Search results for: Internet Gateway
662 Multi-Agent System for Irrigation Using Fuzzy Logic Algorithm and Open Platform Communication Data Access
Authors: T. Wanyama, B. Far
Abstract:
Automatic irrigation systems usually conveniently protect landscape investment. While conventional irrigation systems are known to be inefficient, automated ones have the potential to optimize water usage. In fact, there is a new generation of irrigation systems that are smart in the sense that they monitor the weather, soil conditions, evaporation and plant water use, and automatically adjust the irrigation schedule. In this paper, we present an agent based smart irrigation system. The agents are built using a mix of commercial off the shelf software, including MATLAB, Microsoft Excel and KEPServer Ex5 OPC server, and custom written code. The Irrigation Scheduler Agent uses fuzzy logic to integrate the information that affect the irrigation schedule. In addition, the Multi-Agent system uses Open Platform Connectivity (OPC) technology to share data. OPC technology enables the Irrigation Scheduler Agent to communicate over the Internet, making the system scalable to a municipal or regional agent based water monitoring, management, and optimization system. Finally, this paper presents simulation and pilot installation test result that show the operational effectiveness of our system.Keywords: community water usage, fuzzy logic, irrigation, multi-agent system
Procedia PDF Downloads 298661 The Role of Interactive White Boards towards Achieving Transactional Learning in the Context of Open Distance Learning
Authors: M. Van Zyl, M. H. A. Combrinck, E. J. Spamer
Abstract:
Due to the need for higher education in South Africa, the country experiences a rapid growth in open distance learning, especially in rural areas. It is difficult for people to enrol fulltime at contact universities, owing to work and financial constraints. The Unit for Open Distance Learning (UODL) at the North-West University (NWU), Potchefstroom campus, South Africa was established in 2013 with its main function to deliver open distance learning programmes to 30 000 students from the Faculties of Education Sciences, Theology and Health Sciences. With the use of interactive whiteboards (IWBs), the NWU and UODL are now able to deliver lectures to students concurrently at 60 regional open learning centres across Southern Africa as well as to an unlimited number of individuals with Internet access worldwide. Although IWBs are not new, our initiative is to use them more extensively in order to create more contact between lecturers and students. To be able to ensure and enhance quality education it is vital to determine students’ perceptions on the delivery of programmes by means of IWBs. Therefore, the aim of the study is to explore students’ perceptions for the use of IWBs in the delivery of programmes in terms of Moore’s Theory of Transactional Distance.Keywords: interactive white board, open distance learning, technology, transactional learning
Procedia PDF Downloads 454660 Empirical Evaluation of Game Components Based on Learning Theory: A Preliminary Study
Authors: Seoi Lee, Dongjoo Chin, Heewon Kim
Abstract:
Gamification refers to a technique that applies game elements to non-gaming elements, such as education and exercise, to make people more engaged in these behaviors. The purpose of this study was to identify effective elements in gamification for changing human behaviors. In order to accomplish this purpose, a survey based on learning theory was developed, especially for assessing antecedents and consequences of behaviors, and 8 popular and 8 unpopular games were selected for comparison. A total of 407 adult males and females were recruited via crowdsourcing Internet marketplace and completed the survey, which consisted of 19 questions for antecedent and 14 questions for consequences. Results showed no significant differences in consequence questions between popular and unpopular games. For antecedent questions, popular games are superior to unpopular games in character customization, play type selection, a sense of belonging, patch update cycle, and influence or dominance. This study is significant in that it reveals the elements of gamification based on learning theory. Future studies need to empirically validate whether these factors affect behavioral change.Keywords: gamification, learning theory, antecedent, consequence, behavior change, behaviorism
Procedia PDF Downloads 223659 Design and Implementation of Medium Access Control Based Routing on Real Wireless Sensor Networks Testbed
Authors: Smriti Agarwal, Ashish Payal, B. V. R. Reddy
Abstract:
IEEE 802.15.4 is a Low Rate Wireless Personal Area Networks (LR-WPAN) standard combined with ZigBee, which is going to enable new applications in Wireless Sensor Networks (WSNs) and Internet of Things (IoT) domain. In recent years, it has become a popular standard for WSNs. Wireless communication among sensor motes, enabled by IEEE 802.15.4 standard, is extensively replacing the existing wired technology in a wide range of monitoring and control applications. Researchers have proposed a routing framework and mechanism that interacts with the IEEE 802.15.4 standard using software platform. In this paper, we have designed and implemented MAC based routing (MBR) based on IEEE 802.15.4 standard using a hardware platform “SENSEnuts”. The experimental results include data through light and temperature sensors obtained from communication between PAN coordinator and source node through coordinator, MAC address of some modules used in the experimental setup, topology of the network created for simulation and the remaining battery power of the source node. Our experimental effort on a WSN Testbed has helped us in bridging the gap between theoretical and practical aspect of implementing IEEE 802.15.4 for WSNs applications.Keywords: IEEE 802.15.4, routing, WSN, ZigBee
Procedia PDF Downloads 406658 A Wireless Sensor System for Continuous Monitoring of Particulate Air Pollution
Authors: A. Yawootti, P. Intra, P. Sardyoung, P. Phoosomma, R. Puttipattanasak, S. Leeragreephol, N. Tippayawong
Abstract:
The aim of this work is to design, develop and test the low-cost implementation of a particulate air pollution sensor system for continuous monitoring of outdoors and indoors particulate air pollution at a lower cost than existing instruments. In this study, measuring electrostatic charge of particles technique via high efficiency particulate-free air filter was carried out. The developed detector consists of a PM10 impactor, a particle charger, a Faraday cup electrometer, a flow meter and controller, a vacuum pump, a DC high voltage power supply and a data processing and control unit. It was reported that the developed detector was capable of measuring mass concentration of particulate ranging from 0 to 500 µg/m3 corresponding to number concentration of particulate ranging from 106 to 1012 particles/m3 with measurement time less than 1 sec. The measurement data of the sensor connects to the internet through a GSM connection to a public cellular network. In this development, the apparatus was applied the energy by a 12 V, 7 A internal battery for continuous measurement of about 20 hours. Finally, the developed apparatus was found to be close agreement with the import standard instrument, portable and benefit for air pollution and particulate matter measurements.Keywords: particulate, air pollution, wireless communication, sensor
Procedia PDF Downloads 367657 A Literature Review on Virtual Interventions for Midlife Women
Authors: Daniel D'Souza, Ping Zou
Abstract:
The period before, during, and after menopause is a sensitive time for women as they experience intense physical and psychological health changes and symptoms. These changes accompany the hormonal changes that mark the end of a woman’s reproductive age. To help mitigate and cope with these changes, prompt and correct treatment is needed. eHealth has emerged as a branch of telemedicine in the past few decades as an alternate avenue for patients to receive care quickly and conveniently, as it relies on the Internet and computers. Within the past few years, eHealth has also given rise to mHealth, which is the use of personal mobile devices to receive treatment and care. However, there is a lack of study on their use for menopause. This review aimed to review and summarize the literature for eHealth or mHealth and menopause. Several databases related to women’s health and digital health were searched for original studies about eHealth or mHealth and menopause. The search yielded 25 results. The results were generally positive, with these interventions being feasible and having positive effects on physical and psychosocial outcomes. However, several issues were raised regarding their design process that may inadvertently prevent these interventions from addressing the needs of all potential users. Therefore, while eHealth and mHealth certainly represent a future model of healthcare delivery for menopausal women, further research and design modifications are needed before this can happen.Keywords: eHealth, menopause, mHealth, midlife women
Procedia PDF Downloads 140656 Blockchain for IoT Security and Privacy in Healthcare Sector
Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab
Abstract:
The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data
Procedia PDF Downloads 180655 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security
Authors: James Andrew Fitzjohn
Abstract:
This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.Keywords: quantum computing, encryption, RSA, roadmap, real world
Procedia PDF Downloads 131654 Criminal Liability for Copyright and Related Rights Infringement: Albania Legislation Perspective
Authors: Ilda Muçmataj, Anjeza Liçenji, Borana Kalemi
Abstract:
Copyright and related rights have been pivotal in driving the economic growth of nations worldwide and fostering culture and new forms of entertainment. The introduction of the internet and technological advancement has significantly expanded the opportunities for creators and rights holders to promote their works and boost their revenues. However, this digital era has also brought about complex challenges, leading to a more extensive range of copyright infringement, primarily due to the substantial surge in piracy and counterfeiting. Despite being reported internationally, the mechanisms to tackle and the responsibility for enforcing copyright infringements often remain rooted in national jurisdictions, resulting in a gap between the scale of the problem and the efficacy of enforcement measures. Thus, it is essential to ensure adequate legal protection, a vital safeguard for authors' economic and moral interests, information security, innovative development promotion, and intellectual creativity preservation. This paper describes Albanian criminal law-based copyright enforcement legislation, focusing on doctrinal guidance and practical judicial considerations. Lastly, the paper offers recommendations for enhancing copyright protection and related rights.Keywords: author, copyright infringement, copyright, criminal liability, intellectual property, piracy
Procedia PDF Downloads 36653 Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea
Authors: Min Jin Kwon, Seung Won Kim, Eui Yeon Kim, Haeyoung Lee
Abstract:
Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist.Keywords: deep packet inspection, internet filtering, juvenile protection, technical blocking
Procedia PDF Downloads 349652 Standard Resource Parameter Based Trust Model in Cloud Computing
Authors: Shyamlal Kumawat
Abstract:
Cloud computing is shifting the approach IT capital are utilized. Cloud computing dynamically delivers convenient, on-demand access to shared pools of software resources, platform and hardware as a service through internet. The cloud computing model—made promising by sophisticated automation, provisioning and virtualization technologies. Users want the ability to access these services including infrastructure resources, how and when they choose. To accommodate this shift in the consumption model technology has to deal with the security, compatibility and trust issues associated with delivering that convenience to application business owners, developers and users. Absent of these issues, trust has attracted extensive attention in Cloud computing as a solution to enhance the security. This paper proposes a trusted computing technology through Standard Resource parameter Based Trust Model in Cloud Computing to select the appropriate cloud service providers. The direct trust of cloud entities is computed on basis of the interaction evidences in past and sustained on its present performances. Various SLA parameters between consumer and provider are considered in trust computation and compliance process. The simulations are performed using CloudSim framework and experimental results show that the proposed model is effective and extensible.Keywords: cloud, Iaas, Saas, Paas
Procedia PDF Downloads 330651 Towards Reliable Mobile Cloud Computing
Authors: Khaled Darwish, Islam El Madahh, Hoda Mohamed, Hadia El Hennawy
Abstract:
Cloud computing has been one of the fastest growing parts in IT industry mainly in the context of the future of the web where computing, communication, and storage services are main services provided for Internet users. Mobile Cloud Computing (MCC) is gaining stream which can be used to extend cloud computing functions, services and results to the world of future mobile applications and enables delivery of a large variety of cloud application to billions of smartphones and wearable devices. This paper describes reliability for MCC by determining the ability of a system or component to function correctly under stated conditions for a specified period of time to be able to deal with the estimation and management of high levels of lifetime engineering uncertainty and risks of failure. The assessment procedures consists of determine Mean Time between Failures (MTBF), Mean Time to Failure (MTTF), and availability percentages for main components in both cloud computing and MCC structures applied on single node OpenStack installation to analyze its performance with different settings governing the behavior of participants. Additionally, we presented several factors have a significant impact on rates of change overall cloud system reliability should be taken into account in order to deliver highly available cloud computing services for mobile consumers.Keywords: cloud computing, mobile cloud computing, reliability, availability, OpenStack
Procedia PDF Downloads 397650 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery
Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi
Abstract:
The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.Keywords: CSRF, CSRF detection extension, attackers, attacks
Procedia PDF Downloads 414649 An Experience of Translating an Excerpt from Sophie Adonon’s Echos de Femmes from French to English, Using Reverso.
Authors: Michael Ngongeh Mombe
Abstract:
This Paper seeks to investigate an assertion made by some colleagues that there is no need paying a human translator to translate their literary texts, that there are softwares such as Reverso that can be used to do the translation. The main objective of this study is to examine the veracity of this assertion using Reverso to translate a literary text without any post-editing by a human translator. The work is based on two theories: Skopos and Communicative theories of translation. The work is a documentary research where data were collected from published documents in libraries, on the internet and from the translation produced by Reverso. We made a comparative text analyses of both source and target texts in a bid to highlight the weaknesses and strengths of the software. Findings of this work revealed that those who advocate the use of only Machine translation do so in ignorance of the translation mistakes usually made by the software. From the review of all the 268 segments of translation, we found out that the translation produced by Reverso is fraught with errors. We therefore recommend the use of human translators to either do the translation of their literary texts or revise the translation produced by machine to conform to the skopos of the work. This paper is based on Reverso translation. Similar works in the near future will be based on the other translation softwares to determine their weaknesses and strengths.Keywords: machine translation, human translator, Reverso, literary text
Procedia PDF Downloads 95648 Assessment of Human Factors Analysis and Classification System in Construction Accident Prevention
Authors: Zakari Mustapha, Clinton Aigbavboa, Wellington Didi Thwala
Abstract:
Majority of the incidents and accidents in complex high-risk systems that exist in the construction industry and other sectors have been attributed to unsafe acts of workers. The purpose of this paper was to asses Human Factors Analysis and Classification System (HFACS) in construction accident prevention. The study was conducted through the use of secondary data from journals, books and internet to achieve the objective of the study. The review of literature looked into details of different views from different scholars about HFACS framework in accidents investigations. It further highlighted on various sections or disciplines of accident occurrences in human performance within the construction. The findings from literature review showed that unsafe acts of a worker and unsafe working conditions are the two major causes of accident in the construction industry.Most significant factor in the cause of site accident in the construction industry is unsafe acts of a worker. The findings also show how the application of HFACS framework in the investigation of accident will lead to the identification of common trends. Further findings show that provision for the prevention of accident will be made based on past accident records to identify and prioritize where intervention is needed within the construction industry.Keywords: accident, construction, HFACS, unsafe acts
Procedia PDF Downloads 321647 Interpreting Privacy Harms from a Non-Economic Perspective
Authors: Christopher Muhawe, Masooda Bashir
Abstract:
With increased Internet Communication Technology(ICT), the virtual world has become the new normal. At the same time, there is an unprecedented collection of massive amounts of data by both private and public entities. Unfortunately, this increase in data collection has been in tandem with an increase in data misuse and data breach. Regrettably, the majority of data breach and data misuse claims have been unsuccessful in the United States courts for the failure of proof of direct injury to physical or economic interests. The requirement to express data privacy harms from an economic or physical stance negates the fact that not all data harms are physical or economic in nature. The challenge is compounded by the fact that data breach harms and risks do not attach immediately. This research will use a descriptive and normative approach to show that not all data harms can be expressed in economic or physical terms. Expressing privacy harms purely from an economic or physical harm perspective negates the fact that data insecurity may result into harms which run counter the functions of privacy in our lives. The promotion of liberty, selfhood, autonomy, promotion of human social relations and the furtherance of the existence of a free society. There is no economic value that can be placed on these functions of privacy. The proposed approach addresses data harms from a psychological and social perspective.Keywords: data breach and misuse, economic harms, privacy harms, psychological harms
Procedia PDF Downloads 195646 Development of Intelligent Construction Management System Using Web-Camera Image and 3D Object Image
Authors: Hyeon-Seung Kim, Bit-Na Cho, Tae-Woon Jeong, Soo-Young Yoon, Leen-Seok Kang
Abstract:
Recently, a construction project has been large in the size and complicated in the site work. The web-cameras are used to manage the construction site of such a large construction project. They can be used for monitoring the construction schedule as compared to the actual work image of the planned work schedule. Specially, because the 4D CAD system that the construction appearance is continually simulated in a 3D CAD object by work schedule is widely applied to the construction project, the comparison system between the real image of actual work appearance by web-camera and the simulated image of planned work appearance by 3D CAD object can be an intelligent construction schedule management system (ICON). The delayed activities comparing with the planned schedule can be simulated by red color in the ICON as a virtual reality object. This study developed the ICON and it was verified in a real bridge construction project in Korea. To verify the developed system, a web-camera was installed and operated in a case project for a month. Because the angle and zooming of the web-camera can be operated by Internet, a project manager can easily monitor and assume the corrective action.Keywords: 4D CAD, web-camera, ICON (intelligent construction schedule management system), 3D object image
Procedia PDF Downloads 507645 Study on Conservation and Regeneration of the Industrial Buildings
Authors: Rungpansa Noichan, Bart Julian Dewancker
Abstract:
The conservation and regeneration of historical industrial building is one of the most important issues to be solved in today’s urban development in the world. There are growing numbers of industrial building in which promoting heritage conservation maybe a helpful tool for a sustainable city in social, urban restructuring, environmental and economic component. This paper identifies the key attributes of conservation and regeneration industrial building from the literature, were discussed by reviewing its development at home and abroad. The authors have investigated 93 industrial buildings, which were used as industrial building before and reused into buildings with another function afterward. The data to be discussed below were mainly collected from various publications but also from available internet sources. This study focuses on green transformation, historical culture heritage, transformation techniques, and urban regeneration based on the empirical researches on the historical industrial building and site. Moreover, we focus on social, urban environment and sustainable development. The implications of the study provide suggestions for future improvements in the conservation and regeneration of historical industrial building, and inspire new ways of use, so the building becomes flexible and can consequently be adaptable to changes in order to survive time. Therefore, the building does not take into account only its future impact in the environment and society. Instead, it focuses on its entire life cycle.Keywords: industrial building, heritage conservation, green transformation, regeneration, sustainable development
Procedia PDF Downloads 370644 Exploring Equity and Inclusion in the Context of Distance Education Using a Social Location Perspective
Authors: Boadi Agyekum
Abstract:
In this study, a social location perspective is used to explore the challenges of creating opportunities that will foster lifelong education, inclusion, and equity for residents of rural communities in Ghana. The differentiated experiences of rural adults are under-researched and often unacknowledged in lifelong education literature and distance education policy. There is a need to examine carefully the structural inequalities that create disadvantages for residents of rural communities and women in pursuing distance education in designated cities in Ghana. The paper uses in-depth interviews to explore participants’ experiences of learning at a distance and to scrutinise the narratives of lifelong education. The paper reflects on the implications of the framework employed for educators and social justice in lifelong education. It further recommends the need to provide IT laboratories and fully online programs that would require stable and regular internet and access to ICT equipment for potential learning in rural communities. The social location approach presented a number of axes of diversity as comparatively more important than others; these included gender, age, education, work commitment, geography, and degree of social connectedness. This can inform lifelong education policy and programs to sustain quality education.Keywords: equity, distance education, lifelong learning, social location, intersectionality, rural communities
Procedia PDF Downloads 98643 Remote BioMonitoring of Mothers and Newborns for Temperature Surveillance Using a Smart Wearable Sensor: Techno-Feasibility Study and Clinical Trial in Southern India
Authors: Prem K. Mony, Bharadwaj Amrutur, Prashanth Thankachan, Swarnarekha Bhat, Suman Rao, Maryann Washington, Annamma Thomas, N. Sheela, Hiteshwar Rao, Sumi Antony
Abstract:
The disease burden among mothers and newborns is caused mostly by a handful of avoidable conditions occurring around the time of childbirth and within the first month following delivery. Real-time monitoring of vital parameters of mothers and neonates offers a potential opportunity to impact access as well as the quality of care in vulnerable populations. We describe the design, development and testing of an innovative wearable device for remote biomonitoring (RBM) of body temperatures in mothers and neonates in a hospital in southern India. The architecture consists of: [1] a low-cost, wearable sensor tag; [2] a gateway device for ‘real-time’ communication link; [3] piggy-backing on a commercial GSM communication network; and [4] an algorithm-based data analytics system. Requirements for the device were: long battery-life upto 28 days (with sampling frequency 5/hr); robustness; IP 68 hermetic sealing; and human-centric design. We undertook pre-clinical laboratory testing followed by clinical trial phases I & IIa for evaluation of safety and efficacy in the following sequence: seven healthy adult volunteers; 18 healthy mothers; and three sets of babies – 3 healthy babies; 10 stable babies in the Neonatal Intensive Care Unit (NICU) and 1 baby with hypoxic ischaemic encephalopathy (HIE). The 3-coin thickness, pebble-design sensor weighing about 8 gms was secured onto the abdomen for the baby and over the upper arm for adults. In the laboratory setting, the response-time of the sensor device to attain thermal equilibrium with the surroundings was 4 minutes vis-a-vis 3 minutes observed with a precision-grade digital thermometer used as a reference standard. The accuracy was ±0.1°C of the reference standard within the temperature range of 25-40°C. The adult volunteers, aged 20 to 45 years, contributed a total of 345 hours of readings over a 7-day period and the postnatal mothers provided a total of 403 paired readings. The mean skin temperatures measured in the adults by the sensor were about 2°C lower than the axillary temperature readings (sensor =34.1 vs digital = 36.1); this difference was statistically significant (t-test=13.8; p<0.001). The healthy neonates provided a total of 39 paired readings; the mean difference in temperature was 0.13°C (sensor =36.9 vs digital = 36.7; p=0.2). The neonates in the NICU provided a total of 130 paired readings. Their mean skin temperature measured by the sensor was 0.6°C lower than that measured by the radiant warmer probe (sensor =35.9 vs warmer probe = 36.5; p < 0.001). The neonate with HIE provided a total of 25 paired readings with the mean sensor reading being not different from the radian warmer probe reading (sensor =33.5 vs warmer probe = 33.5; p=0.8). No major adverse events were noted in both the adults and neonates; four adult volunteers reported mild sweating under the device/arm band and one volunteer developed mild skin allergy. This proof-of-concept study shows that real-time monitoring of temperatures is technically feasible and that this innovation appears to be promising in terms of both safety and accuracy (with appropriate calibration) for improved maternal and neonatal health.Keywords: public health, remote biomonitoring, temperature surveillance, wearable sensors, mothers and newborns
Procedia PDF Downloads 208642 The Sociocultural Adaptation, Openness, and Success of Sojourn of Foreign Students in Tarlac City, Philippines
Authors: Maria Sheila S. Garcia
Abstract:
A good number of researches indicate that living in another country may create different and unexpected adjustment problems, and foreign students are not exempted from this. To provide an understanding of this process, 30 foreign college students studying English in Tarlac City were asked to answer questionnaires. This is to determine their sociocultural adaptation, openness to the host culture and success of sojourn. Through statistical analysis, it was found that the students experience greater difficulty in the academic area. Moderate difficulty was attributed to everyday life and social interactions. Albeit difficult, what they like best is the school’s methods of teaching English while the areas that need improvement are the libraries and internet connection. The only significant relationship was found between sociocultural adaptation and success of sojourn. Negatively correlated, if students experience greater difficulties in their host country, they are likely to regret their stay and will not recommend it to anyone. Openness to the host culture did not have an effect on the adaptation and success of sojourn. The short period of time that the students have are spent in studying rather than making friends. Nonetheless, this indicates the need to look deeper into the academic, extra-curricular activities and facilities provided by learning institutions.Keywords: foreign students, sociocultural adaptation, success of sojourn, Tarlac Philippines
Procedia PDF Downloads 600641 Assessing the Impact of Electronic Payment Systems on the Service Delivery of Banks: Case of Nigeria
Authors: Idris lawal
Abstract:
The most recent development in the Nigerian payment system is the venture into “electronic payment system”. Electronic payment system is simply a payment or monetary transaction made over the internet or a network of computers. This study was carried out in order to assess how electronic payment system has impacted on banks service delivery, to examine the efficiency of electronic payment system in Nigeria and to determine the level of customer’s satisfaction as a direct result of the deployment of electronic payment systems. The study was conducted using structured questionnaire distributed to 50 bank officials and customers of Access Bank plc. Chi-square(x2) was adopted for the purpose of data analysis. The result of the study showed that the development of electronic payment system offer great benefit to bank customers including; improved services, reduced turn-around time, ease of banking transaction, significant cost saving etc. The study recommend that customer protection laws should be properly put in place to safeguard the interest of end users of e-payment instruments, the banking industry and government should show strong commitment and effort to educate the populace on the benefit of patronizing e-payment system to facilitate economic development.Keywords: electronic payment system, service delivery, bank, Nigeria
Procedia PDF Downloads 281640 Designing a Patient Monitoring System Using Cloud and Semantic Web Technologies
Authors: Chryssa Thermolia, Ekaterini S. Bei, Stelios Sotiriadis, Kostas Stravoskoufos, Euripides G. M. Petrakis
Abstract:
Moving into a new era of healthcare, new tools and devices are developed to extend and improve health services, such as remote patient monitoring and risk prevention. In this concept, Internet of Things (IoT) and Cloud Computing present great advantages by providing remote and efficient services, as well as cooperation between patients, clinicians, researchers and other health professionals. This paper focuses on patients suffering from bipolar disorder, a brain disorder that belongs to a group of conditions called effective disorders, which is characterized by great mood swings.We exploit the advantages of Semantic Web and Cloud Technologies to develop a patient monitoring system to support clinicians. Based on intelligently filtering of evidence-knowledge and individual-specific information we aim to provide treatment notifications and recommended function tests at appropriate times or concluding into alerts for serious mood changes and patient’s non-response to treatment. We propose an architecture, as the back-end part of a cloud platform for IoT, intertwining intelligence devices with patients’ daily routine and clinicians’ support.Keywords: bipolar disorder, intelligent systems patient monitoring, semantic web technologies, healthcare
Procedia PDF Downloads 509639 A Witty Relief Ailment Based on the Integration of IoT and Cloud
Authors: Sai Shruthi Sridhar, A. Madhumidha, Kreethika Guru, Priyanka Sekar, Ananthi Malayappan
Abstract:
Numerous changes in technology and its recent development are structuring long withstanding effect to our world, one among them is the emergence of “Internet of Things” (IoT). Similar to Technology world, one industry stands out in everyday life–healthcare. Attention to “quality of health care” is an increasingly important issue in a global economy and for every individual. As per WHO (World Health Organization) it is estimated to be less than 50% adhere to the medication provided and only about 20% get their medicine on time. Medication adherence is one of the top problems in healthcare which is fixable by use of technology. In recent past, there were minor provisions for elderly and specially-skilled to get motivated and to adhere medicines prescribed. This paper proposes a novel solution that uses IOT based RFID Medication Reminder Solution to provide personal health care services. This employs real time tracking which offer quick counter measures. The proposed solution builds on the recent digital advances in sensor technologies, smart phones and cloud services. This novel solution is easily adoptable and can benefit millions of people with a direct impact on the nation’s health care expenditure with innovative scenarios and pervasive connectivity.Keywords: cloud services, IoT, RFID, sensors
Procedia PDF Downloads 347638 An E-Maintenance IoT Sensor Node Designed for Fleets of Diverse Heavy-Duty Vehicles
Authors: George Charkoftakis, Panagiotis Liosatos, Nicolas-Alexander Tatlas, Dimitrios Goustouridis, Stelios M. Potirakis
Abstract:
E-maintenance is a relatively new concept, generally referring to maintenance management by monitoring assets over the Internet. One of the key links in the chain of an e-maintenance system is data acquisition and transmission. Specifically for the case of a fleet of heavy-duty vehicles, where the main challenge is the diversity of the vehicles and vehicle-embedded self-diagnostic/reporting technologies, the design of the data acquisition and transmission unit is a demanding task. This clear if one takes into account that a heavy-vehicles fleet assortment may range from vehicles with only a limited number of analog sensors monitored by dashboard light indicators and gauges to vehicles with plethora of sensors monitored by a vehicle computer producing digital reporting. The present work proposes an adaptable internet of things (IoT) sensor node that is capable of addressing this challenge. The proposed sensor node architecture is based on the increasingly popular single-board computer – expansion boards approach. In the proposed solution, the expansion boards undertake the tasks of position identification by means of a global navigation satellite system (GNSS), cellular connectivity by means of 3G/long-term evolution (LTE) modem, connectivity to on-board diagnostics (OBD), and connectivity to analog and digital sensors by means of a novel design of expansion board. Specifically, the later provides eight analog plus three digital sensor channels, as well as one on-board temperature / relative humidity sensor. The specific device offers a number of adaptability features based on appropriate zero-ohm resistor placement and appropriate value selection for limited number of passive components. For example, although in the standard configuration four voltage analog channels with constant voltage sources for the power supply of the corresponding sensors are available, up to two of these voltage channels can be converted to provide power to the connected sensors by means of corresponding constant current source circuits, whereas all parameters of analog sensor power supply and matching circuits are fully configurable offering the advantage of covering a wide variety of industrial sensors. Note that a key feature of the proposed sensor node, ensuring the reliable operation of the connected sensors, is the appropriate supply of external power to the connected sensors and their proper matching to the IoT sensor node. In standard mode, the IoT sensor node communicates to the data center through 3G/LTE, transmitting all digital/digitized sensor data, IoT device identity, and position. Moreover, the proposed IoT sensor node offers WiFi connectivity to mobile devices (smartphones, tablets) equipped with an appropriate application for the manual registration of vehicle- and driver-specific information, and these data are also forwarded to the data center. All control and communication tasks of the IoT sensor node are performed by dedicated firmware. It is programmed with a high-level language (Python) on top of a modern operating system (Linux). Acknowledgment: This research has been co-financed by the European Union and Greek national funds through the Operational Program Competitiveness, Entrepreneurship, and Innovation, under the call RESEARCH—CREATE—INNOVATE (project code: T1EDK- 01359, IntelligentLogger).Keywords: IoT sensor nodes, e-maintenance, single-board computers, sensor expansion boards, on-board diagnostics
Procedia PDF Downloads 154637 Adequacy of Museums' Internet Resources to Infantile and Young Public
Authors: Myriam Ferreira
Abstract:
Websites and social networks allow museums to divulge their works by new and attractive means. Besides, these technologies provide tools to generate a new history of art’s contents and promote visits to their installations. At the same time, museums are proposing more and more activities to families, children and young people. However, these activities usually take place in the museum’s physical installations, while websites and social networks seem to be mainly targeted to adults. The problem is that being children and young people digital natives, they feel apart from museums, so they need a presence of museums in digital means to feel attracted to them. Some institutions are making efforts to fill this vacuum. In this paper, resources designed specifically for children and teenagers have been selected from websites and social networks of five Spanish Museums: Prado Museum, Thyssen Museum, Guggenheim Museum, America Museum and Cerralbo Museum. After that, we have carried out an investigation in a school with children and teenagers between 11 and 15 years old. Those young people have been asked about their valuation of those web pages and social networks, with quantitative-qualitative questions. The results show that the least rated resources were videos and social networks because they were considered ‘too serious’, while the most rated were games and augmented reality. These ratings confirm theoretical papers that affirm that the future of technologies applied to museums is edutainment and interaction.Keywords: children, museums, social networks, teenagers, websites
Procedia PDF Downloads 149636 Side Effects of Dental Whitening: Published Data from the Literature
Authors: Ilma Robo, Saimir Heta, Emela Dalloshi, Nevila Alliu, Vera Ostreni
Abstract:
The dental whitening process, beyond the fact that it is a mini-invasive dental treatment, has effects on the dental structure, or on the pulp of the tooth, where it is applied. The electronic search was performed using keywords to find articles published within the last 10 years about side effects, assessed as such, of minimally invasive dental bleaching treatment. Methodology: In selected articles, the other aim of the study was to evaluate the side effects of bleaching based on the percentage and type of solution used, where the latter was evaluated on the basic solution used for bleaching. Results: The side effects of bleaching are evaluated in selected articles depending on the method of bleaching application, which means it is carried out with recommended solutions, or with mixtures of alternative solutions or substances based on Internet information. Short conclusion: The dental bleaching process has side effects which have not yet been definitively evaluated, experimentally in large samples of individuals or animals (mice or cattle) to arrive at accurate numerical conclusions. The trend of publications about this topic is increasing in recent years, as long as the trend for aesthetic facial treatments, including dental ones, is increasing.Keywords: teeth whitening, side effects, permanent teeth, formed dental apex
Procedia PDF Downloads 63635 Proxisch: An Optimization Approach of Large-Scale Unstable Proxy Servers Scheduling
Authors: Xiaoming Jiang, Jinqiao Shi, Qingfeng Tan, Wentao Zhang, Xuebin Wang, Muqian Chen
Abstract:
Nowadays, big companies such as Google, Microsoft, which have adequate proxy servers, have perfectly implemented their web crawlers for a certain website in parallel. But due to lack of expensive proxy servers, it is still a puzzle for researchers to crawl large amounts of information from a single website in parallel. In this case, it is a good choice for researchers to use free public proxy servers which are crawled from the Internet. In order to improve efficiency of web crawler, the following two issues should be considered primarily: (1) Tasks may fail owing to the instability of free proxy servers; (2) A proxy server will be blocked if it visits a single website frequently. In this paper, we propose Proxisch, an optimization approach of large-scale unstable proxy servers scheduling, which allow anyone with extremely low cost to run a web crawler efficiently. Proxisch is designed to work efficiently by making maximum use of reliable proxy servers. To solve second problem, it establishes a frequency control mechanism which can ensure the visiting frequency of any chosen proxy server below the website’s limit. The results show that our approach performs better than the other scheduling algorithms.Keywords: proxy server, priority queue, optimization algorithm, distributed web crawling
Procedia PDF Downloads 211634 The Use Management of the Knowledge Management and the Information Technologies in the Competitive Strategy of a Self-Propelling Industry
Authors: Guerrero Ramírez Sandra, Ramos Salinas Norma Maricela, Muriel Amezcua Vanesa
Abstract:
This article presents the beginning of a wider study that intends to demonstrate how within organizations of the automotive industry from the city of Querétaro. Knowledge management and technological management are required, as well as people’s initiative and the interaction embedded at the interior of it, with the appropriate environment that facilitates information conversion with wide information technologies management (ITM) range. A company was identified for the pilot study of this research, where descriptive and inferential research information was obtained. The results of the pilot suggest that some respondents did noted entity the knowledge management topic, even if staffs have access to information technology (IT) that serve to enhance access to knowledge (through internet, email, databases, external and internal company personnel, suppliers, customers and competitors) data, this implicates that there are Knowledge Management (KM) problems. The data shows that academically well-prepared organizations normally do not recognize the importance of knowledge in the business, nor in the implementation of it, which at the end is a great influence on how to manage it, so that it should guide the company to greater in sight towards a competitive strategy search, given that the company has an excellent technological infrastructure and KM was not exploited. Cultural diversity is another factor that was observed by the staff.Keywords: Knowledge Management (KM), Technological Knowledge Management (TKM), Technology Information Management (TI), access to knowledge
Procedia PDF Downloads 501633 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis
Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv
Abstract:
Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.Keywords: correlation analysis, hierarchical filtering, multisource data, network security
Procedia PDF Downloads 201