Search results for: mobile edge computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3352

Search results for: mobile edge computing

2392 Mobile Learning and Student Engagement in English Language Teaching: The Case of First-Year Undergraduate Students at Ecole Normal Superieur, Algeria

Authors: I. Tiahi

Abstract:

The aim of the current paper is to explore educational practices in contemporary Algeria. Researches explain such practices bear traditional approach and the overlooks modern teaching methods such as mobile learning. That is why the research output of examining student engagement in respect of mobile learning was obtained from the following objectives: (1) To evaluate the current practice of English language teaching within Algerian higher education institutions, (2) To explore how social constructivism theory and m-learning help students’ engagement in the classroom and (3) To explore the feasibility and acceptability of m-learning amongst institutional leaders. The methodology underpins a case study and action research. For the case study, the researcher engaged with 6 teachers, 4 institutional leaders, and 30 students subjected for semi-structured interviews and classroom observations to explore the current teaching methods for English as a foreign language. For the action research, the researcher applied an intervention course to investigate the possibility and implications for future implementation of mobile learning in higher education institutions. The results were deployed using thematic analysis. The research outcome showed that the disengagement of students in English language learning has many aspects. As seen from the interviews from the teachers, the researcher found that they do not have enough resources except for using ppt for some teacher. According to them, the teaching method they are using is mostly communicative and competency-based approach. Teachers informed that students are disengaged because they have psychological barriers. In classroom setting, the students are conscious about social approval from the peer, and thus if they are to face negative reinforcement which would damage their image, it is seen as a preventive mechanism to be scared of committing mistakes. This was also very reflective in this finding. A lot of other arguments can be given for this claim; however, in Algerian setting, it is usual practice where teachers do not provide positive reinforcement which is open up students for possible learning. Thus, in order to overcome such a psychological barrier, proper measures can be taken. On a conclusive remark, it is evident that teachers, students, and institutional leaders provided positive feedback for using mobile learning. It is not only motivating but also engaging in learning processes. Apps such as Kahoot, Padlet and Slido were well received and thus can be taken further to examine its higher impact in Algerian context. Thus, in the future, it will be important to implement m-learning effectively in higher education to transform the current traditional practices into modern, innovative and active learning. Persuasion for this change for stakeholder may be challenging; however, its long-term benefits can be reflective from the current research paper.

Keywords: Algerian context, mobile learning, social constructivism, student engagement

Procedia PDF Downloads 143
2391 Emerging Technology for Business Intelligence Applications

Authors: Hsien-Tsen Wang

Abstract:

Business Intelligence (BI) has long helped organizations make informed decisions based on data-driven insights and gain competitive advantages in the marketplace. In the past two decades, businesses witnessed not only the dramatically increasing volume and heterogeneity of business data but also the emergence of new technologies, such as Artificial Intelligence (AI), Semantic Web (SW), Cloud Computing, and Big Data. It is plausible that the convergence of these technologies would bring more value out of business data by establishing linked data frameworks and connecting in ways that enable advanced analytics and improved data utilization. In this paper, we first review and summarize current BI applications and methodology. Emerging technologies that can be integrated into BI applications are then discussed. Finally, we conclude with a proposed synergy framework that aims at achieving a more flexible, scalable, and intelligent BI solution.

Keywords: business intelligence, artificial intelligence, semantic web, big data, cloud computing

Procedia PDF Downloads 101
2390 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 333
2389 Investigation of Long-Term Thermal Insulation Performance of Vacuum Insulation Panels with Various Enveloping Methods

Authors: Inseok Yeo, Tae-Ho Song

Abstract:

To practically apply vacuum insulation panels (VIPs) to buildings or home appliances, VIPs have demanded long-term lifespan with outstanding insulation performance. Service lives of VIPs enveloped with Al-foil and three-layer Al-metallized envelope are calculated. For Al-foil envelope, the service life is longer but edge conduction is too large compared with the Al metallized envelope. To increase service life even more, the proposed double enveloping method and metal-barrier-added enveloping method are further analyzed. The service lives of the VIP to employ two enveloping methods are calculated. Also, pressure increase and thermal insulation performance characteristics are investigated. For the metal- barrier-added enveloping method, effective thermal conductivity increase with time is close to that of Al-foil envelope, especially, for getter-inserted VIPs. For the double enveloping method, if water vapor is perfectly adsorbed, the effect of service life enhancement becomes much greater. From these methods, the VIP can be guaranteed for the service life of more than 20 years.

Keywords: vacuum insulation panels, service life, double enveloping, metal-barrier-added enveloping, edge conduction

Procedia PDF Downloads 437
2388 When Mobile Work Creates More Discrimination

Authors: Marie-Therese Claes, Anett Hermann

Abstract:

With the advent of the web and information technology since the end of the 20ᵗʰ century, digitalization has revolutionized our everyday life, from shopping and dating to education and transportation. The world of work is one of the areas that has been highly transformed by changing the time and spatial limits of the work. The expansion of the internet, wireless, and easily portable devices such as laptop computers and mobile phones has enabled us to work almost from any place at any time. As a result, telework, which started in the 1950s and elevated in the 1970s, steeply raised to a new level in 21ˢᵗ century. Telework consists of various forms of work done from outside the traditional workplace by using information technologies. The social distancing and lockdown measures that have been taken to reduce the spread of the virus in many countries worldwide resulted in an increasing number of teleworkers and made “working from home’’ synonymous with telework. Post-COVID-19, the number of teleworkers is still higher than before the pandemic period, and the interest in expanding teleworking has been growing too. Notwithstanding the advantages ushered by telework, it also has a number of drawbacks that negatively affect organizations and employees. The intention of this piece of work is not to indicate a causational relationship between telework and discrimination. Our aim is to indicate some unintended and/or unnoticed deleterious effects of telework in reinforcing discrimination and to instigate discussion on how to mitigate the effects. To do so, this insight indicates how telework reinforces traditional gender roles and how organizational culture towards telework and its access to employees at different levels of the organizational hierarchy opens the room for discrimination.

Keywords: mobile work, discrimination, gender roles, organizational culture

Procedia PDF Downloads 72
2387 Simulation Approach for a Comparison of Linked Cluster Algorithm and Clusterhead Size Algorithm in Ad Hoc Networks

Authors: Ameen Jameel Alawneh

Abstract:

A Mobile ad-hoc network (MANET) is a collection of wireless mobile hosts that dynamically form a temporary network without the aid of a system administrator. It has neither fixed infrastructure nor wireless ad hoc sessions. It inherently reaches several nodes with a single transmission, and each node functions as both a host and a router. The network maybe represented as a set of clusters each managed by clusterhead. The cluster size is not fixed and it depends on the movement of nodes. We proposed a clusterhead size algorithm (CHSize). This clustering algorithm can be used by several routing algorithms for ad hoc networks. An elected clusterhead is assigned for communication with all other clusters. Analysis and simulation of the algorithm has been implemented using GloMoSim networks simulator, MATLAB and MAPL11 proved that the proposed algorithm achieves the goals.

Keywords: simulation, MANET, Ad-hoc, cluster head size, linked cluster algorithm, loss and dropped packets

Procedia PDF Downloads 399
2386 Mobile Based Long Range Weather Prediction System for the Farmers of Rural Areas of Pakistan

Authors: Zeeshan Muzammal, Usama Latif, Fouzia Younas, Syed Muhammad Hassan, Samia Razaq

Abstract:

Unexpected rainfall has always been an issue in the lifetime of crops and brings destruction for the farmers who harvest them. Unfortunately, Pakistan is one of the countries in which untimely rain impacts badly on crops like wash out of seeds and pesticides etc. Pakistan’s GDP is related to agriculture, especially in rural areas farmers sometimes quit farming because leverage of huge loss to their crops. Through our surveys and research, we came to know that farmers in the rural areas of Pakistan need rain information to avoid damages to their crops from rain. We developed a prototype using ICTs to inform the farmers about rain one week in advance. Our proposed solution has two ways of informing the farmers. In first we send daily messages about weekly prediction and also designed a helpline where they can call us to ask about possibility of rain.

Keywords: ICTD, farmers, mobile based, Pakistan, rural areas, weather prediction

Procedia PDF Downloads 578
2385 Accurate Cortical Reconstruction in Narrow Sulci with Zero-Non-Zero Distance (ZNZD) Vector Field

Authors: Somojit Saha, Rohit K. Chatterjee, Sarit K. Das, Avijit Kar

Abstract:

A new force field is designed for propagation of the parametric contour into deep narrow cortical fold in the application of knowledge based reconstruction of cerebral cortex from MR image of brain. Designing of this force field is highly inspired by the Generalized Gradient Vector Flow (GGVF) model and markedly differs in manipulation of image information in order to determine the direction of propagation of the contour. While GGVF uses edge map as its main driving force, the newly designed force field uses the map of distance between zero valued pixels and their nearest non-zero valued pixel as its main driving force. Hence, it is called Zero-Non-Zero Distance (ZNZD) force field. The objective of this force field is forceful propagation of the contour beyond spurious convergence due to partial volume effect (PVE) in to narrow sulcal fold. Being function of the corresponding non-zero pixel value, the force field has got an inherent property to determine spuriousness of the edge automatically. It is effectively applied along with some morphological processing in the application of cortical reconstruction to breach the hindrance of PVE in narrow sulci where conventional GGVF fails.

Keywords: deformable model, external force field, partial volume effect, cortical reconstruction, MR image of brain

Procedia PDF Downloads 399
2384 Succinct Perspective on the Implications of Intellectual Property Rights and 3rd Generation Partnership Project in the Rapidly Evolving Telecommunication Industry

Authors: Arnesh Vijay

Abstract:

Ever since its early introduction in the late 1980s, the mobile industry has been rapidly evolving with each passing year. The development witnessed is not just in its ability to support diverse applications, but also its extension into diverse technological means to access and offer various services to users. Amongst the various technologies present, radio systems have clearly emerged as a strong contender, due to its fine attributes of accessibility, reachability, interactiveness, and cost efficiency. These advancements have no doubt guaranteed unprecedented ease, utility and sophistication to the cell phone users, but caused uncertainty due to the interdependence of various systems, making it extremely complicated to exactly map concepts on to 3GPP (3rd Generation Partnership Project) standards. Although the close interrelation and interdependence of intellectual property rights and mobile standard specifications have been widely acknowledged by the technical and legal community; there, however, is a requirement for clear distinction between the scope and future-proof of inventions to influence standards and its market place adoptability. For this, collaborative work is required between intellectual property professionals, researchers, standardization specialists and country specific legal experts. With the evolution into next generation mobile technology, i.e., to 5G systems, there is a need for further work to be done in this field, which has been felt now more than ever before. Based on these lines, this poster will briefly describe the importance of intellectual property rights in the European market. More specifically, will analyse the role played by intellectual property in various standardization institutes, such as 3GPP (3rd generation partnership project) and ITU (International Telecommunications Union). The main intention: to ensure the scope and purpose is well defined, and concerned parties on all four sides are well informed on the clear significance of good proposals which not only bring economic revenue to the company but those that are capable of improving the technology and offer better services to mankind. The poster will comprise different sections. The first segment begins with a background on the rapidly evolving mobile technology, with a brief insight on the industrial impact of standards and its relation to intellectual property rights. Next, section two will succinctly outline the interplay between patents and standards; explicitly discussing the ever changing and rapidly evolving relationship between the two sectors. Then the remaining sections will examine ITU and its role played in international standards development, touching upon the various standardization process and the common patent policies and related guidelines. Finally, it proposes ways to improve the collaboration amongst various sectors for a more evolved and sophisticated next generation mobile telecommunication system. The sole purpose here is to discuss methods to reduce the gap and enhance the exchange of information between the two sectors to offer advanced technologies and services to mankind.

Keywords: mobile technology, mobile standards, intellectual property rights, 3GPP

Procedia PDF Downloads 129
2383 Low-Surface Roughness and High Optical Quality CdS Thin Film Deposited on Heated Substrate Using Room-Temperature Chemical Solution

Authors: A. Elsayed, M. H. Dewaidar, M. Ghali, M. Elkemary

Abstract:

The high production cost of the conventional solar cells requires the search for economic methods suitable for solar energy conversion. Cadmium Sulfide (CdS) is one of the most important semiconductors used in photovoltaics, especially in large area solar cells; and can be prepared in a thin film form by a wide variety of deposition techniques. The preparation techniques include vacuum evaporation, sputtering and molecular beam epitaxy. Other techniques, based on chemical solutions, are also used for depositing CdS films with dramatically low-cost compared to other vacuum-based methods. Although this technique is widely used during the last decades, due to simplicity and low-deposition temperature (~100°C), there is still a strong need for more information on the growth process and its relation with the quality of the deposited films. Here, we report on deposition of high-quality CdS thin films; with low-surface roughness ( < 3.0 nm) and sharp optical absorption edge; on low-temperature glass substrates (70°C) using a new method based on the room-temperature chemical solution. In this method, a mixture solution of cadmium acetate and thiourea at room temperature was used under special growth conditions for deposition of CdS films. X-ray diffraction (XRD) measurements were used to examine the crystal structure properties of the deposited CdS films. In addition, UV-VIS transmittance and low-temperature (4K) photoluminescence (PL) measurements were performed for quantifying optical properties of the deposited films. The deposited films show high optical quality as confirmed by observation of both, sharp edge in the transmittance spectra and strong PL intensity at room temperature. Furthermore, we found a strong effect of the growth conditions on the optical band gap of the deposited films; where remarkable red-shift in the absorption edge with temperature is clearly seen in both transmission and PL spectra. Such tuning of both optical band gap of the deposited CdS films can be utilized for tuning the electronic bands' alignments between CdS and other light-harvesting materials, like CuInGaSe or CdTe, for potential improvement in the efficiency of solar cells devices based on these heterostructures.

Keywords: chemical deposition, CdS, optical properties, surface, thin film

Procedia PDF Downloads 167
2382 A Hybrid MAC Protocol for Delay Constrained Mobile Wireless Sensor Networks

Authors: Hanefi Cinar, Musa Cibuk, Ismail Erturk, Fikri Aggun, Munip Geylani

Abstract:

Mobile Wireless Sensor Networks (MWSNs) carry heterogeneous data traffic with different urgency and quality of service (QoS) requirements. There are a lot of studies made on energy efficiency, bandwidth, and communication methods in literature. But delay, high throughput, utility parameters are not well considered. Increasing demand for real-time data transfer makes these parameters more important. In this paper we design new MAC protocol which is delay constrained and targets for improving delay, utility, and throughput performance of the network and finding solutions on collision and interference problems. Protocol improving QoS requirements by using TDMA, FDM, and OFDMA hybrid communication methods with multi-channel communication.

Keywords: MWSN, delay, hybrid MAC, TDMA, FDM, OFDMA

Procedia PDF Downloads 484
2381 Fast and Non-Invasive Patient-Specific Optimization of Left Ventricle Assist Device Implantation

Authors: Huidan Yu, Anurag Deb, Rou Chen, I-Wen Wang

Abstract:

The use of left ventricle assist devices (LVADs) in patients with heart failure has been a proven and effective therapy for patients with severe end-stage heart failure. Due to the limited availability of suitable donor hearts, LVADs will probably become the alternative solution for patient with heart failure in the near future. While the LVAD is being continuously improved toward enhanced performance, increased device durability, reduced size, a better understanding of implantation management becomes critical in order to achieve better long-term blood supplies and less post-surgical complications such as thrombi generation. Important issues related to the LVAD implantation include the location of outflow grafting (OG), the angle of the OG, the combination between LVAD and native heart pumping, uniform or pulsatile flow at OG, etc. We have hypothesized that an optimal implantation of LVAD is patient specific. To test this hypothesis, we employ a novel in-house computational modeling technique, named InVascular, to conduct a systematic evaluation of cardiac output at aortic arch together with other pertinent hemodynamic quantities for each patient under various implantation scenarios aiming to get an optimal implantation strategy. InVacular is a powerful computational modeling technique that integrates unified mesoscale modeling for both image segmentation and fluid dynamics with the cutting-edge GPU parallel computing. It first segments the aortic artery from patient’s CT image, then seamlessly feeds extracted morphology, together with the velocity wave from Echo Ultrasound image of the same patient, to the computation model to quantify 4-D (time+space) velocity and pressure fields. Using one NVIDIA Tesla K40 GPU card, InVascular completes a computation from CT image to 4-D hemodynamics within 30 minutes. Thus it has the great potential to conduct massive numerical simulation and analysis. The systematic evaluation for one patient includes three OG anastomosis (ascending aorta, descending thoracic aorta, and subclavian artery), three combinations of LVAD and native heart pumping (1:1, 1:2, and 1:3), three angles of OG anastomosis (inclined upward, perpendicular, and inclined downward), and two LVAD inflow conditions (uniform and pulsatile). The optimal LVAD implantation is suggested through a comprehensive analysis of the cardiac output and related hemodynamics from the simulations over the fifty-four scenarios. To confirm the hypothesis, 5 random patient cases will be evaluated.

Keywords: graphic processing unit (GPU) parallel computing, left ventricle assist device (LVAD), lumped-parameter model, patient-specific computational hemodynamics

Procedia PDF Downloads 140
2380 Application of WHO's Guideline to Evaluating Apps for Smoking Cessation

Authors: Suin Seo, Sung-Il Cho

Abstract:

Background: The use of mobile apps for smoking cessation has grown exponentially in recent years. Yet, there were limited researches which evaluated the quality of smoking cessation apps to our knowledge. In most cases, a clinical practice guideline which is focused on clinical physician was used as an evaluation tool. Objective: The objective of this study was to develop a user-centered measure for quality of mobile smoking cessation apps. Methods: A literature search was conducted to identify articles containing explicit smoking cessation guideline for smoker published until January 2018. WHO’s guide for tobacco users to quit was adopted for evaluation tool which assesses smoker-oriented contents of smoking cessation apps. Compared to the clinical practice guideline, WHO guideline was designed for smokers (non-specialist). On the basis of existing criteria which was developed based on 2008 clinical practice guideline for Treating Tobacco Use and Dependence, evaluation tool was modified and developed by an expert panel. Results: There were five broad categories of criteria that were identified including five objective quality scales: enhancing motivation, assistance with a planning and making quit attempts, preparation for relapse, self-efficacy, connection to smoking. Enhancing motivation and assistance with planning and making quit attempts were similar to contents of clinical practice guideline, but preparation for relapse, self-efficacy and connection to smoking (environment or habit which reminds of smoking) only existed on WHO guideline. WHO guideline had more user-centered elements than clinical guideline. Especially, self-efficacy is the most important determinant of behavior change in accordance with many health behavior change models. With the WHO guideline, it is now possible to analyze the content of the app in the light of a health participant, not a provider. Conclusion: The WHO guideline evaluation tool is a simple, reliable and smoker-centered tool for assessing the quality of mobile smoking cessation apps. It can also be used to provide a checklist for the development of new high-quality smoking cessation apps.

Keywords: smoking cessation, evaluation, mobile application, WHO, guideline

Procedia PDF Downloads 193
2379 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 340
2378 Effects of Ubiquitous 360° Learning Environment on Clinical Histotechnology Competence

Authors: Mari A. Virtanen, Elina Haavisto, Eeva Liikanen, Maria Kääriäinen

Abstract:

Rapid technological development and digitalization has affected also on higher education. During last twenty years multiple of electronic and mobile learning (e-learning, m-learning) platforms have been developed and have become prevalent in many universities and in the all fields of education. Ubiquitous learning (u-learning) is not that widely known or used. Ubiquitous learning environments (ULE) are the new era of computer-assisted learning. They are based on ubiquitous technology and computing that fuses the learner seamlessly into learning process by using sensing technology as tags, badges or barcodes and smart devices like smartphones and tablets. ULE combines real-life learning situations into virtual aspects and can be flexible used in anytime and anyplace. The aim of this study was to assess the effects of ubiquitous 360 o learning environment on higher education students’ clinical histotechnology competence. A quasi-experimental study design was used. 57 students in biomedical laboratory science degree program was assigned voluntarily to experiment (n=29) and to control group (n=28). Experimental group studied via ubiquitous 360o learning environment and control group via traditional web-based learning environment (WLE) in a 8-week educational intervention. Ubiquitous 360o learning environment (ULE) combined authentic learning environment (histotechnology laboratory), digital environment (virtual laboratory), virtual microscope, multimedia learning content, interactive communication tools, electronic library and quick response barcodes placed into authentic laboratory. Web-based learning environment contained equal content and components with the exception of the use of mobile device, interactive communication tools and quick response barcodes. Competence of clinical histotechnology was assessed by using knowledge test and self-report developed for this study. Data was collected electronically before and after clinical histotechnology course and analysed by using descriptive statistics. Differences among groups were identified by using Wilcoxon test and differences between groups by using Mann-Whitney U-test. Statistically significant differences among groups were identified in both groups (p<0.001). Competence scores in post-test were higher in both groups, than in pre-test. Differences between groups were very small and not statistically significant. In this study the learning environment have developed based on 360o technology and successfully implemented into higher education context. And students’ competence increases when ubiquitous learning environment were used. In the future, ULE can be used as a learning management system for any learning situation in health sciences. More studies are needed to show differences between ULE and WLE.

Keywords: competence, higher education, histotechnology, ubiquitous learning, u-learning, 360o

Procedia PDF Downloads 289
2377 D-Wave Quantum Computing Ising Model: A Case Study for Forecasting of Heat Waves

Authors: Dmytro Zubov, Francesco Volponi

Abstract:

In this paper, D-Wave quantum computing Ising model is used for the forecasting of positive extremes of daily mean air temperature. Forecast models are designed with two to five qubits, which represent 2-, 3-, 4-, and 5-day historical data respectively. Ising model’s real-valued weights and dimensionless coefficients are calculated using daily mean air temperatures from 119 places around the world, as well as sea level (Aburatsu, Japan). In comparison with current methods, this approach is better suited to predict heat wave values because it does not require the estimation of a probability distribution from scarce observations. Proposed forecast quantum computing algorithm is simulated based on traditional computer architecture and combinatorial optimization of Ising model parameters for the Ronald Reagan Washington National Airport dataset with 1-day lead-time on learning sample (1975-2010 yr). Analysis of the forecast accuracy (ratio of successful predictions to total number of predictions) on the validation sample (2011-2014 yr) shows that Ising model with three qubits has 100 % accuracy, which is quite significant as compared to other methods. However, number of identified heat waves is small (only one out of nineteen in this case). Other models with 2, 4, and 5 qubits have 20 %, 3.8 %, and 3.8 % accuracy respectively. Presented three-qubit forecast model is applied for prediction of heat waves at other five locations: Aurel Vlaicu, Romania – accuracy is 28.6 %; Bratislava, Slovakia – accuracy is 21.7 %; Brussels, Belgium – accuracy is 33.3 %; Sofia, Bulgaria – accuracy is 50 %; Akhisar, Turkey – accuracy is 21.4 %. These predictions are not ideal, but not zeros. They can be used independently or together with other predictions generated by different method(s). The loss of human life, as well as environmental, economic, and material damage, from extreme air temperatures could be reduced if some of heat waves are predicted. Even a small success rate implies a large socio-economic benefit.

Keywords: heat wave, D-wave, forecast, Ising model, quantum computing

Procedia PDF Downloads 505
2376 A Review of the Parameters Used in Gateway Selection Schemes for Internet Connected MANETs

Authors: Zainab S. Mahmood, Aisha H. Hashim, Wan Haslina Hassan, Farhat Anwar

Abstract:

The wide use of the internet-based applications bring many challenges to the researchers to guarantee the continuity of the connections needed by the mobile hosts and provide reliable Internet access for them. One of proposed solutions by Internet Engineering Task Force (IETF) is to connect the local, multi-hop, and infrastructure-less Mobile Ad hoc Network (MANET) with Internet structure. This connection is done through multi-interface devices known as Internet Gateways. Many issues are related to this connection like gateway discovery, hand off, address auto-configuration and selecting the optimum gateway when multiple gateways exist. Many studies were done proposing gateway selection schemes with a single selection criterion or weighted multiple criteria. In this research, a review of some of these schemes is done showing the differences, the features, the challenges and the drawbacks of each of them.

Keywords: Internet Gateway, MANET, mobility, selection criteria

Procedia PDF Downloads 426
2375 Investigating the Determinants and Growth of Financial Technology Depth of Penetration among the Heterogeneous Africa Economies

Authors: Tochukwu Timothy Okoli, Devi Datt Tewari

Abstract:

The high rate of Fintech adoption has not transmitted to greater financial inclusion and development in Africa. This problem is attributed to poor Fintech diversification and usefulness in the continent. This concept is referred to as the Fintech depth of penetration in this study. The study, therefore, assessed its determinants and growth process in a panel of three emergings, twenty-four frontiers and five fragile African economies disaggregated with dummies over the period 2004-2018 to allow for heterogeneity between groups. The System Generalized Method of Moments (GMM) technique reveals that the average depth of Mobile banking and automated teller machine (ATM) is a dynamic heterogeneity process. Moreover, users' previous experiences/compatibility, trial-ability/income, and financial development were the major factors that raise its usefulness, whereas perceived risk, financial openness, and inflation rate significantly limit its usefulness. The growth rate of Mobile banking, ATM, and Internet banking in 2018 is, on average 41.82, 0.4, and 20.8 per cent respectively greater than its average rates in 2004. These greater averages after the 2009 financial crisis suggest that countries resort to Fintech as a risk-mitigating tool. This study, therefore, recommends greater Fintech diversification through improved literacy, institutional development, financial liberalization, and continuous innovation.

Keywords: depth of fintech, emerging Africa, financial technology, internet banking, mobile banking

Procedia PDF Downloads 132
2374 Analyzing Large Scale Recurrent Event Data with a Divide-And-Conquer Approach

Authors: Jerry Q. Cheng

Abstract:

Currently, in analyzing large-scale recurrent event data, there are many challenges such as memory limitations, unscalable computing time, etc. In this research, a divide-and-conquer method is proposed using parametric frailty models. Specifically, the data is randomly divided into many subsets, and the maximum likelihood estimator from each individual data set is obtained. Then a weighted method is proposed to combine these individual estimators as the final estimator. It is shown that this divide-and-conquer estimator is asymptotically equivalent to the estimator based on the full data. Simulation studies are conducted to demonstrate the performance of this proposed method. This approach is applied to a large real dataset of repeated heart failure hospitalizations.

Keywords: big data analytics, divide-and-conquer, recurrent event data, statistical computing

Procedia PDF Downloads 172
2373 Design and Implementation of a Control System for a Walking Robot with Color Sensing and Line following Using PIC and ATMEL Microcontrollers

Authors: Ibraheem K. Ibraheem

Abstract:

The aim of this research is to design and implement line-tracking mobile robot. The robot must follow a line drawn on the floor with different color, avoids hitting moving object like another moving robot or walking people and achieves color sensing. The control system reacts by controlling each of the motors to keep the tracking sensor over the middle of the line. Proximity sensors used to avoid hitting moving objects that may pass in front of the robot. The programs have been written using micro c instructions, then converted into PIC16F887 ATmega48/88/168 microcontrollers counterparts. Practical simulations show that the walking robot accurately achieves line following action and exactly recognizes the colors and avoids any obstacle in front of it.

Keywords: color sensing, H-bridge, line following, mobile robot, PIC microcontroller, obstacle avoidance, phototransistor

Procedia PDF Downloads 402
2372 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors

Authors: Lok Yi Joyce Poon

Abstract:

China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.

Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay

Procedia PDF Downloads 395
2371 “BUM629” Special Hybrid Reinforcement Materials for Mega Structures

Authors: Gautam, Arjun, V. R. Sharma

Abstract:

In the civil construction steel and concrete plays a different role but the same purposes dealing with the design of structures that support or resist loads. Concrete has been used in construction since long time from now. Being brittle and weak in tension, concrete is always reinforced with steel bars for the purposes in beams and columns etc. The paper deals with idea of special designed 3D materials which we named as “BUM629” to be placed/anchored in the structural member and mixed with concrete later on, so as to resist the developments of cracks due to shear failure , buckling,tension and compressive load in concrete. It had cutting edge technology through Draft, Analysis and Design the “BUM629”. The results show that “BUM629” has the great results in Mechanical application. Its material properties are design according to the need of structure; we apply the material such as Mild Steel and Magnesium Alloy. “BUM629” are divided into two parts one is applied at the middle section of concrete member where bending movements are maximum and the second part is laying parallel to vertical bars near clear cover, so we design this material and apply in Reinforcement of Civil Structures. “BUM629” is analysis and design for use in the mega structures like skyscrapers, dams and bridges.

Keywords: BUM629, magnesium alloy, cutting edge technology, mechanical application, draft, analysis and design, mega structures

Procedia PDF Downloads 388
2370 Development of Stability Indicating Method and Characterization of Degradation Impurity of Nirmaltrelvir in Its Self-Emulsifying Drug Delivery System

Authors: Ravi Patel, Ravisinh Solanki, Dignesh Khunt

Abstract:

A stability-indicating reverse phase high performance liquid chromatography (RP-HPLC) method was developed and validated for estimating Nirmatrelvir in its self-emulsifying drug delivery system (SEDDS). The separation of Nirmatrelvir and its degradation products was accomplished by employing an Agilent Zorbax Eclipse plus C18 (250 mm x 4.6 mm, 5 µm) column, through which the mobile phase 5 mM phosphate buffer (pH 4.0) as mobile phase A and Acetonitrile as mobile phase B in a ratio of (40:60 % v/v) was pumped at a flow rate of 1.0 mL/min, through the HPLC system. Chromatographic separation and elution were monitored by a photo-diode array detector at 210 nm. Stress studies have been employed to evaluate this method's ability to indicate stability. Nirmatrelvir was exposed to several stress conditions, such as acid, alkali, oxidative, photolytic, and thermal degradations. Significant degradation was observed during acid and alkali hydrolysis, and the resulting degradation product was successfully separated from the Nirmatrelvir peak, preventing any interference. Furthermore, the primary degradant produced under alkali degradation conditions was identified using UPLC-ESI-TQ-MS/MS. The method was validated in accordance with the International Council on Harmonization (ICH) and found to be selective, precise, accurate, linear, and robust. The apparent permeability of Nirmatrelvir SEDDS was 4.20 ± 0.21×10-6 cm/sec, and the average proportion of free drug recovered was 0.5%. The method developed in this study was feasible and accurate for routine quality control evaluation of Nirmatrelvir SEDDS.

Keywords: Nirmatrelvir, SEDDS, degradation study, HPLC, LC-MS/MS

Procedia PDF Downloads 24
2369 Clustering Based and Centralized Routing Table Topology of Control Protocol in Mobile Wireless Sensor Networks

Authors: Mbida Mohamed, Ezzati Abdellah

Abstract:

A strong challenge in the wireless sensor networks (WSN) is to save the energy and have a long life time in the network without having a high rate of loss information. However, topology control (TC) protocols are designed in a way that the network is divided and having a standard system of exchange packets between nodes. In this article, we will propose a clustering based and centralized routing table protocol of TC (CBCRT) which delegates a leader node that will encapsulate a single routing table in every cluster nodes. Hence, if a node wants to send packets to the sink, it requests the information's routing table of the current cluster from the node leader in order to root the packet.

Keywords: mobile wireless sensor networks, routing, topology of control, protocols

Procedia PDF Downloads 278
2368 Smartphone Addiction and Reaction Time in Geriatric Population

Authors: Anjali N. Shete, G. D. Mahajan, Nanda Somwanshi

Abstract:

Context: Smartphones are the new generation of mobile phones; they have emerged over the last few years. Technology has developed so much that it has become part of our life and mobile phones are one of them. These smartphones are equipped with the capabilities to display photos, play games, watch videos and navigation, etc. The advances have a huge impact on many walks of life. The adoption of new technology has been challenging for the elderly. But, the elder population is also moving towards digitally connected lives. As age advances, there is a decline in the motor and cognitive functions of the brain, and hence the reaction time is affected. The study was undertaken to assess the usefulness of smartphones in improving cognitive functions. Aims and Objectives: The aim of the study was to observe the effects of smartphone addiction on reaction time in elderly population Material and Methods: This is an experimental study. 100 elderly subjects were enrolled in this study randomly from urban areas. They all were using smartphones for several hours a day. They were divided into two groups according to the scores of the mobile phone addiction scale (MPAS). Simple reaction time was estimated by the Ruler drop method. The reaction time was then calculated for each subject in both groups. The data were analyzed using mean, standard deviation, and Pearson correlation test. Results: The mean reaction time in Group A is 0.27+ 0.040 and in Group B is 0.20 + 0.032. The values show a statistically significant change in reaction time. Conclusion: Group A with a high MPAS score has a low reaction time compared to Group B with a low MPAS score. Hence, it can be concluded that the use of smartphones in the elderly is useful, delaying the neurological decline, and smarten the brain.

Keywords: smartphones, MPAS, reaction time, elderly population

Procedia PDF Downloads 182
2367 Surveying Adolescent Males in India Regarding Mobile Phone Use and Sexual and Reproductive Health Education

Authors: Rohan M. Dalal, Elena Pirondini, Shanu Somvanshi

Abstract:

Introduction: The current state of reproductive health outcomes in lower-income countries is poor, with inadequate knowledge and culture among adolescent boys. Moreover, boys have traditionally not been a priority target. To explore the opportunity to educate adolescent boys in the developing world regarding accurate reproductive health information, the purpose of this study is to investigate how adolescent boys in the developing world engage and use technology, utilizing cell phones. This electronic survey and video interview study were conducted to determine the feasibility of a mobile phone platform for an educational video game specifically designed for boys that will improve health knowledge, influence behavior, and change health outcomes, namely teen pregnancies. Methods: With the assistance of Plan India, a subsidiary of Plan International, informed consent was obtained from parents of adolescent males who participated in an electronic survey and video interviews via Microsoft Teams. An electronic survey was created with 27 questions, including topics of mobile phone usage, gaming preferences, and sexual and reproductive health, with a sample size of 181 adolescents, ages 11-25, near New Delhi, India. The interview questions were written to explore more in-depth topics after the completion of the electronic survey. Eight boys, aged 15, were interviewed for 40 minutes about gaming and usage of mobile phones as well as sexual and reproductive health. Data/Results. 154 boys and 27 girls completed the survey. They rated their English fluency as relatively high. 97% of boys (149/154) had access to mobile phones. The majority of phones were smartphones (97%, 143/148). 48% (71/149) of boys borrowed cell phones. The most popular phone platform was Samsung (22%, 33/148). 36% (54/148) of adolescent males looked at their phones 1-10 times per day for 1-2 hours. 55% (81/149) of the boys had parental restrictions. 51% (76/148) had 32 GB of storage on their phone. 78% (117/150) of the boys had wifi access. 80% (120/150) of respondents reported ease in downloading apps. 97% (145/150) of male adolescents had social media, including WhatsApp, Facebook, and YouTube. 58% (87/150) played video games. Favorite video games included Free Fire, PubG, and other shooting games. In the video interviews, the boys revealed what made games fun and engaging, including customized avatars, progression to higher levels, realistic interactive platforms, shooting/guns, the ability to perform multiple actions, and a variety of worlds/settings/adventures. Ideas to improve engagement in sexual and reproductive health classes included open discussions in the community, enhanced access to information, and posting on social media. Conclusion: This study involving an electronic survey and video interviews provides an initial foray into understanding mobile phone usage among adolescent males and understanding sexual and reproductive health education in New Delhi, India. The data gathered from this study support using mobile phone platforms, and this will be used to create a serious video game to educate adolescent males about sexual and reproductive health in an attempt to lower the rate of unwanted pregnancies in the world.

Keywords: adolescent males, India, mobile phone, sexual and reproductive health

Procedia PDF Downloads 135
2366 Towards a Resources Provisioning for Dynamic Workflows in the Cloud

Authors: Fairouz Fakhfakh, Hatem Hadj Kacem, Ahmed Hadj Kacem

Abstract:

Cloud computing offers a new model of service provisioning for workflow applications, thanks to its elasticity and its paying model. However, it presents various challenges that need to be addressed in order to be efficiently utilized. The resources provisioning problem for workflow applications has been widely studied. Nevertheless, the existing works did not consider the change in workflow instances while they are being executed. This functionality has become a major requirement to deal with unusual situations and evolution. This paper presents a first step towards the resources provisioning for a dynamic workflow. In fact, we propose a provisioning algorithm which minimizes the overall workflow execution cost, while meeting a deadline constraint. Then, we extend it to support the dynamic adding of tasks. Experimental results show that our proposed heuristic demonstrates a significant reduction in resources cost by using a consolidation process.

Keywords: cloud computing, resources provisioning, dynamic workflow, workflow applications

Procedia PDF Downloads 299
2365 Inclusion and Changes of a Research Criterion in the Institute for Quality and Accreditation of Computing, Engineering and Technology Accreditation Model

Authors: J. Daniel Sanchez Ruiz

Abstract:

The paper explains why and how a research criterion was included within an accreditation system for undergraduate engineering programs, in spite of not being a common practice of accreditation agencies at a global level. This paper is divided into three parts. The first presents the context and the motivations that led the Institute for Quality and Accreditation of Computing, Engineering and Technology Programs (ICACIT) to add a research criterion. The second describes the criterion adopted and the feedback received during 2017 accreditation cycle. The third, the author proposes changes to the accreditation criteria that respond in a pertinent way to the results-based accreditation model and the national context. The author seeks to reconcile an outcome based accreditation model, aligned with the established by the International Engineering Alliance, with the particular context of higher education in Peru.

Keywords: accreditation, engineering education, quality assurance, research

Procedia PDF Downloads 286
2364 Optimization of Topology-Aware Job Allocation on a High-Performance Computing Cluster by Neural Simulated Annealing

Authors: Zekang Lan, Yan Xu, Yingkun Huang, Dian Huang, Shengzhong Feng

Abstract:

Jobs on high-performance computing (HPC) clusters can suffer significant performance degradation due to inter-job network interference. Topology-aware job allocation problem (TJAP) is such a problem that decides how to dedicate nodes to specific applications to mitigate inter-job network interference. In this paper, we study the window-based TJAP on a fat-tree network aiming at minimizing the cost of communication hop, a defined inter-job interference metric. The window-based approach for scheduling repeats periodically, taking the jobs in the queue and solving an assignment problem that maps jobs to the available nodes. Two special allocation strategies are considered, i.e., static continuity assignment strategy (SCAS) and dynamic continuity assignment strategy (DCAS). For the SCAS, a 0-1 integer programming is developed. For the DCAS, an approach called neural simulated algorithm (NSA), which is an extension to simulated algorithm (SA) that learns a repair operator and employs them in a guided heuristic search, is proposed. The efficacy of NSA is demonstrated with a computational study against SA and SCIP. The results of numerical experiments indicate that both the model and algorithm proposed in this paper are effective.

Keywords: high-performance computing, job allocation, neural simulated annealing, topology-aware

Procedia PDF Downloads 123
2363 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 271