Search results for: mobile crowdsensing
375 An Evaluation of Kahoot Application and Its Environment as a Learning Tool
Authors: Muhammad Yasir Babar, Ebrahim Panah
Abstract:
Over the past 20 years, internet has seen continual advancement and with the advent of online technology, various types of web-based games have been developed. Games are frequently being used among different age groups from baby boomers to generation Z. Games are not only used for entertainment but also utilized as a learning approach transmitting education to a level that is more interesting and effective for students. One of the popular web-based education games is Kahoot with growing popularity and usage, which is being used in different fields of studies. However, little knowledge is available on university students’ perception of Kahoot environment and application for learning subjects. Hence, the objective of the current study is to investigate students’ perceptions of Kahoot application and environment as a learning tool. The study employed a survey approach by distributing Google Forms –created questionnaire, with high level of reliability index, to 62 students (11 males and 51 females). The findings show that students have positive attitudes towards Kahoot application and its environment for learning. Regarding Kahoot application, it was indicated that activities created using Kahoot are more interesting for students, Kahoot is useful for collaborative learning, and Kahoot enhances interest in learning lesson. In terms of Kahoot environment, it was found that using this application through mobile is easy for students, its design is simple and useful, Kahoot-created activities can easily be shared, and the application can easily be used on any platform. The findings of the study have implications for instructors, policymakers and curriculum developers.Keywords: application, environment, Kahoot, learning tool
Procedia PDF Downloads 134374 Characterization of Penicillin V Acid and Its Related Compounds by HPLC
Authors: Bahdja Guerfi, N. Hadhoum, I. Azouz, M. Bendoumia, S. Bouafia, F. Z. Hadjadj Aoul
Abstract:
Background: 'Penicillin V' is a narrow, bactericidal antibiotic of the beta-lactam family of the naturally occurring penicillin group. It is limited to infections due to the germs defined as sensitive. The objective of this work was to identify and to characterize Penicillin V acid and its related compounds by High-performance liquid chromatography (HPLC). Methods: Firstly phenoxymethylpenicillin was identified by an infrared absorption. The organoleptic characteristics, pH, and determination of water content were also studied. The dosage of Penicillin V acid active substance and the determination of its related compounds were carried on waters HPLC, equipped with a UV detector at 254 nm and Discovery HS C18 column (250 mm X 4.6 mm X 5 µm) which is maintained at room temperature. The flow rate was about 1 ml per min. A mixture of water, acetonitrile and acetic acid (65:35:01) was used as mobile phase for phenoxyacetic acid ‘impurity B' and a mixture of water, acetonitrile and acetic acid (650:150:5.75) for the assay and 4-hydroxypenicillin V 'impurity D'. Results: The identification of Penicillin V acid active substance and the evaluation of its chemical quality showed conformity with USP 35th edition. The Penicillin V acid content in the raw material is equal to 1692.22 UI/mg. The percentage content of phenoxyacetic acid and 4-hydroxypenicillin V was respectively: 0.035% and 0.323%. Conclusion: Through these results, we can conclude that the Penicillin V acid active substance tested is of good physicochemical quality.Keywords: characterization, HPLC, Penicillin V acid, related substances
Procedia PDF Downloads 278373 A Machine Learning Pipeline for Real-Time Activity Detection on Low Computational Power Devices for Metaverse Applications
Authors: Amit Kumar, Amanpreet Chander, Ashish Sahani
Abstract:
This paper presents our recent work on real-time human activity detection based on the media pipe pipeline and machine learning algorithms. The proposed system can detect human activities, including running, jumping, squatting, bending to the left or right, and standing still. This is a robust solution for developing a yoga, dance, metaverse, and fitness application that checks for the correction of the pose without having any additional monitor like a personal trainer. MediaPipe solution offers an open-source cross-platform which utilizes a two-step detector-tracker ML pipeline for live detection of key landmarks on our body which can be used for motion data collection. The prediction of real-time poses uses a variety of machine learning techniques and different types of analysis. Without primarily relying on powerful desktop environments for inference, our method achieves real-time performance on the majority of contemporary mobile phones, desktops/laptops, Python, or even the web. Experimental results show that our method outperforms the existing method in terms of accuracy and real-time capability, achieving an accuracy of 99.92% on testing datasets.Keywords: human activity detection, media pipe, machine learning, metaverse applications
Procedia PDF Downloads 179372 Reliability and Validity for Measurement of Body Composition: A Field Method
Authors: Ahmad Hashim, Zarizi Ab Rahman
Abstract:
Measurement of body composition via a field method has the most popular instruments which are used to estimate the percentage of body fat. Among the instruments used are the Body Mass Index, Bio Impedance Analysis and Skinfold Test. All three of these instruments do not involve high costs, do not require high technical skills, are mobile, save time, and are suitable for use in large populations. Because all three instruments can estimate the percentage of body fat, but it is important to identify the most appropriate instruments and have high reliability. Hence, this study was conducted to determine the reliability and convergent validity of the instruments. A total of 40 students, males and females aged between 13 and 14 years participated in this study. The study found that the test retest and Pearson correlation coefficient of reliability for the three instruments is very high, r = .99. While the inter class reliability also are at high level with r = .99 for Body Mass Index and Bio Impedance Analysis, r = .96 for Skin fold test. Intra class reliability coefficient for these three instruments is too high for Body Mass Index r = .99, Bio Impedance Analysis r = .97, and Skin fold Test r = .90. However, Standard Error of Measurement value for all three instruments indicates the Body Mass Index is the most appropriate instrument with a mean value of .000672 compared with other instruments. The findings show that the Body Mass Index is an instrument which is the most accurate and reliable in estimating body fat percentage for the population studied.Keywords: reliability, validity, body mass index, bio impedance analysis and skinfold test
Procedia PDF Downloads 336371 Banking and Accounting Analysis Researches Effect on Environment and Income
Authors: Gerges Samaan Henin Abdalla
Abstract:
Ultra-secured methods of banking services have been introduced to the customer, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. Consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 46370 Player Experience: A Research on Cross-Platform Supported Games
Authors: Salih Akkemik
Abstract:
User Experience has a characterized perspective based on two fundamentals: the usage process and the product. Digital games can be considered as a special interactive system. This system has a very specific purpose and this is to make the player feel good while playing. At this point, Player Experience (PX) and User Experience (UX) are similar. UX focuses on the user feels good, PX focuses on the player feels good. The most important difference between the two is the action taken. These are actions of using and playing. In this study, the player experience will be examined primarily. PX may differ on different platforms. Nowadays, companies are releasing the successful and high-income games that they have developed with cross-platform support. Cross-platform is the most common expression that an application can run on different operating systems, in other words, be developed to support different operating systems. In terms of digital games, cross-platform support means that a game can be played on a computer, console or mobile device environment, more specifically, the game developed is designed and programmed to be played in the same way on at least two different platforms, such as Windows, MacOS, Linux, iOS, Android, Orbis OS or Xbox OS. Different platforms also accommodate different player groups, profiles and preferences. This study aims to examine these different player profiles in terms of player experience and to determine the effects of cross-platform support on player experience.Keywords: cross-platform, digital games, player experience, user experience
Procedia PDF Downloads 206369 A Review on Using Executive Function to Understand the Limited Efficacy of Weight-Loss Interventions
Authors: H. Soltani, Kevin Laugero
Abstract:
Obesity is becoming an increasingly critical issue in the United States due to the steady and substantial increase in prevalence over the last 30 years. Existing interventions have been able to help participants achieve short-term weight loss, but have failed to show long-term results. The complex nature of behavioral change remains one of the most difficult barriers in promoting sustainable weight-loss in overweight individuals. Research suggests that the 'intention-behavior gap' can be explained by a person’s ability to regulate higher-order thinking, or Executive Function (EF). A review of 63 research articles was completed in fall of 2017 to identify the role of EF in regulating eating behavior and to identify whether there is a potential for improving dietary quality by enhancing EF. Results showed that poor EF is positively associated with obesogenic behavior, namely increased consumption of highly palatable foods, eating in the absence of hunger, high saturated fat intake and low fruit and vegetable consumption. Recent research has indicated that interventions targeting an improvement in EF can be successful in helping promote healthy behaviors. Furthermore, interventions of longer duration have a more lasting and versatile effect on weight loss and maintenance. This may present an opportunity for the increasingly ubiquitous use of mobile application technology.Keywords: eating behavior, executive function, nutrition, obesity, weight-loss
Procedia PDF Downloads 165368 Numerical Investigation of Supertall Buildings and Using Aerodynamic Characteristics to Create New Wind Power Sources
Authors: Mohammad A. Masoumi, Mohammad Zare, Soroush Sabouki
Abstract:
This study investigates the aerodynamic characteristics of supertall buildings to evaluate wind turbine installation at high altitudes. Most recent studies have investigated supertall buildings at a horizontal plane, while a vertical plan could be as important, especially to install wind turbines. A typical square-plan building with a height of 500 m is investigated numerically at horizontal and vertical plans to evaluate wind power generation potentials. The results show good agreement with experimental data and past studies. Then four new geometries are proposed to improvise regions at high altitudes to install wind turbines. Evaluating the simulations shows two regions with high power density, which have the possibility to install wind turbines. Results show that improvised regions to install wind turbines at high altitudes contain significant power density while higher power density is found behind buildings in a far distance. In addition, power density fluctuations behind buildings are investigated, which show decreasing fluctuations by reaching 50 m altitude while altitudes lower than 20 m have the most fluctuations.Keywords: wind power, supertall building, power density, aerodynamic characteristics, wind turbine mobile, quality assurance, testing, applications
Procedia PDF Downloads 168367 Vision-Based Collision Avoidance for Unmanned Aerial Vehicles by Recurrent Neural Networks
Authors: Yao-Hong Tsai
Abstract:
Due to the sensor technology, video surveillance has become the main way for security control in every big city in the world. Surveillance is usually used by governments for intelligence gathering, the prevention of crime, the protection of a process, person, group or object, or the investigation of crime. Many surveillance systems based on computer vision technology have been developed in recent years. Moving target tracking is the most common task for Unmanned Aerial Vehicle (UAV) to find and track objects of interest in mobile aerial surveillance for civilian applications. The paper is focused on vision-based collision avoidance for UAVs by recurrent neural networks. First, images from cameras on UAV were fused based on deep convolutional neural network. Then, a recurrent neural network was constructed to obtain high-level image features for object tracking and extracting low-level image features for noise reducing. The system distributed the calculation of the whole system to local and cloud platform to efficiently perform object detection, tracking and collision avoidance based on multiple UAVs. The experiments on several challenging datasets showed that the proposed algorithm outperforms the state-of-the-art methods.Keywords: unmanned aerial vehicle, object tracking, deep learning, collision avoidance
Procedia PDF Downloads 160366 Survival and Growth Factors of Korean Start-Ups: Focusing on the Industrial Characteristics
Authors: Hanei Son
Abstract:
Since the beginning of the 2010s, ‘start-up boom’ has continued with the creation of many new enterprises in Korea. Such tendency was led by various changes in society such as emergence and diffusion of smartphones. Especially, the Korean government has been interested in start-ups and entrepreneurship as an alternative engine for Korea's economic growth. With strong support from the government, as a result, many new enterprises have been established for recent years and the Korean government seems to have achieved its goal: expanding the basis of start-ups. However, it is unclear which factors affect the survival and growth of these new enterprises after their creation. Therefore, this study aims to identify which start-ups from early 2010s survived and which factors influenced their survival and growth. The study will strongly focus on which industries the new enterprises were in, as environmental elements are expected to be critical factors for business of start-ups in Korean context. For this purpose, 105 companies which were introduced as high potential start-ups from 2010 to 2012 were considered in the analysis. According to their current status, dead or alive, the start-ups were categorized by their industries and service area. Through this analysis, it was observed that many start-ups that are still in business are in internet or mobile platform businesses and four major sectors. In each group, a representative case has been studied to reveal its survival and growth factors. The results point to the importance of industrial characteristics for the survival and success of Korean startups and offer political implications in which sector and business more potentials for start-ups in Korea lie in.Keywords: government support for start-ups, industrial characteristics, Korean start-ups, survival of start-ups
Procedia PDF Downloads 186365 Assessment and Prediction of Vehicular Emissions in Commonwealth Avenue, Quezon City at Various Policy and Technology Scenarios Using Simple Interactive Model (SIM-Air)
Authors: Ria M. Caramoan, Analiza P. Rollon, Karl N. Vergel
Abstract:
The Simple Interactive Models for Better Air Quality (SIM-air) is an integrated approach model that allows the available information to support the integrated urban air quality management. This study utilized the vehicular air pollution information system module of SIM-air for the assessment of vehicular emissions in Commonwealth Avenue, Quezon City, Philippines. The main objective of the study is to assess and predict the contribution of different types of vehicles to the vehicular emissions in terms of PM₁₀, SOₓ, and NOₓ at different policy and technology scenarios. For the base year 2017, the results show vehicular emissions of 735.46 tons of PM₁₀, 108.90 tons of SOₓ, and 2,101.11 tons of NOₓ. Motorcycle is the major source of particulates contributing about 52% of the PM₁₀ emissions. Meanwhile, Public Utility Jeepneys contribute 27% of SOₓ emissions and private cars using gasoline contribute 39% of NOₓ emissions. Ambient air quality monitoring was also conducted in the study area for the standard parameters of PM₁₀, S0₂, and NO₂. Results show an average of 88.11 µg/Ncm, 47.41 µg/Ncm and 22.54 µg/Ncm for PM₁₀, N0₂, and SO₂, respectively, all were within the DENR National Ambient Air Quality Guideline Values. Future emissions of PM₁₀, NOₓ, and SOₓ are estimated at different scenarios. Results show that in the year 2030, PM₁₀ emissions will be increased by 186.2%. NOₓ emissions and SOₓ emissions will also be increased by 38.9% and 5.5%, without the implementation of the scenarios.Keywords: ambient air quality, emissions inventory, mobile air pollution, vehicular emissions
Procedia PDF Downloads 138364 Mobility-Aware Relay Selection in Two Hop Unmanned Aerial Vehicles Network
Authors: Tayyaba Hussain, Sobia Jangsher, Saqib Ali, Saqib Ejaz
Abstract:
Unmanned Aerial vehicles (UAV’s) have gained great popularity due to their remoteness, ease of deployment and high maneuverability in different applications like real-time surveillance, image capturing, weather atmospheric studies, disaster site monitoring and mapping. These applications can involve a real-time communication with the ground station. However, altitude and mobility possess a few challenges for the communication. UAV’s at high altitude usually require more transmit power. One possible solution can be with the use of multi hops (UAV’s acting as relays) and exploiting the mobility pattern of the UAV’s. In this paper, we studied a relay (UAV’s acting as relays) selection for a reliable transmission to a destination UAV. We exploit the mobility information of the UAV’s to propose a Mobility-Aware Relay Selection (MARS) algorithm with the objective of giving improved data rates. The results are compared with Non Mobility-Aware relay selection scheme and optimal values. Numerical results show that our proposed MARS algorithm gives 6% better achievable data rates for the mobile UAV’s as compared with Non MobilityAware relay selection scheme. On average a decrease of 20.2% in data rate is achieved with MARS as compared with SDP solver in Yalmip.Keywords: mobility aware, relay selection, time division multiple acess, unmanned aerial vehicle
Procedia PDF Downloads 238363 Population Stereotype Production, User Factors, and Icon Design for Underserved Communities of Rural India
Authors: Avijit Sengupta, Klarissa Ting Ting Cheng, Maffee Peng-Hui Wan
Abstract:
This study investigates the influence of user factors and referent characteristics on representation types generated using the stereotype production method for designing icons. Sixty-eight participants of farming communities were asked to draw images based on sixteen feature referents. Significant statistical differences were found between the types of representations generated for contextual and context-independent referents. Strong correlations were observed between years of formal education and total number of abstract representations produced for both contextual and context-independent referents. However, representation characteristics were not influenced by other user factors such as participants’ experience with mobile phone and years of farming experience. A statistically significant tendency of making concrete representations was observed for both contextual and context-independent referents. These findings provide insights on community members’ involvement in icon design and suggest a consolidated icon design strategy based on population stereotype, particularly for under-served rural communities of India.Keywords: abstract representation, concrete representation, participatory design, population stereotype
Procedia PDF Downloads 375362 Trace Analysis of Genotoxic Impurity Pyridine in Sitagliptin Drug Material Using UHPLC-MS
Authors: Bashar Al-Sabti, Jehad Harbali
Abstract:
Background: Pyridine is a reactive base that might be used in preparing sitagliptin. International Agency for Research on Cancer classifies pyridine in group 2B; this classification means that pyridine is possibly carcinogenic to humans. Therefore, pyridine should be monitored at the allowed limit in sitagliptin pharmaceutical ingredients. Objective: The aim of this study was to develop a novel ultra high performance liquid chromatography mass spectrometry (UHPLC-MS) method to estimate the quantity of pyridine impurity in sitagliptin pharmaceutical ingredients. Methods: The separation was performed on C8 shim-pack (150 mm X 4.6 mm, 5 µm) in reversed phase mode using a mobile phase of water-methanol-acetonitrile containing 4 mM ammonium acetate in gradient mode. Pyridine was detected by mass spectrometer using selected ionization monitoring mode at m/z = 80. The flow rate of the method was 0.75 mL/min. Results: The method showed excellent sensitivity with a quantitation limit of 1.5 ppm of pyridine relative to sitagliptin. The linearity of the method was excellent at the range of 1.5-22.5 ppm with a correlation coefficient of 0.9996. Recoveries values were between 93.59-103.55%. Conclusions: The results showed good linearity, precision, accuracy, sensitivity, selectivity, and robustness. The studied method was applied to test three batches of sitagliptin raw materials. Highlights: This method is useful for monitoring pyridine in sitagliptin during its synthesis and testing sitagliptin raw materials before using them in the production of pharmaceutical products.Keywords: genotoxic impurity, pyridine, sitagliptin, UHPLC -MS
Procedia PDF Downloads 95361 Advanced Driver Assistance System: Veibra
Authors: C. Fernanda da S. Sampaio, M. Gabriela Sadith Perez Paredes, V. Antonio de O. Martins
Abstract:
Today the transport sector is undergoing a revolution, with the rise of Advanced Driver Assistance Systems (ADAS), industry and society itself will undergo a major transformation. However, the technological development of these applications is a challenge that requires new techniques and great machine learning and artificial intelligence. The study proposes to develop a vehicular perception system called Veibra, which consists of two front cameras for day/night viewing and an embedded device capable of working with Yolov2 image processing algorithms with low computational cost. The strategic version for the market is to assist the driver on the road with the detection of day/night objects, such as road signs, pedestrians, and animals that will be viewed through the screen of the phone or tablet through an application. The system has the ability to perform real-time driver detection and recognition to identify muscle movements and pupils to determine if the driver is tired or inattentive, analyzing the student's characteristic change and following the subtle movements of the whole face and issuing alerts through beta waves to ensure the concentration and attention of the driver. The system will also be able to perform tracking and monitoring through GSM (Global System for Mobile Communications) technology and the cameras installed in the vehicle.Keywords: advanced driver assistance systems, tracking, traffic signal detection, vehicle perception system
Procedia PDF Downloads 155360 A Lightweight Pretrained Encrypted Traffic Classification Method with Squeeze-and-Excitation Block and Sharpness-Aware Optimization
Authors: Zhiyan Meng, Dan Liu, Jintao Meng
Abstract:
Dependable encrypted traffic classification is crucial for improving cybersecurity and handling the growing amount of data. Large language models have shown that learning from large datasets can be effective, making pre-trained methods for encrypted traffic classification popular. However, attention-based pre-trained methods face two main issues: their large neural parameters are not suitable for low-computation environments like mobile devices and real-time applications, and they often overfit by getting stuck in local minima. To address these issues, we developed a lightweight transformer model, which reduces the computational parameters through lightweight vocabulary construction and Squeeze-and-Excitation Block. We use sharpness-aware optimization to avoid local minima during pre-training and capture temporal features with relative positional embeddings. Our approach keeps the model's classification accuracy high for downstream tasks. We conducted experiments on four datasets -USTC-TFC2016, VPN 2016, Tor 2016, and CICIOT 2022. Even with fewer than 18 million parameters, our method achieves classification results similar to methods with ten times as many parameters.Keywords: sharpness-aware optimization, encrypted traffic classification, squeeze-and-excitation block, pretrained model
Procedia PDF Downloads 30359 Automated Testing to Detect Instance Data Loss in Android Applications
Authors: Anusha Konduru, Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai
Abstract:
Mobile applications are increasing in a significant amount, each to address the requirements of many users. However, the quick developments and enhancements are resulting in many underlying defects. Android apps create and handle a large variety of 'instance' data that has to persist across runs, such as the current navigation route, workout results, antivirus settings, or game state. Due to the nature of Android, an app can be paused, sent into the background, or killed at any time. If the instance data is not saved and restored between runs, in addition to data loss, partially-saved or corrupted data can crash the app upon resume or restart. However, it is difficult for the programmer to manually test this issue for all the activities. This results in the issue of data loss that the data entered by the user are not saved when there is any interruption. This issue can degrade user experience because the user needs to reenter the information each time there is an interruption. Automated testing to detect such data loss is important to improve the user experience. This research proposes a tool, DroidDL, a data loss detector for Android, which detects the instance data loss from a given android application. We have tested 395 applications and found 12 applications with the issue of data loss. This approach is proved highly accurate and reliable to find the apps with this defect, which can be used by android developers to avoid such errors.Keywords: Android, automated testing, activity, data loss
Procedia PDF Downloads 237358 Autonomic Sonar Sensor Fault Manager for Mobile Robots
Authors: Martin Doran, Roy Sterritt, George Wilkie
Abstract:
NASA, ESA, and NSSC space agencies have plans to put planetary rovers on Mars in 2020. For these future planetary rovers to succeed, they will heavily depend on sensors to detect obstacles. This will also become of vital importance in the future, if rovers become less dependent on commands received from earth-based control and more dependent on self-configuration and self-decision making. These planetary rovers will face harsh environments and the possibility of hardware failure is high, as seen in missions from the past. In this paper, we focus on using Autonomic principles where self-healing, self-optimization, and self-adaption are explored using the MAPE-K model and expanding this model to encapsulate the attributes such as Awareness, Analysis, and Adjustment (AAA-3). In the experimentation, a Pioneer P3-DX research robot is used to simulate a planetary rover. The sonar sensors on the P3-DX robot are used to simulate the sensors on a planetary rover (even though in reality, sonar sensors cannot operate in a vacuum). Experiments using the P3-DX robot focus on how our software system can be adapted with the loss of sonar sensor functionality. The autonomic manager system is responsible for the decision making on how to make use of remaining ‘enabled’ sonars sensors to compensate for those sonar sensors that are ‘disabled’. The key to this research is that the robot can still detect objects even with reduced sonar sensor capability.Keywords: autonomic, self-adaption, self-healing, self-optimization
Procedia PDF Downloads 350357 Autonomous Kuka Youbot Navigation Based on Machine Learning and Path Planning
Authors: Carlos Gordon, Patricio Encalada, Henry Lema, Diego Leon, Dennis Chicaiza
Abstract:
The following work presents a proposal of autonomous navigation of mobile robots implemented in an omnidirectional robot Kuka Youbot. We have been able to perform the integration of robotic operative system (ROS) and machine learning algorithms. ROS mainly provides two distributions; ROS hydro and ROS Kinect. ROS hydro allows managing the nodes of odometry, kinematics, and path planning with statistical and probabilistic, global and local algorithms based on Adaptive Monte Carlo Localization (AMCL) and Dijkstra. Meanwhile, ROS Kinect is responsible for the detection block of dynamic objects which can be in the points of the planned trajectory obstructing the path of Kuka Youbot. The detection is managed by artificial vision module under a trained neural network based on the single shot multibox detector system (SSD), where the main dynamic objects for detection are human beings and domestic animals among other objects. When the objects are detected, the system modifies the trajectory or wait for the decision of the dynamic obstacle. Finally, the obstacles are skipped from the planned trajectory, and the Kuka Youbot can reach its goal thanks to the machine learning algorithms.Keywords: autonomous navigation, machine learning, path planning, robotic operative system, open source computer vision library
Procedia PDF Downloads 177356 True Single SKU Script: Applying the Automated Test to Set Software Properties in a Global Software Development Environment
Authors: Antonio Brigido, Maria Meireles, Francisco Barros, Gaspar Mota, Fernanda Terra, Lidia Melo, Marcelo Reis, Camilo Souza
Abstract:
As the globalization of the software process advances, companies are increasingly committed to improving software development technologies across multiple locations. On the other hand, working with teams distributed in different locations also raises new challenges. In this sense, automated processes can help to improve the quality of process execution. Therefore, this work presents the development of a tool called TSS Script that automates the sample preparation process for carrier requirements validation tests. The objective of the work is to obtain significant gains in execution time and reducing errors in scenario preparation. To estimate the gains over time, the executions performed in an automated and manual way were timed. In addition, a questionnaire-based survey was developed to discover new requirements and improvements to include in this automated support. The results show an average gain of 46.67% of the total hours worked, referring to sample preparation. The use of the tool avoids human errors, and for this reason, it adds greater quality and speed to the process. Another relevant factor is the fact that the tester can perform other activities in parallel with sample preparation.Keywords: Android, GSD, automated testing tool, mobile products
Procedia PDF Downloads 317355 The Use of Eye Tracking in Evaluating the Success of Golfers in Putting
Authors: Klára Gajdošíková
Abstract:
The aim of this study was to examine the quiet eye method and its components using the mobile eye tracking device. Quiet eye training was proven to be beneficial for different sports, including golf. The main idea of this method is to prolong your fixations on a specific place in order to improve your performance. The shot examined in this study is called putt. Its importance is based on its role on a golf course because, many times, it is the last putt that decides whether you win or lose. Quiet eye training helps players be more focused under pressure, control their attention and overall improve their putting success. Six highly skilled golfers with a handicap ranging from - 4 to + 4, aged 23 to 26, participated in a pilot study with the usage of an eye-tracking device. The study took place in an indoor training area at the golf club Hostivař. Crosstabs showed significant differences between individuals' laterality and their gaze into AOI - areas of interest (middle part of the ball, top of the ball, bottom of the ball, back side of the ball). Statistically significant differences were also discovered between the mean fixation duration of participants with AOI on the middle part of the ball and all other AOIs. The results of this study helped us understand the examined phenomena and showed us the next aim in future quiet eye research. Future research should focus on examining a quiet eye on the golf course. Applying a quiet eye and therefore changing the way we concentrate might be beneficial for coaches and players themselves.Keywords: eye tracking, golf, laterality, quiet eye
Procedia PDF Downloads 112354 Design and Realization of Computer Network Security Perception Control System
Authors: El Miloudi Djelloul
Abstract:
Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)
Procedia PDF Downloads 446353 Comparison of Authentication Methods in Internet of Things Technology
Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud
Abstract:
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter. Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol
Procedia PDF Downloads 264352 Autonomous Taxiing Robot for Grid Resilience Enhancement in Green Airport
Authors: Adedayo Ajayi, Patrick Luk, Liyun Lao
Abstract:
This paper studies the supportive needs for the electrical infrastructure of the green airport. In particular, the core objective revolves around the choice of electric grid configuration required to meet the expected electrified loads, i.e., the taxiing and charging loads of hybrid /pure electric aircraft in the airport. Further, reliability and resilience are critical aspects of a newly proposed grid; the concept of mobile energy storage as energy as a service (EAAS) for grid support in the proposed green airport is investigated using an autonomous electric taxiing robot (A-ETR) at a case study (Cranfield Airport). The performance of the model is verified and validated through DigSILENT power factory simulation software to compare the networks in terms of power quality, short circuit fault levels, system voltage profile, and power losses. Contingency and reliability index analysis are further carried out to show the potential of EAAS on the grid. The results demonstrate that the low voltage a.c network ( LVAC) architecture gives better performance with adequate compensation than the low voltage d.c (LVDC) microgrid architecture for future green airport electrification integration. And A-ETR can deliver energy as a service (EaaS) to improve the airport's electrical power system resilience and energy supply.Keywords: reliability, voltage profile, flightpath 2050, green airport
Procedia PDF Downloads 82351 Traffic Forecasting for Open Radio Access Networks Virtualized Network Functions in 5G Networks
Authors: Khalid Ali, Manar Jammal
Abstract:
In order to meet the stringent latency and reliability requirements of the upcoming 5G networks, Open Radio Access Networks (O-RAN) have been proposed. The virtualization of O-RAN has allowed it to be treated as a Network Function Virtualization (NFV) architecture, while its components are considered Virtualized Network Functions (VNFs). Hence, intelligent Machine Learning (ML) based solutions can be utilized to apply different resource management and allocation techniques on O-RAN. However, intelligently allocating resources for O-RAN VNFs can prove challenging due to the dynamicity of traffic in mobile networks. Network providers need to dynamically scale the allocated resources in response to the incoming traffic. Elastically allocating resources can provide a higher level of flexibility in the network in addition to reducing the OPerational EXpenditure (OPEX) and increasing the resources utilization. Most of the existing elastic solutions are reactive in nature, despite the fact that proactive approaches are more agile since they scale instances ahead of time by predicting the incoming traffic. In this work, we propose and evaluate traffic forecasting models based on the ML algorithm. The algorithms aim at predicting future O-RAN traffic by using previous traffic data. Detailed analysis of the traffic data was carried out to validate the quality and applicability of the traffic dataset. Hence, two ML models were proposed and evaluated based on their prediction capabilities.Keywords: O-RAN, traffic forecasting, NFV, ARIMA, LSTM, elasticity
Procedia PDF Downloads 226350 Prevalence and the Results of the Czech Nationwide Survey and Personality Traits of Adolescence Playing Computer Games
Authors: Jaroslava Sucha, Martin Dolejs, Helena Pipova, Panajotis Cakirpaloglu
Abstract:
The paper introduces the research project which is focused on evaluating the level of pathological relation towards computer or video games playing (including any games played by using a screen such as a mobile or a tablet). The study involves representative sample of the Czech adolescents between ages 11 and 19. This poster presents the psychometric indicators of the new psychologic assessment method (mean, standard deviation, reliability, validity) which will be able to detect an acceptable level of games’ playing and at the same time will detect and describe the level of gaming which might be potentially risky. The prevalence of risky computer game playing at Czech adolescents in age 11 to 19 will be mentioned. The research study also aims to describe the personality profile of the problematic players with respect to the digital games. The research area will encompass risky behaviour, aggression, the level of self-esteem, impulsivity, anxiety and depression. The contribution will introduce a new test method for the assessment of pathological playing computer games. The research will give the first screening information of playing computer games in the Czech Republic by adolescents between 11-19 years. The results clarify what relationship exists between playing computer games and selected personality characteristics (it will describe personality of the gamer, who is in the category of ‘pathological playing computer games’).Keywords: adolescence, computer games, personality traits, risk behaviour
Procedia PDF Downloads 239349 Determining the Functionality of Urban Wildlife with Large Megafauna: A Case Study from Chobe District, Northern Botswana
Authors: Tempe S. F. Adams, Michael J. Chase, Tracey L. Rogers, Keith E. A. Leggett
Abstract:
Transfrontier wildlife corridors can be successful conservation tools, connecting protected areas and reducing the impact of habitat fragmentation on mobile species. Urban wildlife corridors have been proposed as a potential mitigation tool to facilitate the passage of elephants through towns without causing conflict with urban communities. However, because such corridors are typically narrow and close to human development, wildlife (particularly large mammals) may be less likely to use them. We used remote-sensor camera traps and global positioning system collars to identify the movement patterns of African elephants Loxondonta africana through narrow, urban corridors in Botswana. The corridors were in three types of human-dominated land-use designations with varying levels of human activity: agricultural, industrial and open space recreational land. We found that elephants used the corridors within all three land-use designations and we identified, using a model selection approach, that season, time of day and rainfall were important factors in determining the presence of elephants in the corridors. Elephants moved more slowly through the narrow corridors compared with their movement patterns through broader, wide-ranging corridors. Our results indicate that urban wildlife corridors are useful for facilitating elephants to pass through urban areas.Keywords: camera traps, conservation, human-elephant coexistence, land management, urban wildlife corridors
Procedia PDF Downloads 305348 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service
Authors: Mabrouka Algherinai, Fatma Karkouri
Abstract:
Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.Keywords: SMS, RSA, McEliece, RABIN
Procedia PDF Downloads 163347 Mental Health and Technology: Evidence Review
Authors: Kylie Henderson
Abstract:
Adapting mental health interventions is important when providing support to those experiencing difficulties. This analysis aimed to explore and evaluate the effectiveness of various forms of mental health interventions. Literature that has analysed face-to-face (F2F), phone (Telehealth), mobile (mHealth) and online (e-interventions) interferences found all interventions were effective in reducing and treating symptoms of mental health disorders. F2F and Telehealth interventions facilitated greater engagement and client satisfaction. Due to accessibility and privacy, mHealth and e-interventions were the preferred methods of engagement with health services for youth and young adults. Regardless, these interventions still identified several barriers of high dropout, low adherence, and lack of awareness. Additionally, a large proportion of interventions lacked evidence-based foundations. Exploration of interventions that utilise a variety of interfaces, as well as incorporated evidence-based literature and clinician experience, show that they benefit those experiencing mental health difficulties. Applications like YourHealth+ provide a combination of interventions (F2F, mHealth, and e-interventions) to improve the wellbeing of job seekers and employment consults. Individuals that have used the application in conjunction with therapy have reported feeling more empowered and demonstrated improved wellbeing. Practitioners have also described improved confidence in their ability to provide support to clients. Therefore, it can be proposed that utilising a variety of interventions as well as incorporating literature and experience is beneficial to those experiencing mental health difficulties and to health practitioners.Keywords: face-to-face, e-interventions, mHealth, YourHealth+
Procedia PDF Downloads 138346 Proposed Framework based on Classification of Vertical Handover Decision Strategies in Heterogeneous Wireless Networks
Authors: Shidrokh Goudarzi, Wan Haslina Hassan
Abstract:
Heterogeneous wireless networks are converging towards an all-IP network as part of the so-called next-generation network. In this paradigm, different access technologies need to be interconnected; thus, vertical handovers or vertical handoffs are necessary for seamless mobility. In this paper, we conduct a review of existing vertical handover decision-making mechanisms that aim to provide ubiquitous connectivity to mobile users. To offer a systematic comparison, we categorize these vertical handover measurement and decision structures based on their respective methodology and parameters. Subsequently, we analyze several vertical handover approaches in the literature and compare them according to their advantages and weaknesses. The paper compares the algorithms based on the network selection methods, complexity of the technologies used and efficiency in order to introduce our vertical handover decision framework. We find that vertical handovers on heterogeneous wireless networks suffer from the lack of a standard and efficient method to satisfy both user and network quality of service requirements at different levels including architectural, decision-making and protocols. Also, the consolidation of network terminal, cross-layer information, multi packet casting and intelligent network selection algorithm appears to be an optimum solution for achieving seamless service continuity in order to facilitate seamless connectivity.Keywords: heterogeneous wireless networks, vertical handovers, vertical handover metric, decision-making algorithms
Procedia PDF Downloads 393