Search results for: Mobile listening applications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7818

Search results for: Mobile listening applications

6738 Polysorb®-A Versatile Monomer for Improving Thermoplastics and Thermosetting Properties: Case Study of Polyesters

Authors: R. Saint-Loup, H. Amedro, N. Jacquel, S. Legrand, F. Fenouillot, J. P. Pascault, A. Rousseau

Abstract:

Isosorbide or 1,4-3,6 dianhydrohexitol has been developped for several years as a new biobased monomer. It is commercially available as a starch derivative, more precisely obtained derivated from starch and more precisely from sorbitol. Isosorbide can find several applications, directly as a monomer or after chemical modification, in different polymer fields like thermoplastics (obtained from polycondensation or from radical polymerization of unsaturated monomers) or like Thermosetting resins (like cross linked PU, or after modification like acrylates or epoxy coatings) Concerning aliphatic or semi-aromatic polyesters, the addition of isosorbide improves thermal stability an,d optical properties, allowing a large range of applications as semi-crystalline or amorphous polymers. The preparation of poly (ethylene-co-isosorbide) terephthalate with different ratios of isosorbide will be particularly detailed. The structure – properties relationship will permit a focus on the obtention of polyesters with semi-crystalline or amorphous structures. The influence of isosorbide on the polymerization, on the processing of the resulting polyester as well as the modification of the final properties will be enlightened. The properties of Poly (ethylene-co-isosorbide) terephthlate will be emphasized and related to their applications. The evolutions related to Isosorbide with the replacement of ethylene glycol by Cyclohexanedimethanol allowed to drastically change the properties of the resulting polyester, with a large gap on the properties and new potential applications.

Keywords: modified PET, poly(ethylene-co-isosorbide)terephthalate, specialy polyester, poly(isosorbide_co_cyclohexanediol)terephthalate

Procedia PDF Downloads 69
6737 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 164
6736 Locative Media Apps for Re-Building Urban Experience: Discovering Cities Through Technology

Authors: Kerem Rızvanoglu, Serhat Güney, Betül Aydoğan, Emre Kızılkaya, Ayşegül Boyalı, Onurcan Güden

Abstract:

This study investigates the urban experience of international students coming to Istanbul with exchange programs and reveals how locative media applications accompany their urban experiences. The sample of the research consists of international students who lived, perceived, and conceived the city on a daily basis during the academic year of 2022. Focusing on this particular sample would demonstrate the opportunities and authentic experiences offered by the city as well as the prevalent urban problems for the foreigners. In this regard, international students' urban experience in Istanbul, the blockages they encounter as resident tourists, the hotspots that the city offers, and the role of locative media in enriching the urban experience are the main axes to be evaluated. In the first step of the multi-staged research, we conduct an online qualitative survey with a sample; then, we evaluate the data obtained from the survey using cluster analysis to identify the urban experience, consumption habits, and tastes. In the final stage, digital ethnographic fieldwork will be carried out with representative personas identified by the cluster analysis. With this field research on the urban experience accompanied by locative media applications, suggestions will be developed by evaluating the opportunities these applications offer to enrich the urban practice of foreigners.

Keywords: digital ethnography, international students, locative media applications, urban experience

Procedia PDF Downloads 134
6735 The Influence of a Vertical Rotation on the Fluid Dynamics of Compositional Plumes

Authors: Khaled Suleiman Mohammed Al-Mashrafi

Abstract:

A compositional plume is a fluid flow in a directional channel of finite width in another fluid of different material composition. The study of the dynamics of compositional plumes plays an essential role in many real-life applications like industrial applications (e.g., iron casting), environmental applications (e.g., salt fingers and sea ice), and geophysical applications (e.g., solidification at the inner core boundary (ICB) of the Earth, and mantle plumes). The dynamics of compositional plumes have been investigated experimentally and theoretically. The experimental works observed that the plume flow seems to be stable, although some experiments showed that it can be unstable. At the same time, the theoretical investigations showed that the plume flow is unstable. This is found to be true even if the plume is subject to rotation or/and in the presence of a magnetic field and even if another plume of different composition is also present. It is noticeable that all the theoretical studies on the dynamics of compositional plumes are conducted in unbounded domains. The present work is to investigate theoretically the influence of vertical walls (boundaries) on the dynamics of compositional plumes in the absence/presence of a rotation field. The mathematical model of the dynamics of compositional plumes used the equations of continuity, motion, heat, concentration of light material, and state. It is found that the presence of boundaries has a strong influence on the basic state solution as well as the stability of the plume, particularly when the plume is close to the boundary, but the compositional plume remains unstable.

Keywords: compositional plumes, stability, bounded domain, vertical boundaries

Procedia PDF Downloads 21
6734 Excel-VBA as Modelling Platform for Thermodynamic Optimisation of an R290/R600a Cascade Refrigeration System

Authors: M. M. El-Awad

Abstract:

The availability of computers and educational software nowadays helps engineering students acquire better understanding of engineering principles and their applications. With these facilities, students can perform sensitivity and optimisation analyses which were not possible in the past by using slide-rules and hand calculators. Standard textbooks in engineering thermodynamics also use software such as Engineering Equation Solver (EES) and Interactive Thermodynamics (IT) for solving calculation-intensive and design problems. Unfortunately, engineering students in most developing countries do not have access to such applications which are protected by intellectual-property rights. This paper shows how Microsoft ExcelTM and VBA (Visual Basic for Applications), which are normally distributed with personal computers and laptops, can be used as an alternative modelling platform for thermodynamic analyses and optimisation. The paper describes the VBA user-defined-functions developed for determining the refrigerants properties with Excel. For illustration, the combination is used to model and optimise the intermediate temperature for a propane/iso-butane cascade refrigeration system.

Keywords: thermodynamic optimisation, engineering education, excel, VBA, cascade refrigeration system

Procedia PDF Downloads 423
6733 Effect of Mobile Drip and Linear Irrigation System on Sugar Beet Yield

Authors: Ismail Tas, Yusuf Ersoy Yildirim, Yavuz Fatih Fidantemiz, Aysegul Boyacioglu, Demet Uygan, Ozgur Ates, Erdinc Savasli, Oguz Onder, Murat Tugrul

Abstract:

The biggest input of agricultural production is irrigation, water and energy. Although it varies according to the conditions in drip and sprinkler irrigation systems compared to surface irrigation systems, there is a significant amount of energy expenditure. However, this expense not only increases the user's control over the irrigation water but also provides an increase in water savings and water application efficiency. Thus, while irrigation water is used more effectively, it also contributes to reducing production costs. The Mobile Drip Irrigation System (MDIS) is a system in which new technologies are used, and it is one of the systems that are thought to play an important role in increasing the irrigation water utilization rate of plants and reducing water losses, as well as using irrigation water effectively. MDIS is currently considered the most effective method for irrigation, with the development of both linear and central motion systems. MDIS is potentially more advantageous than sprinkler irrigation systems in terms of reducing wind-induced water losses and reducing evaporation losses on the soil and plant surface. Another feature of MDIS is that the sprinkler heads on the systems (such as the liner and center pivot) can remain operational even when the drip irrigation system is installed. This allows the user to use both irrigation methods. In this study, the effect of MDIS and linear sprinkler irrigation method on sugar beet yield at different irrigation water levels will be revealed.

Keywords: MDIS, linear sprinkler, sugar beet, irrigation efficiency

Procedia PDF Downloads 89
6732 Performance-Based Quality Evaluation of Database Conceptual Schemas

Authors: Janusz Getta, Zhaoxi Pan

Abstract:

Performance-based quality evaluation of database conceptual schemas is an important aspect of database design process. It is evident that different conceptual schemas provide different logical schemas and performance of user applications strongly depends on logical and physical database structures. This work presents the entire process of performance-based quality evaluation of conceptual schemas. First, we show format. Then, the paper proposes a new specification of object algebra for representation of conceptual level database applications. Transformation of conceptual schemas and expression of object algebra into implementation schema and implementation in a particular database system allows for precise estimation of the processing costs of database applications and as a consequence for precise evaluation of performance-based quality of conceptual schemas. Then we describe an experiment as a proof of concept for the evaluation procedure presented in the paper.

Keywords: conceptual schema, implementation schema, logical schema, object algebra, performance evaluation, query processing

Procedia PDF Downloads 287
6731 Face Recognition Using Body-Worn Camera: Dataset and Baseline Algorithms

Authors: Ali Almadan, Anoop Krishnan, Ajita Rattani

Abstract:

Facial recognition is a widely adopted technology in surveillance, border control, healthcare, banking services, and lately, in mobile user authentication with Apple introducing “Face ID” moniker with iPhone X. A lot of research has been conducted in the area of face recognition on datasets captured by surveillance cameras, DSLR, and mobile devices. Recently, face recognition technology has also been deployed on body-worn cameras to keep officers safe, enabling situational awareness and providing evidence for trial. However, limited academic research has been conducted on this topic so far, without the availability of any publicly available datasets with a sufficient sample size. This paper aims to advance research in the area of face recognition using body-worn cameras. To this aim, the contribution of this work is two-fold: (1) collection of a dataset consisting of a total of 136,939 facial images of 102 subjects captured using body-worn cameras in in-door and daylight conditions and (2) evaluation of various deep-learning architectures for face identification on the collected dataset. Experimental results suggest a maximum True Positive Rate(TPR) of 99.86% at False Positive Rate(FPR) of 0.000 obtained by SphereFace based deep learning architecture in daylight condition. The collected dataset and the baseline algorithms will promote further research and development. A downloadable link of the dataset and the algorithms is available by contacting the authors.

Keywords: face recognition, body-worn cameras, deep learning, person identification

Procedia PDF Downloads 159
6730 Development of mHealth Information in Community Based on Geographical Information: A Case Study from Saraphi District, Chiang Mai, Thailand

Authors: Waraporn Boonchieng, Ekkarat Boonchieng, Wilawan Senaratana, Jaras Singkaew

Abstract:

Geographical information system (GIS) is a designated system widely used for collecting and analyzing geographical data. Since the introduction of ultra-mobile, 'smart' devices, investigators, clinicians, and even the general public have had powerful new tools for collecting, uploading and accessing information in the field. Epidemiology paired with GIS will increase the efficacy of preventive health care services. The objective of this study is to apply GPS location services that are available on the common mobile device with district health systems, storing data on our private cloud system. The mobile application has been developed for use on iOS, Android, and web-based platforms. The system consists of two parts of district health information, including recorded resident data forms and individual health recorded data forms, which were developed and approved by opinion sharing and public hearing. The application's graphical user interface was developed using HTML5 and PHP with MySQL as a database management system (DBMS). The reporting module of the developed software displays data in a variety of views, from traditional tables to various types of high-resolution, layered graphics, incorporating map location information with street views from Google Maps. Multi-extension exporting is also supported, utilizing standard platforms such as PDF, PNG, JPG, and XLS. The data were collected in the database beginning in March 2013, by district health volunteers and district youth volunteers who had completed the application training program. District health information consisted of patients’ household coordinates, individual health data, social and economic information. This was combined with Google Street View data, collected in March 2014. Studied groups consisted of 16,085 (67.87%) and 47,811 (59.87%) of the total 23,701 households and 79,855 people were collected by the system respectively, in Saraphi district, Chiang Mai Province. The report generated from the system has had a major benefit directly to the Saraphi District Hospital. Healthcare providers are able to use the basic health data to provide a specific home health care service and also to create health promotion activities according to medical needs of the people in the community.

Keywords: health, public health, GIS, geographic information system

Procedia PDF Downloads 326
6729 Enhanced Planar Pattern Tracking for an Outdoor Augmented Reality System

Authors: L. Yu, W. K. Li, S. K. Ong, A. Y. C. Nee

Abstract:

In this paper, a scalable augmented reality framework for handheld devices is presented. The presented framework is enabled by using a server-client data communication structure, in which the search for tracking targets among a database of images is performed on the server-side while pixel-wise 3D tracking is performed on the client-side, which, in this case, is a handheld mobile device. Image search on the server-side adopts a residual-enhanced image descriptors representation that gives the framework a scalability property. The tracking algorithm on the client-side is based on a gravity-aligned feature descriptor which takes the advantage of a sensor-equipped mobile device and an optimized intensity-based image alignment approach that ensures the accuracy of 3D tracking. Automatic content streaming is achieved by using a key-frame selection algorithm, client working phase monitoring and standardized rules for content communication between the server and client. The recognition accuracy test performed on a standard dataset shows that the method adopted in the presented framework outperforms the Bag-of-Words (BoW) method that has been used in some of the previous systems. Experimental test conducted on a set of video sequences indicated the real-time performance of the tracking system with a frame rate at 15-30 frames per second. The presented framework is exposed to be functional in practical situations with a demonstration application on a campus walk-around.

Keywords: augmented reality framework, server-client model, vision-based tracking, image search

Procedia PDF Downloads 274
6728 Industrial Relations as Communication: The Strange Case of the FCA-UAW Agreement

Authors: Francesco Nespoli

Abstract:

After having posed a theoretical framework combining framing theory and new rhetoric, the paper analyze the shift in communication both adopted by UAW and FCA during the negotiations in fall 2015. The paper argues that mistakes and adjustments played a determinant role respectively in the rejection of the first tentative agreement and in the ratification of the contract. The purpose of the paper is to set a new theoretical framework for the analysis of communication in industrial relations, by describing a narrative construction of reality from the perspective of the new rhetoric. The paper thus analyze all public text, speeches, tweets and Facebook posts by the union reading them as part of the narrative set by the organization condensed by the slogan 'it’s our time'. That narrative tried to gain consensus from the members matching the expectations due to the industry recovery after more than five years of workers' sacrifices. In doing so, the analysis points out a shift in the communication strategy of the union after the first rejection of a tentative agreement in 15 years. The findings suggest that, from the communication point of view, consultation in industrial relations can be conceived as a particular kind of political communication where identification with the audience through deliberate narrative may not be effective if it is not preceded by a listening campaign.

Keywords: communication, consultation, automotive, FCA

Procedia PDF Downloads 184
6727 Applications for Tracking Close Contact with COVID-19 Patients in Malaysia

Authors: Bih Ni Lee

Abstract:

This paper discusses the unending coronavirus (Covid-19) pandemic. The activity of detecting, testing those with symptoms, and isolating their contacts is the most effective method of stopping the chain of coronavirus infection. The number of cases of coronavirus continues to increase with some reporting a cure, but not a few die. Efforts to treat and prevent continue to fight COVID-19 with flu-like symptoms. The importance of the study is to identify smartphone applications that can track the movement of individuals in an effort to curb the spread of COVID-19, especially in Malaysia. This research method used a literature review, which included new insights into the quality of action and scientific papers. It synthesized information gleaned from a variety of sources. The findings of the study are that the Government of Malaysia has launched three main applications to track the movement of individuals, namely Gerak Malaysia, MyTrace, MySejahtera. Similarly, every state in Malaysia has its own state government application to track individual movements. Overall, Malaysia is one of the countries in the world that has successfully curbed the spread of COVID-19; Covid-19 cases in Malaysia are under control.

Keywords: COVID-19 app, national security council, Gerak Malaysia, MyTrace, MySejahtera

Procedia PDF Downloads 126
6726 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes

Authors: Petar Kurecic, Josipa Penic

Abstract:

The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.

Keywords: security, security measures in tourism, tourism, tourist destinations

Procedia PDF Downloads 278
6725 Aphasia, Silence and the Non-Verbalisation of Performance (in Music)

Authors: Navonil Hazra

Abstract:

The paper discusses how and why aphasia can be understood as the language of nonverbal communication in musical performance and also looks for the elements that are required to classify it as a nonverbal language. Since music is regarded as a nonverbal medium that cannot be engaged in any language, it is concerned about how aphasia might be called the language of nonverbalization. The paper also talks about how it portrays the magnificence of a performance, and how it expresses its likings or dislikes. Regarding the reasons for aphasia, the paper talks about the seizure factor and elucidates on seizure subjects as well. Furthermore, it discusses collective seizures and individual seizures. It also tries to consider aphasia as a-posteriori rather than a-priori looking at it from the lens of ‘Pure Reason’. Along with aphasia, the paper tries to make a critique of silence and the possibilities of looking at silence differently, also looking at the ontology of silence and sound. This paper also critically examines silence and the significance of gestures in performance. It also investigates whether gestures are accompanied by silence, establishing the notion of agential silence. This paper also talks about the place and role of memory in the formulation and analysis of a performance, as well as the plaguing and reclamation of memory, how memory alters the linear course of time and taunts us to look for alternative models of temporalities. This paper discusses the concept of 'auditory labour', with active and passive listening.

Keywords: aphasia, gestures, memory, silence

Procedia PDF Downloads 39
6724 Towards Natively Context-Aware Web Services

Authors: Hajer Taktak, Faouzi Moussa

Abstract:

With the ubiquitous computing’s emergence and the evolution of enterprises’ needs, one of the main challenges is to build context-aware applications based on Web services. These applications have become particularly relevant in the pervasive computing domain. In this paper, we introduce our approach that optimizes the use of Web services with context notions when dealing with contextual environments. We focus particularly on making Web services autonomous and natively context-aware. We implement and evaluate the proposed approach with a pedagogical example of a context-aware Web service treating temperature values. 

Keywords: context-aware, CXF framework, ubiquitous computing, web service

Procedia PDF Downloads 355
6723 Mathematics Bridging Theory and Applications for a Data-Driven World

Authors: Zahid Ullah, Atlas Khan

Abstract:

In today's data-driven world, the role of mathematics in bridging the gap between theory and applications is becoming increasingly vital. This abstract highlights the significance of mathematics as a powerful tool for analyzing, interpreting, and extracting meaningful insights from vast amounts of data. By integrating mathematical principles with real-world applications, researchers can unlock the full potential of data-driven decision-making processes. This abstract delves into the various ways mathematics acts as a bridge connecting theoretical frameworks to practical applications. It explores the utilization of mathematical models, algorithms, and statistical techniques to uncover hidden patterns, trends, and correlations within complex datasets. Furthermore, it investigates the role of mathematics in enhancing predictive modeling, optimization, and risk assessment methodologies for improved decision-making in diverse fields such as finance, healthcare, engineering, and social sciences. The abstract also emphasizes the need for interdisciplinary collaboration between mathematicians, statisticians, computer scientists, and domain experts to tackle the challenges posed by the data-driven landscape. By fostering synergies between these disciplines, novel approaches can be developed to address complex problems and make data-driven insights accessible and actionable. Moreover, this abstract underscores the importance of robust mathematical foundations for ensuring the reliability and validity of data analysis. Rigorous mathematical frameworks not only provide a solid basis for understanding and interpreting results but also contribute to the development of innovative methodologies and techniques. In summary, this abstract advocates for the pivotal role of mathematics in bridging theory and applications in a data-driven world. By harnessing mathematical principles, researchers can unlock the transformative potential of data analysis, paving the way for evidence-based decision-making, optimized processes, and innovative solutions to the challenges of our rapidly evolving society.

Keywords: mathematics, bridging theory and applications, data-driven world, mathematical models

Procedia PDF Downloads 70
6722 A Goms Model for Blind Users Website Navigation

Authors: Suraina Sulong

Abstract:

Keyboard support is one of the main accessibility requirements for web pages and web applications for blind user. But it is not sufficient that the blind user can perform all actions on the page using the keyboard. In addition, designers of web sites or web applications have to make sure that keyboard users can use their pages with acceptable performance. We present GOMS models for navigation in web pages with specific task given to the blind user to accomplish. These models can be used to construct the user model for accessible website.

Keywords: GOMS analysis, usability factor, blind user, human computer interaction

Procedia PDF Downloads 146
6721 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 294
6720 Self-Supervised Pretraining on Sequences of Functional Magnetic Resonance Imaging Data for Transfer Learning to Brain Decoding Tasks

Authors: Sean Paulsen, Michael Casey

Abstract:

In this work we present a self-supervised pretraining framework for transformers on functional Magnetic Resonance Imaging (fMRI) data. First, we pretrain our architecture on two self-supervised tasks simultaneously to teach the model a general understanding of the temporal and spatial dynamics of human auditory cortex during music listening. Our pretraining results are the first to suggest a synergistic effect of multitask training on fMRI data. Second, we finetune the pretrained models and train additional fresh models on a supervised fMRI classification task. We observe significantly improved accuracy on held-out runs with the finetuned models, which demonstrates the ability of our pretraining tasks to facilitate transfer learning. This work contributes to the growing body of literature on transformer architectures for pretraining and transfer learning with fMRI data, and serves as a proof of concept for our pretraining tasks and multitask pretraining on fMRI data.

Keywords: transfer learning, fMRI, self-supervised, brain decoding, transformer, multitask training

Procedia PDF Downloads 85
6719 Development of High-Performance Conductive Polybenzoxazine/Graphite-Copper Nanoomposite for Electromagnetic Interference Shielding Applications

Authors: Noureddine Ramdani

Abstract:

In recent years, extensive attention has been given to the study of conductive nanocomposites due to their unique properties, which are dependent on their size and shape. The potential applications of these materials include electromagnetic interference shielding, energy storage, photovoltaics, and others. These outstanding properties have led to increased interest and research in this field. In this work, a conductive poly benzoxazine nanocomposite, PBZ/Gr-Cu, was synthesized through a compression molding technique to achieve a high-performance material suitable for electromagnetic interference (EMI) shielding applications. The microstructure of the nanocomposites was analyzed using scanning electron microscopy (SEM) and Fourier transform infrared spectroscopy (FTIR). The thermal stability, electrical conductivity, and EMI shielding properties of the nanocomposites were evaluated using thermogravimetric analysis, a four-point probe, and a VNA analyzer, respectively. The TGA results revealed that the thermal stability and electrical conductivity of the nanocomposites were significantly enhanced by the incorporation of Gr/Cu nanoparticles. The nanocomposites exhibited a low percolation threshold of about 3.5 wt.% and an increase in carrier concentration and mobility of the carriers with increasing hybrid nanofiller content, causing the composites to behave as n-type semiconductors. These nanocomposites also displayed a high dielectric constant and a high dissipation factor in the frequency range of 8-12 GHz, resulting in higher EMI shielding effectiveness (SE) of 25-44 dB. These characteristics make them promising candidates for lightweight EMI shielding materials in aerospace and radar evasion applications.

Keywords: polybenzoxazine matrix, conductive nanocomposites, electrical conductivity, EMI shielding

Procedia PDF Downloads 80
6718 Approximately Similarity Measurement of Web Sites Using Genetic Algorithms and Binary Trees

Authors: Doru Anastasiu Popescu, Dan Rădulescu

Abstract:

In this paper, we determine the similarity of two HTML web applications. We are going to use a genetic algorithm in order to determine the most significant web pages of each application (we are not going to use every web page of a site). Using these significant web pages, we will find the similarity value between the two applications. The algorithm is going to be efficient because we are going to use a reduced number of web pages for comparisons but it will return an approximate value of the similarity. The binary trees are used to keep the tags from the significant pages. The algorithm was implemented in Java language.

Keywords: Tag, HTML, web page, genetic algorithm, similarity value, binary tree

Procedia PDF Downloads 354
6717 Coping Orientation of Academic Community in the Time of COVID-19 Pandemic: A Pilot Survey Study

Authors: Fereshteh Ahmadi, Önver Cetrez, Said Zandi, Sharareh Akhavan

Abstract:

In this paper, we have mapped the coping methods used to address the coronavirus pandemic by members of the academic community. We conducted an anonymous survey of a convenient sample of 674 faculty/staff members and students from September to December 2020. A modified version of the RCOPE scale was used for data collection. The results indicate that both religious and existential coping methods were used by respondents. The study also indicates that even though 71% of in-formants believed in God or another religious figure, 61% reported that they had tried to gain control of the situation directly without the help of God or another religious figure. The ranking of the coping strategies used indicates that the first five methods used by informants were all non-religious coping methods (i.e., secular existential coping methods): regarding life as a part of a greater whole, regarding nature as an important resource, listening to the sound of surrounding nature, being alone and con-templating, and walking/engaging in any activities outdoors giving a spiritual feeling. Our results contribute to the new area of research on academic community’s coping with pandemic-related stress and challenges.

Keywords: academic staff, academics, coping strategies, coronavirus epidemic, higher education.

Procedia PDF Downloads 81
6716 Over the Air Programming Method for Learning Wireless Sensor Networks

Authors: K. Sangeeth, P. Rekha, P. Preeja, P. Divya, R. Arya, R. Maneesha

Abstract:

Wireless sensor networks (WSN) are small or tiny devices that consists of different sensors to sense physical parameters like air pressure, temperature, vibrations, movement etc., process these data and sends it to the central data center to take decisions. The WSN domain, has wide range of applications such as monitoring and detecting natural hazards like landslides, forest fire, avalanche, flood monitoring and also in healthcare applications. With such different applications, it is being taught in undergraduate/post graduate level in many universities under department of computer science. But the cost and infrastructure required to purchase WSN nodes for having the students getting hands on expertise on these devices is expensive. This paper gives overview about the remote triggered lab that consists of more than 100 WSN nodes that helps the students to remotely login from anywhere in the world using the World Wide Web, configure the nodes and learn the WSN concepts in intuitive way. It proposes new way called over the air programming (OTAP) and its internals that program the 100 nodes simultaneously and view the results without the nodes being physical connected to the computer system, thereby allowing for sparse deployment.

Keywords: WSN, over the air programming, virtual lab, AT45DB

Procedia PDF Downloads 370
6715 Sedentary Behaviour and Metabolic Rate among Adults Professionals: An Intervention Approach (E-Mobile)

Authors: Ahsan Ullah

Abstract:

The aim of this study is to measure the relationship between sedentary behaviour and metabolic rate among adult professionals. An intervention (e-mobile) approach was used for gathered the information from the participants. A total of 40 participants (men = 30, and women = 10) with an average age of (36.53 years ± 8.85) were randomly assigned to an intervention group (n= 20) and control group (n= 20). All the participants completed the Sedentary Behaviour Questionnaire (SBQ) and The International Physical Activity Questionnaire (IPAQ) at baseline and at the end of eight weeks. The participants in the intervention group were given physical activity guidelines targeted at increasing physical activity levels during daily activities. On the other side, the control group was advised to continue with their routine daily physical activity. Statistical analyses, including descriptive statistics and inferential analysis like mean, SD, T-tests, and ANOVA, were used to analyze the data and determine relationships between variables. After analyzing the data, the results showed that significant difference in pre and post metabolic rate scores (1488.31 ± 179.13 to 1468.44 ± 128.19) (f = 10.83, p < 0.000) were noted in the experimental group after eight week. The experimental group increased their walking (863.78 METs per week to 1625.55 METs per week), moderate activity (295 METs per week to 743 METs per week) and vigorous activity (362 METs per week to 1366 METs per week) physical activity (all p<0.001). There were no significant differences observed in any outcome measured before and after eight weeks in the control group. These findings suggest that engaging in physical activity can effectively improve metabolic rate and reduce sedentary behavior among physically active adults.

Keywords: sedentary behavior, metabolic rate, adult’s professionals, physical activity

Procedia PDF Downloads 10
6714 Static and Dynamic Tailings Dam Monitoring with Accelerometers

Authors: Cristiana Ortigão, Antonio Couto, Thiago Gabriel

Abstract:

In the wake of Samarco Fundão’s failure in 2015 followed by Vale’s Brumadinho disaster in 2019, the Brazilian National Mining Agency started a comprehensive dam safety programmed to rank dam safety risks and establish monitoring and analysis procedures. This paper focuses on the use of accelerometers for static and dynamic applications. Static applications may employ tiltmeters, as an example shown later in this paper. Dynamic monitoring of a structure with accelerometers yields its dynamic signature and this technique has also been successfully used in Brazil and this paper gives an example of tailings dam.

Keywords: instrumentation, dynamic, monitoring, tailings, dams, tiltmeters, automation

Procedia PDF Downloads 138
6713 Investigating Unplanned Applications and Admissions to Hospitals of Children with Cancer

Authors: Hacer Kobya Bulut, Ilknur Kahriman, Birsel C. Demirbag

Abstract:

Introduction and Purpose: The lives of children with cancer are affected by long term hospitalizations in a negative way due to complications arising from diagnosis or treatment. However, the children's parents are known to have difficulties in meeting their children’s needs and providing home care after cancer treatment or during remission process. Supporting these children and their parents by giving a planned discharge training starting from the hospital and home care leads to reducing hospital applications, hospitalizations, hospital costs, shortening the length of hospital stay and increasing the satisfaction of the children with cancer and their families. This study was conducted to investigate the status of children and their parents' unplanned application to hospital and re-hospitalization. Methods: The study was carried out with 65 children with hematological malignancy in 0-17 age group and their families in a hematology clinic and polyclinic of a university hospital in Trabzon. Data were collected with survey methodology between August-November, 2015 through face to face interview using numbers, percentage and chi-square test in the evaluation. Findings: Most of the children were leukemia (90.8%) and 49.2% had been ill over 13 months. Few of the parents (32.3%) stated that they had received discharge and home care training (24.6%) but most of them (69.2%) found themselves enough in providing home care. Very few parents (6.2%) received home care training after their children being discharged and the majority of parents (61.5%) faced difficulties in home care and had no one to call around them. The parents expressed that in providing care to their children with hematological malignance, they faced difficulty in feeding them (74.6%), explaining their disease (50.0%), giving their oral medication (47.5%), providing hygiene (43.5%) and providing oral care (39.3%). The question ‘What are the emergency situations in which you have to bring your children to a doctor immediately?' was replied as fever (89.2%), severe nausea and vomiting (87.7%), hemorrhage (86.2%) and pain (81.5%). The study showed that 50.8% of the children had unplanned applications to hospitals and 33.8% of them identified as unplanned hospitalization and the first causes of this were fever and pain. The study showed that the frequency of applications (%78.8) and hospitalizations (%81.8) was higher for boys and a statistically significant difference was found between gender and unplanned applications (X=4.779; p=0.02). Applications (48.5%) and hospitalizations (40.9%) were found lower for the parents who had received hospital discharge training, and a significant difference was determined between receiving training and unplanned hospitalizations (X=8.021; p=0.00). Similarly, applications (30.3%) and hospitalizations (40.9%) was found lower for the ones who had received home care training, and a significant difference was determined between receiving home care training and unplanned hospitalizations (X=4.758; p=0.02). Conclusion: It was found out that caregivers of children with cancer did not receive training related to home care and complications about treatment after discharging from hospital, so they faced difficulties in providing home care and this led to an increase in unplanned hospital applications and hospitalizations.

Keywords: cancer, children, unplanned application, unplanned hospitalization

Procedia PDF Downloads 263
6712 Information Overload, Information Literacy and Use of Technology by Students

Authors: Elena Krelja Kurelović, Jasminka Tomljanović, Vlatka Davidović

Abstract:

The development of web technologies and mobile devices makes creating, accessing, using and sharing information or communicating with each other simpler every day. However, while the amount of information constantly increasing it is becoming harder to effectively organize and find quality information despite the availability of web search engines, filtering and indexing tools. Although digital technologies have overall positive impact on students’ lives, frequent use of these technologies and digital media enriched with dynamic hypertext and hypermedia content, as well as multitasking, distractions caused by notifications, calls or messages; can decrease the attention span, make thinking, memorizing and learning more difficult, which can lead to stress and mental exhaustion. This is referred to as “information overload”, “information glut” or “information anxiety”. Objective of this study is to determine whether students show signs of information overload and to identify the possible predictors. Research was conducted using a questionnaire developed for the purpose of this study. The results show that students frequently use technology (computers, gadgets and digital media), while they show moderate level of information literacy. They have sometimes experienced symptoms of information overload. According to the statistical analysis, higher frequency of technology use and lower level of information literacy are correlated with larger information overload. The multiple regression analysis has confirmed that the combination of these two independent variables has statistically significant predictive capacity for information overload. Therefore, the information science teachers should pay attention to improving the level of students’ information literacy and educate them about the risks of excessive technology use.

Keywords: information overload, computers, mobile devices, digital media, information literacy, students

Procedia PDF Downloads 271
6711 Modified Step Size Patch Array Antenna for UWB Wireless Applications

Authors: Hamid Aslani, Ahmed Radwan

Abstract:

In this paper, a single element microstrip antenna is presented for UWB applications by using techniques as partial ground plane and modified the shape of the patch. The antenna is properly designed to have a compact size and constant gain against frequency. The simulated results have done using two EM software and show good agreement with the measured results for the fabricated antenna. Then a designing of two elements patch antenna array for UWB in the frequency band of 3.1-10 GHz is presented in this paper. The array is constructed by means of feeding two omni-directional modified circular patch elements with a modified power divider. Experimental results show that the array has a stable radiation pattern and low return loss over a broad bandwidth of 64% (3.1–10 GHz). Due to its planar profile, physically compact size, wide impedance bandwidth, directive performance over a wide bandwidth proposed antenna is a good candidate for portable UWB applications and other UWB integrated circuits.

Keywords: ultra wide band, radiation performance, microstrip antenna, size miniaturized antenna

Procedia PDF Downloads 255
6710 Small Scale Solar-Photovoltaic and Wind Pump-Storage Hydroelectric System for Remote Residential Applications

Authors: Seshi Reddy Kasu, Florian Misoc

Abstract:

The use of hydroelectric pump-storage system at large scale, MW-size systems, is already widespread around the world. Designed for large scale applications, pump-storage station can be scaled-down for small, remote residential applications. Given the cost and complexity associated with installing a substation further than 100 miles from the main transmission lines, a remote, independent and self-sufficient system is by far the most feasible solution. This article is aiming at the design of wind and solar power generating system, by means of pumped-storage to replace the wind and/or solar power systems with a battery bank energy storage. Wind and solar pumped-storage power generating system can reduce the cost of power generation system, according to the user's electricity load and resource condition and also can ensure system reliability of power supply. Wind and solar pumped-storage power generation system is well suited for remote residential applications with intermittent wind and/or solar energy. This type of power systems, installed in these locations, could be a very good alternative, with economic benefits and positive social effects. The advantage of pumped storage power system, where wind power regulation is calculated, shows that a significant smoothing of the produced power is obtained, resulting in a power-on-demand system’s capability, concomitant to extra economic benefits.

Keywords: battery bank, photo-voltaic, pump-storage, wind energy

Procedia PDF Downloads 591
6709 The Effects of Zinc Oxide Nanoparticles Loaded with Indole-3-Acetic Acid and Indole-3-Butyric Acid on in vitro Rooting of Apple Microcuttings

Authors: Shabnam Alizadeh, Hatice Dumanoglu

Abstract:

Plant tissue culture is a substantial plant propagation technique for mass clonal production throughout the year, regardless of time in fruit species. However, the rooting achievement must be enhanced in the difficult-to-root genotypes. Classical auxin applications in clonal propagation of these genotypes are inadequate to solve the rooting problem. Nanoparticles having different physical and chemical properties from bulk material could enhance the rooting success of controlled release of these substances when loaded with auxin due to their ability to reach the active substance up to the target cells as a carrier system.The purpose of this study is to investigate the effects of zinc oxide nanoparticles loaded with indole-3-acetic acid (IAA-nZnO) and indole-3-butyric acid (IBA-nZnO) on in vitro rooting of microcuttings in a difficult-to-root apple genotype (Malus domestica Borkh.). Rooting treatments consisted of IBA or IAA at concentrations of 0.5, 1.0, 2.0, 3.0 mg/L; nZnO, IAA-nZnO and IBA-nZnO at doses of 0.0, 1.0, 2.0, 3.0, 4.0, 5.0, 6.0 mg/L were used. All components were added to the Murashige and Skoog (MS) basal medium at strength ½ with 2% sucrose and 0.7% agar before autoclaving. In the study, no rooting occurred in control and nZnO applications. Especially, 1.0 mg/L and 2.0 mg/L IBA-nZnO nanoparticle applications (containing 0.5 mg/L and 0.9 mg/L IBA), respectively with rooting rates of 40.3% and 70.4%, rooting levels of 2.0±0.4 and 2.3±0.4, 2.6±0.7 and 2.5±0.6 average root numbers and 20.4±1.6 mm and 20.2±3.4 mm average root lengths put forward as effective applications.

Keywords: Auxin, Malus, nanotechnology, zinc oxide nanoparticles

Procedia PDF Downloads 141