery stage TAGS, a Google Sheet template, was used to extract tweets that included the hashtags #UberSeQueda and #UberSeVa, posts containing the string Uber and tweets directed to @uber_mx. Using scripts written in Python, the data was filtered, discarding tweets with no interaction (replies, retweets or mentions) and locations outside of México. Considerations regarding bots and the omission of anecdotal posts were also taken into account. The utility of graphs to observe interactions of political communication in general was confirmed by the analysis of visualizations generated with programs such as Gephi and NodeXL. However, some aspects require improvements to obtain more useful visual representations for this type of research. For example, link¬crossings complicates following the direction of an interaction forcing users to manipulate the graph to see it clearly. It was concluded that some practices prevalent in political communication in Mexico are replicated in Twitter. Media actors tend to group together instead of interact with others. The political system tends to tweet as an advertising strategy rather than to generate dialogue. However, some actors were identified as bridges establishing communication between the three spheres, generating a more democratic exercise and taking advantage of Twitter’s possibilities. Although interactions in Twitter could become an alternative to political communication, this potential depends on the intentions of the participants and to what extent they are aiming for collaborative and direct communications. Further research is needed to get a deeper understanding on the political behavior of Twitter users and the possibilities of SNA for its analysis.Keywords: interaction, political communication, social network analysis, Twitter
Procedia PDF Downloads 2211922 Haplotypes of the Human Leukocyte Antigen-G Different HIV-1 Groups from the Netherlands
Authors: A. Alyami, S. Christmas, K. Neeltje, G. Pollakis, B. Paxton, Z. Al-Bayati
Abstract:
The Human leukocyte antigen-G (HLA-G) molecule plays an important role in immunomodulation. To date, 16 untranslated regions (UTR) HLA-G haplotypes have been previously defined by sequenced SNPs in the coding region. From these, UTR-1, UTR-2, UTR-3, UTR-4, UTR-5, UTR-6 and UTR-7 are the most frequent 3’UTR haplotypes at the global level. UTR-1 is associated with higher levels of soluble HLA-G and HLA-G expression, whereas UTR-5 and UTR-7 are linked with low levels of soluble HLA-G and HLA-G expression. Human immunodeficiency virus type 1 (HIV-1) infection results in the progressive loss of immune function in infected individuals. The virus escape mechanism typically includes T lymphocytes and NK cell recognition and lyses by classical HLA-A and B down-regulation, which has been associated with non-classical HLA-G molecule up-regulation, respectively. We evaluated the haplotypes of the HLA-G 3′ untranslated region frequencies observed in three HIV-1 groups from the Netherlands and their susceptibility to develop infection. The three groups are made up of mainly men who have sex with men (MSM), injection drug users (IDU) and a high-risk-seronegative (HRSN) group. DNA samples were amplified with published primers prior sequencing. According to our results, the low expresser frequencies show higher in HRSN compared to other groups. This is indicating that 3’UTR polymorphisms may be identified as potential prognostic biomarkers to determine susceptibility to HIV.Keywords: Human leukocyte antigen-G (HLA-G) , men who have sex with men (MSM), injection drug users (IDU), high-risk-seronegative (HRSN) group, high-untranslated region (UTR)
Procedia PDF Downloads 1531921 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection
Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud
Abstract:
A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique
Procedia PDF Downloads 1771920 Network and Sentiment Analysis of U.S. Congressional Tweets
Authors: Chaitanya Kanakamedala, Hansa Pradhan, Carter Gilbert
Abstract:
Social media platforms, such as Twitter, are excellent datasets for understanding human interactions and sentiments. This report explores social dynamics among US Congressional members through a network analysis applied to a dataset of tweets spanning 2008 to 2017 from the ’US Congressional Tweets Dataset’. In this report, we preform network analysis where connections between users (edges) are established based on a similarity threshold: two tweets are connected if the tweets they post are similar. By utilizing the Natural Language Toolkit (NLTK) and NetworkX, we quantified tweet similarity and constructed a graph comprising various interconnected components. Each component represents a cluster of users with closely aligned content. We then preform sentiment analysis on each cluster to explore the prevalent emotions and opinions within these groups. Our findings reveal that despite the initial expectation of distinct ideological divisions typically aligning with party lines, the analysis exposed a high degree of topical convergence across tweets from different political affiliations. The analysis preformed in this report not only highlights the potential of social media as a tool for political communication but also suggests a complex layer of interaction that transcends traditional partisan boundaries, reflecting a complicated landscape of politics in the digital age.Keywords: natural language processing, sentiment analysis, centrality analysis, topic modeling
Procedia PDF Downloads 331919 Interactivity as a Predictor of Intent to Revisit Sports Apps
Authors: Young Ik Suh, Tywan G. Martin
Abstract:
Sports apps in a smartphone provide up-to-date information and fast and convenient access to live games. The market of sports apps has emerged as the second fastest growing app category worldwide. Further, many sports fans use their smartphones to know the schedule of sporting events, players’ position and bios, videos and highlights. In recent years, a growing number of scholars and practitioners alike have emphasized the importance of interactivity with sports apps, hypothesizing that interactivity plays a significant role in enticing sports apps users and that it is a key component in measuring the success of sports apps. Interactivity in sports apps focuses primarily on two functions: (1) two-way communication and (2) active user control, neither of which have been applicable through traditional mass media and communication technologies. Therefore, the purpose of this study is to examine whether the interactivity function on sports apps leads to positive outcomes such as intent to revisit. More specifically, this study investigates how three major functions of interactivity (i.e., two-way communication, active user control, and real-time information) influence the attitude of sports apps users and their intent to revisit the sports apps. The following hypothesis is proposed; interactivity functions will be positively associated with both attitudes toward sports apps and intent to revisit sports apps. The survey questionnaire includes four parts: (1) an interactivity scale, (2) an attitude scale, (3) a behavioral intention scale, and (4) demographic questions. Data are to be collected from ESPN apps users. To examine the relationships among the observed and latent variables and determine the reliability and validity of constructs, confirmatory factor analysis (CFA) is conducted. Structural equation modeling (SEM) is utilized to test hypothesized relationships among constructs. Additionally, this study compares the proposed interactivity model with a rival model to identify the role of attitude as a mediating factor. The findings of the current sports apps study provide several theoretical and practical contributions and implications by extending the research and literature associated with the important role of interactivity functions in sports apps and sports media consumption behavior. Specifically, this study may improve the theoretical understandings of whether the interactivity functions influence user attitudes and intent to revisit sports apps. Additionally, this study identifies which dimensions of interactivity are most important to sports apps users. From practitioners’ perspectives, this findings of this study provide significant implications. More entrepreneurs and investors in the sport industry need to recognize that high-resolution photos, live streams, and up-to-date stats are in the sports app, right at sports fans fingertips. The result will imply that sport practitioners may need to develop sports mobile apps that offer greater interactivity functions to attract sport fans.Keywords: interactivity, two-way communication, active user control, real time information, sports apps, attitude, intent to revisit
Procedia PDF Downloads 1471918 The Role of Formal and Informal Institutions in Water Governance in the Central Rift Valley of Ethiopia
Authors: Endalew Jibat, Feyera Senbeta, Tesfaye Zeleke, Fitsum Hagos
Abstract:
Institutions can play a key role in coordinating how natural resources are effectively used without over-exploitation. Institutions are the laws, policies, and organizational arrangements that permit, forbid or regulate human action. The aim of this study was to look into the roles of formal and informal institutions, as well as their interactions, in water resource governance in Ethiopia's Central Rift Valley (CRV), where water scarcity is a concern. Key informant interviews, group discussions, in depth-interview, and secondary data sources were used to generate relevant data. The study revealed that formal and informal institutions were involved in water resource governance in the study area. However, the influence of informal institutions on formal institutions or vice versa is trivial to change the action of water users. Lack of clear roles and responsibilities of actors, weak capacity and lack of meaningful decentralization and participation of key actors in policy development, lack of synergy and incongruence between formal and informal institutions, and absence of enforcement mechanisms including incentives are attributed to inefficient use of water resources in the CRV. Enhancing the interplay of formal and informal institutions in the water resource policy development and meaningful decentralization and key stakeholders' engagement is recommended for sustainable water use.Keywords: institutions, governance, institutional interplay, water users
Procedia PDF Downloads 1781917 Generating Ideas to Improve Road Intersections Using Design with Intent Approach
Authors: Omar Faruqe Hamim, M. Shamsul Hoque, Rich C. McIlroy, Katherine L. Plant, Neville A. Stanton
Abstract:
Road safety has become an alarming issue, especially in low-middle income developing countries. The traditional approaches lack the out of the box thinking, making engineers confined to applying usual techniques in making roads safer. A socio-technical approach has recently been introduced in improving road intersections through designing with intent. This Design With Intent (DWI) approach aims to give practitioners a more nuanced approach to design and behavior, working with people, people’s understanding, and the complexities of everyday human experience. It's a collection of design patterns —and a design and research approach— for exploring the interactions between design and people’s behavior across products, services, and environments, both digital and physical. Through this approach, it can be seen that how designing with people in behavior change can be applied to social and environmental problems, as well as commercially. It has a total of 101 cards across eight different lenses, such as architectural, error-proofing, interaction, ludic, perceptual, cognitive, Machiavellian, and security lens each having its own distinct characteristics of extracting ideas from the participant of this approach. For this research purpose, a three-legged accident blackspot intersection of a national highway has been chosen to perform the DWI workshop. Participants from varying fields such as civil engineering, naval architecture and marine engineering, urban and regional planning, and sociology actively participated for a day long workshop. While going through the workshops, the participants were given a preamble of the accident scenario and a brief overview of DWI approach. Design cards of varying lenses were distributed among 10 participants and given an hour and a half for brainstorming and generating ideas to improve the safety of the selected intersection. After the brainstorming session, the participants spontaneously went through roundtable discussions regarding the ideas they have come up with. According to consensus of the forum, ideas were accepted or rejected. These generated ideas were then synthesized and agglomerated to bring about an improvement scheme for the intersection selected in our study. To summarize the improvement ideas from DWI approach, color coding of traffic lanes for separate vehicles, channelizing the existing bare intersection, providing advance warning traffic signs, cautionary signs and educational signs motivating road users to drive safe, using textured surfaces at approach with rumble strips before the approach of intersection were the most significant one. The motive of this approach is to bring about new ideas from the road users and not just depend on traditional schemes to increase the efficiency, safety of roads as well and to ensure the compliance of road users since these features are being generated from the minds of users themselves.Keywords: design with intent, road safety, human experience, behavior
Procedia PDF Downloads 139