Search results for: phone users
1685 Wearable Heart Rate Sensor Based on Wireless System for Heart Health Monitoring
Authors: Murtadha Kareem, Oliver Faust
Abstract:
Wearable biosensor systems can be designed and developed for health monitoring. There is much interest in both scientific and industrial communities established since 2007. Fundamentally, the cost of healthcare has increased dramatically and the world population is aging. That creates the need to harvest technological improvements with small bio-sensing devices, wireless-communication, microelectronics and smart textiles, that leads to non-stop developments of wearable sensor based systems. There has been a significant demand to monitor patient's health status while the patient leaves the hospital in his/her personal environment. To address this need, there are numerous system prototypes which has been launched in the medical market recently, the aim of that is to provide real time information feedback about patient's health status, either to the patient himself/herself or direct to the supervising medical centre station, while being capable to give a notification for the patient in case of possible imminent health threatening conditions. Furthermore, wearable health monitoring systems comprise new techniques to address the problem of managing and monitoring chronic heart diseases for elderly people. Wearable sensor systems for health monitoring include various types of miniature sensors, either wearable or implantable. To be specific, our proposed system able to measure essential physiological parameter, such as heart rate signal which could be transmitted through Bluetooth to the cloud server in order to store, process, analysis and visualise the data acquisition. The acquired measurements are connected through internet of things to a central node, for instance an android smart phone or tablet used for visualising the collected information on application or transmit it to a medical centre.Keywords: Wearable sensor, Heart rate, Internet of things, Chronic heart disease
Procedia PDF Downloads 1621684 A Comprehensive Analysis of Factors Leading to Fatal Road Accidents in France and Its Overseas Territories
Authors: Bouthayna Hayou, Mohamed Mouloud Haddak
Abstract:
In road accidents in French overseas territories have been understudied, with relevant data often collected late and incompletely. Although these territories account for only 3% to 4% of road traffic injuries in France, their unique characteristics merit closer attention. Despite lower mobility and, consequently, lower exposure to road risks, the actual road risk in Overseas France is as high or even higher than in Metropolitan France. Significant disparities exist not only between Metropolitan France and Overseas territories but also among the overseas territories themselves. The varying population densities in these regions do not fully explain these differences, as each territory has its own distinct vulnerabilities and road safety challenges. This analysis, based on BAAC data files from 2005 to 2018 for both Metropolitan France and the overseas departments and regions, examines key variables such as gender, age, type of road user, type of obstacle hit, type of trip, road category, traffic conditions, weather, and location of accidents. Logistic regression models were built for each region to investigate the risk factors associated with fatal road accidents, focusing on the probability of being killed versus injured. Due to insufficient data, Mayotte and the Overseas Communities (French Polynesia and New Caledonia) were not included in the models. The findings reveal that road safety is worse in the overseas territories compared to Metropolitan France, particularly for vulnerable road users such as pedestrians and motorized two-wheelers. These territories present an accident profile that sits between that of Metropolitan France and middle-income countries. A pressing need exists to standardize accident data collection between Metropolitan and Overseas France to allow for more detailed comparative analyses. Further epidemiological studies could help identify the specific road safety issues unique to each territory, particularly with regard to socio-economic factors such as social cohesion, which may influence road safety outcomes. Moreover, the lack of data on new modes of travel, such as electric scooters, and the absence of socio-economic details of accident victims complicate the evaluation of emerging risk factors. Additional research, including sociological and psychosocial studies, is essential for understanding road users' behavior and perceptions of road risk, which could also provide valuable insights into accident trends in peri-urban areas in France.Keywords: multivariate logistic regression, overseas France, road safety, road traffic accident, territorial inequalities
Procedia PDF Downloads 131683 A Wearable Device to Overcome Post–Stroke Learned Non-Use; The Rehabilitation Gaming System for wearables: Methodology, Design and Usability
Authors: Javier De La Torre Costa, Belen Rubio Ballester, Martina Maier, Paul F. M. J. Verschure
Abstract:
After a stroke, a great number of patients experience persistent motor impairments such as hemiparesis or weakness in one entire side of the body. As a result, the lack of use of the paretic limb might be one of the main contributors to functional loss after clinical discharge. We aim to reverse this cycle by promoting the use of the paretic limb during activities of daily living (ADLs). To do so, we describe the key components of a system that is composed of a wearable bracelet (i.e., a smartwatch) and a mobile phone, designed to bring a set of neurorehabilitation principles that promote acquisition, retention and generalization of skills to the home of the patient. A fundamental question is whether the loss in motor function derived from learned–non–use may emerge as a consequence of decision–making processes for motor optimization. Our system is based on well-established rehabilitation strategies that aim to reverse this behaviour by increasing the reward associated with action execution as well as implicitly reducing the expected cost associated with the use of the paretic limb, following the notion of the reinforcement–induced movement therapy (RIMT). Here we validate an accelerometer–based measure of arm use, and its capacity to discriminate different activities that require increasing movement of the arm. We also show how the system can act as a personalized assistant by providing specific goals and adjusting them depending on the performance of the patients. The usability and acceptance of the device as a rehabilitation tool is tested using a battery of self–reported and objective measurements obtained from acute/subacute patients and healthy controls. We believe that an extension of these technologies will allow for the deployment of unsupervised rehabilitation paradigms during and beyond the hospitalization time.Keywords: stroke, wearables, learned non use, hemiparesis, ADLs
Procedia PDF Downloads 2201682 Understanding the Benefits of Multiple-Use Water Systems (MUS) for Smallholder Farmers in the Rural Hills of Nepal
Authors: RAJ KUMAR G.C.
Abstract:
There are tremendous opportunities to maximize smallholder farmers’ income from small-scale water resource development through micro irrigation and multiple-use water systems (MUS). MUS are an improved water management approach, developed and tested successfully by iDE that pipes water to a community both for domestic use and for agriculture using efficient micro irrigation. Different MUS models address different landscape constraints, water demand, and users’ preferences. MUS are complemented by micro irrigation kits, which were developed by iDE to enable farmers to grow high-value crops year-round and to use limited water resources efficiently. Over the last 15 years, iDE’s promotion of the MUS approach has encouraged government and other key stakeholders to invest in MUS for better planning of scarce water resources. Currently, about 60% of the cost of MUS construction is covered by the government and community. Based on iDE’s experience, a gravity-fed MUS costs approximately $125 USD per household to construct, and it can increase household income by $300 USD per year. A key element of the MUS approach is keeping farmers well linked to input supply systems and local produce collection centers, which helps to ensure that the farmers can produce a sufficient quantity of high-quality produce that earns a fair price. This process in turn creates an enabling environment for smallholders to invest in MUS and micro irrigation. Therefore, MUS should be seen as an integrated package of interventions –the end users, water sources, technologies, and the marketplace– that together enhance technical, financial, and institutional sustainability. Communities are trained to participate in sustainable water resource management as a part of the MUS planning and construction process. The MUS approach is cost-effective, improves community governance of scarce water resources, helps smallholder farmers to improve rural health and livelihoods, and promotes gender equity. MUS systems are simple to maintain and communities are trained to ensure that they can undertake minor maintenance procedures themselves. All in all, the iDE Nepal MUS offers multiple benefits and represents a practical and sustainable model of the MUS approach. Moreover, there is a growing national consensus that rural water supply systems should be designed for multiple uses, acknowledging that substantial work remains in developing national-level and local capacity and policies for scale-up.Keywords: multiple-use water systems , small scale water resources, rural livelihoods, practical and sustainable model
Procedia PDF Downloads 2921681 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester
Procedia PDF Downloads 1491680 The Role of Virtual Geographic Environment (VGEs)
Abstract:
VGEs are a kind of typical web- and computer-based geographic environment, with aims of merging geographic knowledge, computer technology, virtual reality technology, network technology, and geographic information technology, to provide a digital mirror of physical geographic environments to allow users to ‘feel it in person’ by a means for augmenting the senses and to ‘know it beyond reality’ through geographic phenomena simulation and collaborative geographic experiments. Many achievements have appeared in this field, but further evolution should be explored. With the exploration of the conception of VGEs, and some examples, this article illustrated the role of VGEs and their contribution to currently GIScience. Based on the above analysis, questions are proposed for discussing about the future way of VGEs.Keywords: virtual geographic environments (VGEs), GIScience, virtual reality, geographic information systems
Procedia PDF Downloads 5751679 A Study of Cloud Computing Solution for Transportation Big Data Processing
Authors: Ilgin Gökaşar, Saman Ghaffarian
Abstract:
The need for fast processed big data of transportation ridership (eg., smartcard data) and traffic operation (e.g., traffic detectors data) which requires a lot of computational power is incontrovertible in Intelligent Transportation Systems. Nowadays cloud computing is one of the important subjects and popular information technology solution for data processing. It enables users to process enormous measure of data without having their own particular computing power. Thus, it can also be a good selection for transportation big data processing as well. This paper intends to examine how the cloud computing can enhance transportation big data process with contrasting its advantages and disadvantages, and discussing cloud computing features.Keywords: big data, cloud computing, Intelligent Transportation Systems, ITS, traffic data processing
Procedia PDF Downloads 4701678 Connectivity: Connecting ActivityRethinking Streets as Public Space under the Six Dimensions of Urban Space Design in the Context of Bangladesh
Authors: Manal Anis, Bin Bakhti Sayeed
Abstract:
With the encroachment of automobile upon our communities for decades and the concomitant urban sprawl resulting in a loss of public place, it was only a matter of time before people, realizing the role of streets in stimulating urban prosperity, would start reclaiming them to rebuild their communities. In order for this restoration of communities to take effect it is imperative that streets be freed from the dominance of motor vehicles. A holistic approach to pedestrian-friendly street environment can help build communities that embody the cities in which they are found. While the developed countries are finding more and more innovative ways to integrate walkable streets to foster communal living, the developing countries still have a long way to go. Since Dhaka is still struggling to balance the growing needs of accommodating automobiles for increased population with the loss of urban community life that comes with it, it is high time that alternate approaches are looked into. This study aims to understand streets as a living corridor through which one discovers and identifies with the city. The research area is chosen to be Manik Mia Avenue, overlooking the South Plaza of the National Parliament Building in Dhaka city. Being the site of supreme power, it is precisely this symbolic importance that the National Parliament Building has in the psyche of Bangladeshis, which has given Manik Mia Avenue a significant place in the country’s history. Above all, being an avenue it is essentially a neutral territory, universally accessible, inclusive and pluralist. The needs of the Avenue’s frequent users are analyzed with the help of a multi-method approach to survey consisting of an empirical study, a questionnaire survey and interview with relevant users. The research then tries to understand the concept of walkability by exploring the different ways in which the built environment influences walking. For this analysis, the six dimensions of Matthew Carmona are taken as a guideline for a holistic approach toward the different interacting facets of an urban public space. Based on the studies, a set of criteria is proposed to evaluate, plan and design streets that are more contextual in nature. The study concludes with how the existing street patterns of Dhaka city can be rethought and redesigned to cater to peoples’ need for a public place. The proposal is meant to be an inspiration for further studies in this respect in the context of Bangladesh.Keywords: public space, six dimensions, street, urban, walkability
Procedia PDF Downloads 2231677 Hate Speech Detection Using Deep Learning and Machine Learning Models
Authors: Nabil Shawkat, Jamil Saquer
Abstract:
Social media has accelerated our ability to engage with others and eliminated many communication barriers. On the other hand, the widespread use of social media resulted in an increase in online hate speech. This has drastic impacts on vulnerable individuals and societies. Therefore, it is critical to detect hate speech to prevent innocent users and vulnerable communities from becoming victims of hate speech. We investigate the performance of different deep learning and machine learning algorithms on three different datasets. Our results show that the BERT model gives the best performance among all the models by achieving an F1-score of 90.6% on one of the datasets and F1-scores of 89.7% and 88.2% on the other two datasets.Keywords: hate speech, machine learning, deep learning, abusive words, social media, text classification
Procedia PDF Downloads 1391676 The Kidney-Spine Traffic System: Future Cities, Ensuring World Class Civic Amenities in Urban India
Authors: Abhishek Srivastava, Jeevesh Nandan, Manish Kumar
Abstract:
The study was taken to analyse the alternative source of traffic system for effective and more convenient traffic flow by reducing points of conflicts as well as angle of conflict and keeping in view to minimize the problem of unnecessarily long waiting time, delays, congestion, traffic jam and geometric delays due to intersection between circular and straight lanes. It is a twin kidney-spine type structure system with special allowance for Highway users for quicker passes. Thus reduction in number and intensity of accidents, significance reduction in traffic jam, conservation of valuable time.Keywords: traffic system, collision reduction of vehicles, smooth flow of vehicles, traffic jam
Procedia PDF Downloads 4271675 Usability Evaluation of a Self-Report Mobile App for COVID-19 Symptoms: Supporting Health Monitoring in the Work Context
Authors: Kevin Montanez, Patricia Garcia
Abstract:
The confinement and restrictions adopted to avoid an exponential spread of the COVID-19 have negatively impacted the Peruvian economy. In this context, Industries offering essential products could continue operating, but they have to follow safety protocols and implement strategies to ensure employee health. In view of the increasing internet access and mobile phone ownership, “Alerta Temprana”, a mobile app, was developed to self-report COVID-19 symptoms in the work context. In this study, the usability of the mobile app “Alerta Temprana” was evaluated from the perspective of health monitors and workers. In addition to reporting the metrics related to the usability of the application, the utility of the system is also evaluated from the monitors' perspective. In this descriptive study, the participants used the mobile app for two months. Afterwards, System Usability Scale (SUS) questionnaire was answered by the workers and monitors. A Usefulness questionnaire with open questions was also used for the monitors. The data related to the use of the application was collected during one month. Furthermore, descriptive statistics and bivariate analysis were used. The workers rated the application as good (70.39). In the case of the monitors, usability was excellent (83.0). The most important feature for the monitors were the emails generated by the application. The average interaction per user was 30 seconds and a total of 6172 self-reports were sent. Finally, a statistically significant association was found between the acceptability scale and the work area. The results of this study suggest that Alerta Temprana has the potential to be used for surveillance and health monitoring in any context of face-to-face modality. Participants reported a high degree of ease of use. However, from the perspective of workers, SUS cannot diagnose usability issues and we suggest we use another standard usability questionnaire to improve "Alerta Temprana" for future use.Keywords: public health in informatics, mobile app, usability, self-report
Procedia PDF Downloads 1181674 Analysis of Users’ Behavior on Book Loan Log Based on Association Rule Mining
Authors: Kanyarat Bussaban, Kunyanuth Kularbphettong
Abstract:
This research aims to create a model for analysis of student behavior using Library resources based on data mining technique in case of Suan Sunandha Rajabhat University. The model was created under association rules, apriori algorithm. The results were found 14 rules and the rules were tested with testing data set and it showed that the ability of classify data was 79.24 percent and the MSE was 22.91. The results showed that the user’s behavior model by using association rule technique can use to manage the library resources.Keywords: behavior, data mining technique, a priori algorithm, knowledge discovery
Procedia PDF Downloads 4051673 Improving Infant Vaccination Rates Through Expanded Access to Care
Authors: Aidan Jacobsen, Morgan Motia, David Sam, Jonathan Mudge
Abstract:
Background: The Centers for Disease Control (CDC) lists vaccine requirements for children under two years old to correlate with development markers. CDC lists the coverage by age 24 months to be at least 90% nationally and 84% for Rhode Island Blackstone Valley Community Health Center (BVCHC) in Central Falls, Rhode Island, currently has a completed vaccination rate of 51% for children by the age of 24 months. Current barriers to care for up to date well child vaccinations include lack of transportation, parental work, childcare, and other social stressors. Objective: Increase the vaccination rate of children under the age of 24 months at BVCHC. Conduct a literature review to identify the common barriers preventing children under 24 months from receiving vaccinations. Reduce the barriers to expand access to vaccination care for infants Methods: Setting: Blackstone Valley Community Health Center, Pawtucket, RI Participants: (n=41), Patients between the age of 20-24 months, not up to date with the CDC vaccination recommendations and without a future appointment. QI Intervention: Patients were contacted via phone and offered an appointment during extra Saturday clinic hours in order to receive up to date vaccine care. A Saturday vaccine clinic was established specifically for patients in need of vaccines and having identified barriers to care. Conclusions: Expanding clinic hours and targeting non vaccine up –to-date patients can increase the current standard of childhood immunizations at BVCHC. Overcoming barriers preventing childhood immunization can improve access to providing up to date vaccinations. Other barriers still deter from reaching the national standard of immunizations rates.Keywords: vaccinations, well child care, barriers to care, social determinants of health
Procedia PDF Downloads 741672 New Result for Optical OFDM in Code Division Multiple Access Systems Using Direct Detection
Authors: Cherifi Abdelhamid
Abstract:
In optical communication systems, OFDM has received increased attention as a means to overcome various limitations of optical transmission systems such as modal dispersion, relative intensity noise, chromatic dispersion, polarization mode dispersion and self-phase modulation. The multipath dispersion limits the maximum transmission data rates. In this paper we investigate OFDM system where multipath induced intersymbol interference (ISI) is reduced and we increase the number of users by combining OFDM system with OCDMA system using direct detection Incorporate OOC (orthogonal optical code) for minimize a bit error rate.Keywords: OFDM, OCDMA, OOC (orthogonal optical code), (ISI), prim codes (Pc)
Procedia PDF Downloads 6521671 Remote Wireless Patient Monitoring System
Authors: Sagar R. Patil, Dinesh R. Gawade, Sudhir N. Divekar
Abstract:
One of the medical devices we found when we visit a hospital care unit such device is ‘patient monitoring system’. This device (patient monitoring system) informs doctors and nurses about the patient’s physiological signals. However, this device (patient monitoring system) does not have a remote monitoring capability, which is necessitates constant onsite attendance by support personnel (doctors and nurses). Thus, we have developed a Remote Wireless Patient Monitoring System using some biomedical sensors and Android OS, which is a portable patient monitoring. This device(Remote Wireless Patient Monitoring System) monitors the biomedical signals of patients in real time and sends them to remote stations (doctors and nurse’s android Smartphone and web) for display and with alerts when necessary. Wireless Patient Monitoring System different from conventional device (Patient Monitoring system) in two aspects: First its wireless communication capability allows physiological signals to be monitored remotely and second, it is portable so patients can move while there biomedical signals are being monitor. Wireless Patient Monitoring is also notable because of its implementation. We are integrated four sensors such as pulse oximeter (SPO2), thermometer, respiration, blood pressure (BP), heart rate and electrocardiogram (ECG) in this device (Wireless Patient Monitoring System) and Monitoring and communication applications are implemented on the Android OS using threads, which facilitate the stable and timely manipulation of signals and the appropriate sharing of resources. The biomedical data will be display on android smart phone as well as on web Using web server and database system we can share these physiological signals with remote place medical personnel’s or with any where in the world medical personnel’s. We verified that the multitasking implementation used in the system was suitable for patient monitoring and for other Healthcare applications.Keywords: patient monitoring, wireless patient monitoring, bio-medical signals, physiological signals, embedded system, Android OS, healthcare, pulse oximeter (SPO2), thermometer, respiration, blood pressure (BP), heart rate, electrocardiogram (ECG)
Procedia PDF Downloads 5721670 Anomaly Detection Based on System Log Data
Authors: M. Kamel, A. Hoayek, M. Batton-Hubert
Abstract:
With the increase of network virtualization and the disparity of vendors, the continuous monitoring and detection of anomalies cannot rely on static rules. An advanced analytical methodology is needed to discriminate between ordinary events and unusual anomalies. In this paper, we focus on log data (textual data), which is a crucial source of information for network performance. Then, we introduce an algorithm used as a pipeline to help with the pretreatment of such data, group it into patterns, and dynamically label each pattern as an anomaly or not. Such tools will provide users and experts with continuous real-time logs monitoring capability to detect anomalies and failures in the underlying system that can affect performance. An application of real-world data illustrates the algorithm.Keywords: logs, anomaly detection, ML, scoring, NLP
Procedia PDF Downloads 961669 Frequency- and Content-Based Tag Cloud Font Distribution Algorithm
Authors: Ágnes Bogárdi-Mészöly, Takeshi Hashimoto, Shohei Yokoyama, Hiroshi Ishikawa
Abstract:
The spread of Web 2.0 has caused user-generated content explosion. Users can tag resources to describe and organize them. Tag clouds provide rough impression of relative importance of each tag within overall cloud in order to facilitate browsing among numerous tags and resources. The goal of our paper is to enrich visualization of tag clouds. A font distribution algorithm has been proposed to calculate a novel metric based on frequency and content, and to classify among classes from this metric based on power law distribution and percentages. The suggested algorithm has been validated and verified on the tag cloud of a real-world thesis portal.Keywords: tag cloud, font distribution algorithm, frequency-based, content-based, power law
Procedia PDF Downloads 5061668 Using LMS as an E-Learning Platform in Higher Education
Authors: Mohammed Alhawiti
Abstract:
Assessment of Learning Management Systems has been of less importance than its due share. This paper investigates the evaluation of learning management systems (LMS) within educational setting as both an online learning system as well as a helpful tool for multidisciplinary learning environment. This study suggests a theoretical e-learning evaluation model, studying a multi-dimensional methods for evaluation through LMS system, service and content quality, learner`s perspective and attitudes of the instructor. A survey was conducted among 105 e-learners. The sample consisted of students at both undergraduate and master’s levels. Content validity, reliability were tested through the instrument, Findings suggested the suitability of the proposed model in evaluation for the satisfaction of learners through LMS. The results of this study would be valuable for both instructors and users of e-learning systems.Keywords: e-learning, LMS, higher education, management systems
Procedia PDF Downloads 4051667 An intelligent Troubleshooting System and Performance Evaluator for Computer Network
Authors: Iliya Musa Adamu
Abstract:
This paper seeks to develop an expert system that would troubleshoot computer network and evaluate the network system performance so as to reduce the workload on technicians and increase the efficiency and effectiveness of solutions proffered to computer network problems. The platform of the system was developed using ASP.NET, whereas the codes are implemented in Visual Basic and integrated with SQL Server 2005. The knowledge base was represented using production rule, whereas the searching method that was used in developing the network troubleshooting expert system is the forward-chaining-rule-based-system. This software tool offers the advantage of providing an immediate solution to most computer network problems encountered by computer users.Keywords: expert system, forward chaining rule based system, network, troubleshooting
Procedia PDF Downloads 6471666 User Experience Measurement of User Interfaces
Authors: Mohammad Hashemi, John Herbert
Abstract:
Quantifying and measuring Quality of Experience (QoE) are important and difficult concerns in Human Computer Interaction (HCI). Quality of Service (QoS) and the actual User Interface (UI) of the application are both important contributors to the QoE of a user. This paper describes a framework that measures accurately the way a user uses the UI in order to model users' behaviours and profiles. It monitors the use of the mouse and use of UI elements with accurate time measurement. It does this in real-time and does so unobtrusively and efficiently allowing the user to work as normal with the application. This real-time accurate measurement of the user's interaction provides valuable data and insight into the use of the UI, and is also the basis for analysis of the user's QoE.Keywords: user modelling, user interface experience, quality of experience, user experience, human and computer interaction
Procedia PDF Downloads 5041665 Research Repository System (RRS) for Academics
Authors: Ajayi Olusola Olajide, O. Ojeyinka Taiwo, Adeolara Oluwawemimo Janet, Isheyemi Olufemi Gabriel, Lawal Muideen Adekunle
Abstract:
In an academic world where research work is the tool for promotion and elevation to higher cadres, the quest for a system that secure researchers’ work, monitor as well as alert researchers of pending academic research work, cannot be over-emphasized. This study describes how a research repository system for academics is designed. The invention further relates to a system for archiving any paperwork and journal that comprises of a database for storing all researches. It relates to a method for users to communicate through messages which will also allow reviewing all the messages. To create this research repository system, PHP and MySQL were married together for the system implementation.Keywords: research, repository, academic, archiving, secure, system, implementation
Procedia PDF Downloads 5881664 Electronic Resources and Information Literacy in Higher Education Library
Authors: Nirmal Singh, Rajesh Kumar
Abstract:
Abstract- Information literacy aims to develop both critical understanding and active participation in scholars. It enables scholars to interpret and make informed judgments as users of information sources, and it also enables them to become producers of information in their own right, and thereby to become more powerful participants in society. Information literacy is about developing people‘s critical and creative abilities. Digital media – and particularly the Internet – significantly increase the potential for such active participation of the individual, provided scholars have the means and training to effectively access and use them. This paper provides definition, standards and importance of information literacy (IL). Keywords: Information literacy, Digital Media, Training, Communications Technologies.Keywords: Information literacy, Digital Media, Training, , Communications Technologies
Procedia PDF Downloads 1591663 Mobile-Assisted Language Learning (MALL) Applications for Interactive and Engaging Classrooms: APPsolutely!
Authors: Ajda Osifo, Amanda Radwan
Abstract:
Mobile-assisted language learning (MALL) or m-learning which is defined as learning with mobile devices that can be utilized in any place that is equipped with unbroken transmission signals, has created new opportunities and challenges for educational use. It introduced a new learning model combining new types of mobile devices, wireless communication services and technologies with teaching and learning. Recent advancements in the mobile world such as the Apple IOS devices (IPhone, IPod Touch and IPad), Android devices and other smartphone devices and environments (such as Windows Phone 7 and Blackberry), allowed learning to be more flexible inside and outside the classroom, making the learning experience unique, adaptable and tailored to each user. Creativity, learner autonomy, collaboration and digital practices of language learners are encouraged as well as innovative pedagogical applications, like the flipped classroom, for such practices in classroom contexts are enhanced. These developments are gradually embedded in daily life and they also seem to be heralding the sustainable move to paperless classrooms. Since mobile technologies are increasingly viewed as a main platform for delivery, we as educators need to design our activities, materials and learning environments in such a way to ensure that learners are engaged and feel comfortable. For the purposes of our session, several core MALL applications that work on the Apple IPad/IPhone will be explored; the rationale and steps needed to successfully implement these applications will be discussed and student examples will be showcased. The focus of the session will be on the following points: 1-Our current pedagogical approach, 2-The rationale and several core MALL apps, 3-Possible Challenges for Teachers and Learners, 4-Future implications. This session is aimed at instructors who are interested in integrating MALL apps into their own classroom planning.Keywords: MALL, educational technology, iPads, apps
Procedia PDF Downloads 3941662 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application
Authors: Senthuran Manoharan, Rathesan Sivagananalingam
Abstract:
One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.Keywords: authentication, adaptive authentication, machine learning, security
Procedia PDF Downloads 2521661 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego
Procedia PDF Downloads 821660 Being an Afghan Woman in Australia; Stereotypes, Gender Roles, and Adaption with New Context
Authors: Rojan Afrouz
Abstract:
Introduction: The immigration is a complex process of transitioning and transformation. Immigrants are more likely to come from the patriarchal and hierarchical society with traditional gender roles and women’s stereotypes. Changing the perception of women’s gender roles may result in challenges between women and their family and community. In this article, Afghan women’s perspectives on gender roles and stereotypes have been investigated as well as their experience of changes in the new context of Australia. Australian initiatives of challenging gender roles have provided the opportunities for Afghan women to emancipate from the traditional gender roles and pursue the value of gender equality. In this process, they may face many challenges in intersectional levels within their family, community and wider society which is a complex conflate of oppressive factors that may not be addressed easily and straightforward. Methods: This qualitative study has been conducted among Afghan women who have lived in Australia less than ten years. Semi-structured interviews either face to face or by phone have been used to collect data for this study. The interviews have been audio-recorded and transcribed verbatim. Nvivo software has been used for data analysis. Findings: Many participants mentioned that they had been taught that a good Afghan woman is devoted, obedient and loyal to their family and community. They believed that for many Afghan families, Afghan women's natural place was inside the home as a housewife, mother, daughter involving so many responsibilities and expectation of making sacrifices. Many women stated that their attitudes toward gender roles and their feeling of being a woman had been changed since they came to Australia although the process of change for women was complex and diverse. Some had to deal with conflicts with their stereotypes, traditional gender roles as well as strong disagreement with their family and community. Conclusion: Moving to a different country with more gender equality is an opportunity for Afghan women to change their perceptions of gender roles and stereotypes. However, challenging traditional stereotypes and gender roles in the new context is a complex process comprising intersectional levels.Keywords: stereotypes, gender role, immigration, Afghan women
Procedia PDF Downloads 1721659 The Application of Hellomac Rockfall Alert System in Rockfall Barriers: An Explainer
Authors: Kinjal Parmar, Matteo Lelli
Abstract:
The usage of IoT technology as a rockfall alert system is relatively new. This paper explains the potential of such an alert system called HelloMac from Maccaferri which provides transportation infrastructure asset owners the way to effectively utilize their resources in the detection of boulder impacts on rockfall barriers. This would ensure a faster assessment of the impacted barrier and subsequently facilitates the implementation of remedial works in an effective and timely manner. In addition, the HelloMac can also be integrated with another warning system to alert vehicle users of the unseen dangers ahead. HelloMac is developed to work also in remote areas, where cell coverage is not available. User gets notified when a rockfall even occurs via mobile app, SMS and email. Using such alarming systems effectively, we can reduce the risk of rockfall hazard.Keywords: rockfall, barrier, HelloMac, rockfall alert system
Procedia PDF Downloads 521658 Reducing Inequalities for the Uptake of Long-Term Reversible Contraceptive Methods through Special Family Planning Camps: A High Impact Service Delivery Model of Family Planning Practices
Authors: Ghulam Mustafa Halepota, Zaib Dahar
Abstract:
Background: Low acceptance of FP services, particularly in hard to reach areas where geographic, economic, or social barriers limit-service uptake. Moreover, limited resources appeared to be a reflection of dismal contraceptive use in Pakistan. People’s Primary Health Care Initiative (PPHI) is a Public Private Partnership Program of Government of Sindh which aims to improve maternal child health through accessible family planning services in far flung areas. In 2015 PPHI launched special family planning camps to have achieved a rapid improvement in CPR. On quarterly basis, these camps focus on Long Acting Reversible Contraceptives (LARC). These camps are arranged at 250 BHU Plus (24/7 MCHCs). The Organization manages 1140 primary health care facilities all over Sindh province and focuses on maternal, newborn and child health which includes antenatal care, labor/delivery, postnatal care, family planning, immunization, nutrition, BEmONC, CEmONC, diagnostic laboratories, ambulance services. Under the FPRH program, the organization launched special family planning camps in far flung areas to achieve a rapid improvement in CPR-committed to FP 2020 goal. Objective: To assess the performance of special FP camps for the improvement of long acting reversible contraceptive in hard to reach areas. Methodology: Outreach camps are organized on quarterly basis in 250 BHUs and maternal and child health centers (available-24/7). Using observational study design, the study reports 2 years data of special FP camps conducted in 23 various districts of Sindh during April 2015-April 2017. These special camps served a range of modern contraceptive methods including IUCDs, implants, condoms, pills, and injections. Moreover, 125 male medical officers are trained across Sindh in LARC and 554 female have been trained in implants and IUCD insertions. MSI Impact calculator was used to determine health and demographic impact of services. Results: This intervention has brought exceptional results, and the response has been overwhelming in time. Total 2048 special camps during 2015 till April 2017 have been carried out. 231796 MWRAs visited camps 91% opted modern FP, of which 45% opted Implants, 6% selected IUCDs from LARC (long term reversible contraceptive) from short term, 17% opted injectable 18% choose pills, and 12% used condoms. This intervention created a high contraceptive impact in rural Sindh an estimated 125048 FP users have been created, of this 111846 LARC users and 13498 are SARC users, through this intervention an estimated 55774 unintended pregnancies, 36299 live births, 9394, 80 maternal deaths, 926 and 6077 unsafe abortion have been averted. Moreover, the intervention created an economic impact and saved 2,409,563 direct health expenditure on each woman with reproductive age. Conclusion: Special FP Camps along with routine services is an effective and acceptable model for increase in provision of long-acting and permanent methods in hard to reach areas. This innovative approach by PHHI-Sindh has also been adopted in other provinces of Pakistan.Keywords: inequalities, special camps, family planning services, hard to reach areas
Procedia PDF Downloads 1871657 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures
Authors: Zeinab Ranjbar
Abstract:
Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security
Procedia PDF Downloads 3871656 Sinhala Sign Language to Grammatically Correct Sentences using NLP
Authors: Anjalika Fernando, Banuka Athuraliya
Abstract:
This paper presents a comprehensive approach for converting Sinhala Sign Language (SSL) into grammatically correct sentences using Natural Language Processing (NLP) techniques in real-time. While previous studies have explored various aspects of SSL translation, the research gap lies in the absence of grammar checking for SSL. This work aims to bridge this gap by proposing a two-stage methodology that leverages deep learning models to detect signs and translate them into coherent sentences, ensuring grammatical accuracy. The first stage of the approach involves the utilization of a Long Short-Term Memory (LSTM) deep learning model to recognize and interpret SSL signs. By training the LSTM model on a dataset of SSL gestures, it learns to accurately classify and translate these signs into textual representations. The LSTM model achieves a commendable accuracy rate of 94%, demonstrating its effectiveness in accurately recognizing and translating SSL gestures. Building upon the successful recognition and translation of SSL signs, the second stage of the methodology focuses on improving the grammatical correctness of the translated sentences. The project employs a Neural Machine Translation (NMT) architecture, consisting of an encoder and decoder with LSTM components, to enhance the syntactical structure of the generated sentences. By training the NMT model on a parallel corpus of Sinhala wrong sentences and their corresponding grammatically correct translations, it learns to generate coherent and grammatically accurate sentences. The NMT model achieves an impressive accuracy rate of 98%, affirming its capability to produce linguistically sound translations. The proposed approach offers significant contributions to the field of SSL translation and grammar correction. Addressing the critical issue of grammar checking, it enhances the usability and reliability of SSL translation systems, facilitating effective communication between hearing-impaired and non-sign language users. Furthermore, the integration of deep learning techniques, such as LSTM and NMT, ensures the accuracy and robustness of the translation process. This research holds great potential for practical applications, including educational platforms, accessibility tools, and communication aids for the hearing-impaired. Furthermore, it lays the foundation for future advancements in SSL translation systems, fostering inclusive and equal opportunities for the deaf community. Future work includes expanding the existing datasets to further improve the accuracy and generalization of the SSL translation system. Additionally, the development of a dedicated mobile application would enhance the accessibility and convenience of SSL translation on handheld devices. Furthermore, efforts will be made to enhance the current application for educational purposes, enabling individuals to learn and practice SSL more effectively. Another area of future exploration involves enabling two-way communication, allowing seamless interaction between sign-language users and non-sign-language users.In conclusion, this paper presents a novel approach for converting Sinhala Sign Language gestures into grammatically correct sentences using NLP techniques in real time. The two-stage methodology, comprising an LSTM model for sign detection and translation and an NMT model for grammar correction, achieves high accuracy rates of 94% and 98%, respectively. By addressing the lack of grammar checking in existing SSL translation research, this work contributes significantly to the development of more accurate and reliable SSL translation systems, thereby fostering effective communication and inclusivity for the hearing-impaired communityKeywords: Sinhala sign language, sign Language, NLP, LSTM, NMT
Procedia PDF Downloads 107