Search results for: user attributes analysis
29196 Hyper Tuned RBF SVM: Approach for the Prediction of the Breast Cancer
Authors: Surita Maini, Sanjay Dhanka
Abstract:
Machine learning (ML) involves developing algorithms and statistical models that enable computers to learn and make predictions or decisions based on data without being explicitly programmed. Because of its unlimited abilities ML is gaining popularity in medical sectors; Medical Imaging, Electronic Health Records, Genomic Data Analysis, Wearable Devices, Disease Outbreak Prediction, Disease Diagnosis, etc. In the last few decades, many researchers have tried to diagnose Breast Cancer (BC) using ML, because early detection of any disease can save millions of lives. Working in this direction, the authors have proposed a hybrid ML technique RBF SVM, to predict the BC in earlier the stage. The proposed method is implemented on the Breast Cancer UCI ML dataset with 569 instances and 32 attributes. The authors recorded performance metrics of the proposed model i.e., Accuracy 98.24%, Sensitivity 98.67%, Specificity 97.43%, F1 Score 98.67%, Precision 98.67%, and run time 0.044769 seconds. The proposed method is validated by K-Fold cross-validation.Keywords: breast cancer, support vector classifier, machine learning, hyper parameter tunning
Procedia PDF Downloads 6829195 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria
Authors: K. Alese Boniface, K. Adu Michael
Abstract:
Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)
Procedia PDF Downloads 27929194 Maker-Based Learning in Secondary Mathematics: Investigating Students’ Proportional Reasoning Understanding through Digital Making
Authors: Juan Torralba
Abstract:
Student digital artifacts were investigated, utilizing a qualitative exploratory research design to understand the ways in which students represented their knowledge of seventh-grade proportionality concepts as they participated in maker-based activities that culminated in the creation of digital 3-dimensional models of their dream homes. Representations of the geometric and numeric dimensions of proportionality were analyzed in the written, verbal, and visual data collected from the students. A directed content analysis approach was utilized in the data analysis, as this work aimed to build upon existing research in the field of maker-based STEAM Education. The results from this work show that students can represent their understanding of proportional reasoning through open-ended written responses more accurately than through verbal descriptions or digital artifacts. The geometric and numeric dimensions of proportionality and their respective components of attributes of similarity representation and percents, rates, and ratios representations were the most represented by the students than any other across the data, suggesting a maker-based instructional approach to teaching proportionality in the middle grades may be promising in helping students gain a solid foundation in those components. Recommendations for practice and research are discussed.Keywords: learning through making, maker-based education, maker education in the middle grades, making in mathematics, the maker movement
Procedia PDF Downloads 7329193 Tracing Ethnic Identity through Prehistoric Paintings and Tribal Art in Central India
Authors: Indrani Chattopadhyaya
Abstract:
This paper seeks to examine how identity – a cultural self-image of a group of people develops – how they live, they think, they celebrate and express their world view through language, gesture, symbols, and rituals. 'Culture' is a way of life and 'identity' is assertion of that cultural self-image practiced by the group. The way in which peoples live varies from time to time and from place to place. This variation is important for their identity. Archaeologists have classified these patterns of spacial variations as 'archaeological culture.' These cultures are identified 'self-consciously' with a particular social group indicating ethnicity. The ethnic identity as archaeological cultures also legitimizes the claims of modern groups to territory. In prehistoric research problems of ethnicity and multiculturalism, stylistic attributes significantly reflect both group membership and individuality. In India, anthropologists feel that though tribes have suffered relative isolation through history, they have remained an integral part of Indian civilization. The term 'tribe' calls for substitution with a more meaningful name with an indigenous flavour 'Adivasi' (original inhabitants of the land).While studying prehistoric rock paintings from central India - Sonbhadra (Uttar Pradesh) and Bhimbetka (Madhya Pradesh), one is struck by the similarity between stylistic attributes of painted motifs in the prehistoric rock shelters and the present day indigenous art of Kol and Bhil tribes in the area, who have not seen these prehistoric rock paintings, yet are carrying on with the tradition of painting and decorating their houses in the same way. They worship concretionary sandstone blocks with triangular laminae as Goddess, Devi, Shakti. This practice is going on since Upper Palaeolithic period confirmed by archaeological excavation. The past is legitimizing the role of the present groups by allowing them to trace their roots from earlier times.Keywords: ethnic identity, hermeneutics, semiotics, Adivasi
Procedia PDF Downloads 31029192 Comparison of Illuminance Levels in Old Omani and Portuguese Forts in Oman
Authors: Maatouk Khoukhi
Abstract:
Nowadays the reduction of the energy consumed by buildings to achieve mainly the thermal comfort for the occupants represent the main concern for architects and building designers. The common and traditional solution to achieve this target is the design of a highly insulated envelope and reduce the opening and the transparent elements such windows. However, this will lead to the artificial lighting system to consume more energy to compensate the lack of natural lighting coming through the glazed parts of the building envelope. Therefore, a good balance between sufficient daylight and control thermal heat through the building envelope should be considered for energy saving purpose. To achieve a better indoor environment the windows size and spacing including the interior finishing and the location of the partition must be assessed accurately. Daylighting is the controlled admission of natural light into space through windows and transparent elements of the building envelope which helps create a visually stimulating and productive environment for building occupants. The main concern is not to provide enough daylight to an occupied space, but how to achieve this without any undesirable side effect. Indeed, the glare is a major problem in glazed façade buildings, and this could be reduced by using tinted windows. The main target of this research is to investigate the daylight adequacy of functional needs in old Omani Forts and how they have been designed and built to avoid glare and overheating with the appropriate window-to-floor ratio. Because more windows do not automatically result in more daylighting but that is natural light has been controlled and distributed properly throughout the space. Spaces from different Omani and Portuguese Forts under the same climate conditions are considered in order to compare the daylight illuminance levels and examine the similarities and differences in visual attributes between them. The result of this study indicates that lighting preference is not universal and people from different geographical locations are adapted to certain illuminance levels. Therefore, the standards could not be generalized for the entire world. This would be useful to practitioners who are designing to effectively address the diversity of user’s lighting levels preferences in our globally connected society.Keywords: day lighting, energy, forts, thermal comfort
Procedia PDF Downloads 16729191 Seed Yield and Quality of Late Planted Rabi Wheat Crop as Influenced by Basal and Foliar Application of Urea
Authors: Omvati Verma, Shyamashrre Roy
Abstract:
A field experiment was conducted with three basal nitrogen levels (90, 120 and 150 kg N/ha) and five foliar application of urea (absolute control, water spray, 3% urea spray at anthesis, 7 and 14 days after anthesis) at G.B. Pant University of Agriculture & Technology, Pantnagar, U.S. Nagar (Uttarakhand) during rabi season in a factorial randomized block design with three replications. Results revealed that nitrogen application of 150 kg/ha produced the highest seed yield, straw and biological yield and it was significantly superior to 90 kg N/ha and was at par with 120 kg N/ha. The number of tillers increased significantly with increase in nitrogen doses up to 150 kg N/ha. Spike length, number of grains per spike, grain weight per spike and thousand seed weight showed significantly higher values with 120 kg N/ha than 90 kg N/ha and were at par with that of 150 kg N/ha. Also, plant height showed similar trend. Leaf area index and chlorophyll content showed significant increase with an increase in nitrogen levels at different stages. In the case of foliar spray treatments, urea spray at anthesis showed highest value for yield and yield attributes. In case of spike length and thousand seed weight, it was similar with the urea spray at 7 and 14 days after anthesis, but for rest of the yield attributes, it was significantly higher than rest of the treatments. Among seed quality parameters protein and sedimentation value showed significant increase due to increase in nitrogen rates whereas, starch and hectolitre weight had a decreasing trend. Wet gluten content was not influenced by nitrogen levels. Foliar urea spray at anthesis resulted in highest value of protein and hectolitre weight whereas, urea spray at 7 days after anthesis showed highest value of sedimentation value and wet gluten content.Keywords: foliar application, nitrogenous fertilizer, seed quality, yield
Procedia PDF Downloads 28029190 Objective and Subjective Preconditions for Entrepreneurship: From the Point of View of Enterprise Risk Management
Authors: Maria Luskova, Maria Hudakova, Katarina Buganova
Abstract:
Established objective and subjective preconditions for entrepreneurship, forming the business organically related whole, are the necessary condition of successful entrepreneurial activities. Objective preconditions for entrepreneurship are developed by the market economy that should stimulate entrepreneurship by allowing the use of economic opportunities for all those who want to do business in respective field while providing guarantees to all owners and creating a stable business environment for entrepreneurs. Subjective preconditions of entrepreneurship are formed primarily by personal characteristics of the entrepreneur. These are his properties, abilities, skills, physiological, and psychological preconditions which may be inherited, inborn or sequentially developed and obtained during his life on the basis of education and influences of surrounding environment. The paper is dealing with issues of objective and subjective preconditions for entrepreneurship and provides their analysis in view of the current situation in Slovakia. It presents risks of the business environment in Slovakia that the Slovak managers considered the most significant in 2014 and defines the dominant attributes of the entrepreneur in the current business environment in Slovakia.Keywords: entrepreneurship, innovations, opportunity, risk, uncertainty
Procedia PDF Downloads 52529189 The Effects of High-frequency rTMS Targeting the Mirror Neurons on Improving Social Awareness in ASD, the Preliminary Analysis of a Pilot Study
Authors: Mitra Assadi, Md. Faan
Abstract:
Background: Autism Spectrum Disorder (ASD) in a common neurodevelopmental disorder with limited pharmacological interventions. Transcranial Magnetic Stimulation (rTMS) has produced promising results in ASD, although there is no consensus regarding optimal targets or stimulation paradigms. A prevailing theory in ASD attributes the core deficits to dysfunction of the mirror neurons located in the inferior parietal lobule (IPL) and inferior frontal gyrus (IFG). Methods: Thus far, 11 subjects with ASD, 10 boys and 1 girl with the mean age of 13.36 years have completed the study by receiving 10 session of high frequency rTMS to the IPL. The subjects were randomized to receive stimulation on the left or right IPL and sham stimulation to the opposite side. The outcome measures included the Social Responsiveness Scale – Second Edition (SRS-2) and Delis-Kaplan Executive Function System (D-KEFS) Verbal Fluency task. Results: None of the 11 subjects experienced any adverse effects. The rTMS did not produce any improvement in verbal fluency, nor there was any statistically significant difference between the right versus left sided stimulation. Analysis of social awareness on SRS-2 (SRS-AWR) indicated a close to significant effect of the treatment with a small to medium effect size. After removing a single subject with Level 3 ASD, we demonstrated a close to significant improvement on SRS-AWR with a large effect size. The analysis of the data 3-month post TMS demonstrated return of the SRS-AWR values to baseline. Conclusion: This preliminary analysis of the 11 subjects who have completed our study thus far shows a favorable response to high frequency rTMS stimulation of the mirror neurons/IPL on social awareness. While the decay of the response noted during the 3-month follow-up may be considered a limitation of rTMS, the presence of the improvement, especially the effect size despite the small sample size, is indicative of the efficacy of this technique.Keywords: rTMS, autism, scoial cognition, mirror neurons
Procedia PDF Downloads 7029188 Using Machine Learning Techniques for Autism Spectrum Disorder Analysis and Detection in Children
Authors: Norah Mohammed Alshahrani, Abdulaziz Almaleh
Abstract:
Autism Spectrum Disorder (ASD) is a condition related to issues with brain development that affects how a person recognises and communicates with others which results in difficulties with interaction and communication socially and it is constantly growing. Early recognition of ASD allows children to lead safe and healthy lives and helps doctors with accurate diagnoses and management of conditions. Therefore, it is crucial to develop a method that will achieve good results and with high accuracy for the measurement of ASD in children. In this paper, ASD datasets of toddlers and children have been analyzed. We employed the following machine learning techniques to attempt to explore ASD and they are Random Forest (RF), Decision Tree (DT), Na¨ıve Bayes (NB) and Support Vector Machine (SVM). Then Feature selection was used to provide fewer attributes from ASD datasets while preserving model performance. As a result, we found that the best result has been provided by the Support Vector Machine (SVM), achieving 0.98% in the toddler dataset and 0.99% in the children dataset.Keywords: autism spectrum disorder, machine learning, feature selection, support vector machine
Procedia PDF Downloads 15329187 A Self-Coexistence Strategy for Spectrum Allocation Using Selfish and Unselfish Game Models in Cognitive Radio Networks
Authors: Noel Jeygar Robert, V. K.Vidya
Abstract:
Cognitive radio is a software-defined radio technology that allows cognitive users to operate on the vacant bands of spectrum allocated to licensed users. Cognitive radio plays a vital role in the efficient utilization of wireless radio spectrum available between cognitive users and licensed users without making any interference to licensed users. The spectrum allocation followed by spectrum sharing is done in a fashion where a cognitive user has to wait until spectrum holes are identified and allocated when the licensed user moves out of his own allocated spectrum. In this paper, we propose a self –coexistence strategy using bargaining and Cournot game model for achieving spectrum allocation in cognitive radio networks. The game-theoretic model analyses the behaviour of cognitive users in both cooperative and non-cooperative scenarios and provides an equilibrium level of spectrum allocation. Game-theoretic models such as bargaining game model and Cournot game model produce a balanced distribution of spectrum resources and energy consumption. Simulation results show that both game theories achieve better performance compared to other popular techniquesKeywords: cognitive radio, game theory, bargaining game, Cournot game
Procedia PDF Downloads 30229186 Potential Application of Artocarpus odoratisimmus Seed Flour in Bread Production
Authors: Hasmadi Mamat, Noorfarahzilah Masri
Abstract:
The search for lesser known and underutilized crops, many of which are potentially valuable as human and animal foods has been the focus of research in recent years. Tarap (Artocarpus odoratisimmus) is one of the most delicious tropical fruit and can be found extensively in Borneo, particularly in Sabah and Sarawak. This study was conducted in order to determine the proximate composition, mineral contents as well as to study the effect of the seed flour on the quality of bread produced. Tarap seed powder (TSP) was incorporated (up to 20%) with wheat flour and used to produce bread. The moisture content, ash, protein, fat, ash, carbohydrates, and dietary fiber were measured using AOAC methods while the mineral content was determined using AAS. The effect of substitution of wheat flour with Tarap seed flour on the quality of dough and bread was investigated using various techniques. Farinograph tests were applied to determine the effect of seaweed powder on the rheological properties of wheat flour dough, while texture profile analysis (TPA) was used to measure the textural properties of the final product. Besides that sensory evaluations were also conducted. On a dry weight basis, the TSP was composed of 12.50% moisture, 8.78% protein, 15.60% fat, 1.17% ash, 49.65% carbohydrate and 12.30% of crude fiber. The highest mineral found were Mg, followed by K, Ca, Fe and Na respectively. Farinograh results found that as TSP percentage increased, dough consistency, water absorption capacity and development time of dough decreased. Sensory analysis results showed that bread with 10% of TSP was the most accepted by panelists where the highest acceptability score were found for aroma, taste, colour, crumb texture as well as overall acceptance. The breads with more than 10% of TSP obtained lower acceptability score in most of attributes tested.Keywords: tarap seed, proximate analysis, bread, sensory evaluation
Procedia PDF Downloads 18329185 Performance Comparison of ADTree and Naive Bayes Algorithms for Spam Filtering
Authors: Thanh Nguyen, Andrei Doncescu, Pierre Siegel
Abstract:
Classification is an important data mining technique and could be used as data filtering in artificial intelligence. The broad application of classification for all kind of data leads to be used in nearly every field of our modern life. Classification helps us to put together different items according to the feature items decided as interesting and useful. In this paper, we compare two classification methods Naïve Bayes and ADTree use to detect spam e-mail. This choice is motivated by the fact that Naive Bayes algorithm is based on probability calculus while ADTree algorithm is based on decision tree. The parameter settings of the above classifiers use the maximization of true positive rate and minimization of false positive rate. The experiment results present classification accuracy and cost analysis in view of optimal classifier choice for Spam Detection. It is point out the number of attributes to obtain a tradeoff between number of them and the classification accuracy.Keywords: classification, data mining, spam filtering, naive bayes, decision tree
Procedia PDF Downloads 41329184 Neural Network Models for Actual Cost and Actual Duration Estimation in Construction Projects: Findings from Greece
Authors: Panagiotis Karadimos, Leonidas Anthopoulos
Abstract:
Predicting the actual cost and duration in construction projects concern a continuous and existing problem for the construction sector. This paper addresses this problem with modern methods and data available from past public construction projects. 39 bridge projects, constructed in Greece, with a similar type of available data were examined. Considering each project’s attributes with the actual cost and the actual duration, correlation analysis is performed and the most appropriate predictive project variables are defined. Additionally, the most efficient subgroup of variables is selected with the use of the WEKA application, through its attribute selection function. The selected variables are used as input neurons for neural network models through correlation analysis. For constructing neural network models, the application FANN Tool is used. The optimum neural network model, for predicting the actual cost, produced a mean squared error with a value of 3.84886e-05 and it was based on the budgeted cost and the quantity of deck concrete. The optimum neural network model, for predicting the actual duration, produced a mean squared error with a value of 5.89463e-05 and it also was based on the budgeted cost and the amount of deck concrete.Keywords: actual cost and duration, attribute selection, bridge construction, neural networks, predicting models, FANN TOOL, WEKA
Procedia PDF Downloads 13629183 Human Action Retrieval System Using Features Weight Updating Based Relevance Feedback Approach
Authors: Munaf Rashid
Abstract:
For content-based human action retrieval systems, search accuracy is often inferior because of the following two reasons 1) global information pertaining to videos is totally ignored, only low level motion descriptors are considered as a significant feature to match the similarity between query and database videos, and 2) the semantic gap between the high level user concept and low level visual features. Hence, in this paper, we propose a method that will address these two issues and in doing so, this paper contributes in two ways. Firstly, we introduce a method that uses both global and local information in one framework for an action retrieval task. Secondly, to minimize the semantic gap, a user concept is involved by incorporating features weight updating (FWU) Relevance Feedback (RF) approach. We use statistical characteristics to dynamically update weights of the feature descriptors so that after every RF iteration feature space is modified accordingly. For testing and validation purpose two human action recognition datasets have been utilized, namely Weizmann and UCF. Results show that even with a number of visual challenges the proposed approach performs well.Keywords: relevance feedback (RF), action retrieval, semantic gap, feature descriptor, codebook
Procedia PDF Downloads 47529182 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment
Authors: Emmanuel Ogala
Abstract:
Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment
Procedia PDF Downloads 14129181 Systematic Review of Quantitative Risk Assessment Tools and Their Effect on Racial Disproportionality in Child Welfare Systems
Authors: Bronwen Wade
Abstract:
Over the last half-century, child welfare systems have increasingly relied on quantitative risk assessment tools, such as actuarial or predictive risk tools. These tools are developed by performing statistical analysis of how attributes captured in administrative data are related to future child maltreatment. Some scholars argue that attributes in administrative data can serve as proxies for race and that quantitative risk assessment tools reify racial bias in decision-making. Others argue that these tools provide more “objective” and “scientific” guides for decision-making instead of subjective social worker judgment. This study performs a systematic review of the literature on the impact of quantitative risk assessment tools on racial disproportionality; it examines methodological biases in work on this topic, summarizes key findings, and provides suggestions for further work. A search of CINAHL, PsychInfo, Proquest Social Science Premium Collection, and the ProQuest Dissertations and Theses Collection was performed. Academic and grey literature were included. The review includes studies that use quasi-experimental methods and development, validation, or re-validation studies of quantitative risk assessment tools. PROBAST (Prediction model Risk of Bias Assessment Tool) and CHARMS (CHecklist for critical Appraisal and data extraction for systematic Reviews of prediction Modelling Studies) were used to assess the risk of bias and guide data extraction for risk development, validation, or re-validation studies. ROBINS-I (Risk of Bias in Non-Randomized Studies of Interventions) was used to assess for bias and guide data extraction for the quasi-experimental studies identified. Due to heterogeneity among papers, a meta-analysis was not feasible, and a narrative synthesis was conducted. 11 papers met the eligibility criteria, and each has an overall high risk of bias based on the PROBAST and ROBINS-I assessments. This is deeply concerning, as major policy decisions have been made based on a limited number of studies with a high risk of bias. The findings on racial disproportionality have been mixed and depend on the tool and approach used. Authors use various definitions for racial equity, fairness, or disproportionality. These concepts of statistical fairness are connected to theories about the reason for racial disproportionality in child welfare or social definitions of fairness that are usually not stated explicitly. Most findings from these studies are unreliable, given the high degree of bias. However, some of the less biased measures within studies suggest that quantitative risk assessment tools may worsen racial disproportionality, depending on how disproportionality is mathematically defined. Authors vary widely in their approach to defining and addressing racial disproportionality within studies, making it difficult to generalize findings or approaches across studies. This review demonstrates the power of authors to shape policy or discourse around racial justice based on their choice of statistical methods; it also demonstrates the need for improved rigor and transparency in studies of quantitative risk assessment tools. Finally, this review raises concerns about the impact that these tools have on child welfare systems and racial disproportionality.Keywords: actuarial risk, child welfare, predictive risk, racial disproportionality
Procedia PDF Downloads 5429180 A Brave New World of Privacy: Empirical Insights into the Metaverse’s Personalization Dynamics
Authors: Cheng Xu
Abstract:
As the metaverse emerges as a dynamic virtual simulacrum of reality, its implications on user privacy have become a focal point of interest. While previous discussions have ventured into metaverse privacy dynamics, a glaring empirical gap persists, especially concerning the effects of personalization in the context of news recommendation services. This study stands at the forefront of addressing this void, meticulously examining how users' privacy concerns shift within the metaverse's personalization context. Through a pre-registered randomized controlled experiment, participants engaged in a personalization task across both the metaverse and traditional online platforms. Upon completion of this task, a comprehensive news recommendation service provider offers personalized news recommendations to the users. Our empirical findings reveal that the metaverse inherently amplifies privacy concerns compared to traditional settings. However, these concerns are notably mitigated when users have a say in shaping the algorithms that drive these recommendations. This pioneering research not only fills a significant knowledge gap but also offers crucial insights for metaverse developers and policymakers, emphasizing the nuanced role of user input in shaping algorithm-driven privacy perceptions.Keywords: metaverse, privacy concerns, personalization, digital interaction, algorithmic recommendations
Procedia PDF Downloads 11729179 Design for Sentiment-ancy: Conceptual Framework to Improve User’s Well-being Through Fostering Emotional Attachment in the Use Experience with Their Assistive Devices
Authors: Seba Quqandi
Abstract:
This study investigates the bond that people form using their assistive devices and the tactics applied during the product design process to help improve the user experience leading to a long-term product relationship. The aim is to develop a conceptual framework with which to describe and analyze the bond people form with their assistive devices and to integrate human emotions as a factor during the development of the product design process. The focus will be on the assistive technology market, namely, the Aid-For-Daily-Living market for situational impairments, to increase the quality of wellbeing. Findings will help us better understand the real issues of the product experience concerning people’s interaction throughout the product performance, establish awareness of the emotional effects in the daily interaction that fosters the product attachment, and help product developers and future designers create a connection between users and their assistive devices. The research concludes by discussing the implications of these findings for professionals and academics in the form of experiments in order to identify new areas that can stimulate new /or developed design directions.Keywords: experience design, interaction design, emotion, design psychology, assistive tools, customization, userentred design
Procedia PDF Downloads 23229178 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking
Authors: Handie Pramana Putra, Ani Dijah Rahajoe
Abstract:
The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.Keywords: database, data analysis, DPNE, extended data flow, e-commerce
Procedia PDF Downloads 5729177 Deep Learning for Recommender System: Principles, Methods and Evaluation
Authors: Basiliyos Tilahun Betru, Charles Awono Onana, Bernabe Batchakui
Abstract:
Recommender systems have become increasingly popular in recent years, and are utilized in numerous areas. Nowadays many web services provide several information for users and recommender systems have been developed as critical element of these web applications to predict choice of preference and provide significant recommendations. With the help of the advantage of deep learning in modeling different types of data and due to the dynamic change of user preference, building a deep model can better understand users demand and further improve quality of recommendation. In this paper, deep neural network models for recommender system are evaluated. Most of deep neural network models in recommender system focus on the classical collaborative filtering user-item setting. Deep learning models demonstrated high level features of complex data can be learned instead of using metadata which can significantly improve accuracy of recommendation. Even though deep learning poses a great impact in various areas, applying the model to a recommender system have not been fully exploited and still a lot of improvements can be done both in collaborative and content-based approach while considering different contextual factors.Keywords: big data, decision making, deep learning, recommender system
Procedia PDF Downloads 48029176 Qualitative and Quantitative Methods in Multidisciplinary Fields Collection Development
Authors: Hui Wang
Abstract:
Traditional collection building approaches are limited in breadth and scope and are not necessarily suitable for multidisciplinary fields development in the institutes of the Chinese Academy of Sciences. The increasing of multidisciplinary fields researches require a viable approach to collection development in these libraries. This study uses qualitative and quantitative analysis to assess collection. The quantitative analysis consists of three levels of evaluation, which including realistic demand, potential demand and trend demand analysis. For one institute, three samples were separately selected from the object institute, more than one international top institutes in highly relative research fields and future research hotspots. Each sample contains an appropriate number of papers published in recent five years. Several keywords and the organization names were reasonably combined to search in commercial databases and the institutional repositories. The publishing information and citations in the bibliographies of these papers were selected to build the dataset. One weighted evaluation model and citation analysis were used to calculate the demand intensity index of every journal and book. Principal Investigator selector and database traffic provide a qualitative evidence to describe the demand frequency. The demand intensity, demand frequency and academic committee recommendations were comprehensively considered to recommend collection development. The collection gaps or weaknesses were ascertained by comparing the current collection and the recommend collection. This approach was applied in more than 80 institutes’ libraries in Chinese Academy of Sciences in the past three years. The evaluation results provided an important evidence for collections building in the second year. The latest user survey results showed that the updated collection’s capacity to support research in a multidisciplinary subject area have increased significantly.Keywords: citation analysis, collection assessment, collection development, quantitative analysis
Procedia PDF Downloads 21929175 Mobile Application for Construction Sites Management
Authors: A. Khelifi, M. Al Kaabi, B. Al Rawashdeh
Abstract:
The infrastructure is one of the most important pillars of the UAE, where it spends millions of dollars for investments in the construction sectors. The research done by Kuwait Finance House (KFH) Research showed clearly that the UAE investments in the construction sectors have exceeded 30 billion dollars in 2013. There are many construction companies in the UAE and each one of them is taking the responsibilities to build different infrastructures. The large scale construction projects consist of multi human activities which can affect the efficiency and productivity of the running projects. The Construction Administration System is developed to increase the efficiency and productivity at the construction sites. It runs on two platforms: web server and mobile phone and supports two main users: mobile user and institution employee. With Construction Administration Mobile Application the user can manage and control several projects, create several reports and send these reports in Portable Document Format (PDF) formats through emails, view the physical location of each project, capturing and save photos. An institution employee can use the system to view all existing workers and projects, send emails and view the progress of each project.Keywords: construction sites, management, mobile application, Portable Document Format (PDF)
Procedia PDF Downloads 37529174 The Bioequivalent: A Medical Drug Search Tool Based on a Collaborative Database
Authors: Rosa L. Figueroa, Joselyn A. Hernández
Abstract:
During the last couple of years, the Ministry of Health have been developing new health policies in order to regulate and improve in benefit of the patient the pharmaceutical system in our country. However, there are still some deficiencies in how medicines have been accessed, distributed, and sold. Therefore, it is necessary to empower the patient by offering new instances to improve access to drug information. This work introduces ‘the bioequivalent’ a medical drug search tool created to increase both diffusion and getting information about the therapeutic equivalence of medicines for the patient. The development of the search tool started with a study on the availability of sources of drug information accessible to the patient where advantages and disadvantages were analyzed. The information obtained was used to feed the functional design of the new tool. The design of the new tool shows an external interface that includes a header, body, sidebar and footer. The header has a menu containing ‘Home,’ ‘Who we are,’ and ‘Mission and vision.’ The Body contains the medical drug search tool, and the Sidebar is for the user logging in. It could be anonym, registered user, as well as, administrator. Anonym user could only use the tool. Registered users could add some information on existing medicines in the database; however, adding information will be restricted and limited to specific items and subject to administrator approval because the information added must be endorsed by the Chilean Public Health Institute. On the other hand, the administrator will have all the privileges, including creating or deleting drugs or information about them. The Bioequivalent was tested on different mobile devices, and no fails have been found. Moreover, a small survey was answered by ten people who tested the tool, and all of them agree that the tool was useful to get information about bioequivalent drugs, and they would recommend the tool to others. Nevertheless, an 80% of people who tested the tool says it was easy to use, and a 70% indicates that additional help is not required. These results are evidence that ‘the Bioequivalent’ may contribute to the knowledge about the therapeutic bioequivalence and bioequivalent drugs existing in Chile. As future work, the tool will be developed to make it available to the public for a first testing stage in a more massive scenario.Keywords: collaborative database, bioequivalent drugs, search tool, web platform
Procedia PDF Downloads 23529173 Method to Assessing Aspect of Sustainable Development-Walkability
Authors: Amna Ali Nasser Al-Saadi, Riken Homma, Kazuhisa Iki
Abstract:
Need to generate objective communication between researchers, Practitioners and policy makers are top concern of sustainability. Despite the fact that many places have successes in achieving some aspects of sustainable urban development, there are no scientific facts to convince policy makers in the rest of the world to apply their guides and manuals. This is because each of them was developed to fulfill the need of specific city. The question is, how to learn the lesson from each case study? And how distinguish between the potential criteria and negative one? And how quantify their effects in the future development? Walkability has been found as a solution to achieve healthy life style as well as social, environmental and economic sustainability. Moreover, it is complicated as every aspect of sustainable development. This research is stand on quantitative- comparative methodology in order to assess pedestrian oriented development. Three Analyzed Areas (AAs) were selected. One site is located in Oman in which hypotheses as motorized oriented development, while two sites are in Japan where the development is pedestrian friendly. The study used Multi-Criteria Evaluation Method (MCEM). Initially, MCEM stands on Analytic Hierarchy Process (AHP). The later was structured into main goal (walkability), objectives (functions and layout) and attributes (the urban form criteria). Secondly, the GIS were used to evaluate the attributes in multi-criteria maps. Since each criterion has different scale of measurement, all results were standardized by z-score and used to measure the co-relations among cr iteria. Different scenario was generated from each AA. After that, MCEM (AHP- OWA) based on GIS measured the walkability score and determined the priority of criteria development in the non-walker friendly environment. As results, the comparison criteria for z-score presented a measurable distinguished orientation of development. This result has been used to prove that Oman is motorized environment while Japan is walkable. Also, it defined the powerful criteria and week criteria regardless to the AA. This result has been used to generalize the priority for walkable development.Keywords: walkability, sustainable development, multi- criteria evaluation method, gis
Procedia PDF Downloads 45329172 Scheduling Residential Daily Energy Consumption Using Bi-criteria Optimization Methods
Authors: Li-hsing Shih, Tzu-hsun Yen
Abstract:
Because of the long-term commitment to net zero carbon emission, utility companies include more renewable energy supply, which generates electricity with time and weather restrictions. This leads to time-of-use electricity pricing to reflect the actual cost of energy supply. From an end-user point of view, better residential energy management is needed to incorporate the time-of-use prices and assist end users in scheduling their daily use of electricity. This study uses bi-criteria optimization methods to schedule daily energy consumption by minimizing the electricity cost and maximizing the comfort of end users. Different from most previous research, this study schedules users’ activities rather than household appliances to have better measures of users’ comfort/satisfaction. The relation between each activity and the use of different appliances could be defined by users. The comfort level is at the highest when the time and duration of an activity completely meet the user’s expectation, and the comfort level decreases when the time and duration do not meet expectations. A questionnaire survey was conducted to collect data for establishing regression models that describe users’ comfort levels when the execution time and duration of activities are different from user expectations. Six regression models representing the comfort levels for six types of activities were established using the responses to the questionnaire survey. A computer program is developed to evaluate electricity cost and the comfort level for each feasible schedule and then find the non-dominated schedules. The Epsilon constraint method is used to find the optimal schedule out of the non-dominated schedules. A hypothetical case is presented to demonstrate the effectiveness of the proposed approach and the computer program. Using the program, users can obtain the optimal schedule of daily energy consumption by inputting the intended time and duration of activities and the given time-of-use electricity prices.Keywords: bi-criteria optimization, energy consumption, time-of-use price, scheduling
Procedia PDF Downloads 6029171 Identifying Mitigation Plans in Reducing Usability Risk Using Delphi Method
Authors: Jayaletchumi T. Sambantha Moorthy, Suhaimi bin Ibrahim, Mohd Naz’ri Mahrin
Abstract:
Most quality models have defined usability as a significant factor that leads to improving product acceptability, increasing user satisfaction, improving product reliability, and also financially benefiting companies. Usability is also the best factor that acts as a balance for both the technical and human aspects of a software product, which is an important aspect in defining quality during software development process. A usability risk can be defined as a potential usability risk factor that a chosen action or activity may lead to a possible loss or an undesirable outcome. This could impact the usability of a software product thereby contributing to negative user experiences and causing a possible software product failure. Hence, it is important to mitigate and reduce usability risks in the software development process itself. By managing possible involved usability risks in software development process, failure of software product could be reduced. Therefore, this research uses the Delphi method to identify mitigation plans to reduce potential usability risks. The Delphi method is conducted with seven experts from the field of risk management and software development.Keywords: usability, usability risk, risk management, risk mitigation, delphi study
Procedia PDF Downloads 46729170 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress
Authors: Kavitha Thamadharan, Nurazean Maarop
Abstract:
The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology
Procedia PDF Downloads 46029169 Analysis Model for the Relationship of Users, Products, and Stores on Online Marketplace Based on Distributed Representation
Authors: Ke He, Wumaier Parezhati, Haruka Yamashita
Abstract:
Recently, online marketplaces in the e-commerce industry, such as Rakuten and Alibaba, have become some of the most popular online marketplaces in Asia. In these shopping websites, consumers can select purchase products from a large number of stores. Additionally, consumers of the e-commerce site have to register their name, age, gender, and other information in advance, to access their registered account. Therefore, establishing a method for analyzing consumer preferences from both the store and the product side is required. This study uses the Doc2Vec method, which has been studied in the field of natural language processing. Doc2Vec has been used in many cases to analyze the extraction of semantic relationships between documents (represented as consumers) and words (represented as products) in the field of document classification. This concept is applicable to represent the relationship between users and items; however, the problem is that one more factor (i.e., shops) needs to be considered in Doc2Vec. More precisely, a method for analyzing the relationship between consumers, stores, and products is required. The purpose of our study is to combine the analysis of the Doc2vec model for users and shops, and for users and items in the same feature space. This method enables the calculation of similar shops and items for each user. In this study, we derive the real data analysis accumulated in the online marketplace and demonstrate the efficiency of the proposal.Keywords: Doc2Vec, online marketplace, marketing, recommendation systems
Procedia PDF Downloads 11229168 Failure to Replicate the Unconscious Thought Advantages
Authors: Vladimíra Čavojová, Eva Ballová Mikušková
Abstract:
In this study we tried to replicate the unconscious thought advantage (UTA), which states that complex decisions are better handled by unconscious thinking. We designed an experiment in e-prime using similar material as the original study (choosing between four different apartments, each described by 12 attributes). A total of 73 participants (52 women (71.2%); 18 to 62 age: M=24.63; SD=8.7) took part in the experiment. We did not replicate the results suggested by UTT. However, from the present study we cannot conclude whether this was the case of flaws in the theory or flaws in our experiment and we discuss several ways in which the issue of UTA could be examined further.Keywords: decision making, unconscious thoughts, UTT, complex decisions
Procedia PDF Downloads 30829167 A Unified Approach for Naval Telecommunication Architectures
Authors: Y. Lacroix, J.-F. Malbranque
Abstract:
We present a chronological evolution for naval telecommunication networks. We distinguish periods: with or without multiplexers, with switch systems, with federative systems, with medium switching, and with medium switching with wireless networks. This highlights the introduction of new layers and technology in the architecture. These architectures are presented using layer models of transmission, in a unified way, which enables us to integrate pre-existing models. A ship of a naval fleet has internal communications (i.e. applications' networks of the edge) and external communications (i.e. the use of the means of transmission between edges). We propose architectures, deduced from the layer model, which are the point of convergence between the networks on board and the HF, UHF radio, and satellite resources. This modelling allows to consider end-to-end naval communications, and in a more global way, that is from the user on board towards the user on shore, including transmission and networks on the shore side. The new architectures need take care of quality of services for end-to-end communications, the more remote control develops a lot and will do so in the future. Naval telecommunications will be more and more complex and will use more and more advanced technologies, it will thus be necessary to establish clear global communication schemes to grant consistency of the architectures. Our latest model has been implemented in a military naval situation, and serves as the basic architecture for the RIFAN2 network.Keywords: equilibrium beach profile, eastern tombolo of Giens, potential function, erosion
Procedia PDF Downloads 292