Search results for: visual communications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2462

Search results for: visual communications

1712 The Role of ICT in Engaging Youth in Agricultural Transformation of Africa

Authors: Adebola Adedugbe

Abstract:

Agriculture is the mainstay of most countries in Africa. It employs up to 90 percent of the rural workforce, who are mostly youth and women. Engaging youths in Information and Communications Technology (ICT) in agriculture is critical to economic and agricultural development of the African continent. The objective of this paper is to identify and mobilize the potentials of young Africans in agriculture through ICT and recognize their role as the dominant driver for sustainable agricultural development in Africa. This paper identifies the role of ICT as a tool for attracting youths to agriculture. The development of ICT is important in stimulating youths in SME’s to compete favorably and effectively as a way to fight poverty through job and wealth creation. It is one of the strategies for promoting entrepreneurship by increasing the availability and diversity of online information.

Keywords: Africa, agriculture, ICT, tool, youth

Procedia PDF Downloads 450
1711 Crafting a Livelihood: A Story of the Kotpad Dyers and Weavers

Authors: Anahita Suri

Abstract:

Craft -an integral part of the conduit to create something beautiful- is a visual representation of the human imagination given life through the hand. The Mirgan tribe in the Naxalite infested forests of Koraput, Odisha are not exempt from this craving for beauty. These skilled craftsmen dye and weave the simple yet sophisticated Kotpad textiles. The women undertake the time-consuming task of dyeing the cotton and silk yarns with the root of the aul tree. The men then weave these yarns into beautiful sarees and dupattas. The root of the aul tree lends the textile its maroon to brown color, which is offset against the unbleached cotton to create a minimalist and distinctive look. The motifs, incorporated through the extra weft technique, reflect the rich tribal heritage of the community. This is an eco-friendly, non-toxic textile. Kotpad fabrics were on the verge of extinction due to various factors like poor infrastructure, no innovation in traditional designs/products, customer ignorance leading to low demand. With livelihood opportunities through craft slowly dwindling, artisans were moving to alternative sources of income generation, like agriculture and daily wage labor. There was an urgent need for intervention to revive the craft, spread awareness about them in urban spaces, and strengthen the artisan’s ability to innovate and create. Recent efforts by government bodies and local designers have given Kotpad handloom a contemporary look without diluting its essence. This research explores the possibilities to leverage Kotpad handloom to find a place in the dynamic culture of the world by its promotion among different target groups and incorporating self-sustaining practices for the artisans. This could further encourage a space for handmade and handcrafted art, rich with stories about India, with a contemporary visual sensibility. This will strengthen environmental and ethical sustainability.

Keywords: craft, contemporary, handloom, natural dye, tribal

Procedia PDF Downloads 145
1710 Security of Internet of Things: Challenges, Requirements and Future Directions

Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi

Abstract:

The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.

Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture

Procedia PDF Downloads 374
1709 Comparative Study of Active Release Technique and Myofascial Release Technique in Patients with Upper Trapezius Spasm

Authors: Harihara Prakash Ramanathan, Daksha Mishra, Ankita Dhaduk

Abstract:

Relevance: This qualitative study will educate the clinician in putting into practice the advanced method of movement science in restoring the function. Purpose: The purpose of this study is to compare the effectiveness of Active Release Technique and myofascial release technique on range of motion, neck function and pain in patients with upper trapezius spasm. Methods/Analysis: The study was approved by the institutional Human Research and Ethics committee. This study included sixty patients of age group between 20 to 55 years with upper trapezius spasm. Patients were randomly divided into two groups receiving Active Release Technique (Group A) and Myofascial Release Technique (Group B). The patients were treated for 1 week and three outcome measures ROM, pain and functional level were measured using Goniometer, Visual analog scale(VAS), Neck disability Index Questionnaire(NDI) respectively. Paired Sample 't' test was used to compare the differences of pre and post intervention values of Cervical Range of motion, Neck disability Index, Visual analog scale of Group A and Group B. Independent't' test was used to compare the differences between two groups in terms of improvement in cervical range of motion, decrease in visual analogue scale(VAS), decrease in Neck disability index score. Results: Both the groups showed statistically significant improvements in cervical ROM, reduction in pain and in NDI scores. However, mean change in Cervical flexion, cervical extension, right side flexion, left side flexion, right side rotation, left side rotation, pain, neck disability level showed statistically significant improvement (P < 0. 05)) in the patients who received Active Release Technique as compared to Myofascial release technique. Discussion and conclusions: In present study, the average improvement immediately post intervention is significantly greater as compared to before treatment but there is even more improvement after seven sessions as compared to single session. Hence, this proves that several sessions of Manual techniques are necessary to produce clinically relevant results. Active release technique help to reduce the pain threshold by removing adhesion and promote normal tissue extensibility. The act of tensioning and compressing the affected tissue both with digital contact and through the active movement performed by the patient can be a plausible mechanism for tissue healing in this study. This study concluded that both Active Release Technique (ART) and Myofascial release technique (MFR) are equally effective in managing upper trapezius muscle spasm, but more improvement can be achieved by Active Release Technique (ART). Impact and Implications: Active Release Technique can be adopted as mainstay of treatment approach in treating trapezius spasm for faster relief and improving the functional status.

Keywords: trapezius spasm, myofascial release, active release technique, pain

Procedia PDF Downloads 273
1708 Consumers Perception of Slogans/ Taglines: A Study of Higher Education Sector in India

Authors: Puja Mahesh

Abstract:

Purpose: A good slogan captures the essence of your brand's promised consumer benefit in one short phrase. A good slogan conjures up positive imagery about your business or your product. A good slogan has the element of immediacy. Immediacy does not necessarily mean that the slogan will inspire consumers to run right out and buy your product. It does mean, however, that your slogan has an immediate cognitive impact. It forces your audience to "stop-and-think" after exposure as a necessary first step toward remembering your slogan promise. A good slogan is memorable and durability. When your slogan promise is occupying prime real estate in the consumer's subconscious, it aids in recall and activates preference for your brand when you want it -when consumers are ready to buy. The objective of current study is to understand the consumer perception of slogans/taglines of higher education sector in India. Design/Methodology/Approach: Survey of 500 consumers (largely comprising of youth) will be done using questionnaire. Universities and institutes will be chosen on the basis of various streams and Credible Rankings. The perception will be taken from the respondents on the basis of scale. Findings: Catchy phrases, rhymes, music, jingles, avatars (visual representations) and unique imagery are just a few of the mnemonic clutter-busting tactics commonly used in slogans to stand apart from the competition and to aid in memory recall. The study will reveal whether it is true that catchy phrases, rhymes, music, jingles, avatars (visual representations) and unique imagery across disciplines and universities help in building stronger brands. It will also be found whether consumers pay more attention to reputation of University/ College or brand identity. Originality/Value: Researcher has not come across any study of Consumer Perception of Slogans/Taglines of Higher Education Brands in India. Also, it would be interesting to understand Consumer Perception of various colleges/streams particularly Management colleges who invest a lot of time in branding exercise.

Keywords: consumer perception, higher education, slogans, taglines

Procedia PDF Downloads 424
1707 Neuropsychological Deficits in Drug-Resistant Epilepsy

Authors: Timea Harmath-Tánczos

Abstract:

Drug-resistant epilepsy (DRE) is defined as the persistence of seizures despite at least two syndrome-adapted antiseizure drugs (ASD) used at efficacious daily doses. About a third of patients with epilepsy suffer from drug resistance. Cognitive assessment has a crucial role in the diagnosis and clinical management of epilepsy. Previous studies have addressed the clinical targets and indications for measuring neuropsychological functions; best to our knowledge, no studies have examined it in a Hungarian therapy-resistant population. To fill this gap, we investigated the Hungarian diagnostic protocol between 18 and 65 years of age. This study aimed to describe and analyze neuropsychological functions in patients with drug-resistant epilepsy and identify factors associated with neuropsychology deficits. We perform a prospective case-control study comparing neuropsychological performances in 50 adult patients and 50 healthy individuals between March 2023 and July 2023. Neuropsychological functions were examined in both patients and controls using a full set of specific tests (general performance level, motor functions, attention, executive facts., verbal and visual memory, language, and visual-spatial functions). Potential risk factors for neuropsychological deficit were assessed in the patient group using a multivariate analysis. The two groups did not differ in age, sex, dominant hand and level of education. Compared with the control group, patients with drug-resistant epilepsy showed worse performance on motor functions and visuospatial memory, sustained attention, inhibition and verbal memory. Neuropsychological deficits could therefore be systematically detected in patients with drug-resistant epilepsy in order to provide neuropsychological therapy and improve quality of life. The analysis of the classical and complex indices of the special neuropsychological tasks presented in the presentation can help in the investigation of normal and disrupted memory and executive functions in the DRE.

Keywords: drug-resistant epilepsy, Hungarian diagnostic protocol, memory, executive functions, cognitive neuropsychology

Procedia PDF Downloads 76
1706 Internet of Assets: A Blockchain-Inspired Academic Program

Authors: Benjamin Arazi

Abstract:

Blockchain is the technology behind cryptocurrencies like Bitcoin. It revolutionizes the meaning of trust in the sense of offering total reliability without relying on any central entity that controls or supervises the system. The Wall Street Journal states: “Blockchain Marks the Next Step in the Internet’s Evolution”. Blockchain was listed as #1 in Linkedin – The Learning Blog “most in-demand hard skills needed in 2020”. As stated there: “Blockchain’s novel way to store, validate, authorize, and move data across the internet has evolved to securely store and send any digital asset”. GSMA, a leading Telco organization of mobile communications operators, declared that “Blockchain has the potential to be for value what the Internet has been for information”. Motivated by these seminal observations, this paper presents the foundations of a Blockchain-based “Internet of Assets” academic program that joins under one roof leading application areas that are characterized by the transfer of assets over communication lines. Two such areas, which are pillars of our economy, are Fintech – Financial Technology and mobile communications services. The next application in line is Healthcare. These challenges are met based on available extensive professional literature. Blockchain-based assets communication is based on extending the principle of Bitcoin, starting with the basic question: If digital money that travels across the universe can ‘prove its own validity’, can this principle be applied to digital content. A groundbreaking positive answer here led to the concept of “smart contract” and consequently to DLT - Distributed Ledger Technology, where the word ‘distributed’ relates to the non-existence of reliable central entities or trusted third parties. The terms Blockchain and DLT are frequently used interchangeably in various application areas. The World Bank Group compiled comprehensive reports, analyzing the contribution of DLT/Blockchain to Fintech. The European Central Bank and Bank of Japan are engaged in Project Stella, “Balancing confidentiality and auditability in a distributed ledger environment”. 130 DLT/Blockchain focused Fintech startups are now operating in Switzerland. Blockchain impact on mobile communications services is treated in detail by leading organizations. The TM Forum is a global industry association in the telecom industry, with over 850 member companies, mainly mobile operators, that generate US$2 trillion in revenue and serve five billion customers across 180 countries. From their perspective: “Blockchain is considered one of the digital economy’s most disruptive technologies”. Samples of Blockchain contributions to Fintech (taken from a World Bank document): Decentralization and disintermediation; Greater transparency and easier auditability; Automation & programmability; Immutability & verifiability; Gains in speed and efficiency; Cost reductions; Enhanced cyber security resilience. Samples of Blockchain contributions to the Telco industry. Establishing identity verification; Record of transactions for easy cost settlement; Automatic triggering of roaming contract which enables near-instantaneous charging and reduction in roaming fraud; Decentralized roaming agreements; Settling accounts per costs incurred in accordance with agreement tariffs. This clearly demonstrates an academic education structure where fundamental technologies are studied in classes together with these two application areas. Advanced courses, treating specific implementations then follow separately. All are under the roof of “Internet of Assets”.

Keywords: blockchain, education, financial technology, mobile telecommunications services

Procedia PDF Downloads 180
1705 The Colouration of Additive-Manufactured Polymer

Authors: Abisuga Oluwayemisi Adebola, Kerri Akiwowo, Deon de Beer, Kobus Van Der Walt

Abstract:

The convergence of additive manufacturing (AM) and traditional textile dyeing techniques has initiated innovative possibilities for improving the visual application and customization potential of 3D-printed polymer objects. Textile dyeing techniques have progressed to transform fabrics with vibrant colours and complex patterns over centuries. The layer-by-layer deposition characteristic of AM necessitates adaptations in dye application methods to ensure even colour penetration across complex surfaces. Compatibility between dye formulations and polymer matrices influences colour uptake and stability, demanding careful selection and testing of dyes for optimal results. This study investigates the development interaction between these areas, revealing the challenges and opportunities of applying textile dyeing methods to colour 3D-printed polymer materials. The method explores three innovative approaches to colour the 3D-printed polymer object: (a) Additive Manufacturing of a Prototype, (b) the traditional dyebath method, and (c) the contemporary digital sublimation technique. The results show that the layer lines inherent to AM interact with dyes differently and affect the visual outcome compared to traditional textile fibers. Skillful manipulation of textile dyeing methods and dye type used for this research reduced the appearance of these lines to achieve consistency and desirable colour outcomes. In conclusion, integrating textile dyeing techniques into colouring 3D-printed polymer materials connects historical craftsmanship with innovative manufacturing. Overcoming challenges of colour distribution, compatibility, and layer line management requires a holistic approach that blends the technical consistency of AM with the artistic sensitivity of textile dyeing. Hence, applying textile dyeing methods to 3D-printed polymers opens new dimensions of aesthetic and functional possibilities.

Keywords: polymer, 3D-printing, sublimation, textile, dyeing, additive manufacturing

Procedia PDF Downloads 67
1704 Sensory and Microbiological Sustainability of Smoked Meat Products–Smoked Ham in Order to Determine the Shelf-Life under the Changed Conditions at +15°C

Authors: Radovan Čobanović, Milica Rankov Šicar

Abstract:

The meat is in the group of perishable food which can be spoiled very rapidly if stored at room temperature. Salting in combination with smoke is intended to extend shelf life, and also to form the specific taste, odor and color. The smoke do not affect only on taste and flavor of the product, it has a bactericidal and oxidative effect and that is the reason because smoked products are less susceptible to oxidation and decay processes. According to mentioned the goal of this study was to evaluate shelf life of smoked ham, which is stored in conditions of high temperature (+15 °C). For the purposes of this study analyzes were conducted on eight samples of smoked ham every 7th day from the day of reception until 21st day. During this period, smoked ham is subjected to sensory analysis (appearance, odor, taste, color, aroma) and bacteriological analyzes (Listeria monocytogenes, Salmonella spp. and yeasts and molds) according to Serbian state regulation. All analyses were tested according to ISO methodology: sensory analysis ISO 6658, Listeria monocytogenes ISO 11 290-1, Salmonella spp ISO 6579 and yeasts and molds ISO 21527-2. Results of sensory analysis of smoked ham indicating that the samples after the first seven days of storage showed visual changes at the surface in the form of allocations of salt, most likely due to the process of drying out the internal parts of the product. The sample, after fifteen days of storage had intensive exterior changes, but the taste was still acceptable. Between the fifteenth and twenty-first day of storage, there is an unacceptable change on the surface and inside of the product and the occurrence of molds and yeasts but neither one analyzed pathogen was found. Based on the obtained results it can be concluded that this type of product cannot be stored for more than seven days at an elevated temperature of +15°C because there are a visual changes that would certainly have influence on decision of customers when purchase of this product is concerned.

Keywords: sustainability, smoked meat products, food engineering, agricultural process engineering

Procedia PDF Downloads 360
1703 Clinical and Etiological Particularities of Infectious Uveitis in HIV+ and HIV- Patients in the Internal Medicine Department

Authors: N. Jait, M. Maamar, H. Khibri, H. Harmouche, N. Mouatssim, W. Ammouri, Z. Tazimezaelek, M. Adnaoui

Abstract:

Introduction: Uveitis presents with inflammation of the uvea, intraocular, of heterogeneous etiology and presentation. The objective of our study is to describe the clinical and therapeutic characteristics of infectious uveitis in HIV+ and HIV- patients. Patients and Methods: This is a retrospective study conducted at the internal medicine department of CHU Ibn Sina in Rabat over a period of 12 years (2010–2021), collecting 42 cases of infectious uveitis. Results: 42 patients were identified. 34% (14 cases) had acquired immunosuppression (9 cases: 22% had HIV infection and 12% were on chemotherapy), and 66% were immunocompetent. The M/F sex ratio was 1.1. The average age was 39 years old. Uveitis revealed HIV in a single case; 8/9 patients have already been followed, their average viral load is 3.4 log and an average CD4 count is 356/mm³. The revealing functional signs were: ocular redness (27%), decreased visual acuity (63%), visual blurring (40%), ocular pain (18%), scotoma (13%), and headaches (4%). The uveitis was site: anterior (30%), intermediate (6%), posterior (32%), and pan-uveitis (32%); unilateral in 80% of patients and bilateral in 20%. The etiologies of uveitis in HIV+ were: 3 cases of CMV, 2 cases of toxoplasmosis, 1 case of tuberculosis, 1 case of HSV, 1 case of VZV, and 1 case of syphilis. Etiologies of immunocompetent patients: tuberculosis (41%), toxoplasmosis (18%), syphilis (15%), CMV infection (4 cases: 10%), HSV infection (4 cases: 10%) , lepromatous uveitis (1 case: 2%), VZV infection (1 case: 2%), a locoregional infectious cause such as dental abscess (1 case: 2%), and one case of borreliosis (3% ). 50% of tuberculous uveitis was of the pan-uveitis type, 75% of the uveitis by toxoplasmosis was of the posterior type. Uveitis was associated with other pathologies in 2 seropositive cases (cerebral vasculitis, multifocal tuberculosis). A specific treatment was prescribed in all patients. The initial evolution was favorable in 67%, including 12% HIV+. 11% presented relapses of the same seat during uveitis of the toxoplasmic, tuberculous and herpetic type. 47% presented complications, of which 4 patients were HIV+: 3 retinal detachments; 7 Retinal hemorrhages. 6 unilateral blindness (including 2 HIV+ patients). Conclusion: In our series, the etiologies of infectious uveitis differ between HIV+ and HIV- patients. In HIV+ patients most often had toxoplasmosis and CMV, while HIV - patients mainly presented with tuberculosis and toxoplasmosis. The association between HIV and uveitis is undetermined, but HIV infection was an independent risk factor for uveitis.

Keywords: uveitis, HIV, immunosuppression, infection

Procedia PDF Downloads 93
1702 Mycophenolate Versus Methotrexate in Non-Infectious Ocular Inflammatory Disease: A Systematic Review and Meta-Analysis

Authors: Mohammad Karam, Abdulmalik Alsaif, Abdulrahman Al-Naseem, Amrit Hayre, Abdurrahman Al Jabbouri, Ahmad Aldubaikhi, Narvair Kahlar, Salem Al-Mutairi

Abstract:

Purpose: To compare the outcomes of mycophenolate mofetil (MMF) versus methotrexate (MTX) in non-infectious ocular inflammatory disease (NIOID). Methods: A systematic review and meta-analysis were performed as per the Preferred Reporting Items for Systematic Reviews and Meta-analyses (PRISMA) Guidelines and an electronic search was conducted to identify all comparative studies of MMF versus MTX in NIOID. Treatment results and side effects were primary outcome measures. Secondary outcome measures included visual acuity and resolution of macular oedema. Fixed and random-effects models were used for the analysis. Results: Four studies enrolling 905 patients were identified. There was no significant difference between MMF and MTX groups in overall treatment success (Odds Ratio [OR] = 0.97, P = 0.96) and failure (OR = 0.86, P = 0.85) of NIOID. Although treatment success of uveitis showed no significant difference for anterior and intermediate uveitis cases (OR = 2.33, P = 0.14), MTX showed a significantly improved effect in cases involving posterior uveitis and panuveitis (OR = 0.41, P = 0.003). However, the median dose required for treatment success was lower for MTX whereas MMF was associated with a faster median time to treatment success. Further to this, MMF showed a reduced rate of side effects when compared to MTX, but MTX failed to reach statistical significance, most notably for liver enzyme elevation (OR = 0.65, P = 0.16), fatigue (OR = 0.84, P = 0.49) and headache (OR = 0.81, P = 0.37). For secondary outcomes, no significant difference was noted in visual acuity and resolution of macular edema. Conclusions: MMF is comparable to MTX in the treatment of NIOID as there was no significant difference in the outcome of treatment success and side effect profiles.

Keywords: Mycophenolate mofetil, methotrexate, non-infectious ocular inflammation, uveitis, scleritis

Procedia PDF Downloads 152
1701 Evaluating the Effect of Spatial Qualities, Openness and Complexity, on Human Cognitive Performance within Virtual Reality

Authors: Pierre F. Gerard, Frederic F. Leymarie, William Latham

Abstract:

Architects have developed a series of objective evaluations, using spatial analysis tools such as Isovist, that show how certain spatial qualities are beneficial to specific human activities hosted in the built environments. In return, they can build more adapted environments by tuning those spatial qualities in their design. In parallel, virtual reality technologies have been developed by engineers with the dream of creating a system that immerses users in a new form of spatial experiences. They already have demonstrated a useful range of benefits not only in simulating critical events to assist people in acquiring new skills, but also to enhance memory retention, to name just a few. This paper investigates the effects of two spatial qualities, openness, and complexity, on cognitive performance within immersive virtual environments. Isovist measure is used to design a series of room settings with different levels of each spatial qualities. In an empirical study, each room was then used by every participant to solve a navigational puzzle game and give a rating of their spatial experience. They were then asked to fill in a questionnaire before solving the visual-spatial memory quiz, which addressed how well they remembered the different rooms. Findings suggest that those spatial qualities have an effect on some of the measures, including navigation performance and memory retention. In particular, there is an order effect for the navigation puzzle game. Participants tended to spend a longer time in the complex room settings. Moreover, there is an interaction effect while with more open settings, participants tended to perform better when in a simple setting; however, with more closed settings, participants tended to perform better in a more complex setting. For the visual-spatial memory quiz, participants performed significantly better within the more open rooms. We believe this is a first step in using virtual environments to enhance participant cognitive performances through better use of specific spatial qualities.

Keywords: architecture, navigation, spatial cognition, virtual reality

Procedia PDF Downloads 130
1700 A Microwave and Millimeter-Wave Transmit/Receive Switch Subsystem for Communication Systems

Authors: Donghyun Lee, Cam Nguyen

Abstract:

Multi-band systems offer a great deal of benefit in modern communication and radar systems. In particular, multi-band antenna-array radar systems with their extended frequency diversity provide numerous advantages in detection, identification, locating and tracking a wide range of targets, including enhanced detection coverage, accurate target location, reduced survey time and cost, increased resolution, improved reliability and target information. An accurate calibration is a critical issue in antenna array systems. The amplitude and phase errors in multi-band and multi-polarization antenna array transceivers result in inaccurate target detection, deteriorated resolution and reduced reliability. Furthermore, the digital beam former without the RF domain phase-shifting is less immune to unfiltered interference signals, which can lead to receiver saturation in array systems. Therefore, implementing integrated front-end architecture, which can support calibration function with low insertion and filtering function from the farthest end of an array transceiver is of great interest. We report a dual K/Ka-band T/R/Calibration switch module with quasi-elliptic dual-bandpass filtering function implementing a Q-enhanced metamaterial transmission line. A unique dual-band frequency response is incorporated in the reception and calibration path of the proposed switch module utilizing the composite right/left-handed meta material transmission line coupled with a Colpitts-style negative generation circuit. The fabricated fully integrated T/R/Calibration switch module in 0.18-μm BiCMOS technology exhibits insertion loss of 4.9-12.3 dB and isolation of more than 45 dB in the reception, transmission and calibration mode of operation. In the reception and calibration mode, the dual-band frequency response centered at 24.5 and 35 GHz exhibits out-of-band rejection of more than 30 dB compared to the pass bands below 10.5 GHz and above 59.5 GHz. The rejection between the pass bands reaches more than 50 dB. In all modes of operation, the IP1-dB is between 4 and 11 dBm. Acknowledgement: This paper was made possible by NPRP grant # 6-241-2-102 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors.

Keywords: microwaves, millimeter waves, T/R switch, wireless communications, wireless communications

Procedia PDF Downloads 160
1699 Verification and Proposal of Information Processing Model Using EEG-Based Brain Activity Monitoring

Authors: Toshitaka Higashino, Naoki Wakamiya

Abstract:

Human beings perform a task by perceiving information from outside, recognizing them, and responding them. There have been various attempts to analyze and understand internal processes behind the reaction to a given stimulus by conducting psychological experiments and analysis from multiple perspectives. Among these, we focused on Model Human Processor (MHP). However, it was built based on psychological experiments and thus the relation with brain activity was unclear so far. To verify the validity of the MHP and propose our model from a viewpoint of neuroscience, EEG (Electroencephalography) measurements are performed during experiments in this study. More specifically, first, experiments were conducted where Latin alphabet characters were used as visual stimuli. In addition to response time, ERPs (event-related potentials) such as N100 and P300 were measured by using EEG. By comparing cycle time predicted by the MHP and latency of ERPs, it was found that N100, related to perception of stimuli, appeared at the end of the perceptual processor. Furthermore, by conducting an additional experiment, it was revealed that P300, related to decision making, appeared during the response decision process, not at the end. Second, by experiments using Japanese Hiragana characters, i.e. Japan's own phonetic symbols, those findings were confirmed. Finally, Japanese Kanji characters were used as more complicated visual stimuli. A Kanji character usually has several readings and several meanings. Despite the difference, a reading-related task and a meaning-related task exhibited similar results, meaning that they involved similar information processing processes of the brain. Based on those results, our model was proposed which reflects response time and ERP latency. It consists of three processors: the perception processor from an input of a stimulus to appearance of N100, the cognitive processor from N100 to P300, and the decision-action processor from P300 to response. Using our model, an application system which reflects brain activity can be established.

Keywords: brain activity, EEG, information processing model, model human processor

Procedia PDF Downloads 98
1698 A Prediction Model of Adopting IPTV

Authors: Jeonghwan Jeon

Abstract:

With the advent of IPTV in the fierce competition with existing broadcasting system, it is emerged as an important issue to predict how much the adoption of IPTV service will be. This paper aims to suggest a prediction model for adopting IPTV using classification and Ranking Belief Simplex (CaRBS). A simplex plot method of representing data allows a clear visual representation to the degree of interaction of the support from the variables to the prediction of the objects. CaRBS is applied to the survey data on the IPTV adoption.

Keywords: prediction, adoption, IPTV, CaRBS

Procedia PDF Downloads 412
1697 Listening Anxiety in Iranian EFL learners

Authors: Samaneh serraj

Abstract:

Listening anxiety has a detrimental effect on language learners. Through a qualitative study on Iranian EFL learners several factors were identified as having influence on their listening anxiety. These factors were divided into three categories, i.e. individual factors (nerves and emotionality, using inappropriate strategies and lack of practice), input factors (lack of time to process, lack of visual support, nature of speech and level of difficulty) and environmental factors (instructors, peers and class environment).

Keywords: listening Comprehension, Listening Anxiety, Foreign language learners

Procedia PDF Downloads 470
1696 The Use of Mobile Phones as a Direct Marketing Tool and Consumer Attitudes

Authors: Abdülcelil Mücahid Zengin, Göksel Şimşek

Abstract:

Mobile phones are one of the direct marketing tools that can be used to reach todays hard to reach consumers. Mobile phones are very personal devices and they are always carried with the consumer, where ever they go. This creates an opportunity for marketers to create personalized marketing communications messages and send them on the right time and place. This study examines consumer attitudes toward mobile marketing, especially toward SMS marketing. Unlike similar studies, this study does not focus on the young, but includes consumers who are in the 18-70 age range to the field research. According to the results, it has been concluded that most participants think SMS marketing is disturbing. Most important problems with SMS marketing are about getting subscribed to message lists without the permission of the receiver; the high number of messages sent; and the irrelevancy of the message content.

Keywords: direct marketing, mobile phones mobile marketing, sms advertising, sms marketing

Procedia PDF Downloads 348
1695 Optimizing Communications Overhead in Heterogeneous Distributed Data Streams

Authors: Rashi Bhalla, Russel Pears, M. Asif Naeem

Abstract:

In this 'Information Explosion Era' analyzing data 'a critical commodity' and mining knowledge from vertically distributed data stream incurs huge communication cost. However, an effort to decrease the communication in the distributed environment has an adverse influence on the classification accuracy; therefore, a research challenge lies in maintaining a balance between transmission cost and accuracy. This paper proposes a method based on Bayesian inference to reduce the communication volume in a heterogeneous distributed environment while retaining prediction accuracy. Our experimental evaluation reveals that a significant reduction in communication can be achieved across a diverse range of dataset types.

Keywords: big data, bayesian inference, distributed data stream mining, heterogeneous-distributed data

Procedia PDF Downloads 161
1694 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 509
1693 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 167
1692 Computational Team Dynamics and Interaction Patterns in New Product Development Teams

Authors: Shankaran Sitarama

Abstract:

New Product Development (NPD) is invariably a team effort and involves effective teamwork. NPD team has members from different disciplines coming together and working through the different phases all the way from conceptual design phase till the production and product roll out. Creativity and Innovation are some of the key factors of successful NPD. Team members going through the different phases of NPD interact and work closely yet challenge each other during the design phases to brainstorm on ideas and later converge to work together. These two traits require the teams to have a divergent and a convergent thinking simultaneously. There needs to be a good balance. The team dynamics invariably result in conflicts among team members. While some amount of conflict (ideational conflict) is desirable in NPD teams to be creative as a group, relational conflicts (or discords among members) could be detrimental to teamwork. Team communication truly reflect these tensions and team dynamics. In this research, team communication (emails) between the members of the NPD teams is considered for analysis. The email communication is processed through a semantic analysis algorithm (LSA) to analyze the content of communication and a semantic similarity analysis to arrive at a social network graph that depicts the communication amongst team members based on the content of communication. The amount of communication (content and not frequency of communication) defines the interaction strength between the members. Social network adjacency matrix is thus obtained for the team. Standard social network analysis techniques based on the Adjacency Matrix (AM) and Dichotomized Adjacency Matrix (DAM) based on network density yield network graphs and network metrics like centrality. The social network graphs are then rendered for visual representation using a Metric Multi-Dimensional Scaling (MMDS) algorithm for node placements and arcs connecting the nodes (representing team members) are drawn. The distance of the nodes in the placement represents the tie-strength between the members. Stronger tie-strengths render nodes closer. Overall visual representation of the social network graph provides a clear picture of the team’s interactions. This research reveals four distinct patterns of team interaction that are clearly identifiable in the visual representation of the social network graph and have a clearly defined computational scheme. The four computational patterns of team interaction defined are Central Member Pattern (CMP), Subgroup and Aloof member Pattern (SAP), Isolate Member Pattern (IMP), and Pendant Member Pattern (PMP). Each of these patterns has a team dynamics implication in terms of the conflict level in the team. For instance, Isolate member pattern, clearly points to a near break-down in communication with the member and hence a possible high conflict level, whereas the subgroup or aloof member pattern points to a non-uniform information flow in the team and some moderate level of conflict. These pattern classifications of teams are then compared and correlated to the real level of conflict in the teams as indicated by the team members through an elaborate self-evaluation, team reflection, feedback form and results show a good correlation.

Keywords: team dynamics, team communication, team interactions, social network analysis, sna, new product development, latent semantic analysis, LSA, NPD teams

Procedia PDF Downloads 69
1691 Design Dual Band Band-Pass Filter by Using Stepped Impedance

Authors: Fawzia Al-Sakeer, Hassan Aldeeb

Abstract:

Development in the communications field is proceeding at an amazing speed, which has led researchers to improve and develop electronic circuits by increasing their efficiency and reducing their size to reduce the weight of electronic devices. One of the most important of these circuits is the band-pass filter, which is what made us carry out this research, which aims to use an alternate technology to design a dual band-pass filter by using a stepped impedance microstrip transmission line. We designed a filter that works at two center frequency bands by designing with the ADS program, and the results were excellent, as we obtained the two design frequencies, which are 1 and 3GHz, and the values of insertion loss S11, which was more than 21dB with a small area.

Keywords: band pass filter, dual band band-pass filter, ADS, microstrip filter, stepped impedance

Procedia PDF Downloads 68
1690 Popular Modern Devotional Prints: The Construction of Identity between the Visual and Viewer in Public Interaction Spaces

Authors: Muhammad Asghar, Muhammad Ali, Farwah Batool

Abstract:

Despite the general belief in Islam that figural representations should be avoided, particularly propagated by the Deobandis, a religious group influenced by Salafi and Wahhabi ideas, nevertheless the public interaction spaces such as Shops and offices are decorated with popular, mass-produced, modern devotional prints. This study seeks to focus on popular visual culture, its display in public interaction places such as shops and discusses how people establish relationships with images. The method adopted was basically ethnographic: to describe as precisely and completely as possible the phenomena to be studied, using the language and conceptual categories of the interlocutors themselves. This study has been enriched by ethnographic field research conducted during the months from October to December 2015 in the major cities of Punjab and their brief forays and surroundings where we explored how seeing upon images performs religious identity within the public space. The study examines the pattern of aesthetics and taste in the shops of especially common people whose sensibilities have not been refined or influenced by being exposed to any narrative or fine arts. Furthermore, it is our intention to question the general beliefs and opinions in the context of popular practices, the way in which people relate to these prints. The interpretations and analyses presented in this study illuminate how people create meaning through the display of such items of material culture in the immediate settings of their spaces. This study also seeks to demonstrate how popular Islam is practiced, transformed and understood through the display of popular representations of popular figures of piety like Sufi saints or their shrines are important to many believers and thus occupy important places in their shops. The findings are supported with empirical evidence and based on interviews with the shopkeepers, owners and office employees. Looking upon those popular modern devotional prints keeps people’s reverence of the personages alive. Because of their sacred themes they affect a relationship between the saint and the beholders as well as serve to symbolize and reinforce their belief since they become powerful loci of emotional attachment. Collectively such devotional prints satisfy a local taste to help people establish contact with God through the saints’ intercession in order to receive protection and benediction, and help in spiritual, mental and material problems. By putting all these facets of belief together we gain an insight into both the subjective and cognizant role that icons’ of saints play in the lives of believers. Their veneration through ingeniously contrived modern means of production makes a significant contribution to an understanding of how such imagery promotes a powerful belief in Sufi saints, which ultimately gives indications of how popular Islam is practiced and understood at its gross roots level.

Keywords: ethnographic field research, popular visual culture, protected space, religious identity

Procedia PDF Downloads 227
1689 Factors Affecting Visual Environment in Mine Lighting

Authors: N. Lakshmipathy, Ch. S. N. Murthy, M. Aruna

Abstract:

The design of lighting systems for surface mines is not an easy task because of the unique environment and work procedures encountered in the mines. The primary objective of this paper is to identify the major problems encountered in mine lighting application and to provide guidance in the solution of these problems. In the surface mining reflectance of surrounding surfaces is one of the important factors, which improve the vision, in the night hours. But due to typical working nature in the mines it is very difficult to fulfill these requirements, and also the orientation of the light at work site is a challenging task. Due to this reason machine operator and other workers in a mine need to be able to orient themselves in a difficult visual environment. The haul roads always keep on changing to tune with the mining activity. Other critical area such as dumpyards, stackyards etc. also change their phase with time, and it is difficult to illuminate such areas. Mining is a hazardous occupation, with workers exposed to adverse conditions; apart from the need for hard physical labor, there is exposure to stress and environmental pollutants like dust, noise, heat, vibration, poor illumination, radiation, etc. Visibility is restricted when operating load haul dumper and Heavy Earth Moving Machinery (HEMM) vehicles resulting in a number of serious accidents. one of the leading causes of these accidents is the inability of the equipment operator to see clearly people, objects or hazards around the machine. Results indicate blind spots are caused primarily by posts, the back of the operator's cab, and by lights and light brackets. The careful designed and implemented, lighting systems provide mine workers improved visibility and contribute to improved safety, productivity and morale. Properly designed lighting systems can improve visibility and safety during working in the opencast mines.

Keywords: contrast, efficacy, illuminance, illumination, light, luminaire, luminance, reflectance, visibility

Procedia PDF Downloads 358
1688 Treatment Outcome Of Corneal Ulcers Using Levofloxacin Hydrate 1.5% Ophthalmic Solution And Adjuvant Oral Ciprofloxacin, A Treatment Strategy Applicable To Primary Healthcare

Authors: Celine Shi Ying Lee, Jong Jian Lee

Abstract:

Background: Infectious keratitis is one of the leading causes of blindness worldwide. Prompt treatment with effective medication will control the infection early, preventing corneal scarring and visual loss. fluoroquinolones ophthalmic medication is used because of its broad-spectrum properties, potency, good intraocular penetration, and low toxicity. The study aims to evaluate the treatment outcome of corneal ulcers using Levofloxacin 1.5% ophthalmic solution (LVFX) with adjuvant oral ciprofloxacin when indicated and apply this treatment strategy in primary health care as first-line treatment. Methods: Patients with infective corneal ulcer treated in an eye center were recruited. Inclusion criteria includes Corneal infection consistent with bacterial keratitis, single or multiple small corneal ulcers. Treatment regime: LVFX hourly for the first 2 days, 2 hourly from the 3rd day, and 3 hourly on the 5th day of review. Adjuvant oral ciprofloxacin 500mg BD was administered for 5 days if there were multiple corneal ulcers or when the location of the cornea ulcer was central or paracentral. Results: 47 subjects were recruited. There were 16 (34%) males and 31 (66%) females. 40 subjects (85%) were contact lens (CL) related to corneal ulcer, and 7 subjects (15%) were non-contact lens related. 42 subjects (89%) presented with one ulcer, of which 20 of them (48%) needed adjuvant therapy. 5 subjects presented with 2 or 3 ulcers, of which 3 needed adjuvant therapy. A total of 23 subjects (49%) was given adjuvant therapy (oral ciprofloxacin 500mg BD for 5 days).21 of them (91%) were CL related. All subjects recovered fully, and the average duration of treatment was 3.7 days, with 49% of the subjects resolved on the 3rd day, 38% on the 5thday of and 13% on the 7thday. All subjects showed symptoms of relief of pain, light-sensitivity, and redness on the 3rd day with full visual recovery post-treatment. No adverse drug reactions were recorded. Conclusion: Our treatment regime demonstrated good clinical outcome as first-line treatment for corneal ulcers. A corneal ulcer is a common eye condition in Singapore, mainly due to CL wear. Pseudomonas aeruginosa is the most frequent and potentially sight-threatening pathogen involved in CL related corneal ulcer. Coagulase-negative Staphylococci, Staphylococcus aureus, and Streptococcus Pneumoniae were seen in non-CL users. All these bacteria exhibit good sensitivity rates to ciprofloxacin and levofloxacin. It is therefore logical in our study to use LVFX Eyedrops and adjuvant ciprofloxacin oral antibiotics when indicated as first line treatment for most corneal ulcers. Our study of patients, both CL related and non-CL related, have shown good clinical response and full recovery using the above treatment strategy. There was also a full restoration of visual acuity in all the patients. Eye-trained primary Healthcare practitioners can consider adopting this treatment strategy as first line treatment in patients with corneal ulcers. This is relevant during the COVID pandemic, where hospitals are overwhelmed with patients and in regions with limited access to specialist eye care. This strategy would enable early treatment with better clinical outcome.

Keywords: corneal ulcer, levofloxacin hydrate, treatment strategy, ciprofloxacin

Procedia PDF Downloads 175
1687 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 482
1686 Care: A Cluster Based Approach for Reliable and Efficient Routing Protocol in Wireless Sensor Networks

Authors: K. Prasanth, S. Hafeezullah Khan, B. Haribalakrishnan, D. Arun, S. Jayapriya, S. Dhivya, N. Vijayarangan

Abstract:

The main goal of our approach is to find the optimum positions for the sensor nodes, reinforcing the communications in points where certain lack of connectivity is found. Routing is the major problem in sensor network’s data transfer between nodes. We are going to provide an efficient routing technique to make data signal transfer to reach the base station soon without any interruption. Clustering and routing are the two important key factors to be considered in case of WSN. To carry out the communication from the nodes to their cluster head, we propose a parameterizable protocol so that the developer can indicate if the routing has to be sensitive to either the link quality of the nodes or the their battery levels.

Keywords: clusters, routing, wireless sensor networks, three phases, sensor networks

Procedia PDF Downloads 505
1685 Overview and Future Opportunities of Sarcasm Detection on Social Media Communications

Authors: Samaneh Nadali, Masrah Azrifah Azmi Murad, Nurfadhlina Mohammad Sharef

Abstract:

Sarcasm is a common phenomenon in social media which is a nuanced form of language for stating the opposite of what is implied. Due to the intentional ambiguity, analysis of sarcasm is a difficult task not only for a machine but even for a human. Although sarcasm detection has an important effect on sentiment, it is usually ignored in social media analysis because sarcasm analysis is too complicated. While there is a few systems exist which can detect sarcasm, almost no work has been carried out on a study and the review of the existing work in this area. This survey presents a nearly full image of sarcasm detection techniques and the related fields with brief details. The main contributions of this paper include the illustration of the recent trend of research in the sarcasm analysis and we highlight the gaps and propose a new framework that can be explored.

Keywords: sarcasm detection, sentiment analysis, social media, sarcasm analysis

Procedia PDF Downloads 457
1684 Evaluating and Improving Healthcare Staff Knowledge of the [NG179] NICE Guidelines on Elective Surgical Care during the COVID-19 Pandemic: A Quality Improvement Project

Authors: Stavroula Stavropoulou-Tatla, Danyal Awal, Mohammad Ayaz Hossain

Abstract:

The first wave of the COVID-19 pandemic saw several countries issue guidance postponing all non-urgent diagnostic evaluations and operations, leading to an estimated backlog of 28 million cases worldwide and over 4 million in the UK alone. In an attempt to regulate the resumption of elective surgical activity, the National Institute for Health and Care Excellence (NICE) introduced the ‘COVID-19 rapid guideline [NG179]’. This project aimed to increase healthcare staff knowledge of the aforementioned guideline to a targeted score of 100% in the disseminated questionnaire within 3 months at the Royal Free Hospital. A standardized online questionnaire was used to assess the knowledge of surgical and medical staff at baseline and following each 4-week-long Plan-Study-Do-Act (PDSA) cycle. During PDSA1, the A4 visual summary accompanying the guideline was visibly placed in all relevant clinical areas and the full guideline was distributed to the staff in charge together with a short briefing on the salient points. PDSA2 involved brief small-group teaching sessions. A total of 218 responses was collected. Mean percentage scores increased significantly from 51±19% at baseline to 81±16% after PDSA1 (t=10.32, p<0.0001) and further to 93±8% after PDSA2 (t=4.9, p<0.0001), with 54% of participants achieving a perfect score. In conclusion, the targeted distribution of guideline printouts and visual aids, combined with small-group teaching sessions, were simple and effective ways of educating healthcare staff about the new standards of elective surgical care at the time of COVID-19. This could facilitate the safe restoration of surgical activity, which is critical in order to mitigate the far-reaching consequences of surgical delays on an unprecedented scale during a time of great crisis and uncertainty.

Keywords: COVID-19, elective surgery, NICE guidelines, quality improvement

Procedia PDF Downloads 195
1683 Wireless Network and Its Application

Authors: Henok Mezemr Besfat, Haftom Gebreslassie Gebregwergs

Abstract:

wireless network is one of the most important mediums of transmission of information from one device to another devices. Wireless communication has a broad range of applications, including mobile communications through cell phones and satellites, Internet of Things (IoT) connecting several devices, wireless sensor networks for traffic management and environmental monitoring, satellite communication for weather forecasting and TV without requiring any cable or wire or other electronic conductors, by using electromagnetic waves like IR, RF, satellite, etc. This paper summarizes different wireless network technologies, applications of different wireless technologies and different types of wireless networks. Generally, wireless technology will further enhance operations and experiences across sectors with continued innovation. This paper suggests different strategies that can improve wireless networks and technologies.

Keywords: wireless senser, wireless technology, wireless network, internet of things

Procedia PDF Downloads 52