Search results for: user lifestyle
2284 A Novel Method for Face Detection
Authors: H. Abas Nejad, A. R. Teymoori
Abstract:
Facial expression recognition is one of the open problems in computer vision. Robust neutral face recognition in real time is a major challenge for various supervised learning based facial expression recognition methods. This is due to the fact that supervised methods cannot accommodate all appearance variability across the faces with respect to race, pose, lighting, facial biases, etc. in the limited amount of training data. Moreover, processing each and every frame to classify emotions is not required, as the user stays neutral for the majority of the time in usual applications like video chat or photo album/web browsing. Detecting neutral state at an early stage, thereby bypassing those frames from emotion classification would save the computational power. In this work, we propose a light-weight neutral vs. emotion classification engine, which acts as a preprocessor to the traditional supervised emotion classification approaches. It dynamically learns neutral appearance at Key Emotion (KE) points using a textural statistical model, constructed by a set of reference neutral frames for each user. The proposed method is made robust to various types of user head motions by accounting for affine distortions based on a textural statistical model. Robustness to dynamic shift of KE points is achieved by evaluating the similarities on a subset of neighborhood patches around each KE point using the prior information regarding the directionality of specific facial action units acting on the respective KE point. The proposed method, as a result, improves ER accuracy and simultaneously reduces the computational complexity of ER system, as validated on multiple databases.Keywords: neutral vs. emotion classification, Constrained Local Model, procrustes analysis, Local Binary Pattern Histogram, statistical model
Procedia PDF Downloads 3392283 Feature-Based Summarizing and Ranking from Customer Reviews
Authors: Dim En Nyaung, Thin Lai Lai Thein
Abstract:
Due to the rapid increase of Internet, web opinion sources dynamically emerge which is useful for both potential customers and product manufacturers for prediction and decision purposes. These are the user generated contents written in natural languages and are unstructured-free-texts scheme. Therefore, opinion mining techniques become popular to automatically process customer reviews for extracting product features and user opinions expressed over them. Since customer reviews may contain both opinionated and factual sentences, a supervised machine learning technique applies for subjectivity classification to improve the mining performance. In this paper, we dedicate our work is the task of opinion summarization. Therefore, product feature and opinion extraction is critical to opinion summarization, because its effectiveness significantly affects the identification of semantic relationships. The polarity and numeric score of all the features are determined by Senti-WordNet Lexicon. The problem of opinion summarization refers how to relate the opinion words with respect to a certain feature. Probabilistic based model of supervised learning will improve the result that is more flexible and effective.Keywords: opinion mining, opinion summarization, sentiment analysis, text mining
Procedia PDF Downloads 3322282 AI-Based Information System for Hygiene and Safety Management of Shared Kitchens
Authors: Jongtae Rhee, Sangkwon Han, Seungbin Ji, Junhyeong Park, Byeonghun Kim, Taekyung Kim, Byeonghyeon Jeon, Jiwoo Yang
Abstract:
The shared kitchen is a concept that transfers the value of the sharing economy to the kitchen. It is a type of kitchen equipped with cooking facilities that allows multiple companies or chefs to share time and space and use it jointly. These shared kitchens provide economic benefits and convenience, such as reduced investment costs and rent, but also increase the risk of safety management, such as cross-contamination of food ingredients. Therefore, to manage the safety of food ingredients and finished products in a shared kitchen where several entities jointly use the kitchen and handle various types of food ingredients, it is critical to manage followings: the freshness of food ingredients, user hygiene and safety and cross-contamination of cooking equipment and facilities. In this study, it propose a machine learning-based system for hygiene safety and cross-contamination management, which are highly difficult to manage. User clothing management and user access management, which are most relevant to the hygiene and safety of shared kitchens, are solved through machine learning-based methodology, and cutting board usage management, which is most relevant to cross-contamination management, is implemented as an integrated safety management system based on artificial intelligence. First, to prevent cross-contamination of food ingredients, we use images collected through a real-time camera to determine whether the food ingredients match a given cutting board based on a real-time object detection model, YOLO v7. To manage the hygiene of user clothing, we use a camera-based facial recognition model to recognize the user, and real-time object detection model to determine whether a sanitary hat and mask are worn. In addition, to manage access for users qualified to enter the shared kitchen, we utilize machine learning based signature recognition module. By comparing the pairwise distance between the contract signature and the signature at the time of entrance to the shared kitchen, access permission is determined through a pre-trained signature verification model. These machine learning-based safety management tasks are integrated into a single information system, and each result is managed in an integrated database. Through this, users are warned of safety dangers through the tablet PC installed in the shared kitchen, and managers can track the cause of the sanitary and safety accidents. As a result of system integration analysis, real-time safety management services can be continuously provided by artificial intelligence, and machine learning-based methodologies are used for integrated safety management of shared kitchens that allows dynamic contracts among various users. By solving this problem, we were able to secure the feasibility and safety of the shared kitchen business.Keywords: artificial intelligence, food safety, information system, safety management, shared kitchen
Procedia PDF Downloads 692281 RAPDAC: Role Centric Attribute Based Policy Driven Access Control Model
Authors: Jamil Ahmed
Abstract:
Access control models aim to decide whether a user should be denied or granted access to the user‟s requested activity. Various access control models have been established and proposed. The most prominent of these models include role-based, attribute-based, policy based access control models as well as role-centric attribute based access control model. In this paper, a novel access control model is presented called “Role centric Attribute based Policy Driven Access Control (RAPDAC) model”. RAPDAC incorporates the concept of “policy” in the “role centric attribute based access control model”. It leverages the concept of "policy‟ by precisely combining the evaluation of conditions, attributes, permissions and roles in order to allow authorization access. This approach allows capturing the "access control policy‟ of a real time application in a well defined manner. RAPDAC model allows making access decision at much finer granularity as illustrated by the case study of a real time library information system.Keywords: authorization, access control model, role based access control, attribute based access control
Procedia PDF Downloads 1592280 Co-produced Databank of Tailored Messages to Support Enagagement to Digitial Health Interventions
Authors: Menna Brown, Tania Domun
Abstract:
Digital health interventions are effective across a wide array of health conditions spanning physical health, lifestyle behaviour change, and mental health and wellbeing; furthermore, they are rapidly increasing in volume within both the academic literature and society as commercial apps continue to proliferate the digital health market. However, adherence and engagement to digital health interventions remains problematic. Technology-based personalised and tailored reminder strategies can support engagement to digital health interventions. Interventions which support individuals’ mental health and wellbeing are of critical importance in the wake if the COVID-19 pandemic. Student and young person’s mental health has been negatively affected and digital resources continue to offer cost effective means to address wellbeing at a population level. Develop a databank of digital co-produced tailored messages to support engagement to a range of digital health interventions including those focused on mental health and wellbeing, and lifestyle behaviour change. Qualitative research design. Participants discussed their views of health and wellbeing, engagement and adherence to digital health interventions focused around a 12-week wellbeing intervention via a series of focus group discussions. They worked together to co-create content following a participatory design approach. Three focus group discussions were facilitated with (n=15) undergraduate students at one Welsh university to provide an empirically derived, co-produced, databank of (n=145) tailored messages. Messages were explored and categorised thematically, and the following ten themes emerged: Autonomy, Recognition, Guidance, Community, Acceptance, Responsibility, Encouragement, Compassion, Impact and Ease. The findings provide empirically derived, co-produced tailored messages. These have been made available for use, via ‘ACTivate your wellbeing’ a digital, automated, 12-week health and wellbeing intervention programme, based on acceptance and commitment therapy (ACT). The purpose of which is to support future research to evaluate the impact of thematically categorised tailored messages on engagement and adherence to digital health interventions.Keywords: digital health, engagement, wellbeing, participatory design, positive psychology, co-production
Procedia PDF Downloads 1212279 Programming Language Extension Using Structured Query Language for Database Access
Authors: Chapman Eze Nnadozie
Abstract:
Relational databases constitute a very vital tool for the effective management and administration of both personal and organizational data. Data access ranges from a single user database management software to a more complex distributed server system. This paper intends to appraise the use a programming language extension like structured query language (SQL) to establish links to a relational database (Microsoft Access 2013) using Visual C++ 9 programming language environment. The methodology used involves the creation of tables to form a database using Microsoft Access 2013, which is Object Linking and Embedding (OLE) database compliant. The SQL command is used to query the tables in the database for easy extraction of expected records inside the visual C++ environment. The findings of this paper reveal that records can easily be accessed and manipulated to filter exactly what the user wants, such as retrieval of records with specified criteria, updating of records, and deletion of part or the whole records in a table.Keywords: data access, database, database management system, OLE, programming language, records, relational database, software, SQL, table
Procedia PDF Downloads 1872278 Childhood Obesity in Japan: Trends in Obesity Prevalence among Japanese Kids under 17 Years Old from 2007 to 2016
Authors: Houda Mnif Sellami, Toshi Umehara, Yuriko Yamazaki, Reie Matoba, Anna Sakashita, Yoshimi Abe, Hiroyuki Otake, Satoko Morita, Yoshitaka Akiyama, Chieko Morisawa, Eiji Omura, Masako Yazawa, Yoshie Koike, Mitsugu Tokunaga, Seiki Wada, Shinya Minagawa, Masafumi Matsuda
Abstract:
Childhood obesity has been, for decades, a very serious public health problem worldwide. Some Asian countries have already reached alarming rates, as lifestyle changed dramatically in this part of the world. In many concerned countries, strategies including educational, promotional and awareness-raising activities have been established to combat obesity within kids. Objective: To estimate the obesity and also the underweight trends of Japanese kids from 5 to 17 years, by single year of age and by gender, over the last decade. Methods We used the data from the cross-sectional annual Nationwide surveys (National Nutrition Survey, Japan, Ministry of education, culture, sports, science and technology) conducted from 2007 to 2016. We compared trajectories of obesity prevalence, with the data on sex and age groups. We also analyzed energy and macronutrients intakes of Japanese kids using Ministry of Health, Labor and Welfare-Japan annual data, from 2007 to 2014. Results: From 2007 to 2016, Boys obesity was higher than Girls obesity for the over 6 YO participants. Both Boys and Girls obesity trends had 2 peaks of prevalence at (11-13 YO) and then at (15-16 YO). From 2007 to 2012, Kids obesity decreased considerably in both sex and all year of age; then obesity decline was more modest till 2016.On the other side, Kids underweight prevalence increased in both sexes. The macronutrients analyze couldn’t show an evident association between obesity trends and foods intake. Conclusion: Japanese kids’ obesity has been decreased since 2007, in opposition to some other countries reports. We didn’t find an observed association with food intake using Health Ministry data; we need further investigation to estimate energy intake, lifestyle and physical activity by year of age to know whether there is any possible relation.Keywords: childhood, Japan, obesity, underweight
Procedia PDF Downloads 2892277 Consumer Choice Determinants in Context of Functional Food
Authors: E. Grochowska-Niedworok, K. Brukało, M. Kardas
Abstract:
The aim of this study was to analyze and evaluate the consumption of functional food by consumers by: age, sex, formal education level, place of residence and diagnosed diseases. The study employed an ad hoc questionnaire in a group of 300 inhabitants of Upper Silesia voivodship. Knowledge of functional food among the group covered in the study was far from satisfactory. The choice of functional food was of intuitive character. In addition, the group covered was more likely to choose pharmacotherapy instead of diet-related prevention then, which can be associated with presumption of too distant effects and a long period of treatment.Keywords: consumer choice, functional food, healthy lifestyle, consumer knowledge
Procedia PDF Downloads 2572276 Background Check System for Turkish IT Companies
Authors: Arzu Baloglu, Ugur Kaplancali
Abstract:
This paper focuses on Background Check Systems and Pre-Employment Screening. In our study, we attempted to make an online background checking site that will help employers when hiring employees. Our site has two types of users which are free and powered user. Free users are the employees and powered users are the employers which will hire employers. The database of the site will contain all the information about the employees and employers which are registered in the system so the employers can make a search based on their searching criteria to find the suitable employee for the job. The web site also has a comments and points system. The current employer can make comments to his/her employees and can also give them points. The comments will be shown on employee’s profile, so; when an employer searches for an employee he/she can check the points and comments of the employee to see whether he or she is capable of the job or not. The employers can also follow some employees if they desire. This paper has been designed and implemented with using ASP.NET, C# and JavaScript. The outputs have a user friendly interface. The interface also aimed to provide the useful information for Turkish Technology Companies.Keywords: background, checking, verification, human resources, online
Procedia PDF Downloads 1982275 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement
Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi
Abstract:
Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle
Procedia PDF Downloads 2202274 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control
Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod
Abstract:
The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.Keywords: XML database, trust-based access control, severity-aware, trust values, log file
Procedia PDF Downloads 3002273 Human Centred Design Approach for Public Transportation
Authors: Jo Kuys, Kirsten Day
Abstract:
Improving urban transportation systems requires an emphasis on users’ end-to-end journey experience, from the moment the user steps out of their home to when they arrive at their destination. In considering such end-to-end experiences, human centred design (HCD) must be integrated from the very beginning to generate viable outcomes for the public. An HCD approach will encourage innovative outcomes while acknowledging all factors that need to be understood along the journey. We provide evidence to show that when designing for public transportation, it is not just about the physical manifestation of a particular outcome; moreover, it’s about the context and human behaviours that need to be considered throughout the design process. Humans and their behavioural factors are vitally important to successful implementation of sustainable public transport systems. Through an in-depth literature review of HCD approaches for urban transportation systems, we provide a base to exploit the benefits and highlight the importance of including HCD in public transportation projects for greater patronage, resulting in more sustainable cities. An HCD approach is critical to all public transportation projects to understand different levels of transportation design, from the setting of transport policy to implementation to infrastructure, vehicle, and interface design.Keywords: human centred design, public transportation, urban planning, user experience
Procedia PDF Downloads 1872272 A Web-Based Self-Learning Grammar for Spoken Language Understanding
Authors: S. Biondi, V. Catania, R. Di Natale, A. R. Intilisano, D. Panno
Abstract:
One of the major goals of Spoken Dialog Systems (SDS) is to understand what the user utters. In the SDS domain, the Spoken Language Understanding (SLU) Module classifies user utterances by means of a pre-definite conceptual knowledge. The SLU module is able to recognize only the meaning previously included in its knowledge base. Due the vastity of that knowledge, the information storing is a very expensive process. Updating and managing the knowledge base are time-consuming and error-prone processes because of the rapidly growing number of entities like proper nouns and domain-specific nouns. This paper proposes a solution to the problem of Name Entity Recognition (NER) applied to a SDS domain. The proposed solution attempts to automatically recognize the meaning associated with an utterance by using the PANKOW (Pattern based Annotation through Knowledge On the Web) method at runtime. The method being proposed extracts information from the Web to increase the SLU knowledge module and reduces the development effort. In particular, the Google Search Engine is used to extract information from the Facebook social network.Keywords: spoken dialog system, spoken language understanding, web semantic, name entity recognition
Procedia PDF Downloads 3382271 Development of Wave-Dissipating Block Installation Simulation for Inexperienced Worker Training
Authors: Hao Min Chuah, Tatsuya Yamazaki, Ryosui Iwasawa, Tatsumi Suto
Abstract:
In recent years, with the advancement of digital technology, the movement to introduce so-called ICT (Information and Communication Technology), such as computer technology and network technology, to civil engineering construction sites and construction sites is accelerating. As part of this movement, attempts are being made in various situations to reproduce actual sites inside computers and use them for designing and construction planning, as well as for training inexperienced engineers. The installation of wave-dissipating blocks on coasts, etc., is a type of work that has been carried out by skilled workers based on their years of experience and is one of the tasks that is difficult for inexperienced workers to carry out on site. Wave-dissipating blocks are structures that are designed to protect coasts, beaches, and so on from erosion by reducing the energy of ocean waves. Wave-dissipating blocks usually weigh more than 1 t and are installed by being suspended by a crane, so it would be time-consuming and costly for inexperienced workers to train on-site. In this paper, therefore, a block installation simulator is developed based on Unity 3D, a game development engine. The simulator computes porosity. Porosity is defined as the ratio of the total volume of the wave breaker blocks inside the structure to the final shape of the ideal structure. Using the evaluation of porosity, the simulator can determine how well the user is able to install the blocks. The voxelization technique is used to calculate the porosity of the structure, simplifying the calculations. Other techniques, such as raycasting and box overlapping, are employed for accurate simulation. In the near future, the simulator will install an automatic block installation algorithm based on combinatorial optimization solutions and compare the user-demonstrated block installation and the appropriate installation solved by the algorithm.Keywords: 3D simulator, porosity, user interface, voxelization, wave-dissipating blocks
Procedia PDF Downloads 1032270 Operating System Based Virtualization Models in Cloud Computing
Authors: Dev Ras Pandey, Bharat Mishra, S. K. Tripathi
Abstract:
Cloud computing is ready to transform the structure of businesses and learning through supplying the real-time applications and provide an immediate help for small to medium sized businesses. The ability to run a hypervisor inside a virtual machine is important feature of virtualization and it is called nested virtualization. In today’s growing field of information technology, many of the virtualization models are available, that provide a convenient approach to implement, but decision for a single model selection is difficult. This paper explains the applications of operating system based virtualization in cloud computing with an appropriate/suitable model with their different specifications and user’s requirements. In the present paper, most popular models are selected, and the selection was based on container and hypervisor based virtualization. Selected models were compared with a wide range of user’s requirements as number of CPUs, memory size, nested virtualization supports, live migration and commercial supports, etc. and we identified a most suitable model of virtualization.Keywords: virtualization, OS based virtualization, container based virtualization, hypervisor based virtualization
Procedia PDF Downloads 3292269 A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services
Authors: Raya Al Khayari, Rasha Al Jassim, Muna Al Balushi, Fatma Al Moqbali, Said El Hajjar
Abstract:
This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country.Keywords: civil-id disclosure, awareness, linear regression, multiple regression
Procedia PDF Downloads 572268 Reliability Factors Based Fuzzy Logic Scheme for Spectrum Sensing
Authors: Tallataf Rasheed, Adnan Rashdi, Ahmad Naeem Akhtar
Abstract:
The accurate spectrum sensing is a fundamental requirement of dynamic spectrum access for deployment of Cognitive Radio Network (CRN). To acheive this requirement a Reliability factors based Fuzzy Logic (RFL) Scheme for Spectrum Sensing has been proposed in this paper. Cognitive Radio User (CRU) predicts the presence or absence of Primary User (PU) using energy detector and calculates the Reliability factors which are SNR of sensing node, threshold of energy detector and decision difference of each node with other nodes in a cooperative spectrum sensing environment. Then the decision of energy detector is combined with Reliability factors of sensing node using Fuzzy Logic. These Reliability Factors used in RFL Scheme describes the reliability of decision made by a CRU to improve the local spectrum sensing. This Fuzzy combining scheme provides the accuracy of decision made by sensornode. The simulation results have shown that the proposed technique provide better PU detection probability than existing Spectrum Sensing Techniques.Keywords: cognitive radio, spectrum sensing, energy detector, reliability factors, fuzzy logic
Procedia PDF Downloads 4862267 PostureCheck with the Kinect and Proficio: Posture Modeling for Exercise Assessment
Authors: Elham Saraee, Saurabh Singh, Margrit Betke
Abstract:
Evaluation of a person’s posture while exercising is important in physical therapy. During a therapy session, a physical therapist or a monitoring system must assure that the person is performing an exercise correctly to achieve the desired therapeutic effect. In this work, we introduce a system called POSTURECHECK for exercise assessment in physical therapy. POSTURECHECK assesses the posture of a person who is exercising with the Proficio robotic arm while being recorded by the Microsoft Kinect interface. POSTURECHECK extracts unique features from the person’s upper body during the exercise, and classifies the sequence of postures as correct or incorrect using Bayesian estimation and majority voting. If POSTURECHECK recognizes an incorrect posture, it specifies what the user can do to correct it. The result of our experiment shows that POSTURECHECK is capable of recognizing the incorrect postures in real time while the user is performing an exercise.Keywords: Bayesian estimation, majority voting, Microsoft Kinect, PostureCheck, Proficio robotic arm, upper body physical therapy
Procedia PDF Downloads 2842266 Awareness, Use and Searching Behavior of 'Virtua' Online Public Access Catalog Users
Authors: Saira Soroya, Khalid Mahmood
Abstract:
Library catalogs open the door to the library collection. OPAC (Online Public Access Catalog) are one of the services offered by automated libraries. The present study aims to explore user’s awareness, the level of use and their searching behavior of OPAC with a purpose to give suggestions and ways to improve user-friendly features of library OPAC. The population consisted of OPAC users of Lahore University of Management Sciences (LUMS). Convenient sampling technique was carried out. Total sample size was 100 OPAC users. Quantitative research design, based on survey method used to carry out the study. The data collection instrument was adopted. Data was analyzed using SPSS. Results revealed that a considerable number of users were not aware of OPAC i.e. (30%); however, those who were aware were using basic features of the OPAC. It was found that lack of knowledge was considered the frequent reason for not using all features of OPAC. In this regard, it is strongly recommended that compulsory information literacy programme should be established.Keywords: catalog, OPAC, library automation, usability study, university library
Procedia PDF Downloads 3362265 Interdisciplinary Expressive Artistic Activities within Prevention of Crisis Situations and Pathological Strains in Educational Facilities of Juvenile Detention Centres
Authors: Marie Bajnarová
Abstract:
The core part of the research project is represented by taking a perspective on the role of an educator in Juvenile Institutional Centres. In accordance with the research questions, the research explores impact of the environment, situations, practices, attitudes, values and also experience of the respondents. Art activities minimize risky behaviours and contribute to a healthy lifestyle. They also help children and adolescents with conduct disorders develop positive social behaviour, psychosocial skills and cope with difficult life situations.Keywords: Juvenile Detention Centres, drawing, conduct disorders, art therapy
Procedia PDF Downloads 2842264 Simulator Dynamic Positioning System with Azimuthal Thruster
Authors: Robson C. Santos, Christian N. Barreto, Gerson G. Cunha, Severino J. C. Neto
Abstract:
This paper aims to project the construction of a prototype azimuthal thruster, mounted with materials of low cost and easy access, testing in a controlled environment to measure their performance, characteristics and feasibility of future projects. The construction of the simulation of dynamic positioning software, responsible for simulating a vessel and reposition it when necessary . Tests for partial and full validation of the model were conducted, operates independently of the control system and executes the commands and commands of the helix of rotation azimuth. The system provides an interface to the user and simulates the conditions unfavorable positioning of a vessel, accurately calculates the azimuth angle, the direction of rotation of the helix and the time that this should be turned on so that the vessel back to position original. There is a serial communication that connects the Simulation Dynamic Positioning System with Embedded System causing the user-generated data to simulate the DP system arrives in the form of control signals to the motors of the propellant. This article addresses issues in the marine industry employees.Keywords: azimuthal thruster, dynamic positioning, embedded system, simulator dynamic positioning
Procedia PDF Downloads 4652263 Design of a New Vegetable Snack
Authors: Patricia Calvo, Francisco M. Sánchez, María J. Rodríguez
Abstract:
Nowadays, food intake is becoming more irregular due to changes in family organization and lifestyle. Snacking is part of the day-to-day lives of people, however, most of the snacks have a high saturated fat, salt and refined sugar content; these dietary factors are believed to have negative health consequences. For this reason, there has been an increase in consumer demand for healthy, natural and convenient foods, so the development of a significant portion of new products focuses on improving the nutritional value of food snacks through modification its nutritional composition. In this paper, a new product made from vegetables has been designed. This new product would be an ideal food format to include ingredients with positive health benefits.Keywords: healthy, pepper, dried, carotenes, polyphenols
Procedia PDF Downloads 3782262 Ultra Reliable Communication: Availability Analysis in 5G Cellular Networks
Authors: Yosra Benchaabene, Noureddine Boujnah, Faouzi Zarai
Abstract:
To meet the growing demand of users, the fifth generation (5G) will continue to provide services to higher data rates with higher carrier frequencies and wider bandwidths. As part of the 5G communication paradigm, Ultra Reliable Communication (URC) is envisaged as an important technology pillar for providing anywhere and anytime services to end users. Ultra Reliable Communication (URC) is considered an important technology that why it has become an active research topic. In this work, we analyze the availability of a service in the space domain. We characterize spatially available areas consisting of all locations that meet a performance requirement with confidence, and we define cell availability and system availability, individual user availability, and user-oriented system availability. Poisson point process (PPP) and Voronoi tessellation are adopted to model the spatial characteristics of a cell deployment in heterogeneous networks. Numerical results are presented, also highlighting the effect of different system parameters on the achievable link availability.Keywords: URC, dependability and availability, space domain analysis, Poisson point process, Voronoi Tessellation
Procedia PDF Downloads 1222261 Sustainable User Comfort Using Building Envelope Design; From Traditional Methods to Innovative Solutions
Authors: Soufi Saylam
Abstract:
Environmental concerns, rising consumption of energy, and the high cost of mechanical systems have all contributed to increased interest in building energy efficiency and passive thermal design in recent years. This study attempts to make an evaluation of building envelope components and associated retrofits in terms of their impact on energy efficiency and occupant comfort in a sustainable context. The design of the building envelope, as a critical component of the building, has a significant impact on the organization of interior space and user comfort. In this regard, in order to achieve maximum comfort and energy savings, the design of the building envelope should include a thermal comfort system that adapts to climatic variables. This system should be developed in harmony with the environmental features, building shape, and materials used. The aim of this study is to investigate the role of the building envelope in sustainable architecture by integrating traditional envelope design principles and strategies with technological techniques, as well as to examine its role in providing physical and psychological comfort to users in the interior space.Keywords: envelope design, functional needs, physiological comfort, sustainable architecture, traditional techniques
Procedia PDF Downloads 102260 Delivering User Context-Sensitive Service in M-Commerce: An Empirical Assessment of the Impact of Urgency on Mobile Service Design for Transactional Apps
Authors: Daniela Stephanie Kuenstle
Abstract:
Complex industries such as banking or insurance experience slow growth in mobile sales. While today’s mobile applications are sophisticated and enable location based and personalized services, consumers prefer online or even face-to-face services to complete complex transactions. A possible reason for this reluctance is that the provided service within transactional mobile applications (apps) does not adequately correspond to users’ needs. Therefore, this paper examines the impact of the user context on mobile service (m-service) in m-commerce. Motivated by the potential which context-sensitive m-services hold for the future, the impact of temporal variations as a dimension of user context, on m-service design is examined. In particular, the research question asks: Does consumer urgency function as a determinant of m-service composition in transactional apps by moderating the relation between m-service type and m-service success? Thus, the aim is to explore the moderating influence of urgency on m-service types, which includes Technology Mediated Service and Technology Generated Service. While mobile applications generally comprise features of both service types, this thesis discusses whether unexpected urgency changes customer preferences for m-service types and how this consequently impacts the overall m-service success, represented by purchase intention, loyalty intention and service quality. An online experiment with a random sample of N=1311 participants was conducted. Participants were divided into four treatment groups varying in m-service types and urgency level. They were exposed to two different urgency scenarios (high/ low) and two different app versions conveying either technology mediated or technology generated service. Subsequently, participants completed a questionnaire to measure the effectiveness of the manipulation as well as the dependent variables. The research model was tested for direct and moderating effects of m-service type and urgency on m-service success. Three two-way analyses of variance confirmed the significance of main effects, but demonstrated no significant moderation of urgency on m-service types. The analysis of the gathered data did not confirm a moderating effect of urgency between m-service type and service success. Yet, the findings propose an additive effects model with the highest purchase and loyalty intention for Technology Generated Service and high urgency, while Technology Mediated Service and low urgency demonstrate the strongest effect for service quality. The results also indicate an antagonistic relation between service quality and purchase intention depending on the level of urgency. Although a confirmation of the significance of this finding is required, it suggests that only service convenience, as one dimension of mobile service quality, delivers conditional value under high urgency. This suggests a curvilinear pattern of service quality in e-commerce. Overall, the paper illustrates the complex interplay of technology, user variables, and service design. With this, it contributes to a finer-grained understanding of the relation between m-service design and situation dependency. Moreover, the importance of delivering situational value with apps depending on user context is emphasized. Finally, the present study raises the demand to continue researching the impact of situational variables on m-service design in order to develop more sophisticated m-services.Keywords: mobile consumer behavior, mobile service design, mobile service success, self-service technology, situation dependency, user-context sensitivity
Procedia PDF Downloads 2682259 Web Search Engine Based Naming Procedure for Independent Topic
Authors: Takahiro Nishigaki, Takashi Onoda
Abstract:
In recent years, the number of document data has been increasing since the spread of the Internet. Many methods have been studied for extracting topics from large document data. We proposed Independent Topic Analysis (ITA) to extract topics independent of each other from large document data such as newspaper data. ITA is a method for extracting the independent topics from the document data by using the Independent Component Analysis. The topic represented by ITA is represented by a set of words. However, the set of words is quite different from the topics the user imagines. For example, the top five words with high independence of a topic are as follows. Topic1 = {"scor", "game", "lead", "quarter", "rebound"}. This Topic 1 is considered to represent the topic of "SPORTS". This topic name "SPORTS" has to be attached by the user. ITA cannot name topics. Therefore, in this research, we propose a method to obtain topics easy for people to understand by using the web search engine, topics given by the set of words given by independent topic analysis. In particular, we search a set of topical words, and the title of the homepage of the search result is taken as the topic name. And we also use the proposed method for some data and verify its effectiveness.Keywords: independent topic analysis, topic extraction, topic naming, web search engine
Procedia PDF Downloads 1192258 A Digital Environment for Developing Mathematical Abilities in Children with Autism Spectrum Disorder
Authors: M. Isabel Santos, Ana Breda, Ana Margarida Almeida
Abstract:
Research on academic abilities of individuals with autism spectrum disorder (ASD) underlines the importance of mathematics interventions. Yet the proposal of digital applications for children and youth with ASD continues to attract little attention, namely, regarding the development of mathematical reasoning, being the use of the digital technologies an area of great interest for individuals with this disorder and its use is certainly a facilitative strategy in the development of their mathematical abilities. The use of digital technologies can be an effective way to create innovative learning opportunities to these students and to develop creative, personalized and constructive environments, where they can develop differentiated abilities. The children with ASD often respond well to learning activities involving information presented visually. In this context, we present the digital Learning Environment on Mathematics for Autistic children (LEMA) that was a research project conducive to a PhD in Multimedia in Education and was developed by the Thematic Line Geometrix, located in the Department of Mathematics, in a collaboration effort with DigiMedia Research Center, of the Department of Communication and Art (University of Aveiro, Portugal). LEMA is a digital mathematical learning environment which activities are dynamically adapted to the user’s profile, towards the development of mathematical abilities of children aged 6–12 years diagnosed with ASD. LEMA has already been evaluated with end-users (both students and teacher’s experts) and based on the analysis of the collected data readjustments were made, enabling the continuous improvement of the prototype, namely considering the integration of universal design for learning (UDL) approaches, which are of most importance in ASD, due to its heterogeneity. The learning strategies incorporated in LEMA are: (i) provide options to custom choice of math activities, according to user’s profile; (ii) integrates simple interfaces with few elements, presenting only the features and content needed for the ongoing task; (iii) uses a simple visual and textual language; (iv) uses of different types of feedbacks (auditory, visual, positive/negative reinforcement, hints with helpful instructions including math concept definitions, solved math activities using split and easier tasks and, finally, the use of videos/animations that show a solution to the proposed activity); (v) provides information in multiple representation, such as text, video, audio and image for better content and vocabulary understanding in order to stimulate, motivate and engage users to mathematical learning, also helping users to focus on content; (vi) avoids using elements that distract or interfere with focus and attention; (vii) provides clear instructions and orientation about tasks to ease the user understanding of the content and the content language, in order to stimulate, motivate and engage the user; and (viii) uses buttons, familiarly icons and contrast between font and background. Since these children may experience little sensory tolerance and may have an impaired motor skill, besides the user to have the possibility to interact with LEMA through the mouse (point and click with a single button), the user has the possibility to interact with LEMA through Kinect device (using simple gesture moves).Keywords: autism spectrum disorder, digital technologies, inclusion, mathematical abilities, mathematical learning activities
Procedia PDF Downloads 1162257 Exploring the Relationship Between Life Experiences and Early Relapse Among Imprisoned Users of Illegal Drugs in Oman: A Focused Ethnography
Authors: Hamida Hamed Said Al Harthi
Abstract:
Background: Illegal drug use is a rising problem that affects Omani youth. This research aimed to study a group of young Omani men who were imprisoned more than once for illegal drug use, focusing on exploring their lifestyle experiences inside and outside the prison and whether these contributed to their early relapse and re-imprisonment. This is the first study of its kind from Oman conducted in a prison setting. Methods: 19 Omani males aged 18–35 years imprisoned in Oman Central Prison were recruited using purposive sampling. Focused ethnography was conducted over 8 months to explore the drug-related experiences outside the prison and during imprisonment. Face-to-face semi-structured interviews with the participants yielded detailed transcripts and field notes. These were thematically analyzed, and the results were compared with the existing literature. Results: The participants’ voices yielded new insights into the lives of young Omani men imprisoned for illegal drug use, including their sufferings and challenges in prison. These included: entry shock, timing and boredom, drug trafficking in prison, as well as physical and psychological health issues. Overall, imprisonment was reported to have negatively impacted the participants’ health, personality, self-concept, emotions, attitudes, behavior and life expectations. The participants reported how their efforts to reintegrate into the Omani community after release from prison were rebuffed due to stigmatization and rejection from society and family. They also experienced frequent unemployment, police surveillance, accommodation problems and a lack of rehabilitation facilities. The immensity of the accumulated psychophysiological trauma contributed to their early relapse and re-imprisonment. Conclusion: This thesis concludes that imprisonment is largely ineffective in controlling drug use in Oman. Urgent action is required across multiple sectors to improve the lives and prospects of users of illegal drugs within and outside the prison to minimize factors contributing to early relapse. Key Words: illegal drugs, drug users, Oman, addiction, Omani culture, prisoners, relapse, re-imprisonment, qualitative research, ethnography.Keywords: illigal drugs, Prison, Omani culture lifestyle, post prison life
Procedia PDF Downloads 802256 Brain Computer Interface Implementation for Affective Computing Sensing: Classifiers Comparison
Authors: Ramón Aparicio-García, Gustavo Juárez Gracia, Jesús Álvarez Cedillo
Abstract:
A research line of the computer science that involve the study of the Human-Computer Interaction (HCI), which search to recognize and interpret the user intent by the storage and the subsequent analysis of the electrical signals of the brain, for using them in the control of electronic devices. On the other hand, the affective computing research applies the human emotions in the HCI process helping to reduce the user frustration. This paper shows the results obtained during the hardware and software development of a Brain Computer Interface (BCI) capable of recognizing the human emotions through the association of the brain electrical activity patterns. The hardware involves the sensing stage and analogical-digital conversion. The interface software involves algorithms for pre-processing of the signal in time and frequency analysis and the classification of patterns associated with the electrical brain activity. The methods used for the analysis and classification of the signal have been tested separately, by using a database that is accessible to the public, besides to a comparison among classifiers in order to know the best performing.Keywords: affective computing, interface, brain, intelligent interaction
Procedia PDF Downloads 3892255 Social Media as a Tool for Medication Adherence and Personal Health Management
Authors: Huang Wei-Chi, Li Wei, Yu Tien-Chieh
Abstract:
Medication adherence is crucial for treatment success. Adherence problem is common in patients with polypharmacy, especially in the geriatric population who are vulnerable to multiple chronic conditions but averagely less knowledgeable about diseases and medications. In order to help patients take medications appropriately and enhance the understanding of diseases or medications, a Line official account named e-Pharmacist was designed. The line is a popular freeware app with the highest penetration rate (95.7%) in Taiwan. The interface of e-Pharmacist is user-friendly for easy-to-read and convenient operating. Differ from other medication adherence apps, users just added e-Pharmacist as a LINE friend without installing any more apps and the drug lists were automatically downloaded from the personal electronic medical records with security permission. Over and above medication reminder, several additional capabilities were set up and engaged in the platform of e-Pharmacist including prescription refill reservation, laboratory examination consultation, medical appointment registration, and “Daily Health Log” where patients can record and track data of blood pressure/blood sugar and daily meals for self-health management as well as can share the important information to clinical professionals when seeking medical help. Additionally, a Line chatbot was utilized to provide tailored medicine information for the individual user. From July 2020 to March 2022, around 3000 patients added e-pharmacist as Line friends. Every day more than 1500 patients receive messages from e-pharmacist to notify them to take medicine. Thanks to the e-pharmacist alert system and Chatbot, the low-compliance patients (defined by Program on Adherence to Medication, PAM) significantly dropped from 36% to 6%, whereas the high-compliance patients dramatically increased from 13% to 77%. The user satisfaction is 98%. In brief, an e-pharmacist is not only a medication reminder but also a tailored personal assistant with value-added service for health management.Keywords: e-pharmacist, self-health management, medication reminder, value-added service
Procedia PDF Downloads 160