Search results for: mobile phone advertising
770 Augmenting Navigational Aids: The Development of an Assistive Maritime Navigation Application
Abstract:
On the bridge of a ship the officers are looking for visual aids to guide navigation in order to reconcile the outside world with the position communicated by the digital navigation system. Aids to navigation include: Lighthouses, lightships, sector lights, beacons, buoys, and others. They are designed to help navigators calculate their position, establish their course or avoid dangers. In poor visibility and dense traffic areas, it can be very difficult to identify these critical aids to guide navigation. The paper presents the usage of Augmented Reality (AR) as a means to present digital information about these aids to support navigation. To date, nautical navigation related mobile AR applications have been limited to the leisure industry. If proved viable, this prototype can facilitate the creation of other similar applications that could help commercial officers with navigation. While adopting a user centered design approach, the team has developed the prototype based on insights from initial research carried on board of several ships. The prototype, built on Nexus 9 tablet and Wikitude, features a head-up display of the navigational aids (lights) in the area, presented in AR and a bird’s eye view mode presented on a simplified map. The application employs the aids to navigation data managed by Hydrographic Offices and the tablet’s sensors: GPS, gyroscope, accelerometer, compass and camera. Sea trials on board of a Navy and a commercial ship revealed the end-users’ interest in using the application and further possibility of other data to be presented in AR. The application calculates the GPS position of the ship, the bearing and distance to the navigational aids; all within a high level of accuracy. However, during testing several issues were highlighted which need to be resolved as the prototype is developed further. The prototype stretched the capabilities of Wikitude, loading over 500 objects during tests in a major port. This overloaded the display and required over 45 seconds to load the data. Therefore, extra filters for the navigational aids are being considered in order to declutter the screen. At night, the camera is not powerful enough to distinguish all the lights in the area. Also, magnetic interference with the bridge of the ship generated a continuous compass error of the AR display that varied between 5 and 12 degrees. The deviation of the compass was consistent over the whole testing durations so the team is now looking at the possibility of allowing users to manually calibrate the compass. It is expected that for the usage of AR in professional maritime contexts, further development of existing AR tools and hardware is needed. Designers will also need to implement a user-centered design approach in order to create better interfaces and display technologies for enhanced solutions to aid navigation.Keywords: compass error, GPS, maritime navigation, mobile augmented reality
Procedia PDF Downloads 330769 Improving Infant Vaccination Rates Through Expanded Access to Care
Authors: Aidan Jacobsen, Morgan Motia, David Sam, Jonathan Mudge
Abstract:
Background: The Centers for Disease Control (CDC) lists vaccine requirements for children under two years old to correlate with development markers. CDC lists the coverage by age 24 months to be at least 90% nationally and 84% for Rhode Island Blackstone Valley Community Health Center (BVCHC) in Central Falls, Rhode Island, currently has a completed vaccination rate of 51% for children by the age of 24 months. Current barriers to care for up to date well child vaccinations include lack of transportation, parental work, childcare, and other social stressors. Objective: Increase the vaccination rate of children under the age of 24 months at BVCHC. Conduct a literature review to identify the common barriers preventing children under 24 months from receiving vaccinations. Reduce the barriers to expand access to vaccination care for infants Methods: Setting: Blackstone Valley Community Health Center, Pawtucket, RI Participants: (n=41), Patients between the age of 20-24 months, not up to date with the CDC vaccination recommendations and without a future appointment. QI Intervention: Patients were contacted via phone and offered an appointment during extra Saturday clinic hours in order to receive up to date vaccine care. A Saturday vaccine clinic was established specifically for patients in need of vaccines and having identified barriers to care. Conclusions: Expanding clinic hours and targeting non vaccine up –to-date patients can increase the current standard of childhood immunizations at BVCHC. Overcoming barriers preventing childhood immunization can improve access to providing up to date vaccinations. Other barriers still deter from reaching the national standard of immunizations rates.Keywords: vaccinations, well child care, barriers to care, social determinants of health
Procedia PDF Downloads 74768 Polymer in Electronic Waste: An Analysis
Authors: Anis A. Ansari, Aftab A. Ansari
Abstract:
Electronic waste is inundating the traditional solid-waste-disposal facilities, which are inadequately designed to handle and manage such type of new wastes. Since electronic waste contains mostly hazardous and even toxic materials, the seriousness of its effects on human health and the environment cannot be ignored in present scenario. Waste from the electronic industry is increasing exponentially day by day. From the last 20 years, we are continuously generating huge quantities of e-waste such as obsolete computers and other discarded electronic components, mainly due to evolution of newer technologies as a result of constant efforts in research and development in this sector. Polymers, one of the major constituents in almost every electronic waste, such as computers, printers, electronic equipment, entertainment devices, mobile phones, television sets etc., are if properly recycled can create a new business opportunity. This would not only create potential market for polymers to improve economy but also the priceless land used as dumping sites of electronic waste, can be utilized for other productive purposes.Keywords: polymer recycling, electronic waste, hazardous materials, electronic components
Procedia PDF Downloads 475767 Remote Wireless Patient Monitoring System
Authors: Sagar R. Patil, Dinesh R. Gawade, Sudhir N. Divekar
Abstract:
One of the medical devices we found when we visit a hospital care unit such device is ‘patient monitoring system’. This device (patient monitoring system) informs doctors and nurses about the patient’s physiological signals. However, this device (patient monitoring system) does not have a remote monitoring capability, which is necessitates constant onsite attendance by support personnel (doctors and nurses). Thus, we have developed a Remote Wireless Patient Monitoring System using some biomedical sensors and Android OS, which is a portable patient monitoring. This device(Remote Wireless Patient Monitoring System) monitors the biomedical signals of patients in real time and sends them to remote stations (doctors and nurse’s android Smartphone and web) for display and with alerts when necessary. Wireless Patient Monitoring System different from conventional device (Patient Monitoring system) in two aspects: First its wireless communication capability allows physiological signals to be monitored remotely and second, it is portable so patients can move while there biomedical signals are being monitor. Wireless Patient Monitoring is also notable because of its implementation. We are integrated four sensors such as pulse oximeter (SPO2), thermometer, respiration, blood pressure (BP), heart rate and electrocardiogram (ECG) in this device (Wireless Patient Monitoring System) and Monitoring and communication applications are implemented on the Android OS using threads, which facilitate the stable and timely manipulation of signals and the appropriate sharing of resources. The biomedical data will be display on android smart phone as well as on web Using web server and database system we can share these physiological signals with remote place medical personnel’s or with any where in the world medical personnel’s. We verified that the multitasking implementation used in the system was suitable for patient monitoring and for other Healthcare applications.Keywords: patient monitoring, wireless patient monitoring, bio-medical signals, physiological signals, embedded system, Android OS, healthcare, pulse oximeter (SPO2), thermometer, respiration, blood pressure (BP), heart rate, electrocardiogram (ECG)
Procedia PDF Downloads 572766 Advanced Concrete Crack Detection Using Light-Weight MobileNetV2 Neural Network
Authors: Li Hui, Riyadh Hindi
Abstract:
Concrete structures frequently suffer from crack formation, a critical issue that can significantly reduce their lifespan by allowing damaging agents to enter. Traditional methods of crack detection depend on manual visual inspections, which heavily relies on the experience and expertise of inspectors using tools. In this study, a more efficient, computer vision-based approach is introduced by using the lightweight MobileNetV2 neural network. A dataset of 40,000 images was used to develop a specialized crack evaluation algorithm. The analysis indicates that MobileNetV2 matches the accuracy of traditional CNN methods but is more efficient due to its smaller size, making it well-suited for mobile device applications. The effectiveness and reliability of this new method were validated through experimental testing, highlighting its potential as an automated solution for crack detection in concrete structures.Keywords: Concrete crack, computer vision, deep learning, MobileNetV2 neural network
Procedia PDF Downloads 68765 Research on Architectural Steel Structure Design Based on BIM
Authors: Tianyu Gao
Abstract:
Digital architectures use computer-aided design, programming, simulation, and imaging to create virtual forms and physical structures. Today's customers want to know more about their buildings. They want an automatic thermostat to learn their behavior and contact them, such as the doors and windows they want to open with a mobile app. Therefore, the architectural display form is more closely related to the customer's experience. Based on the purpose of building informationization, this paper studies the steel structure design based on BIM. Taking the Zigan office building in Hangzhou as an example, it is divided into four parts, namely, the digital design modulus of the steel structure, the node analysis of the steel structure, the digital production and construction of the steel structure. Through the application of BIM software, the architectural design can be synergized, and the building components can be informationized. Not only can the architectural design be feedback in the early stage, but also the stability of the construction can be guaranteed. In this way, the monitoring of the entire life cycle of the building and the meeting of customer needs can be realized.Keywords: digital architectures, BIM, steel structure, architectural design
Procedia PDF Downloads 195764 Potential of Safflower (Carthamus tinctorius L.) for Phytoremediation of Soils Contaminated with Heavy Metals
Authors: Violina R. Angelova, Vanja I. Akova, Stefan V. Krustev, Krasimir I. Ivanov
Abstract:
A field study was conducted to evaluate the efficacy of safflower plant for phytoremediation of contaminated soils. The experiment was performed on an agricultural fields contaminated by the Non-Ferrous-Metal Works near Plovdiv, Bulgaria. The concentrations of Pb, Zn and Cd in safflower (roots, stems, leaves and seeds), safflower oil and meal were determined. A correlation was found between the quantity of the mobile forms and the uptake of Pb, Zn and Cd by the safflower seeds. Safflower is a plant which is tolerant to heavy metals and can be grown on contaminated soils, and which can be referred to the hyperaccumulators of cadmium and the accumulators of lead and zinc, and can be successfully used in the phytoremediation of heavy metal contaminated soils. The processing of seeds to oil and using the obtained oil for nutritional purposes will greatly reduce the cost of phytoremediation. The possibility of further industrial processing will make safflower economically interesting crops for farmers of phytoremediation technology.Keywords: heavy metals, phytoremediation, polluted soils, safflower
Procedia PDF Downloads 320763 Analyzing Concrete Structures by Using Laser Induced Breakdown Spectroscopy
Authors: Nina Sankat, Gerd Wilsch, Cassian Gottlieb, Steven Millar, Tobias Guenther
Abstract:
Laser-Induced Breakdown Spectroscopy (LIBS) is a combination of laser ablation and optical emission spectroscopy, which in principle can simultaneously analyze all elements on the periodic table. Materials can be analyzed in terms of chemical composition in a two-dimensional, time efficient and minor destructive manner. These advantages predestine LIBS as a monitoring technique in the field of civil engineering. The decreasing service life of concrete infrastructures is a continuously growing problematic. A variety of intruding, harmful substances can damage the reinforcement or the concrete itself. To insure a sufficient service life a regular monitoring of the structure is necessary. LIBS offers many applications to accomplish a successful examination of the conditions of concrete structures. A selection of those applications are the 2D-evaluation of chlorine-, sodium- and sulfur-concentration, the identification of carbonation depths and the representation of the heterogeneity of concrete. LIBS obtains this information by using a pulsed laser with a short pulse length (some mJ), which is focused on the surfaces of the analyzed specimen, for this only an optical access is needed. Because of the high power density (some GW/cm²) a minimal amount of material is vaporized and transformed into a plasma. This plasma emits light depending on the chemical composition of the vaporized material. By analyzing the emitted light, information for every measurement point is gained. The chemical composition of the scanned area is visualized in a 2D-map with spatial resolutions up to 0.1 mm x 0.1 mm. Those 2D-maps can be converted into classic depth profiles, as typically seen for the results of chloride concentration provided by chemical analysis like potentiometric titration. However, the 2D-visualization offers many advantages like illustrating chlorine carrying cracks, direct imaging of the carbonation depth and in general allowing the separation of the aggregates from the cement paste. By calibrating the LIBS-System, not only qualitative but quantitative results can be obtained. Those quantitative results can also be based on the cement paste, while excluding the aggregates. An additional advantage of LIBS is its mobility. By using the mobile system, located at BAM, onsite measurements are feasible. The mobile LIBS-system was already used to obtain chloride, sodium and sulfur concentrations onsite of parking decks, bridges and sewage treatment plants even under hard conditions like ongoing construction work or rough weather. All those prospects make LIBS a promising method to secure the integrity of infrastructures in a sustainable manner.Keywords: concrete, damage assessment, harmful substances, LIBS
Procedia PDF Downloads 176762 Analysis of Network Performance Using Aspect of Quantum Cryptography
Authors: Nisarg A. Patel, Hiren B. Patel
Abstract:
Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).Keywords: cryptography, networking, quantum, encryption and decryption
Procedia PDF Downloads 185761 Analyzing Corporate Employee Preferences for E-Learning Platforms: A Survey-Based Approach to Knowledge Updation
Authors: Sandhyarani Mahananda
Abstract:
This study investigates the preferences of corporate employees for knowledge updates on the e-learning platform. The researchers explore the factors influencing their platform choices through a survey administered to employees across diverse industries and job roles. The survey examines preferences for specific platforms (e.g., Coursera, Udemy, LinkedIn Learning). It assesses the importance of content relevance, platform usability, mobile accessibility, and integration with workplace learning management systems. Preliminary findings indicate a preference for platforms that offer curated, job-relevant content, personalized learning paths, and seamless integration with employer-provided learning resources. This research provides valuable insights for organizations seeking to optimize their investment in e-learning and enhance employee knowledge development.Keywords: corporate training, e-learning platforms, employee preferences, knowledge updation, professional development
Procedia PDF Downloads 24760 Improving Fingerprinting-Based Localization System Using Generative Artificial Intelligence
Authors: Getaneh Berie Tarekegn
Abstract:
A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 39 cm, and more than 90% of the errors are less than 82 cm. That is, numerical results proved that, in comparison to traditional methods, the proposed SRCLoc method can significantly improve positioning performance and reduce radio map construction costs.Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine
Procedia PDF Downloads 71759 Being an Afghan Woman in Australia; Stereotypes, Gender Roles, and Adaption with New Context
Authors: Rojan Afrouz
Abstract:
Introduction: The immigration is a complex process of transitioning and transformation. Immigrants are more likely to come from the patriarchal and hierarchical society with traditional gender roles and women’s stereotypes. Changing the perception of women’s gender roles may result in challenges between women and their family and community. In this article, Afghan women’s perspectives on gender roles and stereotypes have been investigated as well as their experience of changes in the new context of Australia. Australian initiatives of challenging gender roles have provided the opportunities for Afghan women to emancipate from the traditional gender roles and pursue the value of gender equality. In this process, they may face many challenges in intersectional levels within their family, community and wider society which is a complex conflate of oppressive factors that may not be addressed easily and straightforward. Methods: This qualitative study has been conducted among Afghan women who have lived in Australia less than ten years. Semi-structured interviews either face to face or by phone have been used to collect data for this study. The interviews have been audio-recorded and transcribed verbatim. Nvivo software has been used for data analysis. Findings: Many participants mentioned that they had been taught that a good Afghan woman is devoted, obedient and loyal to their family and community. They believed that for many Afghan families, Afghan women's natural place was inside the home as a housewife, mother, daughter involving so many responsibilities and expectation of making sacrifices. Many women stated that their attitudes toward gender roles and their feeling of being a woman had been changed since they came to Australia although the process of change for women was complex and diverse. Some had to deal with conflicts with their stereotypes, traditional gender roles as well as strong disagreement with their family and community. Conclusion: Moving to a different country with more gender equality is an opportunity for Afghan women to change their perceptions of gender roles and stereotypes. However, challenging traditional stereotypes and gender roles in the new context is a complex process comprising intersectional levels.Keywords: stereotypes, gender role, immigration, Afghan women
Procedia PDF Downloads 172758 The Awareness of Computer Science Students Regarding the Security of Location Based Games
Authors: Jacques Barnard, Magda Huisman, Gunther R. Drevin
Abstract:
Rapid expansion and development in die mobile technology market has created an opportunity for users to participate in location based games. As a consequence of this fast expanding market and new technology, it is important to be aware of the implications this has on security. This paper measures the impact on the security awareness of games’ participants, as well as on that of students at university level with regards to their various stages of input in years of studying and gamer classification. This serves to provide insight into the matter as to discernible differences in the awareness of the security implications concerning these technologies. The data was accumulated via a web questionnaire that was to be completed yearly by students from respective year groups. Results signify a meaningful disparity in security awareness among students completing the varying study years and research. This awareness, however, does not always impact on gamers.Keywords: gamer classifications, location based games, location based data, security awareness
Procedia PDF Downloads 294757 Rule-Based Expert System for Headache Diagnosis and Medication Recommendation
Authors: Noura Al-Ajmi, Mohammed A. Almulla
Abstract:
With the increased utilization of technology devices around the world, healthcare and medical diagnosis are critical issues that people worry about these days. Doctors are doing their best to avoid any medical errors while diagnosing diseases and prescribing the wrong medication. Subsequently, artificial intelligence applications that can be installed on mobile devices such as rule-based expert systems facilitate the task of assisting doctors in several ways. Due to their many advantages, the usage of expert systems has increased recently in health sciences. This work presents a backward rule-based expert system that can be used for a headache diagnosis and medication recommendation system. The structure of the system consists of three main modules, namely the input unit, the processing unit, and the output unit.Keywords: headache diagnosis system, prescription recommender system, expert system, backward rule-based system
Procedia PDF Downloads 219756 Communication in a Heterogeneous Ad Hoc Network
Authors: C. Benjbara, A. Habbani
Abstract:
Wireless networks are getting more and more used in every new technology or feature, especially those without infrastructure (Ad hoc mode) which provide a low cost alternative to the infrastructure mode wireless networks and a great flexibility for application domains such as environmental monitoring, smart cities, precision agriculture, and so on. These application domains present a common characteristic which is the need of coexistence and intercommunication between modules belonging to different types of ad hoc networks like wireless sensor networks, mesh networks, mobile ad hoc networks, vehicular ad hoc networks, etc. This vision to bring to life such heterogeneous networks will make humanity duties easier but its development path is full of challenges. One of these challenges is the communication complexity between its components due to the lack of common or compatible protocols standard. This article proposes a new patented routing protocol based on the OLSR standard in order to resolve the heterogeneous ad hoc networks communication issue. This new protocol is applied on a specific network architecture composed of MANET, VANET, and FANET.Keywords: Ad hoc, heterogeneous, ID-Node, OLSR
Procedia PDF Downloads 217755 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things
Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy
Abstract:
The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.Keywords: internet of things, authentication, cryptography, security protocol
Procedia PDF Downloads 123754 Remote Monitoring and Control System of Potentiostat Based on the Internet of Things
Authors: Liang Zhao, Guangwen Wang, Guichang Liu
Abstract:
Constant potometer is an important component of pipeline anti-corrosion systems in the chemical industry. Based on Internet of Things (IoT) technology, Programmable Logic Controller (PLC) technology and database technology, this paper developed a set of a constant potometer remote monitoring management system. The remote monitoring and remote adjustment of the working status of the constant potometer are realized. The system has real-time data display, historical data query, alarm push management, user permission management, and supporting Web access and mobile client application (APP) access. The actual engineering project test results show the stability of the system, which can be widely used in cathodic protection systems.Keywords: internet of things, pipe corrosion protection, potentiostat, remote monitoring
Procedia PDF Downloads 147753 GAILoc: Improving Fingerprinting-Based Localization System Using Generative Artificial Intelligence
Authors: Getaneh Berie Tarekegn
Abstract:
A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 39 cm, and more than 90% of the errors are less than 82 cm. That is, numerical results proved that, in comparison to traditional methods, the proposed SRCLoc method can significantly improve positioning performance and reduce radio map construction costs.Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine
Procedia PDF Downloads 76752 Internet of Things: Route Search Optimization Applying Ant Colony Algorithm and Theory of Computer Science
Authors: Tushar Bhardwaj
Abstract:
Internet of Things (IoT) possesses a dynamic network where the network nodes (mobile devices) are added and removed constantly and randomly, hence the traffic distribution in the network is quite variable and irregular. The basic but very important part in any network is route searching. We have many conventional route searching algorithms like link-state, and distance vector algorithms but they are restricted to the static point to point network topology. In this paper we propose a model that uses the Ant Colony Algorithm for route searching. It is dynamic in nature and has positive feedback mechanism that conforms to the route searching. We have also embedded the concept of Non-Deterministic Finite Automata [NDFA] minimization to reduce the network to increase the performance. Results show that Ant Colony Algorithm gives the shortest path from the source to destination node and NDFA minimization reduces the broadcasting storm effectively.Keywords: routing, ant colony algorithm, NDFA, IoT
Procedia PDF Downloads 444751 Room Level Indoor Localization Using Relevant Channel Impulse Response Parameters
Authors: Raida Zouari, Iness Ahriz, Rafik Zayani, Ali Dziri, Ridha Bouallegue
Abstract:
This paper proposes a room level indoor localization algorithm based on the use Multi-Layer Neural Network (MLNN) classifiers and one versus one strategy. Seven parameters of the Channel Impulse Response (CIR) were used and Gram-Shmidt Orthogonalization was performed to study the relevance of the extracted parameters. Simulation results show that when relevant CIR parameters are used as position fingerprint and when optimal MLNN architecture is selected good room level localization score can be achieved. The current study showed also that some of the CIR parameters are not correlated to the location and can decrease the localization performance of the system.Keywords: mobile indoor localization, multi-layer neural network (MLNN), channel impulse response (CIR), Gram-Shmidt orthogonalization
Procedia PDF Downloads 362750 Flexible PVC Based Nanocomposites With the Incorporation of Electric and Magnetic Nanofillers for the Shielding Against EMI and Thermal Imaging Signals
Authors: H. M. Fayzan Shakir, Khadija Zubair, Tingkai Zhao
Abstract:
Electromagnetic (EM) waves are being used widely now a days. Cell phone signals, WIFI signals, wireless telecommunications etc everything uses EM waves which then create EM pollution. EM pollution can cause serious effects on both human health and nearby electronic devices. EM waves have electric and magnetic components that disturb the flow of charged particles in both human nervous system and electronic devices. The shielding of both humans and electronic devices are a prime concern today. EM waves can cause headaches, anxiety, suicide and depression, nausea, fatigue and loss of libido in humans and malfunctioning in electronic devices. Polyaniline (PANI) and polypyrrole (PPY) were successfully synthesized using chemical polymerizing using ammonium persulfate and DBSNa as oxidant respectively. Barium ferrites (BaFe) were also prepared using co-precipitation method and calcinated at 10500C for 8h. Nanocomposite thin films with various combinations and compositions of Polyvinylchloride, PANI, PPY and BaFe were prepared. X-ray diffraction technique was first used to confirm the successful fabrication of all nano fillers and particle size analyzer to measure the exact size and scanning electron microscopy is used for the shape. According to Electromagnetic Interference theory, electrical conductivity is the prime property required for the Electromagnetic Interference shielding. 4-probe technique is then used to evaluate DC conductivity of all samples. Samples with high concentration of PPY and PANI exhibit remarkable increased electrical conductivity due to fabrication of interconnected network structure inside the Polyvinylchloride matrix that is also confirmed by SEM analysis. Less than 1% transmission was observed in whole NIR region (700 nm – 2500 nm). Also, less than -80 dB Electromagnetic Interference shielding effectiveness was observed in microwave region (0.1 GHz to 20 GHz).Keywords: nanocomposites, polymers, EMI shielding, thermal imaging
Procedia PDF Downloads 108749 Afghan Women’s Definitions, Perceptions and Experience of Domestic Violence, a Qualitative Study with Afghan Women in Australia
Authors: Rojan Afrouz
Abstract:
The main aim of this study is understanding Afghan women’s perception of domestic violence and their experience of abuse by their family members. The voice of Afghan women has not been heard much particularly in Australia. Their families and communities have silenced some of them in the name of family honour and reputation, and others have not had the opportunity to talk about the issue. Although domestic violence is an issue in every country, research suggests that this is more likely to be considered acceptable behaviour in Afghanistan than elsewhere. Given the high public visibility of initiatives which aim to tackle domestic violence in Australia, it is entirely possible that Afghan women’s perceptions and beliefs about domestic violence will have changed since their arrival in this country. Thus, their understandings, perceptions and their experience of domestic violence have been investigated to improve the Afghan women’s situation in Australia. Methods: This qualitative study has been conducted among Afghan women who have lived in Australia less than ten years. Semi-structured interviews either face to face or by phone have been used to collect data for this study. The interviews have been audio-recorded and transcribed verbatim. Nvivo software has been used for data analysis. Findings: Participants’ definitions of domestic violence vary. They defined domestic violence in relation to their educational levels, their personal life and experience of domestic violence. Some women tended to change the definitions to be more relevant to their own life and experience. Many women had the knowledge of different domestic violence acts that have been distinguished as violent acts in Australia or other western countries. Some of the participants stated that they had the experience of domestic violence from their partner or one of the family members. Those who have been abused, their experiences were diverse and had been perpetrated by different family members. Majority of participants revealed the story of other women in their family and community that have been abused. Conclusion: Moving to Australia helped women to be aware of the issues and recognising that they are in the abusive relationships. However, intersecting multiple identities in a complex system of oppression, domination or discrimination makes the experience of domestic violence more complicated among Afghan community in Australia that cannot be addressed easily.Keywords: domestic violence, intersectionality, immigration, afghan women
Procedia PDF Downloads 325748 Impact of Customer Experience Quality on Loyalty of Mobile and Fixed Broadband Services: Case Study of Telecom Egypt Group
Authors: Nawal Alawad, Passent Ibrahim Tantawi, Mohamed Abdel Salam Ragheb
Abstract:
Providing customers with quality experiences has been confirmed to be a sustainable, competitive advantage with a distinct financial impact for companies. The success of service providers now relies on their ability to provide customer-centric services. The importance of perceived service quality and customer experience is widely recognized. The focus of this research is in the area of mobile and fixed broadband services. This study is of dual importance both academically and practically. Academically, this research applies a new model investigating the impact of customer experience quality on loyalty based on modifying the multiple-item scale for measuring customers’ service experience in a new area and did not depend on the traditional models. The integrated scale embraces four dimensions: service experience, outcome focus, moments of truth and peace of mind. In addition, it gives a scientific explanation for this relationship so this research fill the gap in such relations in which no one correlate or give explanations for these relations before using such integrated model and this is the first time to apply such modified and integrated new model in telecom field. Practically, this research gives insights to marketers and practitioners to improve customer loyalty through evolving the experience quality of broadband customers which is interpreted to suggested outcomes: purchase, commitment, repeat purchase and word-of-mouth, this approach is one of the emerging topics in service marketing. Data were collected through 412 questionnaires and analyzed by using structural equation modeling.Findings revealed that both outcome focus and moments of truth have a significant impact on loyalty while both service experience and peace of mind have insignificant impact on loyalty.In addition, it was found that 72% of the variation occurring in loyalty is explained by the model. The researcher also measured the net prompters score and gave explanation for the results. Furthermore, assessed customer’s priorities of broadband services. The researcher recommends that the findings of this research will extend to be considered in the future plans of Telecom Egypt Group. In addition, to be applied in the same industry especially in the developing countries that have the same circumstances with similar service settings. This research is a positive contribution in service marketing, particularly in telecom industry for making marketing more reliable as managers can relate investments in service experience directly with the performance closest to income for instance, repurchasing behavior, positive word of mouth and, commitment. Finally, the researcher recommends that future studies should consider this model to explain significant marketing outcomes such as share of wallet and ultimately profitability.Keywords: broadband services, customer experience quality, loyalty, net promoters score
Procedia PDF Downloads 268747 Health Tourists in Iran and Cultural Prejudices
Authors: Naeemeh Silvari
Abstract:
The tourism industry is important for different nations in two ways. Apart from economic benefits, it provides a basis for getting acquainted with the culture of different regions of the world. Depending on the capacities and contexts of their geography, countries try to attract more people to their country in different ways. Health tourism has been an important branch of the tourism industry in recent years, and many countries around the world are trying to make progress in this field and attract many tourists from around the world. Iran, like many developing countries in the Middle East and East Asia, is trying to improve and develop tourist attractions in the field of health. Due to the cheapness of providing medical services to tourists, many people have traveled to Iran for medical and health care. However, there is a long way to go before recognizing and reaching the desired position in this field. Due to the direct relationship between tourism and culture, the negative attitude towards the context of Iran has caused foreign travelers not to choose this country as their tourist destination. In this article, we tried to study the change in their attitude towards Iran by using semi-structured interviews of foreign travelers who traveled to Iran for treatment and medical services. The text of the interviews was coded and analyzed by MAX QDA software. Many of the people in the sample were from Middle Eastern and Arabic-speaking countries. Influenced by the media, they felt rejected by the Iranians before the trip. During their stay in Iran and in connection with the health care staff, in the first stage, they pointed out that many of their anxieties about the kind of treatment of Iranians have been allayed. In addition to the satisfaction with the medical services provided, they considered the atmosphere of Iranians' interaction with foreign travelers to be relatively appropriate, and some stated that Iran would be the destination of their leisure trip in the future. At the end of the research, policymakers were suggested that in order to resolve cultural contradictions rooted in values, they should first be recognized and seek to use other opportunities to resolve contradictions and form interactions with other cultures.Keywords: cultural conflict, health tourism, cultural prejudice, advertising and media
Procedia PDF Downloads 78746 A Review on Web-Based Attendance Management System
Authors: Arvind Lal, Chumphila Bhutia, Bidhan Pradhan, Retika Sharma, Monisha Limboo
Abstract:
There have been many proposals to optimize the students’ management system in higher education. Managing student attendance during lecture periods have become a difficult challenge. Manual calculation of attendance produces errors and wastes a lot of time. This proposed system manages the student’s attendance in a web portal and the records of the attendance will be stored in a database. The attendance of the students will be further forwarded to their HOD (Head OF Department), class teacher and their parents/guardians. This system will use MySQL for the database. The template of the website will be built using HTML and CSS (Cascading StyleSheet) code. JavaScript will be added to improve the use of the system. Student’s details will be stored in the database. Also, it will contain the details of the teachers according to their subjects and the classes they teach. The system will be responsive which can be used in mobile phones. Also, the development of this project will be user-friendly by facilitating with clear and understandable tabs. Hence, this website will be beneficial to institutes.Keywords: website, student's attendance, MySQL database, HTML, CSS, PHP, JavaScript
Procedia PDF Downloads 184745 An Exploration of German Tourists’ Market Demand Towards Ethiopian Tourist Destinations
Authors: Dagnew Dessie Mengie
Abstract:
The purpose of this study was to investigate German tourists' demand for Ethiopian tourism destinations. The author has made every effort to identify the differences in the preferences of German visitors’ demand in Ethiopia comparing with Egypt, Kenya, Tanzania, and South African tourism sectors if they are invited to visit at the same time. However, the demand for international tourism for Ethiopia currently lags behind these African countries. Therefore, to offer demand-driven tourism products, the Ethiopian government and tour and travel operators need to understand the important factors that affect international tourists’ decision to visit Ethiopian tourist destinations. The aim of this study was to analyze German Tourists’ Demand for Ethiopian destinations. The researcher aimed to identify the demand for German tourists’ preference for Ethiopian tourist destinations compared to the above-mentioned African countries. For collecting and analysing data for this study, both quantitative and qualitative methods of research are being used in this study. The most significant data are collected by using the primary data collection method i.e. survey and interviews which are the most and large number of potential responses and feedback from nine German active tourists,12 Ethiopian tourism officials, four African embassies, and four well functioning private tour companies and secondary data collected from books, journals, previous research and electronic websites. Based on the data analysis of the information gathered from interviews and questionnaires, the study disclosed that the majority of German tourists do have not that high demand for Ethiopian Tourist destinations due to the following reasons: (1) Many Germans are fascinated by adventures and safari and simply want to lie on the beach and relax. These interests have leaded them to look for other African countries which have these accesses. (2) Uncomfortable infrastructure and transport problems are attributed to the decreasing number of German tourists in the country. (3) Inadequate marketing operation of the Ethiopian Tourism Authority and its delegates in advertising and clarifying the above irregularities which are raised by the tourists.Keywords: environmental benefits of tourism, social benefits of tourism, economic benefits of tourism, political factors on tourism
Procedia PDF Downloads 42744 Privacy Paradox and the Internet of Medical Things
Authors: Isabell Koinig, Sandra Diehl
Abstract:
In recent years, the health-care context has not been left unaffected by technological developments. In recent years, the Internet of Medical Things (IoMT)has not only led to a collaboration between disease management and advanced care coordination but also to more personalized health care and patient empowerment. With more than 40 % of all health technology being IoMT-related by 2020, questions regarding privacy become more prevalent, even more so during COVID-19when apps allowing for an intensive tracking of people’s whereabouts and their personal contacts cause privacy advocates to protest and revolt. There is a widespread tendency that even though users may express concerns and fears about their privacy, they behave in a manner that appears to contradict their statements by disclosing personal data. In literature, this phenomenon is discussed as a privacy paradox. While there are some studies investigating the privacy paradox in general, there is only scarce research related to the privacy paradox in the health sector and, to the authors’ knowledge, no empirical study investigating young people’s attitudes toward data security when using wearables and health apps. The empirical study presented in this paper tries to reduce this research gap by focusing on the area of digital and mobile health. It sets out to investigate the degree of importance individuals attribute to protecting their privacy and individual privacy protection strategies. Moreover, the question to which degree individuals between the ages of 20 and 30 years are willing to grant commercial parties access to their private data to use digital health services and apps are put to the test. To answer this research question, results from 6 focus groups with 40 participants will be presented. The focus was put on this age segment that has grown up in a digitally immersed environment. Moreover, it is particularly the young generation who is not only interested in health and fitness but also already uses health-supporting apps or gadgets. Approximately one-third of the study participants were students. Subjects were recruited in August and September 2019 by two trained researchers via email and were offered an incentive for their participation. Overall, results indicate that the young generation is well informed about the growing data collection and is quite critical of it; moreover, they possess knowledge of the potential side effects associated with this data collection. Most respondents indicated to cautiously handle their data and consider privacy as highly relevant, utilizing a number of protective strategies to ensure the confidentiality of their information. Their willingness to share information in exchange for services was only moderately pronounced, particularly in the health context, since health data was seen as valuable and sensitive. The majority of respondents indicated to rather miss out on using digital and mobile health offerings in order to maintain their privacy. While this behavior might be an unintended consequence, it is an important piece of information for app developers and medical providers, who have to find a way to find a user base for their products against the background of rising user privacy concerns.Keywords: digital health, privacy, privacy paradox, IoMT
Procedia PDF Downloads 138743 Exposure Analysis of GSM Base Stations in Industrial Area
Authors: A. D. Usman, W. F. Wan Ahmad, H. H. Danjuma
Abstract:
Exposure due to GSM frequencies is subject of daily debate. Though regulatory bodies provide guidelines for exposure, people still exercise fear on the possible health hazard that may result due to long term usage. In this study, exposure due to electromagnetic field emitted by GSM base stations in industrial areas was investigated. The aimed was to determine whether industrial area exposure is higher as compared to residential as well as compliance with ICNIRP guidelines. Influence of reflection and absorption with respect to inverse square law was also investigated. Measurements from GSM base stations were performed at various distances in far field region. The highest measured peak power densities as well as the calculated values at GSM 1.8 GHz were 6.05 and 90 mW/m2 respectively. This corresponds to 0.07 and 1% of ICNIRP guidelines. The highest peak power densities as well as the calculated values at GSM 0.9 GHz were 11.92 and 49.7 mW/m2 respectively. These values were 0.3 and 1.1% of ICNIRP guidelines.Keywords: Global System for Mobile Communications (GSM), Electromagnetic Field (EMF), far field, power density, Radiofrequency (RF)
Procedia PDF Downloads 482742 Android Application on Checking Halal Product Based on Augmented Reality
Authors: Saidatul A'isyah Ahmad Shukri, Haslina Arshad
Abstract:
This study was conducted to develop an application that provides Augmented Reality experience in identifying halal food products and beverages based on Malaysian Islamic Development Department (JAKIM) database for Muslim consumers in Malaysia. The applications is operating on the mobile device using the Android platform. This application aims to provide a new experience to the user how to use the Android application implements Augmentation Reality technology The methodology used is object-oriented analysis and design (OOAD). The programming language used is JAVA programming using the Android Software Development Kit (SDK) and XML. Android operating system is selected, and it is an open source operating system. Results from the study are implemented to further enhance diversity in presentation of information contained in this application and so can bring users using these applications from different angles.Keywords: android, augmented reality, food, halal, Malaysia, products, XML
Procedia PDF Downloads 456741 Speech Enhancement Using Kalman Filter in Communication
Authors: Eng. Alaa K. Satti Salih
Abstract:
Revolutions Applications such as telecommunications, hands-free communications, recording, etc. which need at least one microphone, the signal is usually infected by noise and echo. The important application is the speech enhancement, which is done to remove suppressed noises and echoes taken by a microphone, beside preferred speech. Accordingly, the microphone signal has to be cleaned using digital signal processing DSP tools before it is played out, transmitted, or stored. Engineers have so far tried different approaches to improving the speech by get back the desired speech signal from the noisy observations. Especially Mobile communication, so in this paper will do reconstruction of the speech signal, observed in additive background noise, using the Kalman filter technique to estimate the parameters of the Autoregressive Process (AR) in the state space model and the output speech signal obtained by the MATLAB. The accurate estimation by Kalman filter on speech would enhance and reduce the noise then compare and discuss the results between actual values and estimated values which produce the reconstructed signals.Keywords: autoregressive process, Kalman filter, Matlab, noise speech
Procedia PDF Downloads 345