Search results for: office computer users
4073 Value Chain Based New Business Opportunity
Authors: Seonjae Lee, Sungjoo Lee
Abstract:
Excavation is necessary to remain competitive in the current business environment. The company survived the rapidly changing industry conditions by adapting new business strategy and reducing technology challenges. Traditionally, the two methods are conducted excavations for new businesses. The first method is, qualitative analysis of expert opinion, which is gathered through opportunities and secondly, new technologies are discovered through quantitative data analysis of method patents. The second method increases time and cost. Patent data is restricted for use and the purpose of discovering business opportunities. This study presents the company's characteristics (sector, size, etc.), of new business opportunities in customized form by reviewing the value chain perspective and to contributing to creating new business opportunities in the proposed model. It utilizes the trademark database of the Korean Intellectual Property Office (KIPO) and proprietary company information database of the Korea Enterprise Data (KED). This data is key to discovering new business opportunities with analysis of competitors and advanced business trademarks (Module 1) and trading analysis of competitors found in the KED (Module 2).Keywords: value chain, trademark, trading analysis, new business opportunity
Procedia PDF Downloads 3744072 Libyan Crude Oil Composition Analysis and Prediction
Authors: Omar Hussein El Ayadi, EmadY. El-Mansouri, Mohamed B. Dozan
Abstract:
Production oil process require specific details i.e. oil composition. Generally, types of oil or differentiation between reservoir fluids depend specifically on composition. The main purpose of this study is to correlate and predict the Libyan oil (reservoir fluid and residual) composition utilizing tri-angle-coordinate plots discovered and tasked with Excel. The reservoir fluid data (61 old + 47 new), the residual oil data (33 new) collected from most of Libyan reservoirs were correlated with each others. Moreover, find a relation between stock tank molecular weight and stock tank oil gravity (oAPI), the molecular weight oh (C7+) versus residual oil gravity (oAPI). The average value of every oil composition was estimated including non-hydrocarbon (H2S, CO2, and N2). Nevertheless, the isomers (i-…) and normal (n-…) structure of (C4) and (C5) were also obtained. The summary of the conclusion is; utilizing excel Microsoft office to draw triangle coordinates to find two unknown component if only one is known. However, it is recommended to use the obtained oil composition plots and equations for any oil composition dependents i.e. optimum separator pressure.Keywords: PVT, phase behavior, petroleum, chemical engineering
Procedia PDF Downloads 5144071 The Use of Software and Internet Search Engines to Develop the Encoding and Decoding Skills of a Dyslexic Learner: A Case Study
Authors: Rabih Joseph Nabhan
Abstract:
This case study explores the impact of two major computer software programs Learn to Speak English and Learn English Spelling and Pronunciation, and some Internet search engines such as Google on mending the decoding and spelling deficiency of Simon X, a dyslexic student. The improvement in decoding and spelling may result in better reading comprehension and composition writing. Some computer programs and Internet materials can help regain the missing awareness and consequently restore his self-confidence and self-esteem. In addition, this study provides a systematic plan comprising a set of activities (four computer programs and Internet materials) which address the problem from the lowest to the highest levels of phoneme and phonological awareness. Four methods of data collection (accounts, observations, published tests, and interviews) create the triangulation to validly and reliably collect data before the plan, during the plan, and after the plan. The data collected are analyzed quantitatively and qualitatively. Sometimes the analysis is either quantitative or qualitative, and some other times a combination of both. Tables and figures are utilized to provide a clear and uncomplicated illustration of some data. The improvement in the decoding, spelling, reading comprehension, and composition writing skills that occurred is proved through the use of authentic materials performed by the student under study. Such materials are a comparison between two sample passages written by the learner before and after the plan, a genuine computer chat conversation, and the scores of the academic year that followed the execution of the plan. Based on these results, the researcher recommends further studies on other Lebanese dyslexic learners using the computer to mend their language problem in order to design and make a most reliable software program that can address this disability more efficiently and successfully.Keywords: analysis, awareness, dyslexic, software
Procedia PDF Downloads 2274070 An Assessment of Experiential Learning Outcomes of Study Abroad Programs in Hospitality: A Learning Style Perspective
Authors: Radesh Palakurthi
Abstract:
The purpose of this study was to determine the impact of experiential learning on learning outcomes in hospitality education. This paper presents the results of an online survey of students from the U.S. studying abroad and their self-reported change in learning outcomes as assessed using the Core Competencies Model for the Hospitality Industry developed by Employment and Training Development Office of the U.S. Department of Labor. The impact of student learning styles on learning outcomes is also evaluated in this study. Kolb’s Learning Styles Inventory Model was used to assess students’ learning style. The results show that students reported significant improvements in their learning outcomes because of engaging in study abroad experiential learning programs. The learning styles of the students had significant effect on one of core learning outcomes- personal effectiveness.Keywords: hospitality competencies, hospitality education, Kolb’s learning style inventory, learning outcomes, study abroad
Procedia PDF Downloads 2214069 Empirical Study From Final Exams of Graduate Courses in Computer Science to Demystify the Notion of an Average Software Engineer and Offer a Direction to Address Diversity of Professional Backgrounds of a Student Body
Authors: Alex Elentukh
Abstract:
The paper is based on data collected from final exams administered during five years of teaching the graduate course in software engineering. The visualization instrument with four distinct personas has been used to improve the effectiveness of each class. The study offers a plethora of clues toward students' behavioral preferences. Diversity among students (professional background, physical proximity) is too significant to assume a single face of a learner. This is particularly true for a body of online graduate students in computer science. Conclusions of the study (each learner is unique, and each class is unique) are extrapolated to demystify the notion of an 'average software engineer.' An immediate direction for an educator is to ensure a course applies to a wide audience of very different individuals. On the other hand, a student should be clear about his/her abilities and preferences - to follow the most effective learning path.Keywords: K.3.2 computer and information science education, learner profiling, adaptive learning, software engineering
Procedia PDF Downloads 1044068 Don't Just Guess and Slip: Estimating Bayesian Knowledge Tracing Parameters When Observations Are Scant
Authors: Michael Smalenberger
Abstract:
Intelligent tutoring systems (ITS) are computer-based platforms which can incorporate artificial intelligence to provide step-by-step guidance as students practice problem-solving skills. ITS can replicate and even exceed some benefits of one-on-one tutoring, foster transactivity in collaborative environments, and lead to substantial learning gains when used to supplement the instruction of a teacher or when used as the sole method of instruction. A common facet of many ITS is their use of Bayesian Knowledge Tracing (BKT) to estimate parameters necessary for the implementation of the artificial intelligence component, and for the probability of mastery of a knowledge component relevant to the ITS. While various techniques exist to estimate these parameters and probability of mastery, none directly and reliably ask the user to self-assess these. In this study, 111 undergraduate students used an ITS in a college-level introductory statistics course for which detailed transaction-level observations were recorded, and users were also routinely asked direct questions that would lead to such a self-assessment. Comparisons were made between these self-assessed values and those obtained using commonly used estimation techniques. Our findings show that such self-assessments are particularly relevant at the early stages of ITS usage while transaction level data are scant. Once a user’s transaction level data become available after sufficient ITS usage, these can replace the self-assessments in order to eliminate the identifiability problem in BKT. We discuss how these findings are relevant to the number of exercises necessary to lead to mastery of a knowledge component, the associated implications on learning curves, and its relevance to instruction time.Keywords: Bayesian Knowledge Tracing, Intelligent Tutoring System, in vivo study, parameter estimation
Procedia PDF Downloads 1744067 Computer-Aided Exudate Diagnosis for the Screening of Diabetic Retinopathy
Authors: Shu-Min Tsao, Chung-Ming Lo, Shao-Chun Chen
Abstract:
Most diabetes patients tend to suffer from its complication of retina diseases. Therefore, early detection and early treatment are important. In clinical examinations, using color fundus image was the most convenient and available examination method. According to the exudates appeared in the retinal image, the status of retina can be confirmed. However, the routine screening of diabetic retinopathy by color fundus images would bring time-consuming tasks to physicians. This study thus proposed a computer-aided exudate diagnosis for the screening of diabetic retinopathy. After removing vessels and optic disc in the retinal image, six quantitative features including region number, region area, and gray-scale values etc… were extracted from the remaining regions for classification. As results, all six features were evaluated to be statistically significant (p-value < 0.001). The accuracy of classifying the retinal images into normal and diabetic retinopathy achieved 82%. Based on this system, the clinical workload could be reduced. The examination procedure may also be improved to be more efficient.Keywords: computer-aided diagnosis, diabetic retinopathy, exudate, image processing
Procedia PDF Downloads 2744066 Intelligent Software Architecture and Automatic Re-Architecting Based on Machine Learning
Authors: Gebremeskel Hagos Gebremedhin, Feng Chong, Heyan Huang
Abstract:
Software system is the combination of architecture and organized components to accomplish a specific function or set of functions. A good software architecture facilitates application system development, promotes achievement of functional requirements, and supports system reconfiguration. We describe three studies demonstrating the utility of our architecture in the subdomain of mobile office robots and identify software engineering principles embodied in the architecture. The main aim of this paper is to analyze prove architecture design and automatic re-architecting using machine learning. Intelligence software architecture and automatic re-architecting process is reorganizing in to more suitable one of the software organizational structure system using the user access dataset for creating relationship among the components of the system. The 3-step approach of data mining was used to analyze effective recovery, transformation and implantation with the use of clustering algorithm. Therefore, automatic re-architecting without changing the source code is possible to solve the software complexity problem and system software reuse.Keywords: intelligence, software architecture, re-architecting, software reuse, High level design
Procedia PDF Downloads 1204065 Impacts of Online Behaviors on Empathy in Medical Students
Authors: Ling-Lang Huang, Yih-Jer Wu
Abstract:
Empathy is crucial for a patient-physician relationship and medical professionalism. Internet activity, gaming, or even addiction, have been more and more common among medical students. However, there’s been no report showing whether internet behavior has a substantial impact on empathy in medical students to our best knowledge. All year-2 medical students taking the optional course 'Narrative, Comprehension, and Communication' were enrolled. Internet behaviors are divided into two groups, 'internet users without online gaming (IU)' and 'internet users with online gaming (IG)', each group was further divided into 3 groups according to their average online retention time each day (< 2, 2 - 6, > 6 hours). Empathy was evaluated by the scores of the reports and humanities reflection after watching indicated movies, and by self-measured empathy questionnaire. All students taking the year-2 optional course 'Narrative, Comprehension, and Communication' were enrolled. As compared with students in the IU group, those in the IG group had significantly lower scores for the reports (81.3 ± 3.7 vs. 86.4 ± 5.1, P = 0.014). If further dividing the students into 5 groups (IU < 2, IU 2-6, IG < 2, IG 2 - 6, and IG > 6 hours), the scores were significantly and negatively correlated to online gaming with longer hours (r = -0.556, P = 0.006). However, there was no significant difference between IU and IG groups (33.0 ± 5.4 vs. 34.8 ± 3.2, P = n.s.), in terms of scores in the self-measured empathy questionnaire, neither was there any significant trend of scores along with longer online hours across the 5 groups (r = -0.164, P = n.s.). To date, there has been no evidence showing whether different internet behaviors (with or without online gaming) have distinct impacts on empathy. Although all of the medical students had a similarly good self-perception for empathy, our data suggested that online gaming did have a negative impact on their actual expression of empathy. Our observation has brought up an important issue for pondering: May IT- or gaming-assisted medical learning actually harm students’ empathy? In conclusion, this data suggests that long hours of online gaming harms expression of empathy, though all medics think themselves a person of high empathy.Keywords: empathy. Internet, medical students, online gaming
Procedia PDF Downloads 1324064 Improved Wetting for Improved Solubility and Dissolution of Candesartan Cilexetil
Authors: Shilpa Bhilegaonkar, Ram Gaud
Abstract:
Candesartan cilexetil is a poorly soluble antihypertensive agent with solubility limited bioavailability (15%). To initiate process of solubilisation, it is very much necessary to displace the air at the surface and wet the drug surface with a solvent, with which drug is compatible. Present research adopts the same principle to improve solubility and dissolution of candesartan cilexetil. Solvents used here are surfactant and modified surfactant in different drug: solvent (1:1-1:9) ratio’s for preparation of adsorbates. Adsorbates were then converted into free flowing powders as liquisolid compacts and compressed to form tablets. Liquisolid compacts were evaluated for improvement in saturation solubility and dissolution of candesartan cilexetil. All systems were evaluated for improvement in saturation solubility and dissolution in different medias such as water, 0.1 N HCl, Phosphate buffer pH 6.8 and media given by office of generic drugs along with other physicochemical testing. All systems exhibited a promising advantage in terms of solubility and dissolution without affecting the drug structure as confirmed by IR and XRD. No considerable advantage was seen of increasing solvent ratio with drug.Keywords: candesartan cilexetil, improved dissolution, solubility, liquisolid
Procedia PDF Downloads 3284063 Understanding the Impact of Climate-Induced Rural-Urban Migration on the Technical Efficiency of Maize Production in Malawi
Authors: Innocent Pangapanga-Phiri, Eric Dada Mungatana
Abstract:
This study estimates the effect of climate-induced rural-urban migrants (RUM) on maize productivity. It uses panel data gathered by the National Statistics Office and the World Bank to understand the effect of RUM on the technical efficiency of maize production in rural Malawi. The study runs the two-stage Tobit regression to isolate the real effect of rural-urban migration on the technical efficiency of maize production. The results show that RUM significantly reduces the technical efficiency of maize production. However, the interaction of RUM and climate-smart agriculture has a positive and significant influence on the technical efficiency of maize production, suggesting the need for re-investing migrants’ remittances in agricultural activities.Keywords: climate-smart agriculture, farm productivity, rural-urban migration, panel stochastic frontier models, two-stage Tobit regression
Procedia PDF Downloads 1344062 Gender-Based Violence Public Art Projects: An Analysis of the Value of Including Social Justice Topics in Tertiary Courses
Authors: F. Saptouw
Abstract:
This paper will examine the value of introducing social justice issues into the tertiary fine art curriculum at a first-year level. The paper will present detail of the conceptual impetus and the logistics related to the execution of a collaborative teaching project. The cohort of students was registered for the Fine Art Foundation course at the Michaelis School of Fine Art at the University of Cape Town. The course is dedicated to the development of critical thinking, communication skills, and varied approaches to knowledge construction within the first-year cohort. A core component of the course is the examination of the representation of gender, identity, politics, and power. These issues are examined within a range of public and private representations like art galleries, museum spaces, and contemporary popular culture. This particular project was a collaborative project with the Office of Inclusivity and Change, and the project leaders were Fabian Saptouw and Gabriel Khan. The paper will conclude by presenting an argument for the importance of such projects within the tertiary environment.Keywords: art, education, gender-based violence, social responsiveness
Procedia PDF Downloads 1404061 Automated Detection of Targets and Retrieve the Corresponding Analytics Using Augmented Reality
Authors: Suvarna Kumar Gogula, Sandhya Devi Gogula, P. Chanakya
Abstract:
Augmented reality is defined as the collection of the digital (or) computer generated information like images, audio, video, 3d models, etc. and overlay them over the real time environment. Augmented reality can be thought as a blend between completely synthetic and completely real. Augmented reality provides scope in a wide range of industries like manufacturing, retail, gaming, advertisement, tourism, etc. and brings out new dimensions in the modern digital world. As it overlays the content, it makes the users enhance the knowledge by providing the content blended with real world. In this application, we integrated augmented reality with data analytics and integrated with cloud so the virtual content will be generated on the basis of the data present in the database and we used marker based augmented reality where every marker will be stored in the database with corresponding unique ID. This application can be used in wide range of industries for different business processes, but in this paper, we mainly focus on the marketing industry which helps the customer in gaining the knowledge about the products in the market which mainly focus on their prices, customer feedback, quality, and other benefits. This application also focuses on providing better market strategy information for marketing managers who obtain the data about the stocks, sales, customer response about the product, etc. In this paper, we also included the reports from the feedback got from different people after the demonstration, and finally, we presented the future scope of Augmented Reality in different business processes by integrating with new technologies like cloud, big data, artificial intelligence, etc.Keywords: augmented reality, data analytics, catch room, marketing and sales
Procedia PDF Downloads 2384060 Information Communication Technology in Early Childhood Education: An Assessment of the Quality of ICT in the New Mega Primary Schools in Ondo State, Southwestern Nigeria
Authors: Oluyemi Christianah Ojo
Abstract:
This study seeks to investigate the quality of ICT provided in the new Caring Heart schools in Ondo State, Nigeria. The population for the study was all caring Heart Mega Schools in Ondo State, Nigeria. Research questions were generated; two instruments CCCMS and TQCUC were used to elicit information from the schools and the teachers. The study adopts descriptive survey approach. The studies revealed and concluded that ICT components were available and adequate in these schools, Charts showing ICT components and other forms of computer devices used as instructional materials were available but were not adequate; teachers teaching computer studies are competent in the delivery of instructions and in handling computer gadgets in the laboratory. The study recommended the provision of steady electricity, uninterrupted internet facilities and provision of adequate ICT components and charts for effective teaching delivery and learning.Keywords: facilities, information communication technology, mega primary school, primary education
Procedia PDF Downloads 2974059 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach
Authors: Jumana Majdi Qutub
Abstract:
Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.Keywords: cloud computing, cyber crime, data protection, privacy
Procedia PDF Downloads 2624058 Cooperative Jamming for Implantable Medical Device Security
Authors: Kim Lytle, Tim Talty, Alan Michaels, Jeff Reed
Abstract:
Implantable medical devices (IMDs) are medically necessary devices embedded in the human body that monitor chronic disorders or automatically deliver therapies. Most IMDs have wireless capabilities that allow them to share data with an offboard programming device to help medical providers monitor the patient’s health while giving the patient more insight into their condition. However, serious security concerns have arisen as researchers demonstrated these devices could be hacked to obtain sensitive information or harm the patient. Cooperative jamming can be used to prevent privileged information leaks by maintaining an adequate signal-to-noise ratio at the intended receiver while minimizing signal power elsewhere. This paper uses ray tracing to demonstrate how a low number of friendly nodes abiding by Bluetooth Low Energy (BLE) transmission regulations can enhance IMD communication security in an office environment, which in turn may inform how companies and individuals can protect their proprietary and personal information.Keywords: implantable biomedical devices, communication system security, array signal processing, ray tracing
Procedia PDF Downloads 1144057 A Simple Model for Solar Panel Efficiency
Authors: Stefano M. Spagocci
Abstract:
The efficiency of photovoltaic panels can be calculated with such software packages as RETScreen that allow design engineers to take financial as well as technical considerations into account. RETScreen is interfaced with meteorological databases, so that efficiency calculations can be realistically carried out. The author has recently contributed to the development of solar modules with accumulation capability and an embedded water purifier, aimed at off-grid users such as users in developing countries. The software packages examined do not allow to take ancillary equipment into account, hence the decision to implement a technical and financial model of the system. The author realized that, rather than re-implementing the quite sophisticated model of RETScreen - a mathematical description of which is anyway not publicly available - it was possible to drastically simplify it, including the meteorological factors which, in RETScreen, are presented in a numerical form. The day-by-day efficiency of a photovoltaic solar panel was parametrized by the product of factors expressing, respectively, daytime duration, solar right ascension motion, solar declination motion, cloudiness, temperature. For the sun-motion-dependent factors, positional astronomy formulae, simplified by the author, were employed. Meteorology-dependent factors were fitted by simple trigonometric functions, employing numerical data supplied by RETScreen. The accuracy of our model was tested by comparing it to the predictions of RETScreen; the accuracy obtained was 11%. In conclusion, our study resulted in a model that can be easily implemented in a spreadsheet - thus being easily manageable by non-specialist personnel - or in more sophisticated software packages. The model was used in a number of design exercises, concerning photovoltaic solar panels and ancillary equipment like the above-mentioned water purifier.Keywords: clean energy, energy engineering, mathematical modelling, photovoltaic panels, solar energy
Procedia PDF Downloads 714056 A Case Study Comparing the Effect of Computer Assisted Task-Based Language Teaching and Computer-Assisted Form Focused Language Instruction on Language Production of Students Learning Arabic as a Foreign Language
Authors: Hanan K. Hassanein
Abstract:
Task-based language teaching (TBLT) and focus on form instruction (FFI) methods were proven to improve quality and quantity of immediate language production. However, studies that compare between the effectiveness of the language production when using TBLT versus FFI are very little with results that are not consistent. Moreover, teaching Arabic using TBLT is a new field with few research that has investigated its application inside classrooms. Furthermore, to the best knowledge of the researcher, there are no prior studies that compared teaching Arabic as a foreign language in a classroom setting using computer-assisted task-based language teaching (CATBLT) with computer-assisted form focused language instruction (CAFFI). Accordingly, the focus of this presentation is to display CATBLT and CAFFI tools when teaching Arabic as a foreign language as well as demonstrate an experimental study that aims to identify whether or not CATBLT is a more effective instruction method. The effectiveness will be determined through comparing CATBLT and CAFFI in terms of accuracy, lexical complexity, and fluency of language produced by students. The participants of the study are 20 students enrolled in two intermediate-level Arabic as a foreign language classes. The experiment will take place over the course of 7 days. Based on a study conducted by Abdurrahman Arslanyilmaz for teaching Turkish as a second language, an in-house computer assisted tool for the TBLT and another one for FFI will be designed for the experiment. The experimental group will be instructed using the in-house CATBLT tool and the control group will be taught through the in-house CAFFI tool. The data that will be analyzed are the dialogues produced by students in both the experimental and control groups when completing a task or communicating in conversational activities. The dialogues of both groups will be analyzed to understand the effect of the type of instruction (CATBLT or CAFFI) on accuracy, lexical complexity, and fluency. Thus, the study aims to demonstrate whether or not there is an instruction method that positively affects the language produced by students learning Arabic as a foreign language more than the other.Keywords: computer assisted language teaching, foreign language teaching, form-focused instruction, task based language teaching
Procedia PDF Downloads 2524055 Effects of Empathy Priming on Idea Generation
Authors: Tejas Dhadphale
Abstract:
The user-centered design (UCD) approach has led to an increased interest in empathy within the product development process. Designers have explored several empathetic methods and tools such as personas, empathy maps, journey maps, user needs statements and user scenarios to capture and visualize users’ needs. The goal of these tools is not only to generate a deeper and shared understanding of user needs but also to become a point of reference for subsequent decision making, brainstorming and concept evaluation tasks. The purpose of this study is to measure the effect of empathy priming on divergent brainstorming tasks. This study compares the effects of three empathy tools, personas, empathy maps and user needs statements, on ideation fluency and originality of ideas during brainstorming tasks. In a three-between-subjects experimental design study, sixty product design students were randomly assigned to one of three conditions: persona, empathy maps and user needs statements. A one-way, between-subjects analysis of variance (ANOVA) revealed a a statistically significant difference in empathy priming on fluency and originality of ideas. Participants in the persona group showed higher ideation fluency and generated a greater number of original ideas compared to the other groups. The results show that participants in the user need statement group to generate a greater number of feasible and relevant ideas. The study also aims to understand how formatting and visualization of empathy tools impact divergent brainstorming tasks. Participants were interviewed to understand how different visualizations of users’ needs (personas, empathy maps and user needs statements) facilitated idea generation during brainstorming tasks. Implications for design education are discussed.Keywords: empathy, persona, priming, Design research
Procedia PDF Downloads 884054 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022
Authors: Mojtaba Fayaz, Richard Hallal
Abstract:
This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks
Procedia PDF Downloads 1174053 An Analysis of OpenSim Graphical User Interface Effectiveness
Authors: Sina Saadati
Abstract:
OpenSim is a well-known software in biomechanical studies. There are worthy algorithms developed in this program which are used for modeling and simulation of human motions. In this research, we analyze the OpenSim application from the computer science perspective. It is important that every application have a user-friendly interface. An effective user interface can decrease the time, costs, and energy needed to learn how to use a program. In this paper, we survey the user interface of OpenSim as an important factor of the software. Finally, we infer that there are many challenges to be addressed in the development of OpenSim.Keywords: biomechanics, computer engineering, graphical user interface, modeling and simulation, interface effectiveness
Procedia PDF Downloads 964052 Analysis of Histogram Asymmetry for Waste Recognition
Authors: Janusz Bobulski, Kamila Pasternak
Abstract:
Despite many years of effort and research, the problem of waste management is still current. So far, no fully effective waste management system has been developed. Many programs and projects improve statistics on the percentage of waste recycled every year. In these efforts, it is worth using modern Computer Vision techniques supported by artificial intelligence. In the article, we present a method of identifying plastic waste based on the asymmetry analysis of the histogram of the image containing the waste. The method is simple but effective (94%), which allows it to be implemented on devices with low computing power, in particular on microcomputers. Such de-vices will be used both at home and in waste sorting plants.Keywords: waste management, environmental protection, image processing, computer vision
Procedia PDF Downloads 1204051 Three-Dimensional Computer Graphical Demonstration of Calcified Tissue and Its Clinical Significance
Authors: Itsuo Yokoyama, Rikako Kikuti, Miti Sekikawa, Tosinori Asai, Sarai Tsuyoshi
Abstract:
Introduction: Vascular access for hemodialysis therapy is often difficult, even for experienced medical personnel. Ultrasound guided needle placement have been performed occasionally but is not always helpful in certain cases with complicated vascular anatomy. Obtaining precise anatomical knowledge of the vascular structure is important to prevent access-related complications. With augmented reality (AR) device such as AR glasses, the virtual vascular structure is shown superimposed on the actual patient vessels, thus enabling the operator to maneuver catheter placement easily with free both hands. We herein report our method of AR guided vascular access method in dialysis treatment Methods: Three dimensional (3D) object of the arm with arteriovenous fistula is computer graphically created with 3D software from the data obtained by computer tomography, ultrasound echogram, and image scanner. The 3D vascular object thus created is viewed on the screen of the AR digital display device (such as AR glass or iPad). The picture of the vascular anatomical structure becomes visible, which is superimposed over the real patient’s arm, thereby the needle insertion be performed under the guidance of AR visualization with ease. By this method, technical difficulty in catheter placement for dialysis can be lessened and performed safely. Considerations: Virtual reality technology has been applied in various fields and medical use is not an exception. Yet AR devices have not been widely used among medical professions. Visualization of the virtual vascular object can be achieved by creation of accurate three dimensional object with the help of computer graphical technique. Although our experience is limited, this method is applicable with relative easiness and our accumulating evidence has suggested that our method of vascular access with the use of AR can be promising.Keywords: abdominal-aorta, calcification, extraskeletal, dialysis, computer graphics, 3DCG, CT, calcium, phosphorus
Procedia PDF Downloads 1664050 C-eXpress: A Web-Based Analysis Platform for Comparative Functional Genomics and Proteomics in Human Cancer Cell Line, NCI-60 as an Example
Authors: Chi-Ching Lee, Po-Jung Huang, Kuo-Yang Huang, Petrus Tang
Abstract:
Background: Recent advances in high-throughput research technologies such as new-generation sequencing and multi-dimensional liquid chromatography makes it possible to dissect the complete transcriptome and proteome in a single run for the first time. However, it is almost impossible for many laboratories to handle and analysis these “BIG” data without the support from a bioinformatics team. We aimed to provide a web-based analysis platform for users with only limited knowledge on bio-computing to study the functional genomics and proteomics. Method: We use NCI-60 as an example dataset to demonstrate the power of the web-based analysis platform and data delivering system: C-eXpress takes a simple text file that contain the standard NCBI gene or protein ID and expression levels (rpkm or fold) as input file to generate a distribution map of gene/protein expression levels in a heatmap diagram organized by color gradients. The diagram is hyper-linked to a dynamic html table that allows the users to filter the datasets based on various gene features. A dynamic summary chart is generated automatically after each filtering process. Results: We implemented an integrated database that contain pre-defined annotations such as gene/protein properties (ID, name, length, MW, pI); pathways based on KEGG and GO biological process; subcellular localization based on GO cellular component; functional classification based on GO molecular function, kinase, peptidase and transporter. Multiple ways of sorting of column and rows is also provided for comparative analysis and visualization of multiple samples.Keywords: cancer, visualization, database, functional annotation
Procedia PDF Downloads 6194049 Real-Time Course Recommendation System for Online Learning Platforms
Authors: benabbess anja
Abstract:
This research presents the design and implementation of a real-time course recommendation system for online learning platforms, leveraging user competencies and expertise levels. The system begins by extracting and classifying the complexity levels of courses from Udemy datasets using semantic enrichment techniques and resources such as WordNet and BERT. A predictive model assigns complexity levels to each course, adding columns that represent the course category, sub-category, and complexity level to the existing dataset. Simultaneously, user profiles are constructed through questionnaires capturing their skills, sub-skills, and proficiency levels. The recommendation process involves generating embeddings with BERT, followed by calculating cosine similarity between user profiles and courses. Courses are ranked based on their relevance, with the BERT model delivering the most accurate results. To enable real-time recommendations, Apache Kafka is integrated to track user interactions (clicks, comments, time spent, completed courses, feedback) and update user profiles. The embeddings are regenerated, and similarities with courses are recalculated to reflect users' evolving needs and behaviors, incorporating a progressive weighting of interactions for more personalized suggestions. This approach ensures dynamic and real-time course recommendations tailored to user progress and engagement, providing a more personalized and effective learning experience. This system aims to improve user engagement and optimize learning paths by offering courses that precisely match users' needs and current skill levels.Keywords: recommendation system, online learning, real-time, user skills, expertise level, personalized recommendations, dynamic suggestions
Procedia PDF Downloads 104048 Tablet Computer Based Cognitive Rehabilitation Program, Injini, for Children with Cognitive Impairment
Authors: Eun Jae Ko, In Young Sung, Eui Soo Joeng
Abstract:
Cognitive impairment is commonly encountered problem in children with various clinical diseases, including Down syndrome, autism spectrum disorder, brain injury, and others. Cognitive impairment limits participation in education and society, and this further hinders development in cognition. However, young children with cognitive impairment tend not to respond well to traditional cognitive treatments, therefore alternative treatment choices are need. As a cognitive training program, touch screen technology can easily be applied to very young children by involving visual and auditory support. Injini was developed as tablet computer based cognitive rehabilitation program for young children or individuals with severe cognitive impairment, which targeted on cognitive ages of 18 to 36 months. The aim of this study was to evaluate the efficacy of a tablet computer based cognitive rehabilitation program (Injini) for children with cognitive impairment. 38 children between cognitive ages of 18 to 36 months confirmed by cognitive evaluations were recruited and randomly assigned to the intervention group (n=20) and the control group (n=18). The intervention group received tablet computer based cognitive rehabilitation program (Injini) for 30 minutes per session, twice a week, over a period of 12 weeks, in addition to the traditional rehabilitation program. The control group received traditional rehabilitation program only. Mental score of Bayley Scales of Infant Development II (BSID II), Pediatric Evaluation of Disability Inventory (PEDI), Laboratory Temperament Assessment Battery (Lab-TAB), Early Childhood Behavior Questionnaire (ECBQ), and Goal Attainment Scale (GAS) were evaluated before and after 12 weeks of therapeutic intervention. When comparing the baseline characteristics, there was no significant difference between the two groups in the measurements of cognitive function. After 12 weeks of treatment, both group showed improvements in all measurements. However, in comparison of improvements after treatment, the intervention group showed more improvements in the mental score of BSID II, social function domain of PEDI, observation domain of Lab-TAB, and GAS, as compared to the control group. Application of the tablet computer based cognitive rehabilitation program (Injini) would be beneficial for improvement of cognitive function in young children with cognitive impairment.Keywords: cognitive therapy, computer-assisted therapy, early intervention, tablets
Procedia PDF Downloads 2854047 The Application of Computer and Technology in Language Teaching and Learning
Authors: Pouya Vakili
Abstract:
Since computers were first introduced into educational facilities, foreign language educators have been faced with the problem of integrating high-tech multimedia techniques into a traditional text-based curriculum. As studies of language teaching have pointed out, ‘Language teaching tends in practice to be eclectic…. There are not only exceptionally many paths and educational means for arriving at a given educational goal, but there are also many types of educational materials which can be used to achieve that goal’. For language educators who are trying to incorporate technology into their curricula, the choices seem endless. Yet the quantity, as well as the limitations, of available computer programs does not guarantee that these programs can be successfully integrated into a curriculum.Keywords: curriculum, language teaching, learning, multimedia, technology
Procedia PDF Downloads 5754046 Computer-Based Model for Design Selection of Lightning Arrester for 132/33kV Substation
Authors: Uma U. Uma, Uzoechi Laz
Abstract:
Protection of equipment insulation against lightning over voltages and selection of lightning arrester that will discharge at lower voltage level than the voltage required to breakdown the electrical equipment insulation is examined. The objectives of this paper are to design a computer based model using standard equations for the selection of appropriate lightning arrester with the lowest rated surge arrester that will provide adequate protection of equipment insulation and equally have a satisfactory service life when connected to a specified line voltage in power system network. The effectiveness and non-effectiveness of the earthing system of substation determine arrester properties. MATLAB program with GUI (graphic user interphase) its subprogram is used in the development of the model for the determination of required parameters like voltage rating, impulse spark over voltage, power frequency spark over voltage, discharge current, current rating and protection level of lightning arrester of a specified voltage level of a particular line.Keywords: lightning arrester, GUIs, MatLab program, computer based model
Procedia PDF Downloads 4194045 Role of ICT and Wage Inequality in Organization
Authors: Shoji Katagiri
Abstract:
This study deals with wage inequality in organization and shows the relationship between ICT and wage in organization. To do so, we incorporate ICT’s factors in organization into our model. ICT’s factors are efficiencies of Enterprise Resource Planning (ERP), Computer Assisted Design/Computer Assisted Manufacturing (CAD/CAM), and NETWORK. The improvement of ICT’s factors decrease the learning cost to solve problem pertaining to the hierarchy in organization. The improvement of NETWORK increases the wage inequality within workers and decreases within managers and entrepreneurs. The improvements of CAD/CAM and ERP increases the wage inequality within all agent, and partially increase it between the agents in hierarchy.Keywords: endogenous economic growth, ICT, inequality, capital accumulation
Procedia PDF Downloads 2644044 Profile of the Elderly Users of Alcohol and Other Drugs Attended at the Psychosocial Care Centers in the Federal District
Authors: J. S. P. Barbosa, L. C. Pereira, K. R. Garcia, P. C. P. Bouchardet, S. C. T. Vieira, A. O. Gomes, S. S. Funghetto, M. G. O. Kanikowski
Abstract:
For this population, height seems to be a good predictor of strength and body composition. This increase in life expectancy of the Brazilian's population is associated with sociodemographic variables, but also to more access to health services in the prevention and better living conditions. With the growth of elderly population, a problem that has been a concern to health's professionals and public health at all is the use of psychoactive substances. The purpose of this study was to identify the sociodemographic profile of the elderly people who was attended at the Center of Psychosocial Care of alcohol and other drugs in the Federal District of Brazil. 408 medical records of people aged 60 years or over were evaluated, and it is possible to know that most of them were males (85.3%), with a mean age of 64 years (DP ± 4.16), 60 and 84 years and a mean age of 64 years (DP ± 4.42); 88.2% have some family ties, are married and have children, with relatives living in masonry housing. The educational level of drug users was considered low with more emphasis on those who had elementary education being the majority retired or unemployed. Regarding the street situation, there was no significance (p = 0.084), and the women (OR = 2.98) had few chances of street situations compared to men (OR = 0.89). As for substance consumption, the highest quantity of drug consumption bids in relation to the number of illicit. It did not present significant statistical value, and there is a greater probability of consumption/abuse of legal and/or illicit drugs for both sexes (OR = 0.96) for men and (OR = 1.32) for women. In relation to the use of multiple drugs, there was no significant difference between the sexes, (OR = 1.1) male sex and (OR = 0.74) female sex. Based on the results found in the present study, it was concluded that alcohol consumption is the main agent that causes vulnerability in the elderly and predisposes the latter to the consumption of other associated drugs.Keywords: centers of attention psychosocial alcohol and drugs, elderly, mental disorder due to drug use, street situations
Procedia PDF Downloads 216