Search results for: store personality
314 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector
Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar
Abstract:
Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability
Procedia PDF Downloads 184313 Empowering Women through the Fishermen of Functional Skills for City Gorontalo Indonesia
Authors: Abdul Rahmat
Abstract:
Community-based education in the economic empowerment of the family is an attempt to accelerate human development index (HDI) Dumbo Kingdom District of Gorontalo economics (purchasing power) program developed in this activity is the manufacture of functional skills shredded fish, fish balls, fish nuggets, chips anchovies, and corn sticks fish. The target audience of this activity is fishing se mothers subdistrict Dumbo Kingdom include Talumolo Village, Village Botu, Kampung Bugis Village, Village North and Sub Leato South Leato that each village is represented by 20 participants so totaling 100 participants. Time activities beginning in October s/d November 2014 held once a week on every Saturday at 9.00 s/d 13:00/14:00. From the results of the learning process of testing the skills of functional skills of making shredded fish, fish balls, fish nuggets, chips anchovies, fish and corn sticks residents have additional knowledge and experience are: 1) Order the concept include: nutrient content, processing food with fish raw materials , variations in taste, packaging, pricing and marketing sales. 2) Products made: in accordance with the wishes of the residents learned that estimated Eligible selling, product packaging logo creation, preparation and realization of the establishment of Business Study Group (KBU) and pioneered the marketing network with restaurant, store / shop staple food vendors that are around CLC.Keywords: community development, functional skills, gender, HDI
Procedia PDF Downloads 313312 Efficiency and Scale Elasticity in Network Data Envelopment Analysis: An Application to International Tourist Hotels in Taiwan
Authors: Li-Hsueh Chen
Abstract:
Efficient operation is more and more important for managers of hotels. Unlike the manufacturing industry, hotels cannot store their products. In addition, many hotels provide room service, and food and beverage service simultaneously. When efficiencies of hotels are evaluated, the internal structure should be considered. Hence, based on the operational characteristics of hotels, this study proposes a DEA model to simultaneously assess the efficiencies among the room production division, food and beverage production division, room service division and food and beverage service division. However, not only the enhancement of efficiency but also the adjustment of scale can improve the performance. In terms of the adjustment of scale, scale elasticity or returns to scale can help to managers to make decisions concerning expansion or contraction. In order to construct a reasonable approach to measure the efficiencies and scale elasticities of hotels, this study builds an alternative variable-returns-to-scale-based two-stage network DEA model with the combination of parallel and series structures to explore the scale elasticities of the whole system, room production division, food and beverage production division, room service division and food and beverage service division based on the data of international tourist hotel industry in Taiwan. The results may provide valuable information on operational performance and scale for managers and decision makers.Keywords: efficiency, scale elasticity, network data envelopment analysis, international tourist hotel
Procedia PDF Downloads 225311 Hybrid Heat Pump for Micro Heat Network
Authors: J. M. Counsell, Y. Khalid, M. J. Stewart
Abstract:
Achieving nearly zero carbon heating continues to be identified by UK government analysis as an important feature of any lowest cost pathway to reducing greenhouse gas emissions. Heat currently accounts for 48% of UK energy consumption and approximately one third of UK’s greenhouse gas emissions. Heat Networks are being promoted by UK investment policies as one means of supporting hybrid heat pump based solutions. To this effect the RISE (Renewable Integrated and Sustainable Electric) heating system project is investigating how an all-electric heating sourceshybrid configuration could play a key role in long-term decarbonisation of heat. For the purposes of this study, hybrid systems are defined as systems combining the technologies of an electric driven air source heat pump, electric powered thermal storage, a thermal vessel and micro-heat network as an integrated system. This hybrid strategy allows for the system to store up energy during periods of low electricity demand from the national grid, turning it into a dynamic supply of low cost heat which is utilized only when required. Currently a prototype of such a system is being tested in a modern house integrated with advanced controls and sensors. This paper presents the virtual performance analysis of the system and its design for a micro heat network with multiple dwelling units. The results show that the RISE system is controllable and can reduce carbon emissions whilst being competitive in running costs with a conventional gas boiler heating system.Keywords: gas boilers, heat pumps, hybrid heating and thermal storage, renewable integrated and sustainable electric
Procedia PDF Downloads 419310 Still a Man’s World? Rape Myth Acceptance, Attitudes Towards Women and Traditional Male Gender Role Beliefs in a Sample of British Military Veterans
Authors: Jessica Beck
Abstract:
Despite efforts to address the issue through prevention and education, sexual assault remains an issue within the military. Rape supportive beliefs have been identified as a risk factor linked to sexually aggressive and coercive behaviours. Rape myth acceptance is part of a wider cognitive framework of attitudes which perpetuate negative sociocultural norms about the male role. Notwithstanding the established links between rape myth acceptance, attitudinal variables, and rape proclivity, relatively little research has been conducted with military samples. In this study, 151 British military veterans completed an online survey measuring their rape myth acceptance, attitudes towards women, belief in male role norms and basic personality traits. Consistent with previous research, male veterans had higher levels of rape myth acceptance, more negative attitudes towards women, and subscribed to more traditional notions of masculinity. The types of myths endorsed also varied by gender, with male veterans significantly more likely to blame rape victims or believe women regularly lie about being raped. A relationship between rape myth acceptance, negative attitudes towards women, and adherence to male norms was found, which explained a significant proportion of the variance in rape myth acceptance. Implications for sexual assault prevention programmes are discussed.Keywords: rape myths, rape myth acceptance, military sexual assault, sexual assault beliefs
Procedia PDF Downloads 87309 Handling Patient's Supply during Inpatient Stay: Using Lean Six Sigma Techniques to Implement a Comprehensive Medication Handling Program
Authors: Erika Duggan
Abstract:
A Major Hospital had identified that there was no standard process for handling a patient’s medication that they brought with them to the hospital. It was also identified that each floor was handling the patient’s medication differently and storing it in multiple locations. Based on this disconnect many patients were leaving the hospital without their medication. The project team was tasked with creating a cohesive process to send a patient’s unneeded medication home on admission, storing any of the patient’s medication that could not be sent home, storing any of the patient’s medication for inpatient administration, and sending all of the patient’s medication home on discharge. The project team consisted of pharmacists, RNs, LPNs, members from nursing informatics and a project engineer and followed a DMAIC framework. Working together observations were performed to identify what was working and not working on the different floors which resulted in process maps. Using the multidisciplinary team, brainstorming, including affinity diagramming and other lean six sigma techniques, the best process for receiving, storing, and returning the medication was created. It was highlighted that being able to track the medication throughout the patient’s stay would be beneficial and would help make sure the medication left with the patient on discharge. Using an automated medications dispensing system would help store, and track patient’s medications. Also, the use of a specific order that would show up on the discharge instructions would assist the front line staff in retrieving the medication from a set location and sending it home with the patient. This new process will effectively streamline the admission and discharge process for patients who brought their medication with them as well as effectively tracking the medication during the patient’s stay. As well as increasing patient safety as it relates to medication administration.Keywords: lean six sigma, medication dispensing, process improvement, process mapping
Procedia PDF Downloads 255308 The Genetic Basis of the Lack of Impulse Control: What is Provided for the Criminal Law?
Authors: Amir Bastani
Abstract:
The result of the research in the field of human behavioural genetics demonstrates a genetic contribution of behavioural differences in aggression, violence, drug and substance abuse, antisocial personality disorder and other related traits. As the field of human behavioural genetics progresses and achieves credibility, the criminal accused continue to use its types of evidence into the criminal law. One of the most important genetic factors which controls certain neurotransmitters like dopamine and serotonin is the Monoamine Oxidase Acid A (MAOA) gene, known as the 'warrior gene'. The high-profile study by Caspi and colleagues in 2002 showed that the combination between one type of variation of the MAOA gene and childhood maltreatment noticeably predisposes a person to antisocial behaviour. Moreover, further scientific research shows that individuals with the MAOA gene have to some degree difficulties in controlling their impulses. Based on the evidence of MAOA, some criminal accused claimed difficulties in self-control. In the first case – the famous case of Mobley – the court rejected the MAOA evidence on the ground of the lack of scientific support. In contrast, in other cases after the Mobley trial, courts accepted the evidence of MAOA. In this paper, the issue of lack of impulse control produced by the MAOA gene and cases which relied on the MAOA evidence and successfully being accepted will be reviewed in detail. Finally, the anticipation of the paper for the future use of the MAOA evidence in criminal cases will be presented.Keywords: genetic defence, criminal responsibility, MAOA, self-control
Procedia PDF Downloads 472307 A Review on Cloud Computing and Internet of Things
Authors: Sahar S. Tabrizi, Dogan Ibrahim
Abstract:
Cloud Computing is a convenient model for on-demand networks that uses shared pools of virtual configurable computing resources, such as servers, networks, storage devices, applications, etc. The cloud serves as an environment for companies and organizations to use infrastructure resources without making any purchases and they can access such resources wherever and whenever they need. Cloud computing is useful to overcome a number of problems in various Information Technology (IT) domains such as Geographical Information Systems (GIS), Scientific Research, e-Governance Systems, Decision Support Systems, ERP, Web Application Development, Mobile Technology, etc. Companies can use Cloud Computing services to store large amounts of data that can be accessed from anywhere on Earth and also at any time. Such services are rented by the client companies where the actual rent depends upon the amount of data stored on the cloud and also the amount of processing power used in a given time period. The resources offered by the cloud service companies are flexible in the sense that the user companies can increase or decrease their storage requirements or the processing power requirements at any time, thus minimizing the overall rental cost of the service they receive. In addition, the Cloud Computing service providers offer fast processors and applications software that can be shared by their clients. This is especially important for small companies with limited budgets which cannot afford to purchase their own expensive hardware and software. This paper is an overview of the Cloud Computing, giving its types, principles, advantages, and disadvantages. In addition, the paper gives some example engineering applications of Cloud Computing and makes suggestions for possible future applications in the field of engineering.Keywords: cloud computing, cloud systems, cloud services, IaaS, PaaS, SaaS
Procedia PDF Downloads 233306 Study on the Addition of Solar Generating and Energy Storage Units to a Power Distribution System
Authors: T. Costa, D. Narvaez, K. Melo, M. Villalva
Abstract:
Installation of micro-generators based on renewable energy in power distribution system has increased in recent years, with the main renewable sources being solar and wind. Due to the intermittent nature of renewable energy sources, such micro-generators produce time-varying energy which does not correspond at certain times of the day to the peak energy consumption of end users. For this reason, the use of energy storage units next to the grid contributes to the proper leveling of the buses’ voltage level according to Brazilian energy quality standards. In this work, the effect of the addition of a photovoltaic solar generator and a store of energy in the busbar voltages of an electric system is analyzed. The consumption profile is defined as the average hourly use of appliances in a common residence, and the generation profile is defined as a function of the solar irradiation available in a locality. The power summation method is validated with analytical calculation and is used to calculate the modules and angles of the voltages in the buses of an electrical system based on the IEEE standard, at each hour of the day and with defined load and generation profiles. The results show that bus 5 presents the worst voltage level at the power consumption peaks and stabilizes at the appropriate range with the inclusion of the energy storage during the night time period. Solar generator maintains improvement of the voltage level during the period when it receives solar irradiation, having peaks of production during the 12 pm (without exceeding the appropriate maximum levels of tension).Keywords: energy storage, power distribution system, solar generator, voltage level
Procedia PDF Downloads 141305 The Impact of a Sustainable Solar Heating System on the Growth of Strawberry Plants in an Agricultural Greenhouse
Authors: Ilham Ihoume, Rachid Tadili, Nora Arbaoui
Abstract:
The use of solar energy is a crucial tactic in the agricultural industry's plan to decrease greenhouse gas emissions. This clean source of energy can greatly lower the sector's carbon footprint and make a significant impact in the fight against climate change. In this regard, this study examines the effects of a solar-based heating system, in a north-south oriented agricultural greenhouse on the development of strawberry plants during winter. This system relies on the circulation of water as a heat transfer fluid in a closed circuit installed on the greenhouse roof to store heat during the day and release it inside at night. A comparative experimental study was conducted in two greenhouses, one experimental with the solar heating system and the other for control without any heating system. Both greenhouses are located on the terrace of the Solar Energy and Environment Laboratory of the Mohammed V University in Rabat, Morocco. The developed heating system consists of a copper coil inserted in double glazing and placed on the roof of the greenhouse, a water pump circulator, a battery, and a photovoltaic solar panel to power the electrical components. This inexpensive and environmentally friendly system allows the greenhouse to be heated during the winter and improves its microclimate system. This improvement resulted in an increase in the air temperature inside the experimental greenhouse by 6 °C and 8 °C, and a reduction in its relative humidity by 23% and 35% compared to the control greenhouse and the ambient air, respectively, throughout the winter. For the agronomic performance, it was observed that the production was 17 days earlier than in the control greenhouse.Keywords: sustainability, thermal energy storage, solar energy, agriculture greenhouse
Procedia PDF Downloads 88304 Optimal Image Representation for Linear Canonical Transform Multiplexing
Authors: Navdeep Goel, Salvador Gabarda
Abstract:
Digital images are widely used in computer applications. To store or transmit the uncompressed images requires considerable storage capacity and transmission bandwidth. Image compression is a means to perform transmission or storage of visual data in the most economical way. This paper explains about how images can be encoded to be transmitted in a multiplexing time-frequency domain channel. Multiplexing involves packing signals together whose representations are compact in the working domain. In order to optimize transmission resources each 4x4 pixel block of the image is transformed by a suitable polynomial approximation, into a minimal number of coefficients. Less than 4*4 coefficients in one block spares a significant amount of transmitted information, but some information is lost. Different approximations for image transformation have been evaluated as polynomial representation (Vandermonde matrix), least squares + gradient descent, 1-D Chebyshev polynomials, 2-D Chebyshev polynomials or singular value decomposition (SVD). Results have been compared in terms of nominal compression rate (NCR), compression ratio (CR) and peak signal-to-noise ratio (PSNR) in order to minimize the error function defined as the difference between the original pixel gray levels and the approximated polynomial output. Polynomial coefficients have been later encoded and handled for generating chirps in a target rate of about two chirps per 4*4 pixel block and then submitted to a transmission multiplexing operation in the time-frequency domain.Keywords: chirp signals, image multiplexing, image transformation, linear canonical transform, polynomial approximation
Procedia PDF Downloads 412303 Predictive Analytics in Oil and Gas Industry
Authors: Suchitra Chnadrashekhar
Abstract:
Earlier looked as a support function in an organization information technology has now become a critical utility to manage their daily operations. Organizations are processing huge amount of data which was unimaginable few decades before. This has opened the opportunity for IT sector to help industries across domains to handle the data in the most intelligent manner. Presence of IT has been a leverage for the Oil & Gas industry to store, manage and process the data in most efficient way possible thus deriving the economic value in their day-to-day operations. Proper synchronization between Operational data system and Information Technology system is the need of the hour. Predictive analytics supports oil and gas companies by addressing the challenge of critical equipment performance, life cycle, integrity, security, and increase their utilization. Predictive analytics go beyond early warning by providing insights into the roots of problems. To reach their full potential, oil and gas companies need to take a holistic or systems approach towards asset optimization and thus have the functional information at all levels of the organization in order to make the right decisions. This paper discusses how the use of predictive analysis in oil and gas industry is redefining the dynamics of this sector. Also, the paper will be supported by real time data and evaluation of the data for a given oil production asset on an application tool, SAS. The reason for using SAS as an application for our analysis is that SAS provides an analytics-based framework to improve uptimes, performance and availability of crucial assets while reducing the amount of unscheduled maintenance, thus minimizing maintenance-related costs and operation disruptions. With state-of-the-art analytics and reporting, we can predict maintenance problems before they happen and determine root causes in order to update processes for future prevention.Keywords: hydrocarbon, information technology, SAS, predictive analytics
Procedia PDF Downloads 360302 Relations among Coping with Stress, Anxiety and the Achievement Motive of Athletes and Non-Athletes
Authors: Dragana Tomic
Abstract:
This research deals with relations among strategies and styles of coping with stress, social interaction anxiety and the achievement motive of young athletes and non-athletes. The research was conducted on the sample of 402 examinees (197 female and 205 male participants) of the average age of 20.76, divided into three groups: athletes, recreationists, and non-athletes. The COPE-S questionnaire, the Social Interaction Anxiety Scale (SIAS) and the Achievement Motivation Questionnaire (MOP 2002) were used for conducting this research and they had satisfactory reliability. The results of the research indicate that athletes, recreationists and non-athletes are not different when it comes to strategies and styles of coping with stress. Non- athletes have more noticeable social interaction anxiety when compared to athletes (U=5281.5, p=.000) and also when compared to recreationists (U=7573, p=.000). There was a difference among these three groups in the achievement motive (χ2(2)=23,544, p=.000) and the three components of this motive (Competing with others, χ2(2)=31,718, p=.000, Perseverance, χ2(2)=9,415, p=.009 and Planning orientation, χ2(2)=8,171, p=.017). The research also indicates a significant difference in the relation between social interaction anxiety and the achievement motive of examinee subgroups, where the most significant difference is between athletes and non- athletes (q=-.45). Moreover, women more frequently use emotion-focused coping (U=16718, p=.003), while men more frequently use avoidance (U=14895.5, p=.000). Women have a lead when it comes to expressing social anxiety (U=17750.5, p=.036) and the achievement motive (U=17395.5, p=.020). The discussion of the results includes findings of similar previous research and theoretical concepts of the variables which were examined. Future research should be oriented towards examining the background of the differences which were (not) gained as well as towards the influence of personality dimensions on the variables which were examined in order to apply the results in practice in the best way.Keywords: achievement motivation, athletes, coping with stress, non-athletes, recreationists, social interaction anxiety
Procedia PDF Downloads 160301 Utilising an Online Data Collection Platform for the Development of a Community Engagement Database: A Case Study on Building Inter-Institutional Partnerships at UWC
Authors: P. Daniels, T. Adonis, P. September-Brown, R. Comalie
Abstract:
The community engagement unit at the University of the Western Cape was tasked with establishing a community engagement database. The database would store information of all community engagement projects related to the university. The wealth of knowledge obtained from the various disciplines would be used to facilitate interdisciplinary collaboration within the university, as well as facilitating community university partnership opportunities. The purpose of this qualitative study was to explore electronic data collection through the development of a database. Two types of electronic data collection platforms were used, namely online questionnaire and email. The semi structured questionnaire was used to collect data related to community engagement projects from different faculties and departments at the university. There are many benefits for using an electronic data collection platform, such as reduction of costs and time, ease in reaching large numbers of potential respondents, and the possibility of providing anonymity to participants. Despite all the advantages of using the electronic platform, there were as many challenges, as depicted in our findings. The findings suggest that certain barriers existed by using an electronic platform for data collection, even though it was in an academic environment, where knowledge and resources were in abundance. One of the challenges experienced in this process was the lack of dissemination of information via email to staff within faculties. The actual online software used for the questionnaire had its own limitations, such as only being able to access the questionnaire from the same electronic device. In a few cases, academics only completed the questionnaire after a telephonic prompt or face to face meeting about "Is higher education in South Africa ready to embrace electronic platform in data collection?"Keywords: community engagement, database, data collection, electronic platform, electronic tools, knowledge sharing, university
Procedia PDF Downloads 264300 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm
Authors: Vaibhav Barve
Abstract:
Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.Keywords: data embedding, decryption, encryption, reversible data hiding, steganography
Procedia PDF Downloads 288299 Color-Based Emotion Regulation Model: An Affective E-Learning Environment
Authors: Sabahat Nadeem, Farman Ali Khan
Abstract:
Emotions are considered as a vital factor affecting the process of information handling, level of attention, memory capacity and decision making. Latest e-Learning systems are therefore taking into consideration the effective state of learners to make the learning process more effective and enjoyable. One such use of user’s affective information is in the systems that tend to regulate users’ emotions to a state optimally desirable for learning. So for, this objective has been tried to be achieved with the help of teaching strategies, background music, guided imagery, video clips and odors. Nevertheless, we know that colors can affect human emotions. Relationship between color and emotions has a strong influence on how we perceive our environment. Similarly, the colors of the interface can also affect the user positively as well as negatively. This affective behavior of color and its use as emotion regulation agent is not yet exploited. Therefore, this research proposes a Color-based Emotion Regulation Model (CERM), a new framework that can automatically adapt its colors according to user’s emotional state and her personality type and can help in producing a desirable emotional effect, aiming at providing an unobtrusive emotional support to the users of e-learning environment. The evaluation of CERM is carried out by comparing it with classical non-adaptive, static colored learning management system. Results indicate that colors of the interface, when carefully selected has significant positive impact on learner’s emotions.Keywords: effective learning, e-learning, emotion regulation, emotional design
Procedia PDF Downloads 306298 Assessment-Assisted and Relationship-Based Financial Advising: Using an Empirical Assessment to Understand Personal Investor Risk Tolerance in Professional Advising Relationships
Authors: Jerry Szatko, Edan L. Jorgensen, Stacia Jorgensen
Abstract:
A crucial component to the success of any financial advising relationship is for the financial professional to understand the perceptions, preferences and thought-processes carried by the financial clients they serve. Armed with this information, financial professionals are more quickly able to understand how they can tailor their approach to best match the individual preferences and needs of each personal investor. Our research explores the use of a quantitative assessment tool in the financial services industry to assist in the identification of the personal investor’s consumer behaviors, especially in terms of financial risk tolerance, as it relates to their financial decision making. Through this process, the Unitifi Consumer Insight Tool (UCIT) was created and refined to capture and categorize personal investor financial behavioral categories and the financial personality tendencies of individuals prior to the initiation of a financial advisement relationship. This paper discusses the use of this tool to place individuals in one of four behavior-based financial risk tolerance categories. Our discoveries and research were aided through administration of a web-based survey to a group of over 1,000 individuals. Our findings indicate that it is possible to use a quantitative assessment tool to assist in predicting the behavioral tendencies of personal consumers when faced with consumer financial risk and decisions.Keywords: behavior-based advising, financial relationship building, risk capacity based on behavior, risk tolerance, systematic way to assist in financial relationship building
Procedia PDF Downloads 167297 Alpha: A Groundbreaking Avatar Merging User Dialogue with OpenAI's GPT-3.5 for Enhanced Reflective Thinking
Authors: Jonas Colin
Abstract:
Standing at the vanguard of AI development, Alpha represents an unprecedented synthesis of logical rigor and human abstraction, meticulously crafted to mirror the user's unique persona and personality, a feat previously unattainable in AI development. Alpha, an avant-garde artefact in the realm of artificial intelligence, epitomizes a paradigmatic shift in personalized digital interaction, amalgamating user-specific dialogic patterns with the sophisticated algorithmic prowess of OpenAI's GPT-3.5 to engender a platform for enhanced metacognitive engagement and individualized user experience. Underpinned by a sophisticated algorithmic framework, Alpha integrates vast datasets through a complex interplay of neural network models and symbolic AI, facilitating a dynamic, adaptive learning process. This integration enables the system to construct a detailed user profile, encompassing linguistic preferences, emotional tendencies, and cognitive styles, tailoring interactions to align with individual characteristics and conversational contexts. Furthermore, Alpha incorporates advanced metacognitive elements, enabling real-time reflection and adaptation in communication strategies. This self-reflective capability ensures continuous refinement of its interaction model, positioning Alpha not just as a technological marvel but as a harbinger of a new era in human-computer interaction, where machines engage with us on a deeply personal and cognitive level, transforming our interaction with the digital world.Keywords: chatbot, GPT 3.5, metacognition, symbiose
Procedia PDF Downloads 70296 Achieving Conviviality in Terms of Collective Experience through Creative Public Spaces in Namik Kemal Square, Famagusta, North Cyprus
Authors: Shirin Shaideh, Nina Shirkhanloo
Abstract:
Creative public spaces were needed to foster conviviality in an urban form. The conviviality could be enhanced by facilitating variety of opportunities to participate in communal activities and promoting collective experiences. In this regard, The Namik Kemal Square as a major public space of Walled City of Famagusta in North Cyprus was found as the creative public space because it supports collective practices by leisure activities which enclosed the space. The square also utilized creative collaboration such as festivals and outdoor exhibition. Accordingly this paper focuses on the issue of conviviality in urban public space, in the perspective of square, as a major indicator of their success. The survey firstly provides a theoretical framework for understanding conviviality in creative public space to empower collective experience. Secondly it discusses the essential components of conviviality in form of square and finally investigating conviviality and also its determinants in Namik Kemal square. Hence, the main challenges of this study are going to focus on how convivial public spaces impact collective experience, what people expect from a kind of public space, or what they perceive as a good place to be in. Since it seems essential to respond positively, inclusively to the needs of people to socialize in public spaces by involving them in collective and common practices, this article aims to tease out what gives some places personality and conviviality so that we can learn to design, maintain and manage better quality built environment in future.Keywords: conviviality, creative public space, collective experience, Namik Kemal square
Procedia PDF Downloads 429295 Critical Thinking Index of College Students
Authors: Helen Frialde-Dupale
Abstract:
Critical thinking Index (CTI) of 150 third year college students from five State Colleges and Universities (SUCs) in Region I were determined. Only students with Grade Point Average (GPA) of at least 2.0 from four general classification of degree courses, namely: Education, Arts and Sciences, Engineering and Agriculture were included. Specific problem No.1 dealt with the profile variables, namely: age, sex, degree course, monthly family income, number of siblings, high school graduated from, grade point average, personality type, highest educational attainment of parents, and occupation of parents. Problem No. 2 determined the critical thinking index among the respondents. Problem No. 3 investigated whether or not there are significant differences in the critical thinking index among the respondents across the profile variables. While problem No.4 determined whether or not there are significant relationship between the critical thinking index and selected profile variables, namely: age, monthly family income, number of siblings, and grade point average of the respondents. Finally, on problem No. 5, the critical thinking instrument which obtained the lowest rates, were used as basis for outlining an intervention program for enhancing critical thinking index (CTI) of students. The following null hypotheses were tested at 0.05 level of significance: there are no significant differences in the critical thinking index of the third college students across the profile variables; there are no significant relationships between the critical thinking index of the respondents and selected variables, namely: age, monthly family income, number of siblings, and grade point average.Keywords: attitude as critical thinker, critical thinking applied, critical thinking index, self-perception as critical thinker
Procedia PDF Downloads 517294 Sexual Cognitive Behavioral Therapy: Psychological Performance and Openness to Experience
Authors: Alireza Monzavi Chaleshtari, Mahnaz Aliakbari Dehkordi, Amin Asadi Hieh, Majid Kazemnezhad
Abstract:
This research was conducted with the aim of determining the effectiveness of sexual cognitive behavioral therapy on psychological performance and openness to experience in women. The type of research was experimental in the form of pre-test-post-test. The statistical population of this research was made up of all working and married women with membership in the researcher's Instagram social network who had problems in marital-sexual relationships (N=900). From the statistical community, which includes working and married women who are members of the researcher's Instagram social network who have problems in marital-sexual relationships, there are 30 people including two groups (15 people in the experimental group and 15 people in the control group) as available sampling and selected randomly. They were placed in two experimental and control groups. The anxiety, stress, and depression scale (DASS) and the Costa and McCree personality questionnaire were used to collect data, and the cognitive behavioral therapy protocol of Dr. Mehrnaz Ali Akbari was used for the treatment sessions. To analyze the data, the covariance test was used in the SPSS22 software environment. The results showed that sexual cognitive behavioral therapy has a positive and significant effect on psychological performance and openness to experience in women. Conclusion: It can be concluded that interventions such as cognitive-behavioral sex can be used to treat marital problems.Keywords: sexual cognitive behavioral therapy, psychological function, openness to experience, women
Procedia PDF Downloads 78293 Development of a Web-Based Application for Intelligent Fertilizer Management in Rice Cultivation
Authors: Hao-Wei Fu, Chung-Feng Kao
Abstract:
In the era of rapid technological advancement, information technology (IT) has become integral to modern life, exerting significant influence across diverse sectors and serving as a catalyst for development in various industries. Within agriculture, the integration of IT offers substantial benefits, notably enhancing operational efficiency. Real-time monitoring systems, for instance, have been widely embraced in agriculture, effectively improving crop management practices. This study specifically addresses the management of rice panicle fertilizer, presenting the development of a web application tailored to handle data associated with rice panicle fertilizer management. Leveraging the normalized difference red edge index, this application optimizes the quantity of rice panicle fertilizer used, providing recommendations to agricultural stakeholders and service providers in the agricultural information sector. The overarching objective is to minimize costs while maximizing yields. Furthermore, a robust database system has been established to store and manage relevant data for future reference in rice cultivation management. Additionally, the study utilizes the Representational State Transfer software architectural style to construct an application programming interface (API), facilitating data creation, retrieval, updating, and deletion for users via the HyperText Transfer Protocol methods. Future plans involve integrating this API with third-party services to incorporate it into larger frameworks, thus catering to the diverse requirements of various third-party services.Keywords: application programming interface, HyperText Transfer Protocol, nitrogen fertilizer intelligent management, web-based application
Procedia PDF Downloads 61292 Biodiesel Fuel Properties of Mixed Culture Microalgae under Different CO₂ Concentration from Coal Fired Flue Gas
Authors: Ambreen Aslam, Tahira Aziz Mughal, Skye R. Thomas-Hall, Peer M. Schenk
Abstract:
Biodiesel is an alternative to petroleum-derived fuel mainly composed of fatty acid from oleaginous microalgae feedstock. Microalgae produced fatty acid methyl esters (FAMEs) as they can store high levels of lipids without competing for food productivity. After lipid extraction and esterification, fatty acid profile from algae feedstock possessed the abundance of fatty acids with carbon chain length specifically C16 and C18. The qualitative analysis of FAME was done by cultivating mix microalgae consortia under three different CO₂ concentrations (1%, 3%, and 5.5%) from a coal fired flue gas. FAME content (280.3 µg/mL) and productivity (18.69 µg/mL/D) was higher under 1% CO₂ (flue gas) as compare to other treatments. Whereas, Mixed C. (F) supplemented with 5.5% CO₂ (50% flue gas) had higher SFA (36.28%) and UFA (63.72%) which improve the oxidative stability of biodiesel. Subsequently, low Iodine value (136.3 gI₂/100g) and higher Cetane number (52) of Mixed C.+P (F) were found to be in accordance with European (EN 14214) standard under 5.5% CO₂ along with 50mM phosphate buffer. Experimental results revealed that sufficient phosphate reduced FAME productivity but significantly enhance biodiesel quality. This research aimed to develop an integrated approach of utilizing flue gas (as CO₂ source) for significant improvement in biodiesel quality under surplus phosphorus. CO₂ sequestration from industrial flue gas not only reduce greenhouse gases (GHG) emissions but also ensure sustainability and eco-friendliness of the biodiesel production process through microalgae.Keywords: biodiesel analysis, carbon dioxide, coal fired flue gas, FAME productivity, fatty acid profile, fuel properties, lipid content, mixed culture microalgae
Procedia PDF Downloads 328291 Feasibility Study of MongoDB and Radio Frequency Identification Technology in Asset Tracking System
Authors: Mohd Noah A. Rahman, Afzaal H. Seyal, Sharul T. Tajuddin, Hartiny Md Azmi
Abstract:
Taking into consideration the real time situation specifically the higher academic institutions, small, medium to large companies, public to private sectors and the remaining sectors, do experience the inventory or asset shrinkages due to theft, loss or even inventory tracking errors. This happening is due to a zero or poor security systems and measures being taken and implemented in their organizations. Henceforth, implementing the Radio Frequency Identification (RFID) technology into any manual or existing web-based system or web application can simply deter and will eventually solve certain major issues to serve better data retrieval and data access. Having said, this manual or existing system can be enhanced into a mobile-based system or application. In addition to that, the availability of internet connections can aid better services of the system. Such involvement of various technologies resulting various privileges to individuals or organizations in terms of accessibility, availability, mobility, efficiency, effectiveness, real-time information and also security. This paper will look deeper into the integration of mobile devices with RFID technologies with the purpose of asset tracking and control. Next, it is to be followed by the development and utilization of MongoDB as the main database to store data and its association with RFID technology. Finally, the development of a web based system which can be viewed in a mobile based formation with the aid of Hypertext Preprocessor (PHP), MongoDB, Hyper-Text Markup Language 5 (HTML5), Android, JavaScript and AJAX programming language.Keywords: RFID, asset tracking system, MongoDB, NoSQL
Procedia PDF Downloads 306290 Developmental Differences of Elementary School Children in Knowledge Acquisition Following a Sexual Abuse Prevention Program
Authors: Chrysanthi Nega, Fotini-Sonia Apergi
Abstract:
Child sexual abuse (CSA) in Greece is a highly prevalent phenomenon and yet remains largely underreported. CSA can negatively impact cognitive, emotional and psychosocial development, as well as personality formation and capacity for initiation and maintenance of healthy interpersonal relationships. It is particularly important for school-based prevention programs to be implemented early in elementary school, as they are reportedly effective in lowering abuse incidences and providing knowledge for coping in threatening environments. The purpose of the current study was to test the effectiveness of a school-based CSA prevention program (Safe-Touches) on Greek elementary school students (grades 1-3, N=272) and explore the effect of age and time of testing (academic term). There was a significant effect of age in the knowledge of Inappropriate Touch, when comparing pre and post-intervention assessments, with third graders showing greatest gains in knowledge, followed by second and first graders. Time of testing during the academic year also had a significant effect, as first graders tested later in the school year, scored higher on knowledge of Inappropriate Touch. The findings of the current study provide insight into the optimal timing to implement CSA prevention programs. Exposure to such programs and incorporation in the school curricula could largely benefit children of the Greek community in terms of safety and awareness.Keywords: child sexual abuse, Safe-Touches, school-based prevention, schooling
Procedia PDF Downloads 318289 Mobile Number Portability
Authors: R. Geetha, J. Arunkumar, P. Gopal, D. Loganathan, K. Pavithra, C. Vikashini
Abstract:
Mobile Number Portability is an attempt to switch over from one network to another network facility for mobile based on applications. This facility is currently not available for mobile handsets. This application is intended to assist the mobile network and its service customers in understanding the criteria; this will serve as a universal set of requirements which must be met by the customers. This application helps the user's network portability. Accessing permission from the network provider to enable services to the user and utilizing the available network signals. It is enabling the user to make a temporary switch over to other network. The main aim of this research work is to adapt multiple networks at the time of no network coverage. It can be accessed at rural and geographical areas. This can be achieved by this mobile application. The application is capable of temporary switch over between various networks. With this application both the service provider and the network user are benefited. The service provider is benefited by charging a minimum cost for utilizing other network. It provides security in terms of password that is unique to avoid unauthorized users and to prevent loss of balance. The goal intended to be attained is a complete utilization of available network at significant situations and to provide feature that satisfy the customer needs. The temporary switch over is done to manage emergency calls when user is in rural or geographical area, where there will be a very low network coverage. Since people find it trend in using Android mobile, this application is designed as an Android applications, which can be freely downloaded and installed from Play store. In the current scenario, the service provider enables the user to change their network without shifting their mobile network. This application affords a clarification for users while they are jammed in a critical situation. This application is designed by using Android 4.2 and SQLite Version3.Keywords: mobile number, random number, alarm, imei number, call
Procedia PDF Downloads 361288 Tolerance of Ambiguity in Relation to Listening Performance across Learners of Various Linguistic Backgrounds
Authors: Amin Kaveh Boukani
Abstract:
Foreign language learning is not straightforward and can be affected by numerous factors, among which personality features like tolerance of ambiguity (TA) are so well-known and important. Such characteristics yet can be affected by other factors like learning additional languages. The current investigation, thus, opted to explore the possible effect of linguistic background (being bilingual or trilingual) on the tolerance of ambiguity (TA) of Iranian EFL learners. Furthermore, the possible mediating effect of TA on multilingual learners' language performance (listening comprehension in this study) was expounded. This research involved 68 EFL learners (32 bilinguals, 29 trilinguals) with the age range of 19-29 doing their degrees in the Department of English Language and Literature of Urmia University. A set of questionnaires, including tolerance of ambiguity (Herman et. al., 2010) and linguistic background information (Modirkhameneh, 2005), as well as the IELTS listening comprehension test, were used for data collection purposes. The results of a set of independent samples t-test and mediation analysis (Hayes, 2022) showed that (1) linguistic background (being bilingual or trilingual) had a significant direct effect on EFL learners' TA, (2) Linguistic background had a significant direct influence on listening comprehension, (3) TA had a substantial direct influence on listening comprehension, and (4) TA moderated the influence of linguistic background on listening comprehension considerably. These results suggest that multilingualism may be considered as an advantageous asset for EFL learners and should be a prioritized characteristic in EFL instruction in multilingual contexts. Further pedagogical implications and suggestions for research are proposed in light of effective EFL instruction in multilingual contexts.Keywords: tolerance of ambiguity, listening comprehension, multilingualism, bilingual, trilingual
Procedia PDF Downloads 61287 Exploring Data Stewardship in Fog Networking Using Blockchain Algorithm
Authors: Ruvaitha Banu, Amaladhithyan Krishnamoorthy
Abstract:
IoT networks today solve various consumer problems, from home automation systems to aiding in driving autonomous vehicles with the exploration of multiple devices. For example, in an autonomous vehicle environment, multiple sensors are available on roads to monitor weather and road conditions and interact with each other to aid the vehicle in reaching its destination safely and timely. IoT systems are predominantly dependent on the cloud environment for data storage, and computing needs that result in latency problems. With the advent of Fog networks, some of this storage and computing is pushed to the edge/fog nodes, saving the network bandwidth and reducing the latency proportionally. Managing the data stored in these fog nodes becomes crucial as it might also store sensitive information required for a certain application. Data management in fog nodes is strenuous because Fog networks are dynamic in terms of their availability and hardware capability. It becomes more challenging when the nodes in the network also live a short span, detaching and joining frequently. When an end-user or Fog Node wants to access, read, or write data stored in another Fog Node, then a new protocol becomes necessary to access/manage the data stored in the fog devices as a conventional static way of managing the data doesn’t work in Fog Networks. The proposed solution discusses a protocol that acts by defining sensitivity levels for the data being written and read. Additionally, a distinct data distribution and replication model among the Fog nodes is established to decentralize the access mechanism. In this paper, the proposed model implements stewardship towards the data stored in the Fog node using the application of Reinforcement Learning so that access to the data is determined dynamically based on the requests.Keywords: IoT, fog networks, data stewardship, dynamic access policy
Procedia PDF Downloads 59286 Geophysical Approach in the Geological Characterization of a Dam Site: Case of the Chebabta-Dam, Meskiana, Oum El-Bouaghi
Authors: Benhammadi Hocine, Djamel Boubaya, Chaffai Hicham
Abstract:
Meskiana Area is characterized by a semi-arid climate where the water supply for irrigation and industry is not sufficient as the priority goes for domestic use. To meet the increasing population growth and development, the authorities have considered building a new water retaining structure on some major temporary water streams. For this purpose Chebabta site on Oued Meskiana was chosen as the future dam site. It is large enough to store the desired volume of water. This study comes to investigate the conditions of the site and the adequacy of the ground as a foundation for the projected dam. The conditions of the site include the geological structure and mainly the presence of discontinuities in the formation on which the dam will be built, the nature of the lithologies under the foundation and the future lake, and the presence of any hazard. This site characterization is usually carried out using different methods in order to highlight any underground buried problematic structure. In this context, the different geophysical technics remain the most used ones. Three geophysical methods were used in the case of the Chebabta dam site, namely, electric survey, seismic refraction, and tomography. The choice of the technics and the location of the scan line was made on the basis of the available geological data. In this sense, profiles have been established on both banks of Oued Meskiana. The obtained results have allowed a better characterization of the geological structure, defining the limit between the surface cover and the bedrock, which is, in other words, the limit between the weathered zone and the bedrock. Their respective thicknesses were also determined by seismic refraction and electrical resistivity sounding. However, the tomography imaging technic has succeeded in positioning a fault structure passing through the right bank of the wadi.Keywords: dam site, fault, geophysic, investigation, Meskiana
Procedia PDF Downloads 88285 A Study and Design Scarf Collection Applied Vietnamese Traditional Patterns by Using Printing Method on Fabric
Authors: Mai Anh Pham Ho
Abstract:
Scarf products today is a symbol of fashion to decorate, to make our life more beautiful and bring new features to our living space. It also shows the cultural identity by using the traditional patterns that make easily to introduce the image of Vietnam to other nations all over the world. Therefore, the purpose of this research is to classify Vietnamese traditional patterns according to the era and dynasties. Vietnamese traditional patterns through the dynasties of Vietnamese history are done and classified by five groups of patterns including the geometric patterns, the natural patterns, the animal patterns, the floral patterns, and the character patterns in the Prehistoric times, the Bronze and Iron age, the Chinese domination, the Ngo-Dinh-TienLe-Ly-Tran-Ho dynasty, and the LeSo-Mac-LeTrinh-TaySon-Nguyen dynasty. Besides, there are some special kinds of Vietnamese traditional patterns like buffalo, lotus, bronze-drum, Phuc Loc Tho character, and so on. Extensive research was conducted for modernizing scarf collection applied Vietnamese traditional patterns which the fashion trend is used on creating works. The concept, target, image map, lifestyle map, motif, colours, arrangement and completion of patterns on scarf were set up. The scarf collection is designed and developed by the Adobe Illustrator program with three colour ways for each scarf. Upon completion of the research, digital printing technology is chosen for using on scarf collection which Vietnamese traditional patterns were researched deeply and widely with the purpose of establishment the basic background for Vietnamese culture in order to identify Vietnamese national personality as well as establish and preserve the cultural heritage.Keywords: scarf collection, Vietnamese traditional patterns, printing methods, fabric design
Procedia PDF Downloads 342