Search results for: location privacy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2607

Search results for: location privacy

2037 Water Quality Calculation and Management System

Authors: H. M. B. N Jayasinghe

Abstract:

The water is found almost everywhere on Earth. Water resources contain a lot of pollution. Some diseases can be spread through the water to the living beings. So to be clean water it should undergo a number of treatments necessary to make it drinkable. So it is must to have purification technology for the wastewater. So the waste water treatment plants act a major role in these issues. When considering the procedures taken after the water treatment process was always based on manual calculations and recordings. Water purification plants may interact with lots of manual processes. It means the process taking much time consuming. So the final evaluation and chemical, biological treatment process get delayed. So to prevent those types of drawbacks there are some computerized programmable calculation and analytical techniques going to be introduced to the laboratory staff. To solve this problem automated system will be a solution in which guarantees the rational selection. A decision support system is a way to model data and make quality decisions based upon it. It is widely used in the world for the various kind of process automation. Decision support systems that just collect data and organize it effectively are usually called passive models where they do not suggest a specific decision but only reveal information. This web base system is based on global positioning data adding facility with map location. Most worth feature is SMS and E-mail alert service to inform the appropriate person on a critical issue. The technological influence to the system is HTML, MySQL, PHP, and some other web developing technologies. Current issues in the computerized water chemistry analysis are not much deep in progress. For an example the swimming pool water quality calculator. The validity of the system has been verified by test running and comparison with an existing plant data. Automated system will make the life easier in productively and qualitatively.

Keywords: automated system, wastewater, purification technology, map location

Procedia PDF Downloads 239
2036 Maximum Likelihood Estimation Methods on a Two-Parameter Rayleigh Distribution under Progressive Type-Ii Censoring

Authors: Daniel Fundi Murithi

Abstract:

Data from economic, social, clinical, and industrial studies are in some way incomplete or incorrect due to censoring. Such data may have adverse effects if used in the estimation problem. We propose the use of Maximum Likelihood Estimation (MLE) under a progressive type-II censoring scheme to remedy this problem. In particular, maximum likelihood estimates (MLEs) for the location (µ) and scale (λ) parameters of two Parameter Rayleigh distribution are realized under a progressive type-II censoring scheme using the Expectation-Maximization (EM) and the Newton-Raphson (NR) algorithms. These algorithms are used comparatively because they iteratively produce satisfactory results in the estimation problem. The progressively type-II censoring scheme is used because it allows the removal of test units before the termination of the experiment. Approximate asymptotic variances and confidence intervals for the location and scale parameters are derived/constructed. The efficiency of EM and the NR algorithms is compared given root mean squared error (RMSE), bias, and the coverage rate. The simulation study showed that in most sets of simulation cases, the estimates obtained using the Expectation-maximization algorithm had small biases, small variances, narrower/small confidence intervals width, and small root of mean squared error compared to those generated via the Newton-Raphson (NR) algorithm. Further, the analysis of a real-life data set (data from simple experimental trials) showed that the Expectation-Maximization (EM) algorithm performs better compared to Newton-Raphson (NR) algorithm in all simulation cases under the progressive type-II censoring scheme.

Keywords: expectation-maximization algorithm, maximum likelihood estimation, Newton-Raphson method, two-parameter Rayleigh distribution, progressive type-II censoring

Procedia PDF Downloads 153
2035 Assessing Sexual and Reproductive Health Literacy and Engagement Among Refugee and Immigrant Women in Massachusetts: A Qualitative Community-Based Study

Authors: Leen Al Kassab, Sarah Johns, Helen Noble, Nawal Nour, Elizabeth Janiak, Sarrah Shahawy

Abstract:

Introduction: Immigrant and refugee women experience disparities in sexual and reproductive health (SRH) outcomes, partially as a result of barriers to SRH literacy and to regular healthcare access and engagement. Despite the existing data highlighting growing needs for culturally relevant and structurally competent care, interventions are scarce and not well-documented. Methods: In this IRB-approved study, we used a community-based participatory research approach, with the assistance of a community advisory board, to conduct a qualitative needs assessment of SRH knowledge and service engagement with immigrant and refugee women from Africa or the Middle East and currently residing in Boston. We conducted a total of nine focus group discussions (FGDs) in partnership with medical, community, and religious centers, in six languages: Arabic, English, French, Somali, Pashtu, and Dari. A total of 44 individuals participated. We explored migrant and refugee women’s current and evolving SRH care needs and gaps, specifically related to the development of interventions and clinical best practices targeting SRH literacy, healthcare engagement, and informed decision-making. Recordings of the FGDs were transcribed verbatim and translated by interpreter services. We used open coding with multiple coders who resolved discrepancies through consensus and iteratively refined our codebook while coding data in batches using Dedoose software. Results: Participants reported immigrant adaptation experiences, discrimination, and feelings of trust, autonomy, privacy, and connectedness to family, community, and the healthcare system as factors surrounding SRH knowledge and needs. The context of previously learned SRH knowledge was commonly noted to be in schools, at menstruation, before marriage, from family members, partners, friends, and online search engines. Common themes included empowering strength drawn from religious and cultural communities, difficulties bridging educational gaps with their US- born daughters, and a desire for more SRH education from multiple sources, including family, health care providers, and religious experts & communities. Regarding further SRH education, participants’ preferences varied regarding ideal platform (virtual vs. in-person), location (in religious and community centers or not), smaller group sizes, and the involvement of men. Conclusions: Based on these results, empowering SRH initiatives should include both community and religious center-based, as well as clinic-based, interventions. Interventions should be composed of frequent educational workshops in small groups involving age-grouped women, daughters, and (sometimes) men, tailored SRH messaging, and the promotion of culturally, religiously, and linguistically competent care.

Keywords: community, immigrant, religion, sexual & reproductive health, women's health

Procedia PDF Downloads 115
2034 Structural Design and Environmental Analysis of Oyster Mushroom Cultivation House in Korea

Authors: Lee Sunghyoun, Yu Byeongkee, Kim Hyuckjoo, Yun Namkyu, Jung Jongcheon

Abstract:

Most of the recent on-sale oyster mushrooms are raised in a oyster mushroom house, in which the necessary adjustment of growing condition is feasible. The rationale for such artificial growing is the impossibility of successive cultivation in the case of a natural cultivation due to external weather conditions. A oyster mushroom house adopts an equipment called growing bed, laying one growing bed upon another in a multi-column fashion, growing and developing the mushrooms on the respective equipments. The indispensable environment management factors of mushroom cultivation are temperature, humidity, and CO2; on which an appropriate regulation of the three requisites is a necessitated condition for the sake of the total output’s increase. However, due to the multiple layers of growing bed’s disturbance on air circulation, a oyster mushroom house’s internal environmental uniformity meets with considerable instability. This research presents a technology which assures the facilitation of environment regulation over all the internal space of a oyster mushroom house, irrespective of its location. The research staff reinforced the oyster mushroom house’s insulation in order to minimize the external environment’s influence on the oyster mushroom house’s internal environment and installed circulation fan to improve the oyster mushroom house’s interior environmental uniformity. Also, the humidifier nozzle’s position was set to prevent dew condensation when humidifying. As a result, a highly sophisticated management over all the oyster mushroom house‘s internal space was realized with the temperature of 0.2~1.3℃, and the relative humidity of 2~7% at the cultivating stage of mushroom’s growth. Therefore, to maximize oyster mushroom house‘s internal environmental uniformity, it can be concluded that consideration of various factors such as insulation reinforcement, decision on the humidifier nozzle’s location, disposition of circulation fan’s installation and the direction of wind discharge is needed.

Keywords: mushroom growing facility, environmental uniformity, temperature, relative humidity, CO2 concentration

Procedia PDF Downloads 522
2033 Automated Computer-Vision Analysis Pipeline of Calcium Imaging Neuronal Network Activity Data

Authors: David Oluigbo, Erik Hemberg, Nathan Shwatal, Wenqi Ding, Yin Yuan, Susanna Mierau

Abstract:

Introduction: Calcium imaging is an established technique in neuroscience research for detecting activity in neural networks. Bursts of action potentials in neurons lead to transient increases in intracellular calcium visualized with fluorescent indicators. Manual identification of cell bodies and their contours by experts typically takes 10-20 minutes per calcium imaging recording. Our aim, therefore, was to design an automated pipeline to facilitate and optimize calcium imaging data analysis. Our pipeline aims to accelerate cell body and contour identification and production of graphical representations reflecting changes in neuronal calcium-based fluorescence. Methods: We created a Python-based pipeline that uses OpenCV (a computer vision Python package) to accurately (1) detect neuron contours, (2) extract the mean fluorescence within the contour, and (3) identify transient changes in the fluorescence due to neuronal activity. The pipeline consisted of 3 Python scripts that could both be easily accessed through a Python Jupyter notebook. In total, we tested this pipeline on ten separate calcium imaging datasets from murine dissociate cortical cultures. We next compared our automated pipeline outputs with the outputs of manually labeled data for neuronal cell location and corresponding fluorescent times series generated by an expert neuroscientist. Results: Our results show that our automated pipeline efficiently pinpoints neuronal cell body location and neuronal contours and provides a graphical representation of neural network metrics accurately reflecting changes in neuronal calcium-based fluorescence. The pipeline detected the shape, area, and location of most neuronal cell body contours by using binary thresholding and grayscale image conversion to allow computer vision to better distinguish between cells and non-cells. Its results were also comparable to manually analyzed results but with significantly reduced result acquisition times of 2-5 minutes per recording versus 10-20 minutes per recording. Based on these findings, our next step is to precisely measure the specificity and sensitivity of the automated pipeline’s cell body and contour detection to extract more robust neural network metrics and dynamics. Conclusion: Our Python-based pipeline performed automated computer vision-based analysis of calcium image recordings from neuronal cell bodies in neuronal cell cultures. Our new goal is to improve cell body and contour detection to produce more robust, accurate neural network metrics and dynamic graphs.

Keywords: calcium imaging, computer vision, neural activity, neural networks

Procedia PDF Downloads 72
2032 Before Decision: Career Motivation of Teacher Candidates

Authors: Pál Iván Szontagh

Abstract:

We suppose that today, the motivation for the career of a pedagogue (including its existential, organizational and infrastructural conditions) is different from the level of commitment to the profession of an educator (which can be experienced informally, or outside of the public education system). In our research, we made efforts to address the widest possible range of student elementary teachers, and to interpret their responses using different filters. In the first phase of our study, we analyzed first-year kindergarten teacher students’ career motivation and commitment to the profession, and in the second phase, that of final-year kindergarten teacher candidates. In the third phase, we conducted surveys to explore students’ motivation for the profession and the career path of a pedagogue in four countries of the Carpathian Basin (Hungary, Slovakia, Romania and Serbia). The surveys were conducted in 17 campuses of 11 Hungarian teacher’s training colleges and universities. Finally, we extended the survey to practicing graduates preparing for their on-the-job rating examination. Based on our results, in all breakdowns, regardless of age group, training institute or - in part - geographical location and nationality, it is proven that lack of social- and financial esteem of the profession poses serious risks for recruitment and retention of teachers. As a summary, we searched for significant differences between the professional- and career motivations of the three respondent groups (kindergarten teacher students, elementary teacher students and practicing teachers), i.e. the motivation factors that change the most with education and/or with the time spent on the job. Based on our results, in all breakdowns, regardless of age group, training institute or - in part - geographical location and nationality, it is proven that lack of social- and financial esteem of the profession poses serious risks for recruitment and retention of teachers.

Keywords: career motivation, career socialization, professional motivation, teacher training

Procedia PDF Downloads 121
2031 Sustainable Strategies for Post-Disaster Shelters: Case Study-Based Review and Future Prospects

Authors: Fangwen Ni, Hongpeng Xu

Abstract:

When disasters occur, it is important to provide temporary shelters to protect victims from their environment and to comfort them with privacy and dignity. However, the commonly used shelters like tents and shanties can not ensure a comfortable condition. Furthermore, the demand for more energy and less pollution has become a major challenge. Focusing on the sustainable of temporary shelters, this study intends to clarify the essential role of temporary shelters before the reconstruction work is done. The paper also identifies the main problems from three aspects including spatial layout, thermal comfort and utilization of passive technology. Moreover, it expounds the passive strategies of ecological design by case study and simulation. It is found that the living condition of shelters can be improved from the perspective of architectural space, ventilation theory and construction techniques. Regardless of being temporary, these shelters are crucial elements in emergency situations and should be taken more seriously.

Keywords: architectural space, construction technique, sustainable strategy, temporary shelter

Procedia PDF Downloads 259
2030 Extraskeletal Ewing Sarcoma- Experience in a Tertiary Cancer Care Centre of India

Authors: Himanshu Rohela

Abstract:

BACKGROUND: Ewing sarcoma can arise in either bone or soft tissue. Extraskeletal Ewing sarcoma (EES) is an uncommon primary tumor of the soft tissues, accounting for 20 30% of all reported cases of ES. AIM: Was to investigate demographic distribution, survival analysis and factors affecting the survival and recurrence in patients of EES. METHODS: Retrospective study of 19 biopsy-proven EES was performed. Overall survival (OS) using log-rank test and factors affecting OS and local recurrence (LR) were evaluated for the entire cohort. RESULTS: Patients with EES had a mean age of 19.5 and it was more commonly seen in males (63%). Axial location (58%) and solitary presentation (84%) were more common. The average size was 11 cm, 3 of 19 were metastatic at presentation, with the lung beings the most common site for metastasis. 17 received NACT, 16 with VAC-IE regimen and 1 underwent a second line with GEM/DOCE regimen. Unplanned surgery was done in 2 of 19. 3 patients received definitive RT and 13 underwent surgical-wide local excision. 2 of 13 showed good response to NACT. 10 patients required readmission out of which 6 patients had chemotherapy-related complications, 2 had surgical site complications and one patient developed secondary AML post-completion of treatment. A total of 4 patients had a recurrence. One had local recurrence alone, one had distant recurrence alone and 2 patients had a distant and local recurrence both. Tumor size >10 cm, axial location, and previous unplanned surgery was associated with higher LR rate. The mean overall survival was 32 months (2.66 years), with higher rates seen in non-metastatic and non-recurrent settings. CONCLUSIONS: Early and accurate diagnosis is the key to the management of EES, with promising results seen via NACT and RO resection regimens. But further studies with larger study groups are needed to standardize the treatment protocol and evaluate its efficacy.

Keywords: Ewings, sarcoma, extraskeletal, chemotherapy

Procedia PDF Downloads 62
2029 Real-Time Online Tracking Platform

Authors: Denis Obrul, Borut Žalik

Abstract:

We present an extendable online real-time tracking platform that can be used to track a wide variety of location-aware devices. These can range from GPS devices mounted inside a vehicle, closed and secure systems such as Teltonika and to mobile phones running multiple platforms. Special consideration is given to decentralized approach, security and flexibility. A number of different use cases are presented as a proof of concept.

Keywords: real-time, online, gps, tracking, web application

Procedia PDF Downloads 342
2028 Pneumoperitoneum Creation Assisted with Optical Coherence Tomography and Automatic Identification

Authors: Eric Yi-Hsiu Huang, Meng-Chun Kao, Wen-Chuan Kuo

Abstract:

For every laparoscopic surgery, a safe pneumoperitoneumcreation (gaining access to the peritoneal cavity) is the first and essential step. However, closed pneumoperitoneum is usually obtained by blind insertion of a Veress needle into the peritoneal cavity, which may carry potential risks suchas bowel and vascular injury.Until now, there remains no definite measure to visually confirm the position of the needle tip inside the peritoneal cavity. Therefore, this study established an image-guided Veress needle method by combining a fiber probe with optical coherence tomography (OCT). An algorithm was also proposed for determining the exact location of the needle tip through the acquisition of OCT images. Our method not only generates a series of “live” two-dimensional (2D) images during the needle puncture toward the peritoneal cavity but also can eliminate operator variation in image judgment, thus improving peritoneal access safety. This study was approved by the Ethics Committee of Taipei Veterans General Hospital (Taipei VGH IACUC 2020-144). A total of 2400 in vivo OCT images, independent of each other, were acquired from experiments of forty peritoneal punctures on two piglets. Characteristic OCT image patterns could be observed during the puncturing process. The ROC curve demonstrates the discrimination capability of these quantitative image features of the classifier, showing the accuracy of the classifier for determining the inside vs. outside of the peritoneal was 98% (AUC=0.98). In summary, the present study demonstrates the ability of the combination of our proposed automatic identification method and OCT imaging for automatically and objectively identifying the location of the needle tip. OCT images translate the blind closed technique of peritoneal access into a visualized procedure, thus improving peritoneal access safety.

Keywords: pneumoperitoneum, optical coherence tomography, automatic identification, veress needle

Procedia PDF Downloads 117
2027 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying

Authors: Sultan Alanazi, Adwan Alanazi

Abstract:

Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.

Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes

Procedia PDF Downloads 129
2026 Passive Vibration Isolation Analysis and Optimization for Mechanical Systems

Authors: Ozan Yavuz Baytemir, Ender Cigeroglu, Gokhan Osman Ozgen

Abstract:

Vibration is an important issue in the design of various components of aerospace, marine and vehicular applications. In order not to lose the components’ function and operational performance, vibration isolation design involving the optimum isolator properties selection and isolator positioning processes appear to be a critical study. Knowing the growing need for the vibration isolation system design, this paper aims to present two types of software capable of implementing modal analysis, response analysis for both random and harmonic types of excitations, static deflection analysis, Monte Carlo simulations in addition to study of parameter and location optimization for different types of isolation problem scenarios. Investigating the literature, there is no such study developing a software-based tool that is capable of implementing all those analysis, simulation and optimization studies in one platform simultaneously. In this paper, the theoretical system model is generated for a 6-DOF rigid body. The vibration isolation system of any mechanical structure is able to be optimized using hybrid method involving both global search and gradient-based methods. Defining the optimization design variables, different types of optimization scenarios are listed in detail. Being aware of the need for a user friendly vibration isolation problem solver, two types of graphical user interfaces (GUIs) are prepared and verified using a commercial finite element analysis program, Ansys Workbench 14.0. Using the analysis and optimization capabilities of those GUIs, a real application used in an air-platform is also presented as a case study at the end of the paper.

Keywords: hybrid optimization, Monte Carlo simulation, multi-degree-of-freedom system, parameter optimization, location optimization, passive vibration isolation analysis

Procedia PDF Downloads 554
2025 Geographic Information System Application for Predicting Tourism Development in Gunungkidul Regency, Indonesia

Authors: Nindyo Cahyo Kresnanto, Muhamad Willdan, Wika Harisa Putri

Abstract:

Gunungkidul is one of the emerging tourism industry areas in Yogyakarta Province, Indonesia. This article describes how GIS can predict the development of tourism potential in Gunungkidul. The tourism sector in Gunungkidul Regency contributes 3.34% of the total gross regional domestic product and is the economic sector with the highest growth with a percentage of 18.37% in the post-Covid-19 period. This contribution makes researchers consider that several tourist sites need to be explored more to increase regional economic development gradually. This research starts by collecting spatial data from tourist locations tourists want to visit in Gunungkidul Regency based on survey data from 571 respondents. Then the data is visualized with ArcGIS software. This research shows an overview of tourist destinations interested in travellers depicted from the lowest to the highest from the data visualization. Based on the data visualization results, specific tourist locations potentially developed to influence the surrounding economy positively. The visualization of the data displayed is also in the form of a desire line map that shows tourist travel patterns from the origin of the tourist to the destination of the tourist location of interest. From the desire line, the prediction of the path of tourist sites with a high frequency of transportation activity can figure out. Predictions regarding specific tourist location routes that high transportation activities can burden can consider which routes will be chosen. The route also needs to be improved in terms of capacity and quality. The goal is to provide a sense of security and comfort for tourists who drive and positively impact the tourist sites traversed by the route.

Keywords: tourism development, GIS and survey, transportation, potential desire line

Procedia PDF Downloads 58
2024 Effect of Land Use on Soil Organic Carbon Stock and Aggregate Dynamics of Degraded Ultisol in Nsukka, Southeastern Nigeria

Authors: Chukwuebuka Vincent Azuka, Chidimma Peace Odoh

Abstract:

Changes in agricultural practices and land use influence the storage and release of soil organic carbon and soil structural dynamics. To investigate this in Nsukka, southeastern Nigeria, soil samples were collected at 0-10 cm, 10-20 cm and 20-30 cm from three locations; Ovoko (OV), Obukpa (OB) and University of Nigeria, Nsukka (UNN) and three land use types; cultivated land (CL), forest land (FL) and grassland (GL)). Data were subjected to analysis of variance (ANOVA) using SPSS. Also, correlations between organic carbon stock, structural stability indices and other soil properties were established. The result showed that Ksat was significantly (p < 0.05) influenced by location with mean values of 68 cmhr⁻¹,121.63 cmhr⁻¹, 8.42 cmhr⁻¹ in OV, OB and UNN respectively. The MWD and aggregate stability (AS) were significantly (p < 0.05) influenced by land use and depth. The mean values of MWD are 0.85 (CL), 1.35 (FL) and 1.45 (GL), and 1.66 at 0-10 cm, 1.08 at 10-20 cm and 0.88 mm at 20-30 cm. The mean values of AS are; 27.66% (CL), 46.39% (FL) and 49.81% (GL), and 53.96% at 0-10cm, 40.22% at 10-20cm and 29.57% at 20-30cm. Clay flocculation (CFI) and dispersion indices (CDI) differed significantly (p < 0.05) among the land use. Soil pH differed significantly (p < 0.05) across the land use and locations with mean values ranging from 3.90-6.14. Soil organic carbon (SOC) significantly (p < 0.05) differed across locations and depths. SOC decreases as depth increases depth with mean values of 15.6 gkg⁻¹, 10.1 gkg⁻¹, and 8.6 gkg⁻¹ at 0-10 cm, 10-20 cm, and 20-30 cm respectively. SOC in the three land use was 8.8 g kg-1, 15.2 gkg⁻¹ and 10.4 gkg⁻¹ at CL, FL, and GL respectively. The highest aggregate-associated carbon was recorded in 0.5 mm across the land use and depth except in cultivated land and at 20-30 cm which recorded their highest SOC at 1mm. SOC stock, total nitrogen (TN) and CEC were significantly (p < 0.05) different across the locations with highest values of 23.43 t/ha, 0.07g/kg and 14.27 Cmol/kg respectively recorded in UNN. SOC stock was significantly (p < 0.05) influenced by depth as follows; 0-10>10-20>20-30 cm. TN was low with mean values ranging from 0.03-0.07 across the locations, land use and depths. The mean values of CEC ranged from 9.96-14.27 Cmol kg⁻¹ across the locations and land use. SOC stock showed correlation with silt, coarse sand, N and CEC (r = 0.40*, -0.39*, -0.65** and 0.64** respectively. AS showed correlation with BD, Ksat, pH in water and KCl, and SOC (r = -0.42*, 0.54**, -0.44*, -0.45* and 0.49** respectively. Thus, land use and location play a significant role in sustainable management of soil resources.

Keywords: agricultural practices, structural dynamics, sequestration, soil resources, management

Procedia PDF Downloads 132
2023 The Idea of Reputation in a Post-Truth Era

Authors: Karen Armstrong

Abstract:

This paper considers the importance of acquiring, cultivating, and protecting one’s personal online reputation in a post-truth era. Although the idea of the individual is essential psychological construct, the concept necessarily now includes our online reputation. The idea of this online reputation has expanded to become almost more important than any other factor in terms of our professional, social and psychological development. The discussion will first consider philosophical ideas of the self, followed by an examination of underlying concepts of perception and interpretation in a post-truth world. Then, the idea of the recent shift to a consideration of posted images, through words and photos, in the construction of self, will be discussed. Next, the relation between private personal life and exterior social life, including our reputation in a variety of realms will be addressed. This will include the adoption of specific strategies and behaviors, which facilitate accuracy, currency and necessary modifications with regard to our online reputation. Finally, specific ways in which we can negotiate the fluid dynamic between reputation, and inner and outer selves to optimum effect will conclude the discussion.

Keywords: image, post-truth, privacy, reputation, surveillance

Procedia PDF Downloads 244
2022 The Increasing Importance of the Role of AI in Higher Education

Authors: Joshefina Bengoechea Fernandez, Alex Bell

Abstract:

In its 2021 guidance for policy makers, the UNESCO has proposed 4 areas where AI can be applied in educational settings: These are: 1) Education management and delivery; 2) Learning and assessment; 3) Empowering teachers and facilitating teaching, and 4) Providing lifelong learning possibilities (UNESCO, 2021). Like with wblockchain technologies, AI will automate the management of educational institutions. These include, but are not limited to admissions, timetables, attendance, and homework monitoring. Furthermore, AI will be used to select relevant learning content across learning platforms for each student, based on his or her personalized needs. A problem educators face is the “one-size-fits-all” approach that does not work with a diverse student population. The purpose of this paper is to illustrate if the implementation of Technology is the solution to the Problems faced in Higher Education. The paper builds upon a constructivist approach, combining a literature review and research on key publications and academic reports.

Keywords: artificial intelligence, learning platforms, students personalised needs, life- long learning, privacy, ethics

Procedia PDF Downloads 90
2021 Prevalence of Over-Schooling Preschoolers as Perceived by Teachers in Kwara Central, Nigeria

Authors: Rachael Ojima Agarry, Raheemat Opeyemi Omosidi

Abstract:

Over-schooling children is an abuse of the fundamental provisions of the National Policy on Education in Nigeria. The practice overburdens or places unwarranted academic demands on children, particularly preschoolers. This study was carried out to ascertain the prevalence of over-schooling preschoolers as perceived by teachers in the Kwara Central Senatorial District. One research question and two null hypotheses were formulated to guide the study. A descriptive survey design was employed. The population of the study consists of all preschool teachers in both private and public schools in Kwara Central. A validated instrument tagged “Questionnaire on Prevalence of Over-schooling of Preschoolers (QPOP)” with a reliability index of 0.76 was used for data collection. The questionnaire consists of sections A and B. Section A solicited the respondents’ demographic information, and Section B sought the prevalence of over-schooling as perceived by teachers. Data collected were analyzed using descriptive statistics of frequency and percentage. Mean and standard deviation were used to analyze the demographic information and the research question. The two research hypotheses were analyzed using a t-test and Analysis of Variance (ANCOVA) at a 0.05 level of significance. The results revealed that there is a high level of prevalence of over-schooling of preschoolers in Kwara Central. Also, there is a significant difference in teachers' perception of the prevalence of over-schooling preschoolers based on school type and school location. It was concluded that both private and public schools in Kwara Central practice over-schooling of preschoolers at a high level. Hence, it was recommended that the government, through the State and/or Federal Ministry of Education, should enact and enforce a law that would ensure children in this category spend only the stipulated time in school as well as strict adherence to the recommended curriculum contents by proprietors and teachers.

Keywords: over-schooling, preschoolers, school type, school location

Procedia PDF Downloads 40
2020 Improving Fingerprinting-Based Localization System Using Generative AI

Authors: Getaneh Berie Tarekegn

Abstract:

A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. It also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.

Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine

Procedia PDF Downloads 40
2019 Understanding Non-Utilization of AI Tools for Research and Academic Writing among Academic Staff in Nigerian Universities: A Paradigm Shift

Authors: Abubakar Abdulkareem, Nasir Haruna Soba

Abstract:

This study investigates the non-utilization of AI tools for research and academic writing among academic staff in Nigerian universities using the perceived attribute of innovation theory by Rogers as a theoretical framework to guide the investigation. This study was framed in an interpretative research paradigm. A qualitative methodology and case study research design was adopted. Interviews were conducted with 20 academic staff. The study used a thematic analysis process to identify 115 narratives. The narratives are organized into five major categories and further collapsed into five theoretical constructs explaining the non-use of AI tools for research and academic writing. Findings from this study revealed some of the reasons for the non-utilization of AI tools for research and academic writing as lack of Awareness, perceived Complexity, trust and Reliability Concerns, cost and accessibility, ethical and Privacy concerns and, cultural and institutional factors, etc.

Keywords: non-utilization, AI tools, research and academic writing, academic staff

Procedia PDF Downloads 20
2018 Utilizing Federated Learning for Accurate Prediction of COVID-19 from CT Scan Images

Authors: Jinil Patel, Sarthak Patel, Sarthak Thakkar, Deepti Saraswat

Abstract:

Recently, the COVID-19 outbreak has spread across the world, leading the World Health Organization to classify it as a global pandemic. To save the patient’s life, the COVID-19 symptoms have to be identified. But using an AI (Artificial Intelligence) model to identify COVID-19 symptoms within the allotted time was challenging. The RT-PCR test was found to be inadequate in determining the COVID status of a patient. To determine if the patient has COVID-19 or not, a Computed Tomography Scan (CT scan) of patient is a better alternative. It will be challenging to compile and store all the data from various hospitals on the server, though. Federated learning, therefore, aids in resolving this problem. Certain deep learning models help to classify Covid-19. This paper will have detailed work of certain deep learning models like VGG19, ResNet50, MobileNEtv2, and Deep Learning Aggregation (DLA) along with maintaining privacy with encryption.

Keywords: federated learning, COVID-19, CT-scan, homomorphic encryption, ResNet50, VGG-19, MobileNetv2, DLA

Procedia PDF Downloads 59
2017 Urban Retrofitting Application Based on Social-Media to Model the Malioboro Smart Central Business Design through Statistical Regression Approach

Authors: Muhammad Hardyan Prastyanto, Aisah Azhari Marwangi, Yulinda Rizky Pratiwi

Abstract:

Globalization has become a driving force for the current technological developments. The presence of the Virtual Space provides opportunities for people to self-actualization through access to a wider world, quickly and easily. Cities that are part of the existence of life, witness the history of civilization over time, also has been the major object to upgrading on technological sector. A smart city is one where the government and citizenry are using the best available means, including ICT, to achieve their shared goals. This often includes economic development, environmental sustainability, and improved quality of life for citizens. Thus theory is the basis for research of this study. This study aimed to know the implementation of the Urban Retrofitting at Malioboro area based on Information and Communication Technologies. The method of this study is by reviewing the effectiveness of the E-commerce uses as a major system to identification the Malioboro Smart Central Business District. By using a significance level of 5 %, it can be concluded that addresses have a significant influence on the ratings obtained, namely regarding the location of the hotel establishment. But despite the use of the website does not have a significant influence on the rating of the hotel, using the website still has influence significantly on the rating, because the p -value (Sig.) of the variable website is not so much different from the significance level determined by the researcher. In the interpretation, if a hotel is located on the Pasar Kembang streets and not to use the website, so the hotel is likely to have a rating of the constant value which is 3.183. However, if a hotel located on the Sosrowijayan streets, so the hotel rating will be increased by 0,302. Then if a hotel has been using a website, so the hotel rating will increase by 0,264. It is possible to conclude the effectiveness of ICT’s (Website) uses and location to identification the urban retrofitting through increasing of building rating in Malioboro Central Business District.

Keywords: urban retrofitting, e-commerce, information and communication technology, statistic regression, SCBD, Malioboro

Procedia PDF Downloads 285
2016 Review Paper on an Algorithm Enhancing Privacy and Security in Online Meeting Platforms Using a Secured Encryption

Authors: Tonderai Muchenje, Mkhatshwa Phethile

Abstract:

Humans living in this current situation know that communication with one another is necessary for themselves. There are many ways to communicate with each other; during unexpected natural disasters and outbreak of epidemics and pandemics, the need for online meeting platforms are considered most important. Apparently, the development in the telecommunication sector also played an important role. Therefore, the epidemic of the Covid-19 Pandemic and the new normal situation resulted in the overwhelming production of online meeting platforms to prevent the situation. This software is commonly used in business communications in the beginning. Rapidly the COVID-19 pandemic changed the situation. At present-day, these virtual meeting applications are not only used to have informal meetings with friends and relatives but also to be used to have formal meetings in the business and education (universities) sector. In this article, an attempt has been made to list out the useful secured ways for using online meeting platforms.

Keywords: virtual background, zoom, secure online algorithm, RingCentral, Pexip Pexip, TeamViewer, microsoft teams

Procedia PDF Downloads 100
2015 Critical Review of Web Content Mining Extraction Mechanisms

Authors: Rabia Bashir, Sajjad Akbar

Abstract:

There is an inevitable demand of web mining due to rapid increase of huge information on the Internet, but the striking variety of web structures has made required content retrieval a difficult task. To counter this issue, Web Content Mining (WCM) emerges as a potential candidate which extracts and integrates suitable resources of data to users. In past few years, research has been done on several extraction techniques for WCM i.e. agent-based, template-based, assumption-based, statistic-based, wrapper-based and machine learning. However, it is still unclear that either these approaches are efficiently tackling the significant challenges of WCM or not. To answer this question, this paper identifies these challenges such as language independency, structure flexibility, performance, automation, dynamicity, redundancy handling, intelligence, relevant content retrieval, and privacy. Further, mapping of these challenges is done with existing extraction mechanisms which helps to adopt the most suitable WCM approach, given some conditions and characteristics at hand.

Keywords: content mining challenges, web content mining, web content extraction approaches, web information retrieval

Procedia PDF Downloads 536
2014 Efficient Internal Generator Based on Random Selection of an Elliptic Curve

Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche

Abstract:

The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.

Keywords: PRNG, security, cryptosystem, ECC

Procedia PDF Downloads 435
2013 The Prevalence of Organized Retail Crime in Riyadh, Saudi Arabia

Authors: Saleh Dabil

Abstract:

This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: (1) the supermarket profile (volume, location, standard and type of the store), (2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), (3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first is ‘the well distributing of the duties and responsibilities between the employees especially for security purposes’. Second is ‘installation of strong security system’ and ‘making well-designed store layout’. Third is ‘giving training for general employees’ and ‘to give periodically security skills training of employees’. There are other suggestions in the study can be looked up in the text.

Keywords: organized crime, retail, theft, loss prevention, store environment

Procedia PDF Downloads 183
2012 Collocation Assessment between GEO and GSO Satellites

Authors: A. E. Emam, M. Abd Elghany

Abstract:

The change in orbit evolution between collocated satellites (X, Y) inside +/-0.09 ° E/W and +/- 0.07 ° N/S cluster, after one of these satellites is placed in an inclined orbit (satellite X) and the effect of this change in the collocation safety inside the cluster window has been studied and evaluated. Several collocation scenarios had been studied in order to adjust the location of both satellites inside their cluster to maximize the separation between them and safe the mission.

Keywords: satellite, GEO, collocation, risk assessment

Procedia PDF Downloads 382
2011 The Location-Routing Problem with Pickup Facilities and Heterogeneous Demand: Formulation and Heuristics Approach

Authors: Mao Zhaofang, Xu Yida, Fang Kan, Fu Enyuan, Zhao Zhao

Abstract:

Nowadays, last-mile distribution plays an increasingly important role in the whole industrial chain delivery link and accounts for a large proportion of the whole distribution process cost. Promoting the upgrading of logistics networks and improving the layout of final distribution points has become one of the trends in the development of modern logistics. Due to the discrete and heterogeneous needs and spatial distribution of customer demand, which will lead to a higher delivery failure rate and lower vehicle utilization, last-mile delivery has become a time-consuming and uncertain process. As a result, courier companies have introduced a range of innovative parcel storage facilities, including pick-up points and lockers. The introduction of pick-up points and lockers has not only improved the users’ experience but has also helped logistics and courier companies achieve large-scale economy. Against the backdrop of the COVID-19 of the previous period, contactless delivery has become a new hotspot, which has also created new opportunities for the development of collection services. Therefore, a key issue for logistics companies is how to design/redesign their last-mile distribution network systems to create integrated logistics and distribution networks that consider pick-up points and lockers. This paper focuses on the introduction of self-pickup facilities in new logistics and distribution scenarios and the heterogeneous demands of customers. In this paper, we consider two types of demand, including ordinary products and refrigerated products, as well as corresponding transportation vehicles. We consider the constraints associated with self-pickup points and lockers and then address the location-routing problem with self-pickup facilities and heterogeneous demands (LRP-PFHD). To solve this challenging problem, we propose a mixed integer linear programming (MILP) model that aims to minimize the total cost, which includes the facility opening cost, the variable transport cost, and the fixed transport cost. Due to the NP-hardness of the problem, we propose a hybrid adaptive large-neighbourhood search algorithm to solve LRP-PFHD. We evaluate the effectiveness and efficiency of the proposed algorithm by using instances generated based on benchmark instances. The results demonstrate that the hybrid adaptive large neighbourhood search algorithm is more efficient than MILP solvers such as Gurobi for LRP-PFHD, especially for large-scale instances. In addition, we made a comprehensive analysis of some important parameters (e.g., facility opening cost and transportation cost) to explore their impacts on the results and suggested helpful managerial insights for courier companies.

Keywords: city logistics, last-mile delivery, location-routing, adaptive large neighborhood search

Procedia PDF Downloads 65
2010 Non-melanoma Nasal Skin Cancer: Literature Review

Authors: Geovanna dos Santos Romeiro, Polintia Rayza Brito da Silva, Luis Henrique Moura, Izadora Moreira Do Amaral, Marília Vitória Pinto Milhomem

Abstract:

Introduction: The nose is one of the most likely sites for the appearance of malignancy on the face. This can be associated with its unique position of exposure to environmental damage, lack of photoprotection and because it is an area susceptible to greater sun exposure. It is already known that the most common type of nasal tumor is basal cell carcinoma. Squamous cell carcinoma is less common but considerably more aggressive, with a tendency to grow rapidly and metastasize. Nasal skin cancer can have a good prognosis, regardless of the type of treatment chosen, i.e., surgery, radiotherapy or electrodissection. However, tumors that are not diagnosed and treated quickly can be harmful and have a greater chance of metastasizing. When curative surgery is performed, therapies and reconstructive surgical procedures are usually required. Objective: The objective is to review the literature on nasal skin tumors and their types and specific locations. Forty-four articles published in Pubmed related to the location of skin cancer in the specific nasal areas region were analyzed. Twelve were excluded for being prior to the year 2000, three with inconclusive results, and one with unbiased conclusions. Results and Conclusion: Regarding the prevalence of types of nasal tumors, basal cell carcinoma comprises the majority, occurring predominantly in the ala, tip and root; squamous cell carcinoma, on the other hand, is more common in the lateral borders and columella. Even so, 2 articles report that the prevalence of metastasis has a higher incidence in squamous cell carcinomas. All of this points to the importance of early location, including regions that are often overlooked in the examination if the patient is wearing glasses. This topic needs further investigation for a greater correlation between anatomy and clinical-surgical implications.

Keywords: skin cancer, melanoma, non-melanoma, surgery

Procedia PDF Downloads 40
2009 Hyperelastic Constitutive Modelling of the Male Pelvic System to Understand the Prostate Motion, Deformation and Neoplasms Location with the Influence of MRI-TRUS Fusion Biopsy

Authors: Muhammad Qasim, Dolors Puigjaner, Josep Maria López, Joan Herrero, Carme Olivé, Gerard Fortuny

Abstract:

Computational modeling of the human pelvis using the finite element (FE) method has become extremely important to understand the mechanics of prostate motion and deformation when transrectal ultrasound (TRUS) guided biopsy is performed. The number of reliable and validated hyperelastic constitutive FE models of the male pelvis region is limited, and given models did not precisely describe the anatomical behavior of pelvis organs, mainly of the prostate and its neoplasms location. The motion and deformation of the prostate during TRUS-guided biopsy makes it difficult to know the location of potential lesions in advance. When using this procedure, practitioners can only provide roughly estimations for the lesions locations. Consequently, multiple biopsy samples are required to target one single lesion. In this study, the whole pelvis model (comprised of the rectum, bladder, pelvic muscles, prostate transitional zone (TZ), and peripheral zone (PZ)) is used for the simulation results. An isotropic hyperelastic approach (Signorini model) was used for all the soft tissues except the vesical muscles. The vesical muscles are assumed to have a linear elastic behavior due to the lack of experimental data to determine the constants involved in hyperelastic models. The tissues and organ geometry is taken from the existing literature for 3D meshes. Then the biomechanical parameters were obtained under different testing techniques described in the literature. The acquired parametric values for uniaxial stress/strain data are used in the Signorini model to see the anatomical behavior of the pelvis model. The five mesh nodes in terms of small prostate lesions are selected prior to biopsy and each lesion’s final position is targeted when TRUS probe force of 30 N is applied at the inside rectum wall. Code_Aster open-source software is used for numerical simulations. Moreover, the overall effects of pelvis organ deformation were demonstrated when TRUS–guided biopsy is induced. The deformation of the prostate and neoplasms displacement showed that the appropriate material properties to organs altered the resulting lesion's migration parametrically. As a result, the distance traveled by these lesions ranged between 3.77 and 9.42 mm. The lesion displacement and organ deformation are compared and analyzed with our previous study in which we used linear elastic properties for all pelvic organs. Furthermore, the visual comparison of axial and sagittal slices are also compared, which is taken for Magnetic Resource Imaging (MRI) and TRUS images with our preliminary study.

Keywords: code-aster, magnetic resonance imaging, neoplasms, transrectal ultrasound, TRUS-guided biopsy

Procedia PDF Downloads 79
2008 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation

Authors: Mohammad Hadi Khorashadi Zadeh

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Keywords: BYOD, mobile cloud computing, mobile security, information management

Procedia PDF Downloads 302