Search results for: concurrent users
1663 Business Intelligence Proposal to Improve Decision Making in Companies Using Google Cloud Platform and Microsoft Power BI
Authors: Joel Vilca Tarazona, Igor Aguilar-Alonso
Abstract:
The problem of this research related to business intelligence is the lack of a tool that supports automated and efficient financial analysis for decision-making and allows an evaluation of the financial statements, which is why the availability of the information is difficult. Relevant information to managers and users as an instrument in decision making financial, and administrative. For them, a business intelligence solution is proposed that will reduce information access time, personnel costs, and process automation, proposing a 4-layer architecture based on what was reviewed by the research methodology.Keywords: decision making, business intelligence, Google Cloud, Microsoft Power BI
Procedia PDF Downloads 981662 An Improved VM Allocation Algorithm by Utilizing Combined Resource Allocation Mechanism and Released Resources in Cloud Environment
Authors: Md Habibul Ansary, Chandan Garai, Ranjan Dasgupta
Abstract:
Utilization of resources is always a great challenge for any allocation problem, particularly when resource availability is dynamic in nature. In this work VM allocation mechanism has been augmented by providing resources in a combined manner. This approach has some inherent advantages in terms of reduction of wait state for the pending jobs of some users and better utilization of unused resources from the service providers’ point of view. Moreover the algorithm takes care of released resources from the finished jobs as soon as those become available. The proposed algorithm has been explained by suitable example to make the work complete.Keywords: Bid ratio, cloud service, virtualization, VM allocation problem
Procedia PDF Downloads 3931661 Book Recommendation Using Query Expansion and Information Retrieval Methods
Authors: Ritesh Kumar, Rajendra Pamula
Abstract:
In this paper, we present our contribution for book recommendation. In our experiment, we combine the results of Sequential Dependence Model (SDM) and exploitation of book information such as reviews, tags and ratings. This social information is assigned by users. For this, we used CLEF-2016 Social Book Search Track Suggestion task. Finally, our proposed method extensively evaluated on CLEF -2015 Social Book Search datasets, and has better performance (nDCG@10) compared to other state-of-the-art systems. Recently we got the good performance in CLEF-2016.Keywords: sequential dependence model, social information, social book search, query expansion
Procedia PDF Downloads 2861660 Investigating the Effect of Orthographic Transparency on Phonological Awareness in Bilingual Children with Dyslexia
Authors: Sruthi Raveendran
Abstract:
Developmental dyslexia, characterized by reading difficulties despite normal intelligence, presents a significant challenge for bilingual children navigating languages with varying degrees of orthographic transparency. This study bridges a critical gap in dyslexia interventions for bilingual populations in India by examining how consistency and predictability of letter-sound relationships in a writing system (orthographic transparency) influence the ability to understand and manipulate the building blocks of sound in language (phonological processing). The study employed a computerized visual rhyme-judgment task with concurrent EEG (electroencephalogram) recording. The task compared reaction times, accuracy of performance, and event-related potential (ERP) components (N170, N400, and LPC) for rhyming and non-rhyming stimuli in two orthographies: English (opaque orthography) and Kannada (transparent orthography). As hypothesized, the results revealed advantages in phonological processing tasks for transparent orthography (Kannada). Children with dyslexia were faster and more accurate when judging rhymes in Kannada compared to English. This suggests that a language with consistent letter-sound relationships (transparent orthography) facilitates processing, especially for tasks that involve manipulating sounds within words (rhyming). Furthermore, brain activity measured by event-related potentials (ERP) showed less effort required for processing words in Kannada, as reflected by smaller N170, N400, and LPC amplitudes. These findings highlight the crucial role of orthographic transparency in optimizing reading performance for bilingual children with dyslexia. These findings emphasize the need for language-specific intervention strategies that consider the unique linguistic characteristics of each language. While acknowledging the complexity of factors influencing dyslexia, this research contributes valuable insights into the impact of orthographic transparency on phonological awareness in bilingual children. This knowledge paves the way for developing tailored interventions that promote linguistic inclusivity and optimize literacy outcomes for children with dyslexia.Keywords: developmental dyslexia, phonological awareness, rhyme judgment, orthographic transparency, Kannada, English, N170, N400, LPC
Procedia PDF Downloads 61659 Mixed Integer Programming-Based One-Class Classification Method for Process Monitoring
Authors: Younghoon Kim, Seoung Bum Kim
Abstract:
One-class classification plays an important role in detecting outlier and abnormality from normal observations. In the previous research, several attempts were made to extend the scope of application of the one-class classification techniques to statistical process control problems. For most previous approaches, such as support vector data description (SVDD) control chart, the design of the control limits is commonly based on the assumption that the proportion of abnormal observations is approximately equal to an expected Type I error rate in Phase I process. Because of the limitation of the one-class classification techniques based on convex optimization, we cannot make the proportion of abnormal observations exactly equal to expected Type I error rate: controlling Type I error rate requires to optimize constraints with integer decision variables, but convex optimization cannot satisfy the requirement. This limitation would be undesirable in theoretical and practical perspective to construct effective control charts. In this work, to address the limitation of previous approaches, we propose the one-class classification algorithm based on the mixed integer programming technique, which can solve problems formulated with continuous and integer decision variables. The proposed method minimizes the radius of a spherically shaped boundary subject to the number of normal data to be equal to a constant value specified by users. By modifying this constant value, users can exactly control the proportion of normal data described by the spherically shaped boundary. Thus, the proportion of abnormal observations can be made theoretically equal to an expected Type I error rate in Phase I process. Moreover, analogous to SVDD, the boundary can be made to describe complex structures by using some kernel functions. New multivariate control chart applying the effectiveness of the algorithm is proposed. This chart uses a monitoring statistic to characterize the degree of being an abnormal point as obtained through the proposed one-class classification. The control limit of the proposed chart is established by the radius of the boundary. The usefulness of the proposed method was demonstrated through experiments with simulated and real process data from a thin film transistor-liquid crystal display.Keywords: control chart, mixed integer programming, one-class classification, support vector data description
Procedia PDF Downloads 1731658 Shape-Changing Structure: A Prototype for the Study of a Dynamic and Modular Structure
Authors: Annarita Zarrillo
Abstract:
This research is part of adaptive architecture, reflecting the evolution that the world of architectural design is going through. Today's architecture is no longer seen as a static system but, conversely, as a dynamic system that changes in response to the environment and the needs of users. One of the major forms of adaptivity is represented by kinetic structures. This study aims to underline the importance of experimentation on physical scale models for the study of dynamic structures and to present the case study of a modular kinetic structure designed through the use of parametric design software and created as a prototype in the laboratories of the Royal Danish Academy in Copenhagen.Keywords: adaptive architecture, architectural application, kinetic structures, modular prototype
Procedia PDF Downloads 1351657 SQL Generator Based on MVC Pattern
Authors: Chanchai Supaartagorn
Abstract:
Structured Query Language (SQL) is the standard de facto language to access and manipulate data in a relational database. Although SQL is a language that is simple and powerful, most novice users will have trouble with SQL syntax. Thus, we are presenting SQL generator tool which is capable of translating actions and displaying SQL commands and data sets simultaneously. The tool was developed based on Model-View-Controller (MVC) pattern. The MVC pattern is a widely used software design pattern that enforces the separation between the input, processing, and output of an application. Developers take full advantage of it to reduce the complexity in architectural design and to increase flexibility and reuse of code. In addition, we use White-Box testing for the code verification in the Model module.Keywords: MVC, relational database, SQL, White-Box testing
Procedia PDF Downloads 4181656 Linguistic Insights Improve Semantic Technology in Medical Research and Patient Self-Management Contexts
Authors: William Michael Short
Abstract:
Semantic Web’ technologies such as the Unified Medical Language System Metathesaurus, SNOMED-CT, and MeSH have been touted as transformational for the way users access online medical and health information, enabling both the automated analysis of natural-language data and the integration of heterogeneous healthrelated resources distributed across the Internet through the use of standardized terminologies that capture concepts and relationships between concepts that are expressed differently across datasets. However, the approaches that have so far characterized ‘semantic bioinformatics’ have not yet fulfilled the promise of the Semantic Web for medical and health information retrieval applications. This paper argues within the perspective of cognitive linguistics and cognitive anthropology that four features of human meaning-making must be taken into account before the potential of semantic technologies can be realized for this domain. First, many semantic technologies operate exclusively at the level of the word. However, texts convey meanings in ways beyond lexical semantics. For example, transitivity patterns (distributions of active or passive voice) and modality patterns (configurations of modal constituents like may, might, could, would, should) convey experiential and epistemic meanings that are not captured by single words. Language users also naturally associate stretches of text with discrete meanings, so that whole sentences can be ascribed senses similar to the senses of words (so-called ‘discourse topics’). Second, natural language processing systems tend to operate according to the principle of ‘one token, one tag’. For instance, occurrences of the word sound must be disambiguated for part of speech: in context, is sound a noun or a verb or an adjective? In syntactic analysis, deterministic annotation methods may be acceptable. But because natural language utterances are typically characterized by polyvalency and ambiguities of all kinds (including intentional ambiguities), such methods leave the meanings of texts highly impoverished. Third, ontologies tend to be disconnected from everyday language use and so struggle in cases where single concepts are captured through complex lexicalizations that involve profile shifts or other embodied representations. More problematically, concept graphs tend to capture ‘expert’ technical models rather than ‘folk’ models of knowledge and so may not match users’ common-sense intuitions about the organization of concepts in prototypical structures rather than Aristotelian categories. Fourth, and finally, most ontologies do not recognize the pervasively figurative character of human language. However, since the time of Galen the widespread use of metaphor in the linguistic usage of both medical professionals and lay persons has been recognized. In particular, metaphor is a well-documented linguistic tool for communicating experiences of pain. Because semantic medical knowledge-bases are designed to help capture variations within technical vocabularies – rather than the kinds of conventionalized figurative semantics that practitioners as well as patients actually utilize in clinical description and diagnosis – they fail to capture this dimension of linguistic usage. The failure of semantic technologies in these respects degrades the efficiency and efficacy not only of medical research, where information retrieval inefficiencies can lead to direct financial costs to organizations, but also of care provision, especially in contexts of patients’ self-management of complex medical conditions.Keywords: ambiguity, bioinformatics, language, meaning, metaphor, ontology, semantic web, semantics
Procedia PDF Downloads 1321655 Being Authentic is the New “Pieces”: A Mixed Methods Study on Authenticity among African Christian Millennials
Authors: Victor Counted
Abstract:
Staying true to self is complicated. In most cases, we might not fully come to terms with this realities. Just like any journey, a self-discovery experience with the ‘self’, is like a rollercoaster ride. The researcher attempts to engage the reader in an empirical study on authenticity tendencies of African Christian Millennials. Hence, attempting the all-important question: What does it actually mean to be true to self for the African youth? A comprehensive, yet an unfinished business that applies the authenticity theory in its exploratory navigations to uncover the “lived world” of the participants who were part of this study. Using a mixed methods approach, the researcher will exhaustively give account to the authenticity tendencies and experiences of the respondents in the study by providing the reader with a unique narrative for understanding what it means to be true to oneself in Africa. At the quantitative study, the participants recorded higher scores on the Authenticity Scale (AS) authentic living, while showing a significant correlation within the subscales. Hypotheses were tested at the quantitative phase, which statistically supported gender and church affiliation as possible predictors for the authenticity orientations of the participants, while being a Christian native and race/ethnicity were not impact factors statistically. The results helped the researcher to develop the objectives behind the qualitative study, where only fifteen AS-authentic living participants were interviewed to understand why they scored high on authentic living, in order to understand what it means to be authentic. The hallmark of the qualitative case study exploration was the common coping mechanism of splitting adopted by the respondents to deal with their self-crisis as they tried to remain authentic to self, whilst self-regulating and self-investing the self to discover ‘self’. Specifically, the researcher observed the concurrent utilization of some kind of the religious-self by the respondents to regulate their self crisis, as they relate with self fragmenting through different splitting stages in hope for some kind of redemption. It was an explanation that led to the conclusion that being authentic is the new pieces. Authenticity is in fragments. This proposition led the researcher to introduce a hermeneutical support-system that will enable future researchers engage more critically and responsibly with their “living human documents” in order to inspire timely solutions that resolve the concerns of authenticity and wellbeing among Millennials in Africa.Keywords: authenticity, self, identity, self-fragmentation, weak self integration, postmodern self, splitting
Procedia PDF Downloads 5201654 Development of a Porous Porcelain Frape with Thermochromic Visualization
Authors: Jose Gois
Abstract:
The paper presents the development of a porous porcelain frappe with thermochromic visualization for port wines, having as a partner the Institute of Vinhos do Douro and Porto. This ceramic frappe is intended to promote the cooling and maintenance of the temperature of port wines through porous ceramic materials, consisting of a porcelain composite with sawdust addition, so as to contain, on the one hand, the similar cooling properties of the terracotta and, on the other, the resistance of materials such as porcelain. The application of the thermochromic element makes it possible to see if the wine is at optimal service temperatures, allowing users to drink the wine in the ideal conditions and contributing to more efficient maintenance of the service.Keywords: design, frappe, porcelain, porous, thermochromic
Procedia PDF Downloads 1341653 Informal Green Infrastructure as Mobility Enabler in Informal Settlements of Quito
Authors: Ignacio W. Loor
Abstract:
In the context of informal settlements in Quito, this paper provides evidence that slopes and deep ravines typical of Andean cities, around which marginalized urban communities sit, constitute a platform for green infrastructure that supports mobility for pedestrians in an incremental fashion. This is informally shaped green infrastructure that provides connectivity to other mobility infrastructures such as roads and public transport, which permits relegated dwellers reach their daily destinations and reclaim their rights to the city. This is relevant in that walking has been increasingly neglected as a viable mean of transport in Latin American cities, in favor of rather motorized means, for which the mobility benefits of green infrastructure have remained invisible to policymakers, contributing to the progressive isolation of informal settlements. This research leverages greatly on an ecological rejuvenation programme led by the municipality of Quito and the Andean Corporation for Development (CAN) intended for rehabilitating the ecological functionalities of ravines. Accordingly, four ravines in different stages of rejuvenation were chosen, in order to through ethnographic methods, capture the practices they support to dwellers of informal settlements across different stages, particularly in terms of issues of mobility. Then, by presenting fragments of interviews, description of observed phenomena, photographs and narratives published in institutional reports and media, the production process of mobility infrastructure over unoccupied slopes and ravines, and the roles that this infrastructure plays in the mobility of dwellers and their quotidian practices are explained. For informal settlements, which normally feature scant urban infrastructure, mobility embodies an unfavourable driver for the possibilities of dwellers to actively participate in the social, economic and political dimensions of the city, for which their rights to the city are widely neglected. Nevertheless, informal green infrastructure for mobility provides some alleviation. This infrastructure is incremental, since its features and usability gradually evolves as users put into it knowledge, labour, devices, and connectivity to other infrastructures in different dimensions which increment its dependability. This is evidenced in the diffusion of knowledge of trails and routes of footpaths among users, the implementation of linking stairs and bridges, the improved access by producing public spaces adjacent to the ravines, the illuminating of surrounding roads, and ultimately, the restoring of ecological functions of ravines. However, the perpetuity of this type of infrastructure is also fragile and vulnerable to the course of urbanisation, densification, and expansion of gated privatised spaces.Keywords: green infrastructure, informal settlements, urban mobility, walkability
Procedia PDF Downloads 1641652 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)
Authors: Wafa' Slaibi Alsharafat
Abstract:
Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection
Procedia PDF Downloads 4721651 A Long Tail Study of eWOM Communities
Authors: M. Olmedilla, M. R. Martinez-Torres, S. L. Toral
Abstract:
Electronic Word-Of-Mouth (eWOM) communities represent today an important source of information in which more and more customers base their purchasing decisions. They include thousands of reviews concerning very different products and services posted by many individuals geographically distributed all over the world. Due to their massive audience, eWOM communities can help users to find the product they are looking for even if they are less popular or rare. This is known as the long tail effect, which leads to a larger number of lower-selling niche products. This paper analyzes the long tail effect in a well-known eWOM community and defines a tool for finding niche products unavailable through conventional channels.Keywords: eWOM, online user reviews, long tail theory, product categorization, social network analysis
Procedia PDF Downloads 4181650 Analysis of Road Risk in Four French Overseas Territories Compared with Metropolitan France
Authors: Mohamed Mouloud Haddak, Bouthayna Hayou
Abstract:
Road accidents in French overseas territories have been understudied, with relevant data often collected late and incompletely. Although these territories account for only 3% to 4% of road traffic injuries in France, their unique characteristics merit closer attention. Despite lower mobility and, consequently, lower exposure to road risks, the actual road risk in Overseas France is as high or even higher than in Metropolitan France. Significant disparities exist not only between Metropolitan France and Overseas territories but also among the overseas territories themselves. The varying population densities in these regions do not fully explain these differences, as each territory has its own distinct vulnerabilities and road safety challenges. This analysis, based on BAAC data files from 2005 to 2018 for both Metropolitan France and the overseas departments and regions, examines key variables such as gender, age, type of road user, type of obstacle hit, type of trip, road category, traffic conditions, weather, and location of accidents. Logistic regression models were built for each region to investigate the risk factors associated with fatal road accidents, focusing on the probability of being killed versus injured. Due to insufficient data, Mayotte and the Overseas Communities (French Polynesia and New Caledonia) were not included in the models. The findings reveal that road safety is worse in the overseas territories compared to Metropolitan France, particularly for vulnerable road users such as pedestrians and motorized two-wheelers. These territories present an accident profile that sits between that of Metropolitan France and middle-income countries. A pressing need exists to standardize accident data collection between Metropolitan and Overseas France to allow for more detailed comparative analyses. Further epidemiological studies could help identify the specific road safety issues unique to each territory, particularly with regards to socio-economic factors such as social cohesion, which may influence road safety outcomes. Moreover, the lack of data on new modes of travel, such as electric scooters, and the absence of socio-economic details of accident victims complicate the evaluation of emerging risk factors. Additional research, including sociological and psychosocial studies, is essential for understanding road users' behavior and perceptions of road risk, which could also provide valuable insights into accident trends in peri-urban areas in France.Keywords: multivariate logistic regression, french overseas regions, road safety, road traffic accidents, territorial inequalities
Procedia PDF Downloads 91649 Detection and Tracking Approach Using an Automotive Radar to Increase Active Pedestrian Safety
Authors: Michael Heuer, Ayoub Al-Hamadi, Alexander Rain, Marc-Michael Meinecke
Abstract:
Vulnerable road users, e.g. pedestrians, have a high impact on fatal accident numbers. To reduce these statistics, car manufactures are intensively developing suitable safety systems. Hereby, fast and reliable environment recognition is a major challenge. In this paper we describe a tracking approach that is only based on a 24 GHz radar sensor. While common radar signal processing loses much information, we make use of a track-before-detect filter to incorporate raw measurements. It is explained how the Range-Doppler spectrum can help to indicated pedestrians and stabilize tracking even in occultation scenarios compared to sensors in series.Keywords: radar, pedestrian detection, active safety, sensor
Procedia PDF Downloads 5281648 An Embedded System for Early Detection of Gas Leakage in Hospitals and Industries
Authors: Sehreen Moorat, Hiba, Maham Mahnoor, Faryal Soomro
Abstract:
Leakage of gases in a system makes infrastructures and users vulnerable; it can occur due to its environmental conditions or old groundwork. In hospitals and industries, it is very important to detect any small level of gas leakage because of their sensitivity. In this research, a portable detection system for the small leakage of gases has been developed, gas sensor (MQ-2) is used to find leakage when it’s at its initial phase. The sensor and transmitting module senses the change in level of gas by using a sensing circuit. When a concentration of gas reach at a specified threshold level, it will activate an alarm and send the alarming situation notification to receiver through GSM module. The proposed system works well in hospitals, home, and industries.Keywords: gases, detection, Arduino, MQ-2, alarm
Procedia PDF Downloads 2041647 Breast Cancer Cellular Immunotherapies
Authors: Zahra Shokrolahi, Mohammad Reza Atashzar
Abstract:
The goals of treating patients with breast cancer are to cure the disease, prolong survival, and improve quality of life. Immune cells in the tumor microenvironment have an important role in regulating tumor progression. The term of cellular immunotherapy refers to the administration of living cells to a patient; this type of immunotherapy can be active, such as a dendritic cell (DC) vaccine, in that the cells can stimulate an anti-tumour response in the patient, or the therapy can be passive, whereby the cells have intrinsic anti-tumour activity; this is known as adoptive cell transfer (ACT) and includes the use of autologous or allogeneic lymphocytes that may, or may not, be modified. The most important breast cancer cellular immunotherapies involving the use of T cells and natural killer (NK) cells in adoptive cell transfer, as well as dendritic cells vaccines. T cell-based therapies including tumour-infiltrating lymphocytes (TILs), engineered TCR-T cells, chimeric antigen receptor (CAR T cell), Gamma-delta (γδ) T cells, natural killer T (NKT) cells. NK cell-based therapies including lymphokine-activated killers (LAK), cytokine-induced killer (CIK) cells, CAR-NK cells. Adoptive cell therapy has some advantages and disadvantages some. TILs cell strictly directed against tumor-specific antigens but are inactive against tumor changes due to immunoediting. CIK cell have MHC-independent cytotoxic effect and also need concurrent high dose IL-2 administration. CAR T cell are MHC-independent; overcome tumor MHC molecule downregulation; potent in recognizing any cell surface antigen (protein, carbohydrate or glycolipid); applicable to a broad range of patients and T cell populations; production of large numbers of tumor-specific cells in a moderately short period of time. Meanwhile CAR T cells capable of targeting only cell surface antigens; lethal toxicity due to cytokine storm reported. Here we present the most popular cancer cellular immunotherapy approaches and discuss their clinical relevance referring to data acquired from clinical trials .To date, clinical experience and efficacy suggest that combining more than one immunotherapy interventions, in conjunction with other treatment options like chemotherapy, radiotherapy and targeted or epigenetic therapy, should guide the way to cancer cure.Keywords: breast cancer , cell therapy , CAR T cell , CIK cells
Procedia PDF Downloads 1291646 Gesture-Controlled Interface Using Computer Vision and Python
Authors: Vedant Vardhan Rathour, Anant Agrawal
Abstract:
The project aims to provide a touchless, intuitive interface for human-computer interaction, enabling users to control their computer using hand gestures and voice commands. The system leverages advanced computer vision techniques using the MediaPipe framework and OpenCV to detect and interpret real time hand gestures, transforming them into mouse actions such as clicking, dragging, and scrolling. Additionally, the integration of a voice assistant powered by the Speech Recognition library allows for seamless execution of tasks like web searches, location navigation and gesture control on the system through voice commands.Keywords: gesture recognition, hand tracking, machine learning, convolutional neural networks
Procedia PDF Downloads 101645 The Artificial Intelligence Technologies Used in PhotoMath Application
Authors: Tala Toonsi, Marah Alagha, Lina Alnowaiser, Hala Rajab
Abstract:
This report is about the Photomath app, which is an AI application that uses image recognition technology, specifically optical character recognition (OCR) algorithms. The (OCR) algorithm translates the images into a mathematical equation, and the app automatically provides a step-by-step solution. The application supports decimals, basic arithmetic, fractions, linear equations, and multiple functions such as logarithms. Testing was conducted to examine the usage of this app, and results were collected by surveying ten participants. Later, the results were analyzed. This paper seeks to answer the question: To what level the artificial intelligence features are accurate and the speed of process in this app. It is hoped this study will inform about the efficiency of AI in Photomath to the users.Keywords: photomath, image recognition, app, OCR, artificial intelligence, mathematical equations.
Procedia PDF Downloads 1701644 Network User Rules in Universities
Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson
Abstract:
This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.Keywords: computer security, IT policy, security awareness, network user rules
Procedia PDF Downloads 5601643 Exploring Cybersecurity and Phishing Attacks within Healthcare Institutions in Saudi Arabia: A Narrative Review
Authors: Ebtesam Shadadi, Rasha Ibrahim, Essam Ghadafi
Abstract:
Phishing poses a significant threat as a cybercrime by tricking end users into revealing their confidential and sensitive information. Attackers often manipulate victims to achieve their malicious goals. The increasing prevalence of Phishing has led to extensive research on this issue, including studies focusing on phishing attempts in healthcare institutions in the Kingdom of Saudi Arabia. This paper explores the importance of analyzing phishing attacks, specifically focusing on those targeting the healthcare industry. The study delves into the tactics, obstacles, and remedies associated with these attacks, all while considering the implications for Saudi Vision 2030.Keywords: phishing, cybersecurity, cyber threat, social engineering, vision 2030
Procedia PDF Downloads 591642 Modeling Jordan University of Science and Technology Parking Using Arena Program
Authors: T. Qasim, M. Alqawasmi, M. Hawash, M. Betar, W. Qasim
Abstract:
Over the last decade, the over population that has happened in urban areas has been reflecting on the services that various local institutions provide to car users in the form of car parks, which is becoming a daily necessity in our lives. This study focuses on car parks at Jordan University of Science and Technology, in Irbid, Jordan, to understand the university parking needs. Data regarding arrival and departure times of cars and the parking utilization were collected, to find various options that the university can implement to solve and develop an efficient car parking system. Arena software was used to simulate a parking model. This model allows measuring the different solutions that solve the parking problem at Jordan University of Science and Technology.Keywords: car park, simulation, modeling, service time
Procedia PDF Downloads 1801641 A Comprehensive Analysis of Factors Leading to Fatal Road Accidents in France and Its Overseas Territories
Authors: Bouthayna Hayou, Mohamed Mouloud Haddak
Abstract:
In road accidents in French overseas territories have been understudied, with relevant data often collected late and incompletely. Although these territories account for only 3% to 4% of road traffic injuries in France, their unique characteristics merit closer attention. Despite lower mobility and, consequently, lower exposure to road risks, the actual road risk in Overseas France is as high or even higher than in Metropolitan France. Significant disparities exist not only between Metropolitan France and Overseas territories but also among the overseas territories themselves. The varying population densities in these regions do not fully explain these differences, as each territory has its own distinct vulnerabilities and road safety challenges. This analysis, based on BAAC data files from 2005 to 2018 for both Metropolitan France and the overseas departments and regions, examines key variables such as gender, age, type of road user, type of obstacle hit, type of trip, road category, traffic conditions, weather, and location of accidents. Logistic regression models were built for each region to investigate the risk factors associated with fatal road accidents, focusing on the probability of being killed versus injured. Due to insufficient data, Mayotte and the Overseas Communities (French Polynesia and New Caledonia) were not included in the models. The findings reveal that road safety is worse in the overseas territories compared to Metropolitan France, particularly for vulnerable road users such as pedestrians and motorized two-wheelers. These territories present an accident profile that sits between that of Metropolitan France and middle-income countries. A pressing need exists to standardize accident data collection between Metropolitan and Overseas France to allow for more detailed comparative analyses. Further epidemiological studies could help identify the specific road safety issues unique to each territory, particularly with regard to socio-economic factors such as social cohesion, which may influence road safety outcomes. Moreover, the lack of data on new modes of travel, such as electric scooters, and the absence of socio-economic details of accident victims complicate the evaluation of emerging risk factors. Additional research, including sociological and psychosocial studies, is essential for understanding road users' behavior and perceptions of road risk, which could also provide valuable insights into accident trends in peri-urban areas in France.Keywords: multivariate logistic regression, overseas France, road safety, road traffic accident, territorial inequalities
Procedia PDF Downloads 81640 Understanding the Benefits of Multiple-Use Water Systems (MUS) for Smallholder Farmers in the Rural Hills of Nepal
Authors: RAJ KUMAR G.C.
Abstract:
There are tremendous opportunities to maximize smallholder farmers’ income from small-scale water resource development through micro irrigation and multiple-use water systems (MUS). MUS are an improved water management approach, developed and tested successfully by iDE that pipes water to a community both for domestic use and for agriculture using efficient micro irrigation. Different MUS models address different landscape constraints, water demand, and users’ preferences. MUS are complemented by micro irrigation kits, which were developed by iDE to enable farmers to grow high-value crops year-round and to use limited water resources efficiently. Over the last 15 years, iDE’s promotion of the MUS approach has encouraged government and other key stakeholders to invest in MUS for better planning of scarce water resources. Currently, about 60% of the cost of MUS construction is covered by the government and community. Based on iDE’s experience, a gravity-fed MUS costs approximately $125 USD per household to construct, and it can increase household income by $300 USD per year. A key element of the MUS approach is keeping farmers well linked to input supply systems and local produce collection centers, which helps to ensure that the farmers can produce a sufficient quantity of high-quality produce that earns a fair price. This process in turn creates an enabling environment for smallholders to invest in MUS and micro irrigation. Therefore, MUS should be seen as an integrated package of interventions –the end users, water sources, technologies, and the marketplace– that together enhance technical, financial, and institutional sustainability. Communities are trained to participate in sustainable water resource management as a part of the MUS planning and construction process. The MUS approach is cost-effective, improves community governance of scarce water resources, helps smallholder farmers to improve rural health and livelihoods, and promotes gender equity. MUS systems are simple to maintain and communities are trained to ensure that they can undertake minor maintenance procedures themselves. All in all, the iDE Nepal MUS offers multiple benefits and represents a practical and sustainable model of the MUS approach. Moreover, there is a growing national consensus that rural water supply systems should be designed for multiple uses, acknowledging that substantial work remains in developing national-level and local capacity and policies for scale-up.Keywords: multiple-use water systems , small scale water resources, rural livelihoods, practical and sustainable model
Procedia PDF Downloads 2881639 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester
Procedia PDF Downloads 1471638 The Role of Virtual Geographic Environment (VGEs)
Abstract:
VGEs are a kind of typical web- and computer-based geographic environment, with aims of merging geographic knowledge, computer technology, virtual reality technology, network technology, and geographic information technology, to provide a digital mirror of physical geographic environments to allow users to ‘feel it in person’ by a means for augmenting the senses and to ‘know it beyond reality’ through geographic phenomena simulation and collaborative geographic experiments. Many achievements have appeared in this field, but further evolution should be explored. With the exploration of the conception of VGEs, and some examples, this article illustrated the role of VGEs and their contribution to currently GIScience. Based on the above analysis, questions are proposed for discussing about the future way of VGEs.Keywords: virtual geographic environments (VGEs), GIScience, virtual reality, geographic information systems
Procedia PDF Downloads 5741637 The Effect of Balance Training on Stable and Unstable Surfaces under Cognitive Dual-Task Condition on the Two Directions of Body Sway, Functional Balance and Fear of Fall in Non-Fallers Older Adults
Authors: Elham Azimzadeh, Fahimeh Khorshidi, Alireza Farsi
Abstract:
Balance impairment and fear of falling in older adults may reduce their quality of life. Reactive balance training could improve rapid postural responses and fall prevention in the elderly during daily tasks. Performing postural training and simultaneously cognitive dual tasks could be similar to the daily circumstances. Purpose: This study aimed to determine the effect of balance training on stable and unstable surfaces under dual cognitive task conditions on postural control and fear of falling in the elderly. Methods: Thirty non-fallers of older adults (65-75 years) were randomly assigned to two training groups: stable-surface (n=10), unstable-surface (n=10), or a control group (n=10). The intervention groups underwent six weeks of balance training either on a stable (balance board) or an unstable (wobble board) surface while performing a cognitive dual task. The control group received no balance intervention. COP displacements in the anterioposterior (AP) and mediolateral (ML) directions using a computerized balance board, functional balance using TUG, and fear of falling using FES-I were measured in all participants before and after the interventions. Summary of Results: Mixed ANOVA (3 groups * 2 times) with repeated measures and post hoc test showed a significant improvement in both intervention groups in AP index (F= 11/652, P= 0/0002) and functional balance (F= 9/961, P= 0/0001). However, the unstable surface training group had more improvement. However, the fear of falling significantly improved after training on an unstable surface (p= 0/035). All groups had no significant improvement in the ML index (p= 0/817). In the present study, there was an improvement in the AP index after balance training. Conclusion: Unstable surface training may reduce reaction time in posterior ankle muscle activity. Furthermore, focusing attention on cognitive tasks can lead to maintaining balance unconsciously. Most of the daily activities need attention distribution among several activities. So, balance training concurrent to a dual cognitive task is challenging and more similar to the real world. According to the specificity of the training principle, it may improve functional independence and fall prevention in the elderly.Keywords: cognitive dual task, elderly, fear of falling, postural control, unstable surface
Procedia PDF Downloads 621636 A Study of Cloud Computing Solution for Transportation Big Data Processing
Authors: Ilgin Gökaşar, Saman Ghaffarian
Abstract:
The need for fast processed big data of transportation ridership (eg., smartcard data) and traffic operation (e.g., traffic detectors data) which requires a lot of computational power is incontrovertible in Intelligent Transportation Systems. Nowadays cloud computing is one of the important subjects and popular information technology solution for data processing. It enables users to process enormous measure of data without having their own particular computing power. Thus, it can also be a good selection for transportation big data processing as well. This paper intends to examine how the cloud computing can enhance transportation big data process with contrasting its advantages and disadvantages, and discussing cloud computing features.Keywords: big data, cloud computing, Intelligent Transportation Systems, ITS, traffic data processing
Procedia PDF Downloads 4651635 Connectivity: Connecting ActivityRethinking Streets as Public Space under the Six Dimensions of Urban Space Design in the Context of Bangladesh
Authors: Manal Anis, Bin Bakhti Sayeed
Abstract:
With the encroachment of automobile upon our communities for decades and the concomitant urban sprawl resulting in a loss of public place, it was only a matter of time before people, realizing the role of streets in stimulating urban prosperity, would start reclaiming them to rebuild their communities. In order for this restoration of communities to take effect it is imperative that streets be freed from the dominance of motor vehicles. A holistic approach to pedestrian-friendly street environment can help build communities that embody the cities in which they are found. While the developed countries are finding more and more innovative ways to integrate walkable streets to foster communal living, the developing countries still have a long way to go. Since Dhaka is still struggling to balance the growing needs of accommodating automobiles for increased population with the loss of urban community life that comes with it, it is high time that alternate approaches are looked into. This study aims to understand streets as a living corridor through which one discovers and identifies with the city. The research area is chosen to be Manik Mia Avenue, overlooking the South Plaza of the National Parliament Building in Dhaka city. Being the site of supreme power, it is precisely this symbolic importance that the National Parliament Building has in the psyche of Bangladeshis, which has given Manik Mia Avenue a significant place in the country’s history. Above all, being an avenue it is essentially a neutral territory, universally accessible, inclusive and pluralist. The needs of the Avenue’s frequent users are analyzed with the help of a multi-method approach to survey consisting of an empirical study, a questionnaire survey and interview with relevant users. The research then tries to understand the concept of walkability by exploring the different ways in which the built environment influences walking. For this analysis, the six dimensions of Matthew Carmona are taken as a guideline for a holistic approach toward the different interacting facets of an urban public space. Based on the studies, a set of criteria is proposed to evaluate, plan and design streets that are more contextual in nature. The study concludes with how the existing street patterns of Dhaka city can be rethought and redesigned to cater to peoples’ need for a public place. The proposal is meant to be an inspiration for further studies in this respect in the context of Bangladesh.Keywords: public space, six dimensions, street, urban, walkability
Procedia PDF Downloads 2211634 Hate Speech Detection Using Deep Learning and Machine Learning Models
Authors: Nabil Shawkat, Jamil Saquer
Abstract:
Social media has accelerated our ability to engage with others and eliminated many communication barriers. On the other hand, the widespread use of social media resulted in an increase in online hate speech. This has drastic impacts on vulnerable individuals and societies. Therefore, it is critical to detect hate speech to prevent innocent users and vulnerable communities from becoming victims of hate speech. We investigate the performance of different deep learning and machine learning algorithms on three different datasets. Our results show that the BERT model gives the best performance among all the models by achieving an F1-score of 90.6% on one of the datasets and F1-scores of 89.7% and 88.2% on the other two datasets.Keywords: hate speech, machine learning, deep learning, abusive words, social media, text classification
Procedia PDF Downloads 134