Search results for: online threats
2008 The Impact of Facebook Brand Pages Engagement on Consumers Purchase Behaviour
Authors: Sudarsan Jayasingh, R. Venkatesh
Abstract:
Increasing number of customers gets connected to social networking sites, such as Facebook and Twitter to details about the brand communications. This survey, based on a convenience sample, aimed to find the reason for the participants to like Facebook fan pages, how often they visit and interact with the pages that they like, and how is it related with their purchase behaviour. 104 respondents completed the online survey. Overall, the study aimed at determining whether or not creating and maintaining a Facebook fan page is a beneficial tool for brands to communicate with their consumer base.Keywords: facebook brand pages, social media, consumer engagement, digital engagement, purchase behaviour
Procedia PDF Downloads 3162007 Enhancing Audience Engagement: Informal Music Learning During Classical Concerts
Authors: Linda Dusman, Linda Baker
Abstract:
The Bearman Study of Audience Engagement examined the potential for real-time music education during online symphony orchestra concerts. It follows on the promising results of a preliminary study of STEAM (Science, Technology, Engineering, Arts, and Mathematics) education during live concerts, funded by the National Science Foundation with the Baltimore Symphony Orchestra. For the Bearman Study, audience groups were recruited to attend two previously recorded concerts of the National Orchestral Institute (NOI) in 2020 or the Utah Symphony in 2021. They used a smartphone app called EnCue to present real-time program notes about the music being performed. Short notes along with visual information (photos and score fragments) were designed to provide historical, cultural, biographical, and theoretical information at specific moments in the music where that information would be most pertinent, generally spaced 2-3 minutes apart to avoid distraction. The music performed included Dvorak Symphony No. 8 and Mahler Symphony No. 5 at NOI, and Mendelssohn Scottish Symphony and Richard Strauss Metamorphosen with the Utah Symphony, all standard repertoire for symphony orchestras. During each phase of the study (2020 and 2021), participants were randomly assigned to use the app to view program notes during the first concert or to use the app during the second concert. A total of 139 participants (67 in 2020 and 72 in 2021) completed three online questionnaires, one before attending the first concert, one immediately after the concert, and the third immediately after the second concert. Questionnaires assessed demographic background, expertise in music, engagement during the concert, learning of content about the composers and the symphonies, and interest in the future use of the app. In both phases of the study, participants demonstrated that they learned content presented on the app, evidenced by the fact that their multiple-choice test scores were significantly higher when they used the app than when they did not. In addition, most participants indicated that using the app enriched their experience of the concert. Overall, they were very positive about their experience using the app for real-time learning and they expressed interest in using it in the future at both live and streaming concerts. Results confirmed that informal real-time learning during concerts is possible and can generate enhanced engagement and interest in classical music.Keywords: audience engagement, informal education, music technology, real-time learning
Procedia PDF Downloads 2012006 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 1902005 Mobile Games Applications Android-Based Physics Education to Improve Student Motivation and Interest in Learning Physics
Authors: Rizky Dwi A, Mikha Herlina Pi
Abstract:
Physics lessons for high school students, especially in Indonesia is less desirable because many people believe that physics is very difficult, especially the development of increasingly sophisticated era make online gaming more attractive many people especially school children with a variety of increasingly sophisticated gadgets. Therefore, if those two things combined to attract students in physics, the physics-based educational game android can motivate students' interest and understanding of the physics because while playing, they can also learn physics.Keywords: education, game physics, interest, student's motivation
Procedia PDF Downloads 2772004 Formal Development of Electronic Identity Card System Using Event-B
Authors: Tomokazu Nagata, Jawid Ahmad Baktash
Abstract:
The goal of this paper is to explore the use of formal methods for Electronic Identity Card System. Nowadays, one of the core research directions in a constantly growing distributed environment is the improvement of the communication process. The responsibility for proper verification becomes crucial. Formal methods can play an essential role in the development and testing of systems. The thesis presents two different methodologies for assessing correctness. Our first approach employs abstract interpretation techniques for creating a trace based model for Electronic Identity Card System. The model was used for building a semi decidable procedure for verifying the system model. We also developed the code for the eID System and can cover three parts login to system sending of Acknowledgment from user side, receiving of all information from server side and log out from system. The new concepts of impasse and spawned sessions that we introduced led our research to original statements about the intruder’s knowledge and eID system coding with respect to secrecy. Furthermore, we demonstrated that there is a bound on the number of sessions needed for the analysis of System.Electronic identity (eID) cards promise to supply a universal, nation-wide mechanism for user authentication. Most European countries have started to deploy eID for government and private sector applications. Are government-issued electronic ID cards the proper way to authenticate users of online services? We use the eID project as a showcase to discuss eID from an application perspective. The new eID card has interesting design features, it is contact-less, it aims to protect people’s privacy to the extent possible, and it supports cryptographically strong mutual authentication between users and services. Privacy features include support for pseudonymous authentication and per service controlled access to individual data items. The article discusses key concepts, the eID infrastructure, observed and expected problems, and open questions. The core technology seems ready for prime time and government projects deploy it to the masses. But application issues may hamper eID adoption for online applications.Keywords: eID, event-B, Pro-B, formal method, message passing
Procedia PDF Downloads 2332003 A Framework for Consumer Selection on Travel Destinations
Authors: J. Rhodes, V. Cheng, P. Lok
Abstract:
The aim of this study is to develop a parsimonious model that explains the effect of different stimulus on a tourist’s intention to visit a new destination. The model consists of destination trust and interest as the mediating variables. The model was tested using two different types of stimulus; both studies empirically supported the proposed model. Furthermore, the first study revealed that advertising has a stronger effect than positive online reviews. The second study found that the peripheral route of the elaboration likelihood model has a stronger influence power than the central route in this context.Keywords: advertising, electronic word-of-mouth, elaboration likelihood model, intention to visit, trust
Procedia PDF Downloads 4572002 Potential Use of Spore-Forming Biosurfactant Producing Bacteria in Oil-Pollution Bioremediation
Authors: S. N. Al-Bahry, Y. M. Al-Wahaibi, S. J. Joshi, E. A. Elshafie, A. S. Al-Bimani
Abstract:
Oman is one of the oil producing countries in the Arabian Peninsula and the Gulf region. About 30-40 % of oil produced from the Gulf is transported globally along the seacoast of Oman. Oil pollution from normal tanker operations, ballast water, illegal discharges and accidental spills are always serious threats to terrestrial and marine habitats. Due to Oman’s geographical location at arid region where the temperature ranges between high 40s and low 50s Celsius in summers with low annual rainfall, the main source of fresh water is desalinated sea and brackish water. Oil pollution, therefore, pose a major threat to drinking water. Biosurfactants are secondary metabolites produced by microorganisms in hydrophobic environments to release nutrients from solid surfaces, such as oil. In this study, indigenous oil degrading thermophilic spore forming bacteria were isolated from oil fields contaminated soil. The isolates were identified using MALDI-TOF biotyper and 16s RNA. Their growth conditions were optimized for the production of biosurfactant. Surface tension, interfacial tensions and microbial oil biodegradation capabilities were tested. Some thermophilic bacteria degraded either completely or partially heavy crude oil (API 10-15) within 48h suggesting their high potential in oil spill bioremediation and avoiding the commonly used physical and chemical methods which usually lead to other environmental pollution.Keywords: bacteria, bioremediation, biosurfactant, crude-oil-pollution
Procedia PDF Downloads 4252001 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan
Authors: Pema Choejey, David Murray, Chun Che Fung
Abstract:
Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.Keywords: awareness and training, cybersecurity policy, risk management, security risks
Procedia PDF Downloads 3442000 Exo-III Assisted Amplification Strategy through Target Recycling of Hg²⁺ Detection in Water: A GNP Based Label-Free Colorimetry Employing T-Rich Hairpin-Loop Metallobase
Authors: Abdul Ghaffar Memon, Xiao Hong Zhou, Yunpeng Xing, Ruoyu Wang, Miao He
Abstract:
Due to deleterious environmental and health effects of the Hg²⁺ ions, various online, detection methods apart from the traditional analytical tools have been developed by researchers. Biosensors especially, label, label-free, colorimetric and optical sensors have advanced with sensitive detection. However, there remains a gap of ultrasensitive quantification as noise interact significantly especially in the AuNP based label-free colorimetry. This study reported an amplification strategy using Exo-III enzyme for target recycling of Hg²⁺ ions in a T-rich hairpin loop metallobase label-free colorimetric nanosensor with an improved sensitivity using unmodified gold nanoparticles (uGNPs) as an indicator. The two T-rich metallobase hairpin loop structures as 5’- CTT TCA TAC ATA GAA AAT GTA TGT TTG -3 (HgS1), and 5’- GGC TTT GAG CGC TAA GAA A TA GCG CTC TTT G -3’ (HgS2) were tested in the study. The thermodynamic properties of HgS1 and HgS2 were calculated using online tools (http://biophysics.idtdna.com/cgi-bin/meltCalculator.cgi). The lab scale synthesized uGNPs were utilized in the analysis. The DNA sequence had T-rich bases on both tails end, which in the presence of Hg²⁺ forms a T-Hg²⁺-T mismatch, promoting the formation of dsDNA. Later, the Exo-III incubation enable the enzyme to cleave stepwise mononucleotides from the 3’ end until the structure become single-stranded. These ssDNA fragments then adsorb on the surface of AuNPs in their presence and protect AuNPs from the induced salt aggregation. The visible change in color from blue (aggregation stage in the absence of Hg²⁺) and pink (dispersion state in the presence of Hg²⁺ and adsorption of ssDNA fragments) can be observed and analyzed through UV spectrometry. An ultrasensitive quantitative nanosensor employing Exo-III assisted target recycling of mercury ions through label-free colorimetry with nanomolar detection using uGNPs have been achieved and is further under the optimization to achieve picomolar range by avoiding the influence of the environmental matrix. The proposed strategy will supplement in the direction of uGNP based ultrasensitive, rapid, onsite, label-free colorimetric detection.Keywords: colorimetric, Exo-III, gold nanoparticles, Hg²⁺ detection, label-free, signal amplification
Procedia PDF Downloads 3091999 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 2771998 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances
Authors: Tydra Preyear, Victor Clincy
Abstract:
Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy
Procedia PDF Downloads 201997 Extracting Attributes for Twitter Hashtag Communities
Authors: Ashwaq Alsulami, Jianhua Shao
Abstract:
Various organisations often need to understand discussions on social media, such as what trending topics are and characteristics of the people engaged in the discussion. A number of approaches have been proposed to extract attributes that would characterise a discussion group. However, these approaches are largely based on supervised learning, and as such they require a large amount of labelled data. We propose an approach in this paper that does not require labelled data, but rely on lexical sources to detect meaningful attributes for online discussion groups. Our findings show an acceptable level of accuracy in detecting attributes for Twitter discussion groups.Keywords: attributed community, attribute detection, community, social network
Procedia PDF Downloads 1601996 Expanding Learning Reach: Innovative VR-Enabled Retention Strategies
Authors: Bilal Ahmed, Muhammad Rafiq, Choongjae Im
Abstract:
The tech-savvy Gen Z's transfer towards interactive concept learning is hammering the demand for online collaborative learning environments, renovating conventional education approaches. The authors propose a novel approach to enhance learning outcomes to improve retention in 3D interactive education by connecting virtual reality (VR) and non-VR devices in the classroom and distance learning. The study evaluates students' experiences with VR interconnectivity devices in human anatomy lectures using real-time 3D interactive data visualization. Utilizing the renowned "Guo & Pooles Inventory" and the "Flow for Presence Questionnaires," it used an experimental research design with a control and experimental group to assess this novel connecting strategy's effectiveness and significant potential for in-person and online educational settings during the sessions. The experimental group's interactions, engagement levels, and usability experiences were assessed using the "Guo & Pooles Inventory" and "Flow for Presence Questionnaires," which measure their sense of presence, engagement, and immersion throughout the learning process using a 5-point Likert scale. At the end of the sessions, we used the "Perceived Usability Scale" to find our proposed system's overall efficiency, effectiveness, and satisfaction. By comparing both groups, the students in the experimental group used the integrated VR environment and VR to non-VR devices, and their sense of presence and attentiveness was significantly improved, allowing for increased engagement by giving students diverse technological access. Furthermore, learners' flow states demonstrated increased absorption and focus levels, improving information retention and Perceived Usability. The findings of this study can help educational institutions optimize their technology-enhanced teaching methods for traditional classroom settings as well as distance-based learning, where building a sense of connection among remote learners is critical. This study will give significant insights into educational technology and its ongoing progress by analyzing engagement, interactivity, usability, satisfaction, and presence.Keywords: interactive learning environments, human-computer interaction, virtual reality, computer- supported collaborative learning
Procedia PDF Downloads 631995 Increasing Cervical Screening Uptake during the Covid-19 Pandemic at Lakeside Healthcare, Corby, UK
Authors: Devyani Shete, Sudeep Rai
Abstract:
Background: The COVID-19 pandemic has caused one of the highest disruptions to the NHS (National Health Service), especially to the fundamental cervical cancer screening service. To prioritize screening response effectively, it is vital to understand the underlying disease risks amongst groups of women who are less likely to resume their screening/follow up at General Practices. The current government target is to have>=80% of women have an adequate test within the previous 3.5 years (ages 25-49) or 5.5 years (ages 50-64). Aims/Objectives: To increase the number of eligible people aged 25-49 attending cervical screening by 5% at Lakeside Healthcare (a General Practice in Corby). Methods: An online survey was posted on the Lakeside Healthcare website to find out what the barriers towards cervical screening were. It was apparent that patients needed more information catered to their responses. 6 informational videos and a “Cervical Screening Guide” were created for Lakeside patients about cervical screening, which were posted on the Healthcare website. Lakeside also started sending reminder texts to those eligible, with a link to a booking form. Results: On 18th January 2022, 69.7% of patients aged 25-49 years (7207) had an adequate cervical screening test in the last 3.5 years. There were 80 total responders to the online survey. In response to “which of the following are reasons why you have not attended screening”, 30% ticked “I kept putting it off/did not get around to it,” and 13% ticked “I was worried it would be painful or daunting.” In response to “which of the following would make you more likely to book an appointment”, 23% ticked “More detailed explanations of what the risks are if I don’t have screening,” and 20% ticked “I would like more information about the test and what the smear entails.” 10% of responders had previous trauma, whilst 28% of responders said the pandemic had impacted them getting a smear. Survey results were used to carry out interventions to increase smear uptake. On 23rdMarch 2022 (after a 2-month period), 75%of patients aged 25-49 (7119) attended the screening, which was a 5.3% increase from January. Discussion/Conclusion: The survey was vital in carrying out the exact interventions that were required for patients to increase screening uptake, as it is important to know what the populations’ needs are in order to create personalized invitations. This helps to optimise response during a pandemic. A HPV self-sample kit at home could be a popular method of dealing with further outbreaks.Keywords: gynaecology, cervical screening, public health, COVID-19
Procedia PDF Downloads 1491994 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review
Authors: Awad A. Younis, Elise Stronberg, Shifa Noor
Abstract:
Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review
Procedia PDF Downloads 2291993 Performance Analysis of Traffic Classification with Machine Learning
Authors: Htay Htay Yi, Zin May Aye
Abstract:
Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.Keywords: false negative rate, intrusion detection system, machine learning methods, performance
Procedia PDF Downloads 1161992 Network Traffic Classification Scheme for Internet Network Based on Application Categorization for Ipv6
Authors: Yaser Miaji, Mohammed Aloryani
Abstract:
The rise of recent applications in everyday implementation like videoconferencing, online recreation and voice speech communication leads to pressing the need for novel mechanism and policy to serve this steep improvement within the application itself and users‟ wants. This diversity in web traffics needs some classification and prioritization of the traffics since some traffics merit abundant attention with less delay and loss, than others. This research is intended to reinforce the mechanism by analysing the performance in application according to the proposed mechanism implemented. The mechanism used is quite direct and analytical. The mechanism is implemented by modifying the queue limit in the algorithm.Keywords: traffic classification, IPv6, internet, application categorization
Procedia PDF Downloads 5631991 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA
Authors: Cai Qianyi
Abstract:
In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment
Procedia PDF Downloads 581990 Design of a Customized Freshly-Made Fruit Salad and Juices Vending Machine
Authors: María Laura Guevara Campos
Abstract:
The increasing number of vending machines makes it easy for people to find them more frequently in stores, universities, workplaces, and even hospitals. These machines usually offer products with high contents of sugar and fat, which, if consumed regularly, can result in serious health threats, as overweight and obesity. Additionally, the energy consumption of these machines tends to be high, which has an impact on the environment as well. In order to promote the consumption of healthy food, a vending machine was designed to give the customer the opportunity to choose between a customized fruit salad and a customized fruit juice, both of them prepared instantly with the ingredients selected by the customer. The main parameters considered to design the machine were: the storage of the preferred fruits in a salad and/or in a juice according to a survey, the size of the machine, the use of ecologic recipients, and the overall energy consumption. The methodology used for the design was the one proposed by the German Association of Engineers for mechatronics systems, which breaks the design process in several stages, from the elaboration of a list of requirements through the establishment of the working principles and the design concepts to the final design of the machine, which was done in a 3D modelling software. Finally, with the design of this machine, the aim is to contribute to the development and implementation of healthier vending machines that offer freshly-made products, which is not being widely attended at present.Keywords: design, design methodology, mechatronics systems, vending machines
Procedia PDF Downloads 1311989 Exploring the Influence of Wind on Wildfire Behavior in China: A Data-Driven Study Using Machine Learning and Remote Sensing
Authors: Rida Kanwal, Wang Yuhui, Song Weiguo
Abstract:
Wildfires are one of the most prominent threats to ecosystems, human health, and economic activities, with wind acting as a critical driving factor. This study combines machine learning (ML) and remote sensing (RS) to assess the effects of wind on wildfires in Chongqing Province from August 16-23, 2022. Landsat 8 satellite images were used to estimate the difference normalized burn ratio (dNBR), representing prefire and postfire vegetation conditions. Wind data was analyzed through geographic information system (GIS) mapping. Correlation analysis between wind speed and fire radiative power (FRP) revealed a significant relationship. An autoregressive integrated moving average (ARIMA) model was developed for wind forecasting, and linear regression was applied to determine the effect of wind speed on FRP. The results identified high wind speed as a key factor contributing to the surge in FRP. Wind-rose plots showed winds blowing to the northwest (NW), aligning with the wildfire spread. This model was further validated with data from other provinces across China. This study integrated ML, RS, and GIS to analyze wildfire behavior, providing effective strategies for prediction and management.Keywords: wildfires, machine learning, remote sensing, wind speed, GIS, wildfire behavior
Procedia PDF Downloads 181988 Flipped Learning in Interpreter Training: Technologies, Activities and Student Perceptions
Authors: Dohun Kim
Abstract:
Technological innovations have stimulated flipped learning in many disciplines, including language teaching. It is a specific type of blended learning, which combines onsite (i.e. face-to-face) with online experiences to produce effective, efficient and flexible learning. Flipped learning literally ‘flips’ conventional teaching and learning activities upside down: it leverages technologies to deliver a lecture and direct instruction—other asynchronous activities as well—outside the classroom to reserve onsite time for interaction and activities in the upper cognitive realms: applying, analysing, evaluating and creating. Unlike the conventional flipped approaches, which focused on video lecture, followed by face-to-face or on-site session, new innovative methods incorporate various means and structures to serve the needs of different academic disciplines and classrooms. In the light of such innovations, this study adopted ‘student-engaged’ approaches to interpreter training and contrasts them with traditional classrooms. To this end, students were also encouraged to engage in asynchronous activities online, and innovative technologies, such as Telepresence, were employed. Based on the class implementation, a thorough examination was conducted to examine how we can structure and implement flipped classrooms for language and interpreting training while actively engaging learners. This study adopted a quantitative research method, while complementing it with a qualitative one. The key findings suggest that the significance of the instructor’s role does not dwindle, but his/her role changes to a moderator and a facilitator. Second, we can apply flipped learning to both theory- and practice-oriented modules. Third, students’ integration into the community of inquiry is of significant importance to foster active and higher-order learning. Fourth, cognitive presence and competence can be enhanced through strengthened and integrated teaching and social presences. Well-orchestrated teaching presence stimulates students to find out the problems and voices the convergences and divergences, while fluid social presence facilitates the exchanges of knowledge and the adjustment of solutions, which eventually contributes to consolidating cognitive presence—a key ingredient that enables the application and testing of the solutions and reflection thereon.Keywords: blended learning, Community of Inquiry, flipped learning, interpreter training, student-centred learning
Procedia PDF Downloads 1951987 Reducing Environmental Impact of Olive Oil Production in Sakaka City Using Combined Chemical, Physical, and Biological Treatment
Authors: Abdullah Alhajoj, Bassam Alowaiesh
Abstract:
This work aims to reduce the risks of discharging olive mill waste directly to the environment without treatment in Sakaka City, KSA. The organic loads expressed by chemical oxygen demand (COD) and biological oxygen demand (BOD) of the produced wastewater (OMWW) as well as the solid waste (OMW) were evaluated. The wastes emitted from the three-phase centrifuge decanters was found to be higher than that emitted from the two-phase centrifuge decanters. The olive mill wastewater (OMWW) was treated using advanced oxidation combined with filtration treatment. The results indicated that the concentration of COD, BOD, TSS, oil and grease and phenol was reduced by using complex sand filtration from 72150, 21660 10256, 36430, and 1470 mg/l to 980, 421, 58, 68, and 0.35 mg/l for three-phase OMWW and from 150562, 17955, 15325, 19658 and 2153 mg/l to 1050, 501, 29, 0.75, and 0.29 mg/l, respectively. While, by using modified trickling filter (packed with the neck of waste plastic bottles the concentration of the previously mentioned parameters was reduced to 1190, 570, 55, 0.85, and 0.3 mg/l, respectively. This work supports the application of such treatment technique for reducing the environmental threats of olive mill waste effluents in Saudi Arabia.Keywords: two-phase, three-phase, olive mill, olive oil, waste treatment, filtration, advanced oxidation, waste plastic bottles
Procedia PDF Downloads 1521986 The Role of Journalism in Society, Informing, Educating, and Holding Power Accountable within the Yaoundé Region of Cameroon
Authors: Ita Noh Nkwain
Abstract:
Journalism plays a critical role in today's society by providing accurate and reliable information to the public. Through various mediums such as print, television, and online news outlets, journalists inform and educate the public on important issues and events happening around the world. Additionally, journalism serves as a watchdog by holding those in power accountable for their actions and decisions. However, with the rise of social media and the decline of traditional news sources, the future of journalism is uncertain. Despite these challenges, the importance of quality journalism cannot be overstated in a world where information is readily available but not always trustworthy.Keywords: journalism, accountability, education, television, public
Procedia PDF Downloads 381985 The Role of Journalism in Society, Informing, Educating, and Holding Power Accountable within the Yaoundé Region of Cameroon
Authors: Ita Noh Nkwain
Abstract:
Journalism plays a critical role in today's society by providing accurate and reliable information to the public. Through various mediums such as print, television, and online news outlets, journalists inform and educate the public on important issues and events happening around the world. Additionally, journalism serves as a watchdog by holding those in power accountable for their actions and decisions. However, with the rise of social media and the decline of traditional news sources, the future of journalism is uncertain. Despite these challenges, the importance of quality journalism cannot be overstated in a world where information is readily available but not always trustworthy.Keywords: Journalism, accountability, education, television, public
Procedia PDF Downloads 331984 Community-based Mapping as a Planning Tool; Examples from Pakistan
Authors: Noman Ahmed, Fariha Tahseen
Abstract:
Since several decades, unplanned urbanization and rapid growth of informal settlements have evolved and increased in size and number. Large cities such as Karachi have been impacted with sprawl and rising share of unplanned settlements where poor communities reside. Threats of eviction, deteriorating law and order situation, lack of essential amenities and infrastructure, extortion and bullying from local and non-local musclemen and feeble response of government agencies towards their development needs are some predicaments. Non-governmental organizations (NGOs) have caused important interventions in such locations. Appraisal of the community-based mapping as a tool in supporting the development work in less privileged areas in Karachi has been the objective of this research. The Orangi Pilot Project (OPP), under the leadership of its slain director Perween Rahman had a significant role to play in developing and extending this approach in low income locations in Karachi and beyond. The paper investigates the application of mapping in the process of peri urban land invasion causing rapid transformation of traditional settlements in Karachi. Mixed methodology components comprising literature review, archival research, and unstructured interviews with key informants and case studies have been used.Keywords: squatters (katchi abadis), land grabbing, community empowerment, housing rights, mapping, infrastructure development
Procedia PDF Downloads 3141983 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 1511982 An Improvement of a Dynamic Model of the Secondary Sedimentation Tank and Field Validation
Authors: Zahir Bakiri, Saci Nacefa
Abstract:
In this paper a comparison in made between two models, with and without dispersion term, and focused on the characterization of the movement of the sludge blanket in the secondary sedimentation tank using the solid flux theory and the velocity settling. This allowed us develop a one-dimensional models, with and without dispersion based on a thorough experimental study carried out in situ and the application of online data which are the mass load flow, transfer concentration, and influent characteristic. On the other hand, in the proposed model, the new settling velocity law (double-exponential function) used is based on the Vesilind function.Keywords: wastewater, activated sludge, sedimentation, settling velocity, settling models
Procedia PDF Downloads 3881981 Assessment of Urban Immunization Practices among Urban Mother's in Sri Lanka
Authors: Kasun U. G. Palihakkara
Abstract:
Although vaccine coverage in Sri Lanka is close to 100%, with the widely spreading vaccine rejection trend reaching South Asian regions, it is essential to catch on whether Sri Lankans are being misinformed from the common misconceptions regarding vaccines. As the rates of target diseases decrease, parents become less accepting of even minor common adverse events. It is essential to preserve the integrity of immunization programs and protect public health by finding out the prevalence of anti-immunization trends. The primary objective of this study was to assess the immunization practices and prevalence of trends related to anti-immunization among urban community in Sri Lanka. A descriptive cross-sectional quantitative study on 323 participants using convenient sampling with 213 self-administered questionnaires. Additionally, 110 online questionnaires were distributed. 31% of the study population does not maintain immunization records for their children. While majority seek information regarding immunization from reliable sources such as the family physician or specialist pediatricians, 30% also refer to unreliable sources such as online communities for their opinion. 31% of study population had not vaccinated for Japanese encephalitis. 73% of the study population had encountered with side effects of vaccination such as fever & 47% believed that such side effects are rare. 52% of the population had hostile attitude regarding the administration of several doses multiple vaccines within a child’s first year. Diseases like polio had been successfully eradicated from Sri Lanka with the help of vigorous vaccination programs. However, majority of the study population believe that there’s no need to keep vaccinating the children for those eradicated diseases and exposing the child for adverse effects of such vaccines. Majority of the population were aware of the existing misconceptions regarding immunization. The most popular misconceptions about vaccines popular among the study population were the MMR (Measles, Mumps, and Rubella) vaccine being a possible cause leading to autism and bowel disease and children getting infected with the disease even after they get vaccinated, may be due to the inactivated vaccine. Disturbingly 22% of the study population believed that vaccines are useless in preventing diseases nowadays. These data obtained from the urban study population reveals that even though statistically Sri Lankan immunization coverage is 100%, there is a possibility of anti-vaccination trend arising in Sri Lanka due to the prevalence of various misconceptions and rumors related to it. Therefore these data recommend the need for thorough awareness among the mothers.Keywords: anti-vaccination, immunization, infectious diseases, pediatric health
Procedia PDF Downloads 1381980 Strategic Mine Planning: A SWOT Analysis Applied to KOV Open Pit Mine in the Democratic Republic of Congo
Authors: Patrick May Mukonki
Abstract:
KOV pit (Kamoto Oliveira Virgule) is located 10 km from Kolwezi town, one of the mineral rich town in the Lualaba province of the Democratic Republic of Congo. The KOV pit is currently operating under the Katanga Mining Limited (KML), a Glencore-Gecamines (a State Owned Company) join venture. Recently, the mine optimization process provided a life of mine of approximately 10 years withnice pushbacks using the Datamine NPV Scheduler software. In previous KOV pit studies, we recently outlined the impact of the accuracy of the geological information on a long-term mine plan for a big copper mine such as KOV pit. The approach taken, discussed three main scenarios and outlined some weaknesses on the geological information side, and now, in this paper that we are going to develop here, we are going to highlight, as an overview, those weaknesses, strengths and opportunities, in a global SWOT analysis. The approach we are taking here is essentially descriptive in terms of steps taken to optimize KOV pit and, at every step, we categorized the challenges we faced to have a better tradeoff between what we called strengths and what we called weaknesses. The same logic is applied in terms of the opportunities and threats. The SWOT analysis conducted in this paper demonstrates that, despite a general poor ore body definition, and very rude ground water conditions, there is room for improvement for such high grade ore body.Keywords: mine planning, mine optimization, mine scheduling, SWOT analysis
Procedia PDF Downloads 2241979 Genome-Wide Identification of Genes Resistance to Nitric Oxide in Vibrio parahaemolyticus
Abstract:
Food poison caused by consumption of contaminated food, especially seafood, is one of most serious public health threats worldwide. Vibrio parahaemolyticus is emerging bacterial pathogen and the leading cause of human gastroenteritis associated with food poison, especially in the southern coastal region of China. To successfully cause disease in host, bacterial pathogens need to overcome the host-derived stresses encountered during infection. One of the toxic chemical species elaborated by the host is nitric oxide (NO). NO is generated by acidified nitrite in the stomach and by enzymes of the inducible NO synthase (iNOS) in the host cell, and is toxic to bacteria. Bacterial pathogens have evolved some mechanisms to battle with this toxic stress. Such mechanisms include genes to sense NO produced from immune system and activate others to detoxify NO toxicity, and genes to repair the damage caused by toxic reactive nitrogen species (RNS) generated during NO toxic stress. However, little is known about the NO resistance in V. parahaemolyticus. In this study, a transposon coupled with next generation sequencing (Tn-seq) technology will be utilized to identify genes for NO resistance in V. parahaemolyticus. Our strategy will include construction the saturating transposon insertion library, transposon library challenging with NO, next generation sequencing (NGS), bioinformatics analysis and verification of the identified genes in vitro and in vivo.Keywords: vibrio parahaemolyticus, nitric oxide, tn-seq, virulence
Procedia PDF Downloads 263