Search results for: user attributes analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30096

Search results for: user attributes analysis

28986 A Versatile Standing Cum Sitting Device for Rehabilitation and Standing Aid for Paraplegic Patients

Authors: Sasibhushan Yengala, Nelson Muthu, Subramani Kanagaraj

Abstract:

The abstract reports on the design related to a modular and affordable standing cum sitting device to meet the requirements of paraplegic patients of the different physiques. Paraplegic patients need the assistance of an external arrangement to the lower limbs and trunk to help patients adopt the correct posture while standing abreast gravity. This support can be from a tilt table or a standing frame which the patient can use to stay in a vertical posture. Standing frames are devices fitting to support a person in a weight-bearing posture. Commonly, these devices support and lift the end-user in shifting from a sitting position to a standing position. The merits of standing for a paraplegic patient with a spinal injury are numerous. Even when there is limited control on muscles that ordinarily support the user using the standing frame in a vertical position, the standing stance improves the blood pressure, increases bone density, improves resilience and scope of motion, and improves the user's feelings of well-being by letting the patient stand. One limitation with standing frames is that these devices are typically function definitely; cannot be used for different purposes. Therefore, users are often compelled to purchase more than one of these devices, each being purposefully built for definite activities. Another concern frequent in standing frames is manoeuvrability; it is crucial to provide a convenient adjustment scope for all users. Thus, there is a need to provide a standing frame with multiple uses that can be economical for a larger population. There is also a need to equip added readjustment means in a standing frame to lessen the shear and to accommodate a broad range of users. The proposed Versatile Standing cum Sitting Device (VSD) is designed to change from standing to a comfortable sitting position using a series of mechanisms. First, a locking mechanism is provided to lock the VSD in a standing stance. Second, a dampening mechanism is provided to make sure that the VSD shifts from a standing to a sitting position gradually when the lock mechanism gets disengaged. An adjustment option is offered for the height of the headrest via the use of lock knobs. This device can be used in clinics for rehabilitation purposes irrespective of patient's anthropometric data due to its modular adjustments. It can facilitate the patient's daily life routine while in therapy and giving the patient the comfort to sit when tired. The device also provides the availability of rehabilitation to a common person.

Keywords: paraplegic, rehabilitation, spinal cord injury, standing frame

Procedia PDF Downloads 200
28985 An Online Space for Practitioners in the Water, Sanitation and Hygiene Sector

Authors: Olivier Mills, Bernard McDonell, Laura A. S. MacDonald

Abstract:

The increasing availability and quality of internet access throughout the developing world provides an opportunity to utilize online spaces to disseminate water, sanitation and hygiene (WASH) knowledge to practitioners. Since 2001, CAWST has provided in-person education, training and consulting services to thousands of WASH practitioners all over the world, supporting them to start, troubleshoot, improve and expand their WASH projects. As CAWST continues to grow, the organization faces challenges in meeting demand from clients and in providing consistent, timely technical support. In 2012, CAWST began utilizing online spaces to expand its reach by developing a series of resources websites and webinars. CAWST has developed a WASH Education and Training resources website, a Biosand Filter (BSF) Knowledge Base, a Household Water Treatment and Safe Storage Knowledge Base, a mobile app for offline users, a live chat support tool, a WASH e-library, and a series of webinar-style online training sessions to complement its in-person capacity development services. In order to determine the preliminary outcomes of providing these online services, CAWST has monitored and analyzed registration to the online spaces, downloads of the educational materials, and webinar attendance; as well as conducted user surveys. The purpose of this analysis was to find out who was using the online spaces, where users came from, and how the resources were being used. CAWST’s WASH Resources website has served over 5,800 registered users from 3,000 organizations in 183 countries. Additionally, the BSF Knowledge Base has served over 1000 registered users from 68 countries, and over 540 people from 73 countries have attended CAWST’s online training sessions. This indicates that the online spaces are effectively reaching a large numbers of users, from a range of countries. A 2016 survey of the Biosand Filter Knowledge Base showed that approximately 61% of users are practitioners, and 39% are either researchers or students. Of the respondents, 46% reported using the BSF Knowledge Base to initiate a BSF project and 43% reported using the information to train BSF technicians. Finally, 61% indicated they would like even greater support from CAWST’s Technical Advisors going forward. The analysis has provided an encouraging indication that CAWST’s online spaces are contributing to its objective of engaging and supporting WASH practitioners to start, improve and expand their initiatives. CAWST has learned several lessons during the development of these online spaces, in particular related to the resources needed to create and maintain the spaces, and respond to the demand created. CAWST plans to continue expanding its online spaces, improving user experience of the sites, and involving new contributors and content types. Through the use of online spaces, CAWST has been able to increase its global reach and impact without significantly increasing its human resources by connecting WASH practitioners with the information they most need, in a practical and accessible manner. This paper presents on CAWST’s use of online spaces through the CAWST-developed platforms discussed above and the analysis of the use of these platforms.

Keywords: education and training, knowledge sharing, online resources, water and sanitation

Procedia PDF Downloads 266
28984 Cooking Qualities and Sensory Evaluation Analysis of a Collection of Traditional Rice Genotypes of Kerala, India

Authors: Vanaja T., Sravya P. K.

Abstract:

Cooking and eating qualities have major roles in determining the quality characteristics of rice. Traditional rice varieties are highly diversified with each other with respect to unique nutrient, cooking, and eating characteristics, which can be used as parents for the development of high-quality varieties. In order to gather vital information for upcoming rice breeding programs, a study was conducted to assess the diversity of the cooking attributes and sensory evaluation of 28 traditional rice genotypes of Kerala, India, conserved at Regional Agricultural Research Station, Pilicode of Kerala Agricultural University. The cultivars ‘Kochuvithu’, ‘Jeerakachamba’, and ‘Rajameni’ exhibited the highest volume expansion ratio. The highest Kernel elongation ratio was recorded for ‘Gandhakasala’, ‘Rajameni’, and ‘Avadi’. A shorter cooking time based on Alkali spread value was shown by the cultivars ‘Kozhivalan’, ‘Kunhikayama’, ‘Rasagadham’, ‘Jadathi’, ‘Japanviolet’, ‘Nooravella’, ‘Punchavella’, ‘Avadi’, ‘Vadakan vellarikayama’, ‘Punchaparuthi’, ‘Shyamala’, ‘China Silk’, ‘Marathondi’, and ‘Gandhakasala’. Sensory evaluation revealed that the cultivars ‘Japanviolet’, ‘Kunhukunhu’, and ‘Kalladiyaran’ can be categorized under moderate to very much.

Keywords: rice, traditional rice varieties, cooking qualities, sensory evaluation, consumer acceptance

Procedia PDF Downloads 20
28983 Information Retrieval from Internet Using Hand Gestures

Authors: Aniket S. Joshi, Aditya R. Mane, Arjun Tukaram

Abstract:

In the 21st century, in the era of e-world, people are continuously getting updated by daily information such as weather conditions, news, stock exchange market updates, new projects, cricket updates, sports and other such applications. In the busy situation, they want this information on the little use of keyboard, time. Today in order to get such information user have to repeat same mouse and keyboard actions which includes time and inconvenience. In India due to rural background many people are not much familiar about the use of computer and internet also. Also in small clinics, small offices, and hotels and in the airport there should be a system which retrieves daily information with the minimum use of keyboard and mouse actions. We plan to design application based project that can easily retrieve information with minimum use of keyboard and mouse actions and make our task more convenient and easier. This can be possible with an image processing application which takes real time hand gestures which will get matched by system and retrieve information. Once selected the functions with hand gestures, the system will report action information to user. In this project we use real time hand gesture movements to select required option which is stored on the screen in the form of RSS Feeds. Gesture will select the required option and the information will be popped and we got the information. A real time hand gesture makes the application handier and easier to use.

Keywords: hand detection, hand tracking, hand gesture recognition, HSV color model, Blob detection

Procedia PDF Downloads 292
28982 Understanding the Selectional Preferences of the Twitter Mentions Network

Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das

Abstract:

Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.

Keywords: information diffusion, personality and values, social network analysis, twitter mentions network

Procedia PDF Downloads 379
28981 Effect of Drought Stress on Yield and Yield Components of Maize Cultivars in Golestan Province

Authors: Mojtaba Esmaeilzad Limoudehi, Ebrahim Amiri

Abstract:

Water scarcity is now one of the leading challenges for human societies. In this regard, recognizing the relationship between soil, water, plant growth, and plant response to stress is very significant. In this paper, considering the importance of drought stress and the role of choosing suitable cultivars in resistance against drought, a split-plot experiment using early, intermediate, and late-maturing cultivars was carried out in Katul filed, Golestan province during two cultivation years of 2015 and 2016. The main factor was irrigation intervals at four levels, including 7 days, 14 days, 21 days, and 28 days. The subfactor was the subplot of six maize cultivars (two early maturing cultivars, two medium maturing cultivars, and two late-maturing cultivars). The results of variance analysis have revealed that irrigation interval and cultivars treatment have significant effects on the number of grain in each corn, number of rows in each corn, number of grain per row, the weight of 1000 grains, grain yield, and biomass yield. Although, the interaction of these two factors on the mentioned attributes was meaningful. The best grain yield was achieved at 7 days irrigation interval and late maturing maize cultivars treatment, which was equal to 12301 kg/ha.

Keywords: corn, growth period, optimization, stress

Procedia PDF Downloads 144
28980 Online Teaching and Learning Processes: Declarative and Procedural Knowledge

Authors: Eulalia Torras, Andreu Bellot

Abstract:

To know whether students’ achievements are the result of online interaction and not just a consequence of individual differences themselves, it seems essential to link the teaching presence and social presence to the types of knowledge built. The research aim is to analyze the social presence in relation to two types of knowledge, declarative and procedural. Qualitative methodology has been used. The analysis of the contents was based on an observation protocol that included community of enquiry indicators and procedural and declarative knowledge indicators. The research has been conducted in three phases that focused on an observational protocol and indicators, results and conclusions. Results show that the teaching-learning processes have been characterized by the patterns of presence and types of knowledge. Results also show the importance of social presence support provided by the teacher and the students, not only in regard to the nature of the instructional support but also concerning how it is presented to the student and the importance that is attributed to it in the teaching-learning process, that is, what it is that assistance is offered on. In this study, we find that the presence based on procedural guidelines and declarative reflection, the management of shared meaning on the basis of the skills and the evidence of these skills entail patterns of learning. Nevertheless, the importance that the teacher attributes to each support aspect has a bearing on the extent to which the students reflect more on the given task.

Keywords: education, online, teaching and learning processes, knowledge

Procedia PDF Downloads 217
28979 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 194
28978 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 260
28977 Optimizing Usability Testing with Collaborative Method in an E-Commerce Ecosystem

Authors: Markandeya Kunchi

Abstract:

Usability testing (UT) is one of the vital steps in the User-centred design (UCD) process when designing a product. In an e-commerce ecosystem, UT becomes primary as new products, features, and services are launched very frequently. And, there are losses attached to the company if an unusable and inefficient product is put out to market and is rejected by customers. This paper tries to answer why UT is important in the product life-cycle of an E-commerce ecosystem. Secondary user research was conducted to find out work patterns, development methods, type of stakeholders, and technology constraints, etc. of a typical E-commerce company. Qualitative user interviews were conducted with product managers and designers to find out the structure, project planning, product management method and role of the design team in a mid-level company. The paper tries to address the usual apprehensions of the company to inculcate UT within the team. As well, it stresses upon factors like monetary resources, lack of usability expert, narrow timelines, and lack of understanding of higher management as some primary reasons. Outsourcing UT to vendors is also very prevalent with mid-level e-commerce companies, but it has its own severe repercussions like very little team involvement, huge cost, misinterpretation of the findings, elongated timelines, and lack of empathy towards the customer, etc. The shortfalls of the unavailability of a UT process in place within the team and conducting UT through vendors are bad user experiences for customers while interacting with the product, badly designed products which are neither useful and nor utilitarian. As a result, companies see dipping conversions rates in apps and websites, huge bounce rates and increased uninstall rates. Thus, there was a need for a more lean UT system in place which could solve all these issues for the company. This paper highlights on optimizing the UT process with a collaborative method. The degree of optimization and structure of collaborative method is the highlight of this paper. Collaborative method of UT is one in which the centralised design team of the company takes for conducting and analysing the UT. The UT is usually a formative kind where designers take findings into account and uses in the ideation process. The success of collaborative method of UT is due to its ability to sync with the product management method employed by the company or team. The collaborative methods focus on engaging various teams (design, marketing, product, administration, IT, etc.) each with its own defined roles and responsibility in conducting a smooth UT with users In-house. The paper finally highlights the positive results of collaborative UT method after conducting more than 100 In-lab interviews with users across the different lines of businesses. Some of which are the improvement of interaction between stakeholders and the design team, empathy towards users, improved design iteration, better sanity check of design solutions, optimization of time and money, effective and efficient design solution. The future scope of collaborative UT is to make this method leaner, by reducing the number of days to complete the entire project starting from planning between teams to publishing the UT report.

Keywords: collaborative method, e-commerce, product management method, usability testing

Procedia PDF Downloads 119
28976 Exploring Augmented Reality Applications for UNESCO World Heritage Sites in Greece: Addressing Purpose, Scenarios, Platforms, and Visitor Impact

Authors: A. Georgiou, A. Galani, A. Karatza, G. E. Bampasidis

Abstract:

Augmented Reality (AR) technology has become integral in enhancing visitor experiences at Greece's UNESCO World Heritage Sites. This research meticulously investigates various facets of AR applications/games associated with these revered sites. The cultural heritage represents the identity of each nation in the world. Technology can breathe life into this identity. Through Augmented Reality (AR), individuals can travel back in time, visit places they cannot access in real life, discover the history of these places, and live unique experiences. The study examines the objectives and intended goals behind the development and deployment of each augmented reality application/game pertaining to the UNESCO World Heritage Sites in Greece. It thoroughly analyzes the scenarios presented within these AR games/applications, examining how historical narratives, interactive elements, and cultural context are incorporated to engage users. Furthermore, the research identifies and assesses the technological platforms utilized for the development and implementation of these AR experiences, encompassing mobile devices, AR headsets, or specific software frameworks. It classifies and examines the types of augmented reality employed within these applications/games, including marker-based, markerless, location-based, or immersive AR experiences. Evaluation of the benefits accrued by visitors engaging with these AR applications/games, such as enhanced learning experiences, improved cultural understanding, and heightened engagement with the heritage sites, forms a crucial aspect of this study. Additionally, the research scrutinizes potential drawbacks or limitations associated with the AR applications/games, considering technological barriers, user accessibility issues, or constraints affecting user experience. By thoroughly investigating these pivotal aspects, this research aims to provide a comprehensive overview and analysis of the landscape of augmented reality applications/games linked to the UNESCO World Heritage Sites in Greece. The findings seek to contribute nuanced insights into the effectiveness, challenges, and opportunities associated with leveraging AR technology for heritage site preservation, visitor engagement, and cultural enrichment.

Keywords: augmented reality, AR applications, UNESCO sites, cultural heritage, Greece, visitor engagement, historical narratives

Procedia PDF Downloads 64
28975 Interaction Design In Home Appliance: An Integrated Approach InKanseiAnd Hedonomic “Cases: Rice Cooker, Juicer, Mixer”

Authors: Sara Mostowfi, Hassan Sadeghinaeini, Sana Behnamasl, Leila Ensaniat, Maryam Mostafaee

Abstract:

Nowadays, most of product producers, e.g. home appliance, electronic machines and vehicles focus on quality and comfort, and promise consumers ease of use and pleasurable experiences during product using. Consumers make their purchase decisions according to two needs: functional and emotional needs. Functional needs are fulfilled by product functionality, besides emotional needs are related to psychologists’ aspects of production. Emotions are distinctive elements which should be added to products and services to lead them up. In this case, the authors’ survey conducted pleasurable and hedonomic aspects in products of a home appliance company in Iran. In this regard, three samples of home appliance were selected: mixer, rice cooker, iron. Fifteen women (20-60) participated in this study. Every user evaluated each product by questionnaire based on 7 point semantic differential scale. After analyzing the results with statistical methods, results showed that 90% of users aren’t satisfied with hedonic and pleasurable criteria in interaction with these products. They notified that regarding hedonomics and pleasurable criteria’s they will have better ease of use and functionality. Our findings show a significant association between products’ features and user satisfaction. It seems that industrial design has a significant impression on the company’s products and with regard the pleasurable criteria the company sales will be more successful.

Keywords: home appliance, interaction, pleasure, hedonomy, ergonomy

Procedia PDF Downloads 383
28974 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 252
28973 Doing Durable Organisational Identity Work in the Transforming World of Work: Meeting the Challenge of Different Workplace Strategies

Authors: Theo Heyns Veldsman, Dieter Veldsman

Abstract:

Organisational Identity (OI) refers to who and what the organisation is, what it stands for and does, and what it aspires to become. OI explores the perspectives of how we see ourselves, are seen by others and aspire to be seen. It provides as rationale the ‘why’ for the organisation’s continued existence. The most widely accepted differentiating features of OI are encapsulated in the organisation’s core, distinctive, differentiating, and enduring attributes. OI finds its concrete expression in the organisation’s Purpose, Vision, Strategy, Core Ideology, and Legacy. In the emerging new order infused by hyper-turbulence and hyper-fluidity, the VICCAS world, OI provides a secure anchor and steady reference point for the organisation, particularly the growing widespread focus on Purpose, which is indicative of the organisation’s sense of social citizenship. However, the transforming world of work (TWOW) - particularly the potent mix of ongoing disruptive innovation, the 4th Industrial Revolution, and the gig economy with the totally unpredicted COVID19 pandemic - has resulted in the consequential adoption of different workplace strategies by organisations in terms of how, where, and when work takes place. Different employment relations (transient to permanent); work locations (on-site to remote); work time arrangements (full-time at work to flexible work schedules); and technology enablement (face-to-face to virtual) now form the basis of the employer/employee relationship. The different workplace strategies, fueled by the demands of TWOW, pose a substantive challenge to organisations of doing durable OI work, able to fulfill OI’s critical attributes of core, distinctive, differentiating, and enduring. OI work is contained in the ongoing, reciprocally interdependent stages of sense-breaking, sense-giving, internalisation, enactment, and affirmation. The objective of our paper is to explore how to do durable OI work relative to different workplace strategies in the TWOW. Using a conceptual-theoretical approach from a practice-based orientation, the paper addresses the following topics: distinguishes different workplace strategies based upon a time/place continuum; explicates stage-wise the differential organisational content and process consequences of these strategies for durable OI work; indicates the critical success factors of durable OI work under these differential conditions; recommends guidelines for OI work relative to TWOW; and points out ethical implications of all of the above.

Keywords: organisational identity, workplace strategies, new world of work, durable organisational identity work

Procedia PDF Downloads 200
28972 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 73
28971 Effect of Mobile Drip and Linear Irrigation System on Sugar Beet Yield

Authors: Ismail Tas, Yusuf Ersoy Yildirim, Yavuz Fatih Fidantemiz, Aysegul Boyacioglu, Demet Uygan, Ozgur Ates, Erdinc Savasli, Oguz Onder, Murat Tugrul

Abstract:

The biggest input of agricultural production is irrigation, water and energy. Although it varies according to the conditions in drip and sprinkler irrigation systems compared to surface irrigation systems, there is a significant amount of energy expenditure. However, this expense not only increases the user's control over the irrigation water but also provides an increase in water savings and water application efficiency. Thus, while irrigation water is used more effectively, it also contributes to reducing production costs. The Mobile Drip Irrigation System (MDIS) is a system in which new technologies are used, and it is one of the systems that are thought to play an important role in increasing the irrigation water utilization rate of plants and reducing water losses, as well as using irrigation water effectively. MDIS is currently considered the most effective method for irrigation, with the development of both linear and central motion systems. MDIS is potentially more advantageous than sprinkler irrigation systems in terms of reducing wind-induced water losses and reducing evaporation losses on the soil and plant surface. Another feature of MDIS is that the sprinkler heads on the systems (such as the liner and center pivot) can remain operational even when the drip irrigation system is installed. This allows the user to use both irrigation methods. In this study, the effect of MDIS and linear sprinkler irrigation method on sugar beet yield at different irrigation water levels will be revealed.

Keywords: MDIS, linear sprinkler, sugar beet, irrigation efficiency

Procedia PDF Downloads 99
28970 Automated Multisensory Data Collection System for Continuous Monitoring of Refrigerating Appliances Recycling Plants

Authors: Georgii Emelianov, Mikhail Polikarpov, Fabian Hübner, Jochen Deuse, Jochen Schiemann

Abstract:

Recycling refrigerating appliances plays a major role in protecting the Earth's atmosphere from ozone depletion and emissions of greenhouse gases. The performance of refrigerator recycling plants in terms of material retention is the subject of strict environmental certifications and is reviewed periodically through specialized audits. The continuous collection of Refrigerator data required for the input-output analysis is still mostly manual, error-prone, and not digitalized. In this paper, we propose an automated data collection system for recycling plants in order to deduce expected material contents in individual end-of-life refrigerating appliances. The system utilizes laser scanner measurements and optical data to extract attributes of individual refrigerators by applying transfer learning with pre-trained vision models and optical character recognition. Based on Recognized features, the system automatically provides material categories and target values of contained material masses, especially foaming and cooling agents. The presented data collection system paves the way for continuous performance monitoring and efficient control of refrigerator recycling plants.

Keywords: automation, data collection, performance monitoring, recycling, refrigerators

Procedia PDF Downloads 165
28969 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 447
28968 Historic Urban Landscape Approach, a Methodology to Elaborate Sustainable Development Plans through Culture and Heritage: The Case Study of Valverde de Burguillos (Spain)

Authors: Julia Rey Perez, Victoria Dominguez Ruiz

Abstract:

The phenomenon of depopulation puts the authorities at risk of abandoning a number of rural-urban areas of significant cultural value, affecting their architecture and intangible cultural heritage. The purpose of this research is to present a methodology created according to the UNESCO Recommendation on the Historic Urban Landscape (HUL), which through the identification of cultural values and attributes, leads to ´Strategic Plans´ build upon the culture and heritage. This methodology is based on the analysis of the town from three perspectives: 1) from the public administration, 2) from the discipline of architecture, and 3) from citizen perception. In order to be able to work on the development of a diagnosis from three very different approaches, collaborative cartographies have been used as working tools. The methodology discussed was applied in Valverde de Burguillos, in Spain, leading to the construction of an inclusive ‘Strategic Plan’ that integrates the management of the town within the overall territorial development plan. The importance of incorporating culture and heritage as a conductor for sustainable urban development through the HUL approach has allowed the local authorities to assume these new tools for heritage conservation, acknowledging community participation as the main element for the ´Strategic Plan” elaboration.

Keywords: rural heritage, citizen participation, inclusiveness, urban governance, UNESCO

Procedia PDF Downloads 141
28967 Remote Vital Signs Monitoring in Neonatal Intensive Care Unit Using a Digital Camera

Authors: Fatema-Tuz-Zohra Khanam, Ali Al-Naji, Asanka G. Perera, Kim Gibson, Javaan Chahl

Abstract:

Conventional contact-based vital signs monitoring sensors such as pulse oximeters or electrocardiogram (ECG) may cause discomfort, skin damage, and infections, particularly in neonates with fragile, sensitive skin. Therefore, remote monitoring of the vital sign is desired in both clinical and non-clinical settings to overcome these issues. Camera-based vital signs monitoring is a recent technology for these applications with many positive attributes. However, there are still limited camera-based studies on neonates in a clinical setting. In this study, the heart rate (HR) and respiratory rate (RR) of eight infants at the Neonatal Intensive Care Unit (NICU) in Flinders Medical Centre were remotely monitored using a digital camera applying color and motion-based computational methods. The region-of-interest (ROI) was efficiently selected by incorporating an image decomposition method. Furthermore, spatial averaging, spectral analysis, band-pass filtering, and peak detection were also used to extract both HR and RR. The experimental results were validated with the ground truth data obtained from an ECG monitor and showed a strong correlation using the Pearson correlation coefficient (PCC) 0.9794 and 0.9412 for HR and RR, respectively. The RMSE between camera-based data and ECG data for HR and RR were 2.84 beats/min and 2.91 breaths/min, respectively. A Bland Altman analysis of the data also showed a close correlation between both data sets with a mean bias of 0.60 beats/min and 1 breath/min, and the lower and upper limit of agreement -4.9 to + 6.1 beats/min and -4.4 to +6.4 breaths/min for both HR and RR, respectively. Therefore, video camera imaging may replace conventional contact-based monitoring in NICU and has potential applications in other contexts such as home health monitoring.

Keywords: neonates, NICU, digital camera, heart rate, respiratory rate, image decomposition

Procedia PDF Downloads 105
28966 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 77
28965 Wet Spun Graphene Fibers With Silver Nanoparticles For Flexible Electronic Applications

Authors: Syed W. Hasan, Zhiqun Tian

Abstract:

Wet spinning provides a facile and economic route to fabricate graphene nanofibers (GFs) on mass scale. Nevertheless, the pristine GFs exhibit significantly low electrical and mechanical properties owing to stacked graphene sheets and weak inter-atomic bonding. In this report, we present highly conductive Ag-decorated-GFs (Ag/GFs). The SEM micrographs show Ag nanoparticles (NPs) (dia ~10 nm) are homogeneously distributed throughout the cross-section of the fiber. The Ag NPs provide a conductive network for the electrons flow raising the conductivity to 1.8(10^4) S/m which is 4 times higher than the pristine GFs. Our results surpass the conductivities of graphene fibers doped with CNTs, Nanocarbon, fullerene, and Cu. The chemical and structural attributes of Ag/GFs are further elucidated through XPS, AFM and Raman spectroscopy.

Keywords: Ag nanoparticles, Conductive fibers, Graphene, Wet spinning

Procedia PDF Downloads 144
28964 The Extension of the Kano Model by the Concept of Over-Service

Authors: Lou-Hon Sun, Yu-Ming Chiu, Chen-Wei Tao, Chia-Yun Tsai

Abstract:

It is common practice for many companies to ask employees to provide heart-touching service for customers and to emphasize the attitude of 'customer first'. However, services may not necessarily gain praise, and may actually be considered excessive, if customers do not appreciate such behaviors. In reality, many restaurant businesses try to provide as much service as possible without taking into account whether over-provision may lead to negative customer reception. A survey of 894 people in Britain revealed that 49 percent of respondents consider over-attentive waiters the most annoying aspect of dining out. It can be seen that merely aiming to exceed customers’ expectations without actually addressing their needs, only further distances and dissociates the standard of services from the goals of customer satisfaction itself. Over-service is defined, as 'service provided that exceeds customer expectations, or simply that customers deemed redundant, resulting in negative perception'. It was found that customers’ reactions and complaints concerning over-service are not as intense as those against service failures caused by the inability to meet expectations; consequently, it is more difficult for managers to become aware of the existence of over-service. Thus the ability to manage over-service behaviors is a significant topic for consideration. The Kano model classifies customer preferences into five categories: attractive quality attribute, one-dimensional quality attribute, must-be quality attribute, indifferent quality attribute and reverse quality attributes. The model is still very popular for researchers to explore the quality aspects and customer satisfaction. Nevertheless, several studies indicated that Kano’s model could not fully capture the nature of service quality. The concept of over-service can be used to restructure the model and provide a better understanding of the service quality construct. In this research, the structure of Kano's two-dimensional questionnaire will be used to classify the factors into different dimensions. The same questions will be used in the second questionnaire for identifying the over-service experienced of the respondents. The finding of these two questionnaires will be used to analyze the relevance between service quality classification and over-service behaviors. The subjects of this research are customers of fine dining chain restaurants. Three hundred questionnaires will be issued based on the stratified random sampling method. Items for measurement will be derived from DINESERV scale. The tangible dimension of the questionnaire will be eliminated due to this research is focused on the employee behaviors. Quality attributes of the Kano model are often regarded as an instrument for improving customer satisfaction. The concept of over-service can be used to restructure the model and provide a better understanding of service quality construct. The extension of the Kano model will not only develop a better understanding of customer needs and expectations but also enhance the management of service quality.

Keywords: consumer satisfaction, DINESERV, kano model, over-service

Procedia PDF Downloads 164
28963 Response of Onion to FTM and Inorganic Fertilizers Application on Growth, Yield and Nutrient Uptake in Lateritic Soil of Konkan

Authors: Rupali Thorat, S. B. Dodake, V. N. Palsande, S. D. Patil

Abstract:

A field experiment was conducted to study the “Response of onion to FYM and inorganic fertilizers application on growth, yield and nutrient uptake in lateritic soil of Konkan” at the farm of Pangari block of Irrigation of Scheme, Central Experimentation Station, Wakawali during Rabi 2009-10. There were 12 treatment combinations, comprising of 3 levels of NPK fertilizers (C1 ,C2-125 kg N, 62.5 kg P205 and 62.5 kg K20 ha-1 and C3-150 kg N, 75 kg P205 and 75 kg K20 ha-1) and 4 levels of FYM (F1-10 t FYM ha-1, F2 - 15 t FYM ha-1, F3-20 t FYM ha-1, F4-25 t FYM ha-1) replicated thrice using Factorial Randomized Block Design. The observations on plant height, number of leaves, girth of plant, polar and equatorial diameter of bulb as well as dry matter yield, onion bulb yield recorded during the course of field study were subjected to statistical analysis. Similarly nutrient content and uptake, quality parameters of bulb and soil properties were also determined and their data were also analyzed statistically. It is revealed from the study that the growth attributes, dry matter yield, onion bulb yield, nutrient content, nutrient uptake, quality parameters were improved significantly due to application of NPK @ 150:75:75 kg ha-1 along with FYM @ 20 t ha-1(C3F3). Application of NPK @ 150:75:75 kg ha-1 along with FYM @ 20 t ha-1 (C3F3) registered highest onion bulb yield (t ha-1). The quality of onion as well as availability of N, P, K, Fe, Mn, Zn and Cu in the soil was improved due to application of NPK @ 150:75:75 kg ha-1 and FYM @ 20 t ha-1.

Keywords: onion, FYM, yield, nutrient uptake and fertilizer

Procedia PDF Downloads 488
28962 Reliability of Dry Tissues Sampled from Exhumed Bodies in DNA Analysis

Authors: V. Agostini, S. Gino, S. Inturri, A. Piccinini

Abstract:

In cases of corpse identification or parental testing performed on exhumed alleged dead father, usually, we seek and acquire organic samples as bones and/or bone fragments, teeth, nails and muscle’s fragments. The DNA analysis of these cadaveric matrices usually leads to identifying success, but it often happens that the results of the typing are not satisfactory with highly degraded, partial or even non-interpretable genetic profiles. To aggravate the interpretative panorama deriving from the analysis of such 'classical' organic matrices, we must add a long and laborious treatment of the sample that starts from the mechanical fragmentation up to the protracted decalcification phase. These steps greatly increase the chance of sample contamination. In the present work, instead, we want to report the use of 'unusual' cadaveric matrices, demonstrating that their forensic genetics analysis can lead to better results in less time and with lower costs of reagents. We report six case reports, result of on-field experience, in which eyeswabs and cartilage were sampled and analyzed, allowing to obtain clear single genetic profiles, useful for identification purposes. In all cases we used the standard DNA tissue extraction protocols (as reported on the user manuals of the manufacturers such as QIAGEN or Invitrogen- Thermo Fisher Scientific), thus bypassing the long and difficult phases of mechanical fragmentation and decalcification of bones' samples. PCR was carried out using PowerPlex® Fusion System kit (Promega), and capillary electrophoresis was carried out on an ABI PRISM® 310 Genetic Analyzer (Applied Biosystems®), with GeneMapper ID v3.2.1 (Applied Biosystems®) software. The software Familias (version 3.1.3) was employed for kinship analysis. The genetic results achieved have proved to be much better than the analysis of bones or nails, both from the qualitative and quantitative point of view and from the point of view of costs and timing. This way, by using the standard procedure of DNA extraction from tissue, it is possible to obtain, in a shorter time and with maximum efficiency, an excellent genetic profile, which proves to be useful and can be easily decoded for later paternity tests and/or identification of human remains.

Keywords: DNA, eye swabs and cartilage, identification human remains, paternity testing

Procedia PDF Downloads 109
28961 The Online Advertising Speech that Effect to the Thailand Internet User Decision Making

Authors: Panprae Bunyapukkna

Abstract:

This study investigated figures of speech used in fragrance advertising captions on the Internet. The objectives of the study were to find out the frequencies of figures of speech in fragrance advertising captions and the types of figures of speech most commonly applied in captions. The relation between figures of speech and fragrance was also examined in order to analyze how figures of speech were used to represent fragrance. Thirty-five fragrance advertisements were randomly selected from the Internet. Content analysis was applied in order to consider the relation between figures of speech and fragrance. The results showed that figures of speech were found in almost every fragrance advertisement except one advertisement of Lancôme. Thirty-four fragrance advertising captions used at least one kind of figure of speech. Metaphor was most frequently found and also most frequently applied in fragrance advertising captions, followed by alliteration, rhyme, simile and personification, and hyperbole respectively.

Keywords: advertising speech, fragrance advertisements, figures of speech, metaphor

Procedia PDF Downloads 241
28960 The Preliminary Study of the Possible Relationship between Urban Open Space System and Residents' Health Outcome

Authors: Jia-Jin He, Tzu-Yuan Stessa Chao

Abstract:

It is generally accepted that community residents with abundant open space have better health status on average, and thus more and more cities around the world began their pursuit of the greatest possible amount of green space within urban areas through urban planning approach. Nevertheless, only a few studies managed to provide empirical evidence regarding the actual relationship between 'providing' green space and 'improving' human health at city level. There is also lack of evidence of direct positive improvement of health by increasing the amount of green space. For urban planning professional, it is important to understand citizens’ usage behaviour towards green space as a critical evidence for future planning and design strategies. There is a research need to further investigate the amount of green space, user behaviour of green spaces and the health outcome of urban dwellers. To this end, we would like to find out other important factors for urban dwellers’ usage behaviours of green spaces. 'Average green spaces per person' is one of the National well-being Indicators in Taiwan as in many other countries. Through our preliminary research, we collected and analyzed the official data of planned open space coverages, average life expectancy, exercise frequency and obesity ratio in all cities of Taiwan. The study result indicates an interesting finding that Kaohsiung city, the second largest city in Taiwan, tells a completely different story. Citizens in Kaosiung city have more open spaces than any other city through urban planning, yet have relatively unhealthy condition in contrary. Whether it pointed out that the amount of the open spaces per person has would not direct to the health outcome. Therefore, the pre-established view which states that open spaces must have positive effects on human health should be examined more prudently. Hence, this paper intends to explore the relationship between user behaviour of open spaces and citizens’ health conditions by critically analyzing past related literature and collecting selective data from government health database in 2015. We also take Kaohsiung city, as a case study area to conduct statistical analysis first followed by questionnaire survey to gain a better understanding. Finally, we aim to feedback our findings to the current planning system in Taiwan for better health promotion urbanized areas.

Keywords: open spaces, urban planning systems, healthy cities, health outcomes

Procedia PDF Downloads 167
28959 Long-Term Resilience Performance Assessment of Dual and Singular Water Distribution Infrastructures Using a Complex Systems Approach

Authors: Kambiz Rasoulkhani, Jeanne Cole, Sybil Sharvelle, Ali Mostafavi

Abstract:

Dual water distribution systems have been proposed as solutions to enhance the sustainability and resilience of urban water systems by improving performance and decreasing energy consumption. The objective of this study was to evaluate the long-term resilience and robustness of dual water distribution systems versus singular water distribution systems under various stressors such as demand fluctuation, aging infrastructure, and funding constraints. To this end, the long-term dynamics of these infrastructure systems was captured using a simulation model that integrates institutional agency decision-making processes with physical infrastructure degradation to evaluate the long-term transformation of water infrastructure. A set of model parameters that varies for dual and singular distribution infrastructure based on the system attributes, such as pipes length and material, energy intensity, water demand, water price, average pressure and flow rate, as well as operational expenditures, were considered and input in the simulation model. Accordingly, the model was used to simulate various scenarios of demand changes, funding levels, water price growth, and renewal strategies. The long-term resilience and robustness of each distribution infrastructure were evaluated based on various performance measures including network average condition, break frequency, network leakage, and energy use. An ecologically-based resilience approach was used to examine regime shifts and tipping points in the long-term performance of the systems under different stressors. Also, Classification and Regression Tree analysis was adopted to assess the robustness of each system under various scenarios. Using data from the City of Fort Collins, the long-term resilience and robustness of the dual and singular water distribution systems were evaluated over a 100-year analysis horizon for various scenarios. The results of the analysis enabled: (i) comparison between dual and singular water distribution systems in terms of long-term performance, resilience, and robustness; (ii) identification of renewal strategies and decision factors that enhance the long-term resiliency and robustness of dual and singular water distribution systems under different stressors.

Keywords: complex systems, dual water distribution systems, long-term resilience performance, multi-agent modeling, sustainable and resilient water systems

Procedia PDF Downloads 292
28958 The Role of Libraries in the Context of Indian Knowledge Based Society

Authors: Sanjeev Sharma

Abstract:

We are living in the information age. Information is not only important to an individual but also to researchers, scientists, academicians and all others who are doing work in their respective fields. The 21st century which is also known as the electronic era has brought several changes in the mechanism of the libraries in their working environment. In the present scenario, acquisition of information resources and implementation of new strategies have brought a revolution in the library’s structures and their principles. In the digital era, the role of the library has become important as new information is coming at every minute. The knowledge society wants to seek information at their desk. The libraries are managing electronic services and web-based information sources constantly in a democratic way. The basic objective of every library is to save the time of user which is based on the quality and user-orientation of services. With the advancement of information communication and technology, the libraries should pay more devotion to the development trends of the information society that would help to adjust their development strategies and information needs of the knowledge society. The knowledge-based society demands to re-define the position and objectives of all the institutions which work with information, knowledge, and culture. The situation is the era of digital India is changing at a fast speed. Everyone wants information 24x7 and libraries have been recognized as one of the key elements for open access to information, which is crucial not only to individual but also to democratic knowledge-based information society. Libraries are especially important now a day the whole concept of education is focusing more and more independent e-learning and their acting. The citizens of India must be able to find and use the relevant information. Here we can see libraries enter the stage: The essential features of libraries are to acquire, organize, store and retrieve for use and preserve publicly available material irrespective of the print as well as non-print form in which it is packaged in such a way that, when it is needed, it can be found and put to use.

Keywords: knowledge, society, libraries, culture

Procedia PDF Downloads 140
28957 The Role of Smart-Taps in Improving Water Accessibility in Rural Ghana

Authors: Ernestina Ohenewaah Denchie, Kevin Lo

Abstract:

Access to clean water is a key element of sustainable development, yet many nations cannot provide reliable water supply to their inhabitants, particularly in rural areas. In Ghana, public smart taps with pre-paid tokens for public standpipe management have been introduced to enhance access to clean water in small towns and rural communities. This research article highlights the impact of pre-paid token systems on water accessibility in small towns and rural Ghana, focusing on their alignment with Sustainable Development Goal 6. We utilize the Technology Acceptance Model (TAM) with data obtained from both quantitative and qualitative responses to demonstrate the user’s acceptance and overall effectiveness of the pre-paid token system in improving access to clean water. We find that among the characteristics of the pre-paid token system, convenience of use, user satisfaction, proximity and accessibility impact smart tap usage positively. Further analyses reveal that providing token loading points at vantage points within communities would improve smart tap usage by about 96%. Finally, our thematic analyses reveal that the problems of the smart tap system can be improved through regular maintenance and technical support, system improvement such as developing an online app for credit loading, restoring lost or unused credits, and better tracking of lost tokens.

Keywords: smart tap, pre-paid, technology acceptance model, water supply

Procedia PDF Downloads 8