Search results for: easy authentication
1588 Dual Biometrics Fusion Based Recognition System
Authors: Prakash, Vikash Kumar, Vinay Bansal, L. N. Das
Abstract:
Dual biometrics is a subpart of multimodal biometrics, which refers to the use of a variety of modalities to identify and authenticate persons rather than just one. We limit the risks of mistakes by mixing several modals, and hackers have a tiny possibility of collecting information. Our goal is to collect the precise characteristics of iris and palmprint, produce a fusion of both methodologies, and ensure that authentication is only successful when the biometrics match a particular user. After combining different modalities, we created an effective strategy with a mean DI and EER of 2.41 and 5.21, respectively. A biometric system has been proposed.Keywords: multimodal, fusion, palmprint, Iris, EER, DI
Procedia PDF Downloads 1471587 New Approach for Constructing a Secure Biometric Database
Authors: A. Kebbeb, M. Mostefai, F. Benmerzoug, Y. Chahir
Abstract:
The multimodal biometric identification is the combination of several biometric systems. The challenge of this combination is to reduce some limitations of systems based on a single modality while significantly improving performance. In this paper, we propose a new approach to the construction and the protection of a multimodal biometric database dedicated to an identification system. We use a topological watermarking to hide the relation between face image and the registered descriptors extracted from other modalities of the same person for more secure user identification.Keywords: biometric databases, multimodal biometrics, security authentication, digital watermarking
Procedia PDF Downloads 3901586 The Potential of Dinar (Gold) Currency as the Main Object Transaction in Indonesia
Authors: Muhammad Ilham Agus Salim, Mohammad Ali
Abstract:
In this article, we have elaborated a study over the nature of Islamic financial transaction by comparing between Dinar and IDR currency in Indonesia. We have found the interesting issue among scholars and practitioners in which Dinar would be a single currency ASEAN Economic Community (AEC), then becoming motivation and added value research. The assessment among dinar volatility analysis for three years ago and IDR fluctuation as well as outlook qualitative test regarding dinar are components of analysis that weak Indonesian currency should be altered to be better coinage. The value of dinar more stable than IDR and also eligible as a currency e.g. limited quantities, easy to carry, durable, easy to saved, and has the same quality. On the other hand, the existing of IDR has defeated by inflation. The EViews program explained that Dinar at current level still fluctuate, but in the first different have fixed variant. The result of analysis describing that dinar has potential as the medium exchange, because the material of dinar is relevant and feasible since 14 century until present. Therefore, dinar should be considered to solve Indonesia crisis today.Keywords: medium of exchange, dinar & IDR currency, volatility analysis, EViews program
Procedia PDF Downloads 3631585 The Happy Workplace Program Promoting Health Literate Workplace in Thai Garment Industry
Authors: Kwanmuang Kaeodumkoeng, Jumnian Junhasobhaga
Abstract:
This action research on the happy workplace program (HWP) promoting health literate workplace (HLW) in Thai Garment Industry Companies aimed to categorize activities promoting HLW and results of HWP in the Thai garment industry. Thirteen program reports purposely selected from sampled companies. Data were analyzed using descriptive statistics, paired t-test and content analysis. The results showed that the end of the program, the significant higher levels of work skills, life skills, and factors promoting happy workplace were found compared to before the program in all 13 companies. The activities and results of the HWP could be categorized in five steps of implementing an HWP, compared with the attributes of HLW were composed of 1) Leadership promotion; 2) Preparing workforce; 3) Planning, evaluating, and improving; 4) Communicating effectively; and 5) Designing easy to use materials and ensuring easy access.Keywords: happy workplace program, health literate workplace, garment industry, indicators
Procedia PDF Downloads 2361584 Key Transfer Protocol Based on Non-invertible Numbers
Authors: Luis A. Lizama-Perez, Manuel J. Linares, Mauricio Lopez
Abstract:
We introduce a method to perform remote user authentication on what we call non-invertible cryptography. It exploits the fact that the multiplication of an invertible integer and a non-invertible integer in a ring Zn produces a non-invertible integer making infeasible to compute factorization. The protocol requires the smallest key size when is compared with the main public key algorithms as Diffie-Hellman, Rivest-Shamir-Adleman or Elliptic Curve Cryptography. Since we found that the unique opportunity for the eavesdropper is to mount an exhaustive search on the keys, the protocol seems to be post-quantum.Keywords: invertible, non-invertible, ring, key transfer
Procedia PDF Downloads 1791583 Evaluation of Easy-to-Use Energy Building Design Tools for Solar Access Analysis in Urban Contexts: Comparison of Friendly Simulation Design Tools for Architectural Practice in the Early Design Stage
Abstract:
Current building sector is focused on reduction of energy requirements, on renewable energy generation and on regeneration of existing urban areas. These targets need to be solved with a systemic approach, considering several aspects simultaneously such as climate conditions, lighting conditions, solar radiation, PV potential, etc. The solar access analysis is an already known method to analyze the solar potentials, but in current years, simulation tools have provided more effective opportunities to perform this type of analysis, in particular in the early design stage. Nowadays, the study of the solar access is related to the easiness of the use of simulation tools, in rapid and easy way, during the design process. This study presents a comparison of three simulation tools, from the point of view of the user, with the aim to highlight differences in the easy-to-use of these tools. Using a real urban context as case study, three tools; Ecotect, Townscope and Heliodon, are tested, performing models and simulations and examining the capabilities and output results of solar access analysis. The evaluation of the ease-to-use of these tools is based on some detected parameters and features, such as the types of simulation, requirements of input data, types of results, etc. As a result, a framework is provided in which features and capabilities of each tool are shown. This framework shows the differences among these tools about functions, features and capabilities. The aim of this study is to support users and to improve the integration of simulation tools for solar access with the design process.Keywords: energy building design tools, solar access analysis, solar potential, urban planning
Procedia PDF Downloads 3401582 A Method of Detecting the Difference in Two States of Brain Using Statistical Analysis of EEG Raw Data
Authors: Digvijaysingh S. Bana, Kiran R. Trivedi
Abstract:
This paper introduces various methods for the alpha wave to detect the difference between two states of brain. One healthy subject participated in the experiment. EEG was measured on the forehead above the eye (FP1 Position) with reference and ground electrode are on the ear clip. The data samples are obtained in the form of EEG raw data. The time duration of reading is of one minute. Various test are being performed on the alpha band EEG raw data.The readings are performed in different time duration of the entire day. The statistical analysis is being carried out on the EEG sample data in the form of various tests.Keywords: electroencephalogram(EEG), biometrics, authentication, EEG raw data
Procedia PDF Downloads 4641581 Development of Underactuated Robot Hand Using Cross Section Deformation Spring
Authors: Naoki Saito, Daisuke Kon, Toshiyuki Sato
Abstract:
This paper describes an underactuated robot hand operated by low-power actuators. It can grasp objects of various shapes using easy operations. This hand is suitable for use as a lightweight prosthetic hand that can grasp various objects using few input channels. To realize operations using a low-power actuator, a cross section deformation spring is proposed. The design procedure of the underactuated robot finger is proposed to realize an adaptive grasping movement. The validity of this mechanism and design procedure are confirmed through an object grasping experiment. Results demonstrate the effectiveness of a cross section deformation spring in reducing the actuator power. Moreover, adaptive grasping movement is realized by an easy operation.Keywords: robot hand, underactuated mechanism, cross-section deformation spring, prosthetic hand
Procedia PDF Downloads 3721580 A Three-modal Authentication Method for Industrial Robots
Authors: Luo Jiaoyang, Yu Hongyang
Abstract:
In this paper, we explore a method that can be used in the working scene of intelligent industrial robots to confirm the identity information of operators to ensure that the robot executes instructions in a sufficiently safe environment. This approach uses three information modalities, namely visible light, depth, and sound. We explored a variety of fusion modes for the three modalities and finally used the joint feature learning method to improve the performance of the model in the case of noise compared with the single-modal case, making the maximum noise in the experiment. It can also maintain an accuracy rate of more than 90%.Keywords: multimodal, kinect, machine learning, distance image
Procedia PDF Downloads 791579 Use of Personal Rhythm to Authenticate Encrypted Messages
Authors: Carlos Gonzalez
Abstract:
When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).Keywords: authentication, digital signature, keystroke dynamics, personal rhythm, public-key encryption
Procedia PDF Downloads 3041578 Analysis of the Feasibility of Using a Solar Spiral Type Water Heater for Swimming Pool Application in Physiotherapy and Sports Centers
Authors: G. B. M. Carvalho, V. A. C. Vale, E. T. L. Cöuras Ford
Abstract:
A heated pool makes it possible to use it during all hours of the day and in the seasons, especially in physiotherapies and sports centers. However, the cost of installation, operation and maintenance often makes it difficult to deploy. In addition, the current global policy for the use of natural resources from energy sources contradicts the most common means of heating swimming pools, such as the use of gas (Natural Gas and Liquefied Petroleum Gas), the use of firewood or oil and the use of electricity (heat pumps and electrical resistances). In this sense, this work focuses on the use of solar water heaters to be used in swimming pools of physiotherapy centers, in order to analyze their viability for this purpose in view of the costs linked to the medium and/or long term heating. For this, materials of low cost, low weight, easy commercial acquisition were used besides easy manufacture. Parameters such as flow, temperature distribution, efficiency and technical-economic feasibility were evaluated.Keywords: heating, water, pool, solar energy, solar collectors, temperature, efficiency
Procedia PDF Downloads 1661577 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review
Authors: Rashid Mahmood, Muhammad Junaid Sarwar
Abstract:
Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.Keywords: MANET, IDS, intrusions, signature, detection, prevention
Procedia PDF Downloads 3791576 Are Some Languages Harder to Learn and Teach Than Others?
Authors: David S. Rosenstein
Abstract:
The author believes that modern spoken languages should be equally difficult (or easy) to learn, since all normal children learning their native languages do so at approximately the same rate and with the same competence, progressing from easy to more complex grammar and syntax in the same way. Why then, do some languages seem more difficult than others? Perhaps people are referring to the written language, where it may be true that mastering Chinese requires more time than French, which in turn requires more time than Spanish. But this may be marginal, since Chinese and French children quickly catch up to their Spanish peers in reading comprehension. Rather, the real differences in difficulty derive from two sources: hardened L1 language habits trying to cope with contrasting L2 habits; and unfamiliarity with unique L2 characteristics causing faulty expectations. It would seem that effective L2 teaching and learning must take these two sources of difficulty into consideration. The author feels that the latter (faulty expectations) causes the greatest difficulty, making effective teaching and learning somewhat different for each given foreign language. Examples from Chinese and other languages are presented.Keywords: learning different languages, language learning difficulties, faulty language expectations
Procedia PDF Downloads 5331575 Automatic Checkpoint System Using Face and Card Information
Authors: Kriddikorn Kaewwongsri, Nikom Suvonvorn
Abstract:
In the deep south of Thailand, checkpoints for people verification are necessary for the security management of risk zones, such as official buildings in the conflict area. In this paper, we propose an automatic checkpoint system that verifies persons using information from ID cards and facial features. The methods for a person’s information abstraction and verification are introduced based on useful information such as ID number and name, extracted from official cards, and facial images from videos. The proposed system shows promising results and has a real impact on the local society.Keywords: face comparison, card recognition, OCR, checkpoint system, authentication
Procedia PDF Downloads 3211574 Design and Implementation of a Geodatabase and WebGIS
Authors: Sajid Ali, Dietrich Schröder
Abstract:
The merging of internet and Web has created many disciplines and Web GIS is one these disciplines which is effectively dealing with the geospatial data in a proficient way. Web GIS technologies have provided an easy accessing and sharing of geospatial data over the internet. However, there is a single platform for easy and multiple accesses of the data lacks for the European Caribbean Association (Europaische Karibische Gesselschaft - EKG) to assist their members and other research community. The technique presented in this paper deals with designing of a geodatabase using PostgreSQL/PostGIS as an object oriented relational database management system (ORDBMS) for competent dissemination and management of spatial data and Web GIS by using OpenGeo Suite for the fast sharing and distribution of the data over the internet. The characteristics of the required design for the geodatabase have been studied and a specific methodology is given for the purpose of designing the Web GIS. At the end, validation of this Web based geodatabase has been performed over two Desktop GIS software and a web map application and it is also discussed that the contribution has all the desired modules to expedite further research in the area as per the requirements.Keywords: desktop GISSoftware, European Caribbean association, geodatabase, OpenGeo suite, postgreSQL/PostGIS, webGIS, web map application
Procedia PDF Downloads 3401573 Internet as a Marketing Tool for Tourism Promotion
Authors: Emeka Okonkwo
Abstract:
The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.Keywords: internet, marketing, tourism, tourism management
Procedia PDF Downloads 4181572 Health Literacy: Collaboration between Clinician and Patient
Authors: Cathy Basterfield
Abstract:
Issue: To engage in one’s own health care, health professionals need to be aware of an individual’s specific skills and abilities for best communication. One of the most discussed is health literacy. One of the assumed skills and abilities for adults is an individuals’ health literacy. Background: A review of publicly available health content appears to assume all adult readers will have a broad and full capacity to read at a high level of literacy, often at a post-school education level. Health information writers and clinicians need to recognise one critical area for why there may be little or no change in a person’s behaviour, or no-shows to appointments. Perhaps unintentionally, they are miscommunicating with the majority of the adult population. Health information contains many literacy domains. It usually includes technical medical terms or jargon. Many fact sheets and other information require scientific literacy with or without specific numerical literacy. It may include graphs, percentages, timing, distance, or weights. Each additional word or concept in these domains decreases the readers' ability to meaningfully read, understand and know what to do with the information. An attempt to begin to read the heading where long or unfamiliar words are used will reduce the readers' motivation to attempt to read. Critically people who have low literacy are overwhelmed when pages are covered with lots of words. People attending a health environment may be unwell or anxious about a diagnosis. These make it harder to read, understand and know what to do with the information. But access to health information must consider an even wider range of adults, including those with poor school attainment, migrants, and refugees. It is also homeless people, people with mental health illnesses, or people who are ageing. People with low literacy also may include people with lifelong disabilities, people with acquired disabilities, people who read English as a second (or third) language, people who are Deaf, or people who are vision impaired. Outcome: This paper will discuss Easy English, which is developed for adults. It uses the audiences’ everyday words, short sentences, short words, and no jargon. It uses concrete language and concrete, specific images to support the text. It has been developed in Australia since the mid-2000s. This paper will showcase various projects in the health domain which use Easy English to improve the understanding and functional use of written information for the large numbers of adults in our communities who do not have the health literacy to manage a range of day to day reading tasks. See examples from consent forms, fact sheets and choice options, instructions, and other functional documents, where Easy English has been developed. This paper will ask individuals to reflect on their own work practice and consider what written information must be available in Easy English. It does not matter how cutting-edge a new treatment is; when adults can not read or understand what it is about and the positive and negative outcomes, they are less likely to be engaged in their own health journey.Keywords: health literacy, inclusion, Easy English, communication
Procedia PDF Downloads 1251571 Efficient GIS Based Public Health System for Disease Prevention
Authors: K. M. G. T. R. Waidyarathna, S. M. Vidanagamachchi
Abstract:
Public Health System exists in Sri Lanka has a satisfactory complete information flow when compared to other systems in developing countries. The availability of a good health information system contributed immensely to achieve health indices that are in line with the developed countries like US and UK. The health information flow at the moment is completely paper based. In Sri Lanka, the fields like banking, accounting and engineering have incorporated information and communication technology to the same extent that can be observed in any other country. The field of medicine has behind those fields throughout the world mainly due to its complexity, issues like privacy, confidentially and lack of people with knowledge in both fields of Information Technology (IT) and Medicine. Sri Lanka’s situation is much worse and the gap is rapidly increasing with huge IT initiatives by private-public partnerships in all other countries. The major goal of the framework is to support minimizing the spreading diseases. To achieve that a web based framework should be implemented for this application domain with web mapping. The aim of this GIS based public health system is a secure, flexible, easy to maintain environment for creating and maintaining public health records and easy to interact with relevant parties.Keywords: DHIS2, GIS, public health, Sri Lanka
Procedia PDF Downloads 5631570 Design and Implementation of a Monitoring System Using Arduino and MATLAB
Authors: Jonas P. Reges, Jessyca A. Bessa, Auzuir R. Alexandria
Abstract:
The research came up with the need of monitoring them of temperature and relative moisture in past work that enveloped the study of a greenhouse located in the Research and Extension Unit(UEPE). This research brought several unknowns that were resolved from bibliographical research. Based on the studies performed were found some monitoring methods, including the serial communication between the arduino and matlab which showed a great option due to the low cost. The project was conducted in two stages, the first, an algorithm was developed to the Arduino and Matlab, and second, the circuits were assembled and performed the monitoring tests the following variables: moisture, temperature, and distance. During testing it was possible to momentarily observe the change in the levels of monitored variables. The project showed satisfactory results, such as: real-time verification of the change of state variables, the low cost of acquisition of the prototype, possibility of easy change of programming for the execution of monitoring of other variables. Therefore, the project showed the possibility of monitoring through software and hardware that have easy programming and can be used in several areas. However, it is observed also the possibility of improving the project from a remote monitoring via Bluetooth or web server and through the control of monitored variables.Keywords: automation, monitoring, programming, arduino, matlab
Procedia PDF Downloads 5151569 Implementation of Invisible Digital Watermarking
Authors: V. Monisha, D. Sindhuja, M. Sowmiya
Abstract:
Over the decade, the applications about multimedia have been developed rapidly. The advancement in the communication field at the faster pace, it is necessary to protect the data during transmission. Thus, security of multimedia contents becomes a vital issue, and it is a need for protecting the digital content against malfunctions. Digital watermarking becomes the solution for the copyright protection and authentication of data in the network. In multimedia applications, embedded watermarks should be robust, and imperceptible. For improving robustness, the discrete wavelet transform is used. Both encoding and extraction algorithm can be done using MATLAB R2012a. In this Discrete wavelet transform (DWT) domain of digital image, watermarking algorithm is used, and hardware implementation can be done on Xilinx based FPGA.Keywords: digital watermarking, DWT, robustness, FPGA
Procedia PDF Downloads 4131568 A Tool to Provide Advanced Secure Exchange of Electronic Documents through Europe
Authors: Jesus Carretero, Mario Vasile, Javier Garcia-Blas, Felix Garcia-Carballeira
Abstract:
Supporting cross-border secure and reliable exchange of data and documents and to promote data interoperability is critical for Europe to enhance sector (like eFinance, eJustice and eHealth). This work presents the status and results of the European Project MADE, a Research Project funded by Connecting Europe facility Programme, to provide secure e-invoicing and e-document exchange systems among Europe countries in compliance with the eIDAS Regulation (Regulation EU 910/2014 on electronic identification and trust services). The main goal of MADE is to develop six new AS4 Access Points and SMP in Europe to provide secure document exchanges using the eDelivery DSI (Digital Service Infrastructure) amongst both private and public entities. Moreover, the project demonstrates the feasibility and interest of the solution provided by providing several months of interoperability among the providers of the six partners in different EU countries. To achieve those goals, we have followed a methodology setting first a common background for requirements in the partner countries and the European regulations. Then, the partners have implemented access points in each country, including their service metadata publisher (SMP), to allow the access to their clients to the pan-European network. Finally, we have setup interoperability tests with the other access points of the consortium. The tests will include the use of each entity production-ready Information Systems that process the data to confirm all steps of the data exchange. For the access points, we have chosen AS4 instead of other existing alternatives because it supports multiple payloads, native web services, pulling facilities, lightweight client implementations, modern crypto algorithms, and more authentication types, like username-password and X.509 authentication and SAML authentication. The main contribution of MADE project is to open the path for European companies to use eDelivery services with cross-border exchange of electronic documents following PEPPOL (Pan-European Public Procurement Online) based on the e-SENS AS4 Profile. It also includes the development/integration of new components, integration of new and existing logging and traceability solutions and maintenance tool support for PKI. Moreover, we have found that most companies are still not ready to support those profiles. Thus further efforts will be needed to promote this technology into the companies. The consortium includes the following 9 partners. From them, 2 are research institutions: University Carlos III of Madrid (Coordinator), and Universidad Politecnica de Valencia. The other 7 (EDICOM, BIZbrains, Officient, Aksesspunkt Norge, eConnect, LMT group, Unimaze) are private entities specialized in secure delivery of electronic documents and information integration brokerage in their respective countries. To achieve cross-border operativity, they will include AS4 and SMP services in their platforms according to the EU Core Service Platform. Made project is instrumental to test the feasibility of cross-border documents eDelivery in Europe. If successful, not only einvoices, but many other types of documents will be securely exchanged through Europe. It will be the base to extend the network to the whole Europe. This project has been funded under the Connecting Europe Facility Agreement number: INEA/CEF/ICT/A2016/1278042. Action No: 2016-EU-IA-0063.Keywords: security, e-delivery, e-invoicing, e-delivery, e-document exchange, trust
Procedia PDF Downloads 2651567 Development of Ready Reckoner Charts for Easy, Convenient, and Widespread Use of Horrock’s Apparatus by Field Level Health Functionaries in India
Authors: Gumashta Raghvendra, Gumashta Jyotsna
Abstract:
Aim and Objective of Study : The use of Horrock’s Apparatus by health care worker requires onsite mathematical calculations for estimation of ‘volume of water’ and ‘amount of bleaching powder’ necessary as per the serial number of first cup showing blue coloration after adding freshly prepared starch-iodide indicator solution. In view of the difficulties of two simultaneous calculations required to be done, the use of Horrock’s Apparatus is not routinely done by health care workers because it is impractical and inconvenient Material and Methods: Arbitrary use of bleaching powder in wells results in hyper-chlorination or hypo-chlorination of well defying the purpose of adequate chlorination or non-usage of well water due to hyper-chlorination. Keeping this in mind two nomograms have been developed, one to assess the volume of well using depth and diameter of well and the other to know the quantity of bleaching powder to b added using the number of the cup of Horrock’s apparatus which shows the colour indication. Result & Conclusion: Out of thus developed two self-speaking interlinked easy charts, first chart will facilitate bypassing requirement of formulae ‘πr2h’ for water volume (ready reckoner table with depth of water shown on ‘X’ axis and ‘diameter of well’ on ‘Y’ axis) and second chart will facilitate bypassing requirement formulae ‘2ab/455’ (where ‘a’ is for ‘serial number of cup’ and ‘b’ is for ‘water volume’, while ready reckoner table showing ‘water volume’ shown on ‘X’ axis and ‘serial number of cup’ on ‘Y’ axis). The use of these two charts will help health care worker to immediately known, by referring the two charts, about the exact requirement of bleaching powder. Thus, developed ready reckoner charts will be easy and convenient to use for ensuring prevention of water-borne diseases occurring due to hypo-chlorination, especially in rural India and other developing countries.Keywords: apparatus, bleaching, chlorination, Horrock’s, nomogram
Procedia PDF Downloads 4831566 Relationship between Thumb Length and Pointing Performance on Portable Terminal with Touch-Sensitive Screen
Authors: Takahiro Nishimura, Kouki Doi, Hiroshi Fujimoto
Abstract:
Touch-sensitive screens that serve as displays and input devices have been adopted in many portable terminals such as smartphones and personal media players, and the market of touch-sensitive screens has expanded greatly. One of the advantages of touch-sensitive screen is the flexibility in the graphical user interface (GUI) design, and it is imperative to design an appropriate GUI to realize an easy-to-use interface. Moreover, it is important to evaluate the relationship between pointing performance and GUI design. There is much knowledge regarding easy-to-use GUI designs for portable terminals with touch-sensitive screens, and most have focused on GUI design approaches for women or children with small hands. In contrast, GUI design approaches for users with large hands have not received sufficient attention. In this study, to obtain knowledge that contributes to the establishment of individualized easy-to-use GUI design guidelines, we conducted experiments to investigate the relationship between thumb length and pointing performance on portable terminals with touch-sensitive screens. In this study, fourteen college students who participated in the experiment were divided into two groups based on the length of their thumbs. Specifically, we categorized the participants into two groups, thumbs longer than 64.2 mm into L (Long) group, and thumbs longer than 57.4 mm but shorter than 64.2 mm into A (Average) group, based on Japanese anthropometric database. They took part in this study under the authorization of Waseda University’s ‘Ethics Review Committee on Research with Human Subjects’. We created an application for the experimental task and implemented it on the projected capacitive touch-sensitive screen portable terminal (iPod touch (4th generation)). The display size was 3.5 inch and 960 × 640 - pixel resolution at 326 ppi (pixels per inch). This terminal was selected as the experimental device, because of its wide use and market share. The operational procedure of the application is as follows. First, the participants placed their thumb on the start position. Then, one cross-shaped target in a 10 × 7 array of 70 positions appeared at random. The participants pointed the target with their thumb as accurately and as fast as possible. Then, they returned their thumb to the start position and waited. The operation ended when this procedure had been repeated until all 70 targets had each been pointed at once by the participants. We adopted the evaluation indices for absolute error, variable error, and pointing time to investigate pointing performance when using the portable terminal. The results showed that pointing performance varied with thumb length. In particular, on the lower right side of the screen, the performance of L group with long thumb was low. Further, we presented an approach for designing easy-to- use button GUI for users with long thumbs. The contributions of this study include revelation of the relationship between pointing performance and user’s thumb length when using a portable terminal in terms of accuracy, precision, and speed of pointing. We hope that these findings contribute to an easy-to-use GUI design for users with large hands.Keywords: pointing performance, portable terminal, thumb length, touch-sensitive screen
Procedia PDF Downloads 1641565 Theoretical Framework and Empirical Simulation of Policy Design on Trans-Dimensional Resource Recycling
Authors: Yufeng Wu, Yifan Gu, Bin Li, Wei Wang
Abstract:
Resource recycling process contains a subsystem with interactions of three dimensions including coupling allocation of primary and secondary resources, responsibility coordination of stakeholders in forward and reverse supply chains, and trans-boundary transfer of hidden resource and environmental responsibilities between regions. Overlap or lack of responsibilities is easy to appear at the intersection of the three management dimensions. It is urgent to make an overall design of the policy system for recycling resources. From theoretical perspective, this paper analyzes the unique external differences of resource and environment in various dimensions and explores the reason why the effects of trans-dimensional policies are strongly correlated. Taking the example of the copper resources contained in the waste electrical and electronic equipment, this paper constructs reduction effect accounting model of resources recycling and set four trans-dimensional policy scenarios including resources tax and environmental tax reform of the raw and secondary resources, application of extended producer responsibility system, promotion of clean development mechanism, and strict entry barriers of imported wastes. In these ways, the paper simulates the impact effect of resources recycling process on resource deduction and emission reduction of waste water and gas, and constructs trans-dimensional policy mix scenario through integrating dominant strategy. The results show that combined application of various dimensional policies can achieve incentive compatibility and the trans-dimensional policy mix scenario can reach a better effect. Compared with baseline scenario, this scenario will increase 91.06% copper resources reduction effect and improve emission reduction of waste water and gas by eight times from 2010 to 2030. This paper further analyzes the development orientation of policies in various dimension. In resource dimension, the combined application of compulsory, market and authentication methods should be promoted to improve the use ratio of secondary resources. In supply chain dimension, resource value, residual functional value and potential information value contained in waste products should be fully excavated to construct a circular business system. In regional dimension, it should give full play to the comparative advantages of manufacturing power to improve China’s voice in resource recycling in the world.Keywords: resource recycling, trans-dimension, policy design, incentive compatibility, life cycle
Procedia PDF Downloads 1261564 Factors Relating to Travel Behavior at the Floating Market of Thai Tourists
Authors: Siri-orn Champatong
Abstract:
The purpose of this research was to study factors that were related with travel behaviors of Thai tourists at the Ayothaya Floating Market, Phra Nakhon Sri Ayutthaya. The quantitative research was conducted with 400 samples of Thai tourists traveling to the Ayothaya Floating Market. The Questionnaire was a tool used to collect data, and the statistics used for data analysis were mean and Pearson product moment correlation coefficient. The results found that Thai tourists focused on attraction, easy access and facilities of the tourist spot at a high level. In addition, they gave priority to the marketing mix in the dimension of products, price, and distribution channels at a high level as well. For marketing promotion, it was at the moderate level. The results of hypothesis testing revealed that factors related to the attractions of the tourist destination, easy access to the tourist destination, the facilities of the tourist spot, and product and price of the marketing mix were associated with travel behaviors in the aspect of the number of visits used and the budget on tourism.Keywords: floating market, marketing mix, tourism attractions, travelling behavior
Procedia PDF Downloads 2861563 Petra: Simplified, Scalable Verification Using an Object-Oriented, Compositional Process Calculus
Authors: Aran Hakki, Corina Cirstea, Julian Rathke
Abstract:
Formal methods are yet to be utilized in mainstream software development due to issues in scaling and implementation costs. This work is about developing a scalable, simplified, pragmatic, formal software development method with strong correctness properties and guarantees that are easy prove. The method aims to be easy to learn, use and apply without extensive training and experience in formal methods. Petra is proposed as an object-oriented, process calculus with composable data types and sequential/parallel processes. Petra has a simple denotational semantics, which includes a definition of Correct by Construction. The aim is for Petra is to be standard which can be implemented to execute on various mainstream programming platforms such as Java. Work towards an implementation of Petra as a Java EDSL (Embedded Domain Specific Language) is also discussed.Keywords: compositionality, formal method, software verification, Java, denotational semantics, rewriting systems, rewriting semantics, parallel processing, object-oriented programming, OOP, programming language, correct by construction
Procedia PDF Downloads 1441562 Reflections of Young Language Learners’ and Teacher Candidates’ for ‘Easy English’ Project
Authors: F. Özlem Saka
Abstract:
There should be connections between universities and state schools in order to improve the quality of instruction. ELT department of Akdeniz University carries out a project named ‘Easy English’ with a state primary school in Antalya for 2 years. According to the Project requirements, junior students at university teach English to 3rd grade primary school students during the term. They are supposed to teach the topics planned before, preparing different activities for the students. This study reflects the ideas of both students at university and at state school related to the language programme carried out. Their ideas have been collected with a questionnaire consisting of similar structured questions. The result shows that both groups like the programme and evaluate it from their own perspectives. It is believed the efficient results of this project will lead to planning similar programmes for different levels. From this study, curriculum planners and teachers can get ideas to improve language teaching at primary level as both university students, being the teachers in the project and students at state primary school have positive feelings and thoughts about it.Keywords: foreign language teacher training, games in English teaching, songs in English teaching, teaching English to young learners
Procedia PDF Downloads 2001561 Unlocking Academic Success: A Comprehensive Exploration of Shaguf Bites’s Impact on Learning and Retention
Authors: Joud Zagzoog, Amira Aldabbagh, Radiyah Hamidaddin
Abstract:
This research aims to test out and observe whether artificial intelligence (AI) software and applications could actually be effective, useful, and time-saving for those who use them. Shaguf Bites, a web application that uses AI technology, claims to help students study and memorize information more effectively in less time. The website uses smart learning, or AI-powered bite-sized repetitive learning, by transforming documents or PDFs with the help of AI into summarized interactive smart flashcards (Bites, n.d.). To properly test out the websites’ effectiveness, both qualitative and quantitative methods were used in this research. An experiment was conducted on a number of students where they were first requested to use Shaguf Bites without any prior knowledge or explanation of how to use it. Second, they were asked for feedback through a survey on how their experience was after using it and whether it was helpful, efficient, time-saving, and easy to use for studying. After reviewing the collected data, we found out that the majority of students found the website to be straightforward and easy to use. 58% of the respondents agreed that the website accurately formulated the flashcard questions. And 53% of them reported that they are most likely to use the website again in the future as well as recommend it to others. Overall, from the given results, it is clear that Shaguf Bites have proved to be very beneficial, accurate, and time saving for the majority of the students.Keywords: artificial intelligence (AI), education, memorization, spaced repetition, flashcards.
Procedia PDF Downloads 1891560 Effective Design Factors for Bicycle-Friendly Streets
Authors: Zohreh Asadi-Shekari, Mehdi Moeinaddini, Muhammad Zaly Shah, Amran Hamzah
Abstract:
Bicycle level of service (BLOS) is a measure for evaluating street conditions for cyclists. Currently, various methods are proposed for BLOS. These analytical methods however have some drawbacks: they usually assume cyclists as users that can share street facilities with motorized vehicles, it is not easy to link them to design process and they are not easy to follow. In addition, they only support a narrow range of cycling facilities and may not be applicable for all situations. Along this, the current paper introduces various effective design factors for bicycle-friendly streets. This study considers cyclists as users of streets who have special needs and facilities. Therefore, the key factors that influence BLOS based on different cycling facilities that are proposed by developed guidelines and literature are identified. The combination of these factors presents a complete set of effective design factors for bicycle-friendly streets. In addition, the weight of each factor in existing BLOS models is estimated and these effective factors are ranked based on these weights. These factors and their weights can be used in further studies to propose special bicycle-friendly street design model.Keywords: bicycle level of service, bicycle-friendly streets, cycling facilities, rating system, urban streets
Procedia PDF Downloads 4881559 Factors Influencing the Choice of Food Intake of Students of the Federal Polytechnic, Bida, Niger State, Nigeria
Authors: Adekunle Ayodeji Folorunso, Aisha S. Habeeb
Abstract:
The purpose of this study was to determine the factors influencing the student’s choice of food intake, a case study of the Federal Polytechnic, Bida. A review of the past work was done, and many key points were noted. A sample population of 1000 students was selected randomly (i.e. 200 students from each school) who were in the 2011/2012 academic session. The factor influencing the students' foods intake ranges from economic factors (food cost, income, availability of food), physical factors (easy to cook, shortest time), social factors (cultural, family and meal pattern) attitudes, belief and knowledge about food were discovered. The data collected were tabulated in frequency and percentages. It was revealed that ‘easy method of cooking and preparation’ influenced students’ choice of food intake more (34%) and the food frequency questionnaire shows that the students eat more of carbohydrates foods compared to other classes of food. The cooking skills of students were low (1%) which may be responsible for the limitations in the food choices. It is, therefore, recommended that students should be equipped with sound cooking skills to increase their range of food intake. Variety is needed in diet/meal because the required nutrients are scattered among many different foods.Keywords: factors, food intake, influencing, choice, students
Procedia PDF Downloads 332