Search results for: musical mobile
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1916

Search results for: musical mobile

446 The Use of Eye Tracking in Evaluating the Success of Golfers in Putting

Authors: Klára Gajdošíková

Abstract:

The aim of this study was to examine the quiet eye method and its components using the mobile eye tracking device. Quiet eye training was proven to be beneficial for different sports, including golf. The main idea of this method is to prolong your fixations on a specific place in order to improve your performance. The shot examined in this study is called putt. Its importance is based on its role on a golf course because, many times, it is the last putt that decides whether you win or lose. Quiet eye training helps players be more focused under pressure, control their attention and overall improve their putting success. Six highly skilled golfers with a handicap ranging from - 4 to + 4, aged 23 to 26, participated in a pilot study with the usage of an eye-tracking device. The study took place in an indoor training area at the golf club Hostivař. Crosstabs showed significant differences between individuals' laterality and their gaze into AOI - areas of interest (middle part of the ball, top of the ball, bottom of the ball, back side of the ball). Statistically significant differences were also discovered between the mean fixation duration of participants with AOI on the middle part of the ball and all other AOIs. The results of this study helped us understand the examined phenomena and showed us the next aim in future quiet eye research. Future research should focus on examining a quiet eye on the golf course. Applying a quiet eye and therefore changing the way we concentrate might be beneficial for coaches and players themselves.

Keywords: eye tracking, golf, laterality, quiet eye

Procedia PDF Downloads 113
445 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 447
444 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 265
443 Autonomous Taxiing Robot for Grid Resilience Enhancement in Green Airport

Authors: Adedayo Ajayi, Patrick Luk, Liyun Lao

Abstract:

This paper studies the supportive needs for the electrical infrastructure of the green airport. In particular, the core objective revolves around the choice of electric grid configuration required to meet the expected electrified loads, i.e., the taxiing and charging loads of hybrid /pure electric aircraft in the airport. Further, reliability and resilience are critical aspects of a newly proposed grid; the concept of mobile energy storage as energy as a service (EAAS) for grid support in the proposed green airport is investigated using an autonomous electric taxiing robot (A-ETR) at a case study (Cranfield Airport). The performance of the model is verified and validated through DigSILENT power factory simulation software to compare the networks in terms of power quality, short circuit fault levels, system voltage profile, and power losses. Contingency and reliability index analysis are further carried out to show the potential of EAAS on the grid. The results demonstrate that the low voltage a.c network ( LVAC) architecture gives better performance with adequate compensation than the low voltage d.c (LVDC) microgrid architecture for future green airport electrification integration. And A-ETR can deliver energy as a service (EaaS) to improve the airport's electrical power system resilience and energy supply.

Keywords: reliability, voltage profile, flightpath 2050, green airport

Procedia PDF Downloads 84
442 Perceived Benefits of Technology Enhanced Learning by Learners in Uganda: Three Band Benefits

Authors: Kafuko M. Maria, Namisango Fatuma, Byomire Gorretti

Abstract:

Mobile learning (m-learning) is steadily growing and has undoubtedly derived benefits to learners and tutors in different learning environments. This paper investigates the variation in benefits derived from enhanced classroom learning through use of m-learning platforms in the context of a developing country owing to the fact that it is still in its initial stages. The study focused on how basic technology-enhanced pedagogic innovation like cell phone-based learning is enhancing classroom learning from the learners’ perspective. The paper explicitly indicates the opportunities presented by enhanced learning to a conventional learning environment like a physical classroom. The findings were obtained through a survey of two universities in Uganda in which data was quantitatively collected, analyzed and presented in a three banded diagram depicting the variation in the obtainable benefits. Learners indicated that a smartphone is the most commonly used device. Learners also indicate that straight lectures, student to student plus student to lecturer communication, accessing learning material and assignments are core activities. In a TEL environment support by smartphones, learners indicated that they conveniently achieve the prior activities plus discussions and group work. Learners seemed not attracted to the possibility of using TEL environment to take lectures, as well as make class presentations. The less attractiveness of these two factors may be due to the teacher centered approach commonly applied in the country’s education system.

Keywords: technology enhanced learning, m-learning, classroom learning, perceived benefits

Procedia PDF Downloads 231
441 Traffic Forecasting for Open Radio Access Networks Virtualized Network Functions in 5G Networks

Authors: Khalid Ali, Manar Jammal

Abstract:

In order to meet the stringent latency and reliability requirements of the upcoming 5G networks, Open Radio Access Networks (O-RAN) have been proposed. The virtualization of O-RAN has allowed it to be treated as a Network Function Virtualization (NFV) architecture, while its components are considered Virtualized Network Functions (VNFs). Hence, intelligent Machine Learning (ML) based solutions can be utilized to apply different resource management and allocation techniques on O-RAN. However, intelligently allocating resources for O-RAN VNFs can prove challenging due to the dynamicity of traffic in mobile networks. Network providers need to dynamically scale the allocated resources in response to the incoming traffic. Elastically allocating resources can provide a higher level of flexibility in the network in addition to reducing the OPerational EXpenditure (OPEX) and increasing the resources utilization. Most of the existing elastic solutions are reactive in nature, despite the fact that proactive approaches are more agile since they scale instances ahead of time by predicting the incoming traffic. In this work, we propose and evaluate traffic forecasting models based on the ML algorithm. The algorithms aim at predicting future O-RAN traffic by using previous traffic data. Detailed analysis of the traffic data was carried out to validate the quality and applicability of the traffic dataset. Hence, two ML models were proposed and evaluated based on their prediction capabilities.

Keywords: O-RAN, traffic forecasting, NFV, ARIMA, LSTM, elasticity

Procedia PDF Downloads 228
440 Prevalence and the Results of the Czech Nationwide Survey and Personality Traits of Adolescence Playing Computer Games

Authors: Jaroslava Sucha, Martin Dolejs, Helena Pipova, Panajotis Cakirpaloglu

Abstract:

The paper introduces the research project which is focused on evaluating the level of pathological relation towards computer or video games playing (including any games played by using a screen such as a mobile or a tablet). The study involves representative sample of the Czech adolescents between ages 11 and 19. This poster presents the psychometric indicators of the new psychologic assessment method (mean, standard deviation, reliability, validity) which will be able to detect an acceptable level of games’ playing and at the same time will detect and describe the level of gaming which might be potentially risky. The prevalence of risky computer game playing at Czech adolescents in age 11 to 19 will be mentioned. The research study also aims to describe the personality profile of the problematic players with respect to the digital games. The research area will encompass risky behaviour, aggression, the level of self-esteem, impulsivity, anxiety and depression. The contribution will introduce a new test method for the assessment of pathological playing computer games. The research will give the first screening information of playing computer games in the Czech Republic by adolescents between 11-19 years. The results clarify what relationship exists between playing computer games and selected personality characteristics (it will describe personality of the gamer, who is in the category of ‘pathological playing computer games’).

Keywords: adolescence, computer games, personality traits, risk behaviour

Procedia PDF Downloads 239
439 Determining the Functionality of Urban Wildlife with Large Megafauna: A Case Study from Chobe District, Northern Botswana

Authors: Tempe S. F. Adams, Michael J. Chase, Tracey L. Rogers, Keith E. A. Leggett

Abstract:

Transfrontier wildlife corridors can be successful conservation tools, connecting protected areas and reducing the impact of habitat fragmentation on mobile species. Urban wildlife corridors have been proposed as a potential mitigation tool to facilitate the passage of elephants through towns without causing conflict with urban communities. However, because such corridors are typically narrow and close to human development, wildlife (particularly large mammals) may be less likely to use them. We used remote-sensor camera traps and global positioning system collars to identify the movement patterns of African elephants Loxondonta africana through narrow, urban corridors in Botswana. The corridors were in three types of human-dominated land-use designations with varying levels of human activity: agricultural, industrial and open space recreational land. We found that elephants used the corridors within all three land-use designations and we identified, using a model selection approach, that season, time of day and rainfall were important factors in determining the presence of elephants in the corridors. Elephants moved more slowly through the narrow corridors compared with their movement patterns through broader, wide-ranging corridors. Our results indicate that urban wildlife corridors are useful for facilitating elephants to pass through urban areas.

Keywords: camera traps, conservation, human-elephant coexistence, land management, urban wildlife corridors

Procedia PDF Downloads 306
438 An Algorithm Based on Control Indexes to Increase the Quality of Service on Cellular Networks

Authors: Rahman Mofidi, Sina Rahimi, Farnoosh Darban

Abstract:

Communication plays a key role in today’s world, and to support it, the quality of service has the highest priority. It is very important to differentiate between traffic based on priority level. Some traffic classes should be a higher priority than other classes. It is also necessary to give high priority to customers who have more payment for better service, however, without influence on other customers. So to realize that, we will require effective quality of service methods. To ensure the optimal performance of the network in accordance with the quality of service is an important goal for all operators in the mobile network. In this work, we propose an algorithm based on control parameters which it’s based on user feedback that aims at minimizing the access to system transmit power and thus improving the network key performance indicators and increasing the quality of service. This feedback that is known as channel quality indicator (CQI) indicates the received signal level of the user. We aim at proposing an algorithm in control parameter criterion to study improving the quality of service and throughput in a cellular network at the simulated environment. In this work we tried to parameter values have close to their actual level. Simulation results show that the proposed algorithm improves the system throughput and thus satisfies users' throughput and improves service to set up a successful call.

Keywords: quality of service, key performance indicators, control parameter, channel quality indicator

Procedia PDF Downloads 205
437 Reflections on the Trajectory of an Online Literature Cafe through Its Music and Arts Activities

Authors: Mariko Hara, Mari Aoki, Takako Ito, Masao Sugita

Abstract:

Social distancing measures due to the COVID-19 crisis had a severe impact on music and art practices based in community settings. They had to re-think how to connect with their dispersed community using online tools. As the social distancing continues, there is an urgent need to investigate the possibilities of online community music and art practices. Are they sustainable actions that can have positive impacts on the community and the quality of lives of people over time? The Online Lindgren Café (hereafter ‘OLC’) is a monthly online literature event which started in June 2020. In the OLC, up to 14 members meet online to discuss the works of Astrid Lindgren and similar authors. Members come from various places in Japan and Norway, with a variety of expertise from music therapy, music education, psychotherapy, music sociology, storytelling, and theatre, and their family members join them. In these meetings, music and arts activities emerged in response to interests among the members. The resources and experiences of the members helped to develop these activities further. This paper first introduces one of the music and art activities in one specific event, a collaborative picture book-making with music, which was initiated and led by the second author. The third author chose the music, and the activity itself was recorded. This is followed by the description of a reflecting event, where the recording of the collaborative picture book-making activity was shared to facilitate further creations (drawings, haiku, and fabric weaving) as well as group reflections on the trajectories of the Online Lindgren Café. Finally, we will discuss the preliminary findings using the data collected at the reflecting event. Key findings suggest that the resource-driven approach of the OLC leveled the relationships among the intergenerational, multi-cultural, and interdisciplinary members. This enabled the members to set aside their professional and/or predominant identities, which allowed them to discover their own and others’ resources. The relaxed, unstructured, and liminal phenomenon at OLC can be regarded as a form of communitas, where members gain a sense of liberation and belonging in a different way from in-person communications. Participation from one’s home, as well as a video conferencing function that allowed the members to position themselves among the other participants in equal-sized windows, seems to have enabled members to feel safe to express themselves openly at the same time feel a sense of belonging. Furthermore, in the OLC, music and arts activities acted to inclusively connect and re-connect dispersed, intergenerational members with each other. For instance, in a music and drawing activity, music acted as a means for each member to engage in their own ‘drawing space’ while still feeling connected with the others. The positive experiences from these activities inspired the members to use similar approaches outside of the OLC. The finding suggests that, because of its resource-driven approach supported by the music and arts activities, the OLC could be developed further as a permeable and sustainable action even after any current social distancing measures are lifted.

Keywords: communitas, COVID-19, musical affordances, online community of practices, resource-driven approach

Procedia PDF Downloads 134
436 Information Communication Technologies and Renewable Technologies' Impact on Irish People's Lifestyle: A Constructivist Grounded Theory Study

Authors: Hamilton V. Niculescu

Abstract:

This paper discusses findings relating to people's engagement with mobile communication technologies and remote automated systems. This interdisciplinary study employs a constructivist grounded theory methodology, with qualitative data that was generated following in-depth semi-structured interviews with 18 people living in Ireland being corroborated with participants' observations and quantitative data. Additional data was collected following participants' remote interaction with six custom-built automated enclosures, located at six different sites around Dublin, Republic of Ireland. This paper argues that ownership and education play a vital role in people engaging with and adoption of new technologies. Analysis of participants' behavior and attitude towards Information Communication Technologies (ICT) suggests that innovations do not always improve peoples' social inclusion. Technological innovations are sometimes perceived as destroying communities and create a dysfunctional society. Moreover, the findings indicate that a lack of public information and support from Irish governmental institutions, as well as limited off-the-shelves availability, has led to low trust and adoption of renewable technologies. A limited variation in participants' behavior and interaction patterns with technologies was observed during the study. This suggests that people will eventually adopt new technologies according to their needs and experience, even though they initially rejected the idea of changing their lifestyle.

Keywords: automation, communication, ICT, renewables

Procedia PDF Downloads 113
435 Effect of On-Road Vehicular Traffic on Noise Pollution in Bhubaneswar City, Eastern India

Authors: Dudam Bharath Kumar, Harsh Kumar, Naveed Ahmed

Abstract:

Vehicular traffic on the road-side plays a significant role in affecting the noise pollution in most of the cities over the world. To assess the correlation of the road-traffic on noise pollution in the city environment, continuous measurements were carried out in an entire daytime starting from 8:00 AM IST to 6:00 PM IST at a single point for each 5 minutes (8:00-8:05, 9:00-9:05, 10:00-10:05 AM, ...) near the KIIT University campus road. Noise levels were observed using a mobile operated app of android cell phone and a handheld noise meter. Calibration analysis shows high correlation about 0.89 for the study location for the day time period. Results show diurnal variability of atmospheric noise pollution levels go hand-in and with the vehicular number which pass through a point of observation. The range of noise pollution levels in the daytime period is observed as 55 to 75 dB(A). As a day starts, sudden upsurge of noise levels is observed from 65 to 71 dB(A) in the early morning, 64 dB(A) in late morning, regains the same quantity 68-71 dB(A) in the afternoon, and rises 70 dB(A) in the early evening. Vehicular number of the corresponding noise levels exhibits 115-120, 150-160, and 140-160, respectively. However, this preliminary study suggests the importance of vehicular traffic on noise pollution levels in the urban environment and further to study population exposed to noise levels. Innovative approaches help curb the noise pollution through modelling the traffic noise pollution spatially and temporally over the city environments.

Keywords: noise pollution, vehicular traffic, urban environment, noise meter

Procedia PDF Downloads 297
434 Role of mHealth in Effective Response to Disaster

Authors: Mohammad H. Yarmohamadian, Reza Safdari, Nahid Tavakoli

Abstract:

In recent years, many countries have suffered various natural disasters. Disaster response continues to face the challenges in health care sector in all countries. Information and communication management is a significant challenge in disaster scene. During the last decades, rapid advances in information technology have led to manage information effectively and improve communication in health care setting. Information technology is a vital solution for effective response to disasters and emergencies so that if an efficient ICT-based health information system is available, it will be highly valuable in such situation. Of that, mobile technology represents a nearly computing technology infrastructure that is accessible, convenient, inexpensive and easy to use. Most projects have not yet reached the deployment stage, but evaluation exercises show that mHealth should allow faster processing and transport of patients, improved accuracy of triage and better monitoring of unattended patients at a disaster scene. Since there is a high prevalence of cell phones among world population, it is expected the health care providers and managers to take measures for applying this technology for improvement patient safety and public health in disasters. At present there are challenges in the utilization of mhealth in disasters such as lack of structural and financial issues in our country. In this paper we will discuss about benefits and challenges of mhealth technology in disaster setting considering connectivity, usability, intelligibility, communication and teaching for implementing this technology for disaster response.

Keywords: information technology, mhealth, disaster, effective response

Procedia PDF Downloads 443
433 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 165
432 Pharmacokinetic Study of Clarithromycin in Human Female of Pakistani Population

Authors: Atifa Mushtaq, Tanweer Khaliq, Hafiz Alam Sher, Asia Farid, Anila Kanwal, Maliha Sarfraz

Abstract:

The study was designed to assess the various pharmacokinetic parameters of a commercially available clarithromycin Tablet (Klaricid® 250 mg Abbot, Pakistan) in plasma sample of healthy adult female volunteers by applying a rapid, sensitive and accurate HPLC-UV analytical method. The human plasma samples were evaluated by using an isocratic High Performance Liquid Chromatography (HPLC) system of Sykam consisted of a pump with a column C18 column (250×4.6mn, 5µm) UV-detector. The mobile phase comprises of potassium dihydrogen phosphate (50 mM, pH 6.8, contained 0.7% triethylamine), methanol and acetonitrile (30:25:45, v/v/v) was delivered with injection volume of 20µL at flow rate of 1 mL/min. The detection was performed at λmax 275 nm. By applying this method, important pharmacokinetic parameters Cmax, Tmax, Area under curve (AUC), half-life (t1/2), , Volume of distribution (Vd) and Clearance (Cl) were measured. The parameters of pharmacokinetics of clarithromycin were calculated by software (APO) pharmacological analysis. Maximum plasma concentrations Cmax 2.78 ±0.33 µg/ml, time to reach maximum concentration tmax 2.82 ± 0.11 h and Area under curve AUC was 20.14 h.µg/ml. The mean ± SD values obtained for the pharmacokinetic parameters showed a significant difference in pharmacokinetic parameters observed in previous literature which emphasizes the need for dose adjustment of clarithromycin in Pakistani population.

Keywords: Pharmacokinetc, Clarothromycin, HPLC, Pakistan

Procedia PDF Downloads 108
431 Mental Health and Technology: Evidence Review

Authors: Kylie Henderson

Abstract:

Adapting mental health interventions is important when providing support to those experiencing difficulties. This analysis aimed to explore and evaluate the effectiveness of various forms of mental health interventions. Literature that has analysed face-to-face (F2F), phone (Telehealth), mobile (mHealth) and online (e-interventions) interferences found all interventions were effective in reducing and treating symptoms of mental health disorders. F2F and Telehealth interventions facilitated greater engagement and client satisfaction. Due to accessibility and privacy, mHealth and e-interventions were the preferred methods of engagement with health services for youth and young adults. Regardless, these interventions still identified several barriers of high dropout, low adherence, and lack of awareness. Additionally, a large proportion of interventions lacked evidence-based foundations. Exploration of interventions that utilise a variety of interfaces, as well as incorporated evidence-based literature and clinician experience, show that they benefit those experiencing mental health difficulties. Applications like YourHealth+ provide a combination of interventions (F2F, mHealth, and e-interventions) to improve the wellbeing of job seekers and employment consults. Individuals that have used the application in conjunction with therapy have reported feeling more empowered and demonstrated improved wellbeing. Practitioners have also described improved confidence in their ability to provide support to clients. Therefore, it can be proposed that utilising a variety of interventions as well as incorporating literature and experience is beneficial to those experiencing mental health difficulties and to health practitioners.

Keywords: face-to-face, e-interventions, mHealth, YourHealth+

Procedia PDF Downloads 139
430 Proposed Framework based on Classification of Vertical Handover Decision Strategies in Heterogeneous Wireless Networks

Authors: Shidrokh Goudarzi, Wan Haslina Hassan

Abstract:

Heterogeneous wireless networks are converging towards an all-IP network as part of the so-called next-generation network. In this paradigm, different access technologies need to be interconnected; thus, vertical handovers or vertical handoffs are necessary for seamless mobility. In this paper, we conduct a review of existing vertical handover decision-making mechanisms that aim to provide ubiquitous connectivity to mobile users. To offer a systematic comparison, we categorize these vertical handover measurement and decision structures based on their respective methodology and parameters. Subsequently, we analyze several vertical handover approaches in the literature and compare them according to their advantages and weaknesses. The paper compares the algorithms based on the network selection methods, complexity of the technologies used and efficiency in order to introduce our vertical handover decision framework. We find that vertical handovers on heterogeneous wireless networks suffer from the lack of a standard and efficient method to satisfy both user and network quality of service requirements at different levels including architectural, decision-making and protocols. Also, the consolidation of network terminal, cross-layer information, multi packet casting and intelligent network selection algorithm appears to be an optimum solution for achieving seamless service continuity in order to facilitate seamless connectivity.

Keywords: heterogeneous wireless networks, vertical handovers, vertical handover metric, decision-making algorithms

Procedia PDF Downloads 395
429 Poli4SDG: An Application for Environmental Crises Management and Gender Support

Authors: Angelica S. Valeriani, Lorenzo Biasiolo

Abstract:

In recent years, the scale of the impact of climate change and its related side effects has become ever more massive and devastating. Sustainable Development Goals (SDGs), promoted by United Nations, aim to front issues related to climate change, among others. In particular, the project CROWD4SDG focuses on a bunch of SDGs since it promotes environmental activities and climate-related issues. In this context, we developed a prototype of an application, under advanced development considering web design, that focuses on SDG 13 (SDG on climate action) by providing users with useful instruments to face environmental crises and climate-related disasters. Our prototype is thought and structured for both web and mobile development. The main goal of the application, POLI4SDG, is to help users to get through emergency services. To this extent, an organized overview and classification prove to be very effective and helpful to people in need. A careful analysis of data related to environmental crises prompted us to integrate the user contribution, i.e., exploiting a core principle of Citizen Science, into the realization of a public catalog, available for consulting and organized according to typology and specific features. In addition, gender equality and opportunity features are considered in the prototype in order to allow women, often the most vulnerable category, to have direct support. The overall description of the application functionalities is detailed. Moreover, the implementation features and properties of the prototype are discussed.

Keywords: crowdsourcing, social media, SDG, climate change, natural disasters, gender equality

Procedia PDF Downloads 114
428 Impacts on the Modification of a Two-Blade Mobile on the Agitation of Newtonian Fluids

Authors: Abderrahim Sidi Mohammed Nekrouf, Sarra Youcefi

Abstract:

Fluid mixing plays a crucial role in numerous industries as it has a significant impact on the final product quality and performance. In certain cases, the circulation of viscous fluids presents challenges, leading to the formation of stagnant zones. To overcome this issue, stirring devices are employed for fluid mixing. This study focuses on a numerical analysis aimed at understanding the behavior of Newtonian fluids when agitated by a two-blade agitator in a cylindrical vessel. We investigate the influence of the agitator shape on fluid motion. Bi-blade agitators of this type are commonly used in the food, cosmetic, and chemical industries to agitate both viscous and non-viscous liquids. Numerical simulations were conducted using Computational Fluid Dynamics (CFD) software to obtain velocity profiles, streamlines, velocity contours, and the associated power number. The obtained results were compared with experimental data available in the literature, validating the accuracy of our numerical approach. The results clearly demonstrate that modifying the agitator shape has a significant impact on fluid motion. This modification generates an axial flow that enhances the efficiency of the fluid flow. The various velocity results convincingly reveal that the fluid is more uniformly agitated with this modification, resulting in improved circulation and a substantial reduction in stagnant zones.

Keywords: Newtonian fluids, numerical modeling, two blade., CFD

Procedia PDF Downloads 81
427 Tracking and Classifying Client Interactions with Personal Coaches

Authors: Kartik Thakore, Anna-Roza Tamas, Adam Cole

Abstract:

The world health organization (WHO) reports that by 2030 more than 23.7 million deaths annually will be caused by Cardiovascular Diseases (CVDs); with a 2008 economic impact of $3.76 T. Metabolic syndrome is a disorder of multiple metabolic risk factors strongly indicated in the development of cardiovascular diseases. Guided lifestyle intervention driven by live coaching has been shown to have a positive impact on metabolic risk factors. Individuals’ path to improved (decreased) metabolic risk factors are driven by personal motivation and personalized messages delivered by coaches and augmented by technology. Using interactions captured between 400 individuals and 3 coaches over a program period of 500 days, a preliminary model was designed. A novel real time event tracking system was created to track and classify clients based on their genetic profile, baseline questionnaires and usage of a mobile application with live coaching sessions. Classification of clients and coaches was done using a support vector machines application build on Apache Spark, Stanford Natural Language Processing Library (SNLPL) and decision-modeling.

Keywords: guided lifestyle intervention, metabolic risk factors, personal coaching, support vector machines application, Apache Spark, natural language processing

Procedia PDF Downloads 433
426 Determination of Marbofloxacin in Pig Plasma Using LC-MS/MS and Its Application to the Pharmacokinetic Studies

Authors: Jeong Woo Kang, MiYoung Baek, Ki-Suk Kim, Kwang-Jick Lee, ByungJae So

Abstract:

Introduction: A fast, easy and sensitive detection method was developed and validated by liquid chromatography tandem mass spectrometry for the determination of marbofloxacin in pig plasma which was further applied to study the pharmacokinetics of marbofloxacin. Materials and Methods: The plasma sample (500 μL) was mixed with 1.5 ml of 0.1% formic acid in MeCN to precipitate plasma proteins. After shaking for 20 min, The mixture was centrifuged at 5,000 × g for 30 min. It was dried under a nitrogen flow at 50℃. 500 μL aliquot of the sample was injected into the LC-MS/MS system. Chromatographic analysis was carried out mobile phase gradient consisting 0.1% formic acid in D.W. (A) and 0.1% formic acid in MeCN (B) with C18 reverse phase column. Mass spectrometry was performed using the positive ion mode and the selected ion monitoring (MRM). Results and Conclusions: The method validation was performed in the sample matrix. Good linearities (R2>0.999) were observed and the quantified average recoveries of marbofloxacin were 87 - 92% at level of 10 ng g-1 -100 ng g-1. The percent of coefficient of variation (CV) for the described method was less than 10 % over the range of concentrations studied. The limits of detection (LOD) and quantification (LOQ) were 2 and 5 ng g-1, respectively. This method has also been applied successfully to pharmacokinetic analysis of marbofloxacin after intravenous (IV), intramuscular (IM) and oral administration (PO). The mean peak plasma concentration (Cmax) was 2,597 ng g-1at 0.25 h, 2,587 ng g-1at 0.44 h and 2,355 ng g-1at 1.58 h for IV, IM and PO, respectively. The area under the plasma concentration-time curve (AUC0–t) was 24.8, 29.0 and 25.2 h μg/mL for IV, IM and PO, respectively. The elimination half-life (T1/2) was 8.6, 13.1 and 9.5 for IV, IM and PO, respectively. Bioavailability (F) of the marbofloxacin in pig was 117 and 101 % for IM and PO, respectively. Based on these result, marbofloxacin does not have any obstacles as therapeutics to develop the oral formulations such as tablets and capsules.

Keywords: marbofloxacin, LC-MS/MS, pharmacokinetics, chromatographic

Procedia PDF Downloads 549
425 Identifying Autism Spectrum Disorder Using Optimization-Based Clustering

Authors: Sharifah Mousli, Sona Taheri, Jiayuan He

Abstract:

Autism spectrum disorder (ASD) is a complex developmental condition involving persistent difficulties with social communication, restricted interests, and repetitive behavior. The challenges associated with ASD can interfere with an affected individual’s ability to function in social, academic, and employment settings. Although there is no effective medication known to treat ASD, to our best knowledge, early intervention can significantly improve an affected individual’s overall development. Hence, an accurate diagnosis of ASD at an early phase is essential. The use of machine learning approaches improves and speeds up the diagnosis of ASD. In this paper, we focus on the application of unsupervised clustering methods in ASD as a large volume of ASD data generated through hospitals, therapy centers, and mobile applications has no pre-existing labels. We conduct a comparative analysis using seven clustering approaches such as K-means, agglomerative hierarchical, model-based, fuzzy-C-means, affinity propagation, self organizing maps, linear vector quantisation – as well as the recently developed optimization-based clustering (COMSEP-Clust) approach. We evaluate the performances of the clustering methods extensively on real-world ASD datasets encompassing different age groups: toddlers, children, adolescents, and adults. Our experimental results suggest that the COMSEP-Clust approach outperforms the other seven methods in recognizing ASD with well-separated clusters.

Keywords: autism spectrum disorder, clustering, optimization, unsupervised machine learning

Procedia PDF Downloads 118
424 Effective Nutrition Label Use on Smartphones

Authors: Vladimir Kulyukin, Tanwir Zaman, Sarat Kiran Andhavarapu

Abstract:

Research on nutrition label use identifies four factors that impede comprehension and retention of nutrition information by consumers: label’s location on the package, presentation of information within the label, label’s surface size, and surrounding visual clutter. In this paper, a system is presented that makes nutrition label use more effective for nutrition information comprehension and retention. The system’s front end is a smartphone application. The system’s back end is a four node Linux cluster for image recognition and data storage. Image frames captured on the smartphone are sent to the back end for skewed or aligned barcode recognition. When barcodes are recognized, corresponding nutrition labels are retrieved from a cloud database and presented to the user on the smartphone’s touchscreen. Each displayed nutrition label is positioned centrally on the touchscreen with no surrounding visual clutter. Wikipedia links to important nutrition terms are embedded to improve comprehension and retention of nutrition information. Standard touch gestures (e.g., zoom in/out) available on mainstream smartphones are used to manipulate the label’s surface size. The nutrition label database currently includes 200,000 nutrition labels compiled from public web sites by a custom crawler. Stress test experiments with the node cluster are presented. Implications for proactive nutrition management and food policy are discussed.

Keywords: mobile computing, cloud computing, nutrition label use, nutrition management, barcode scanning

Procedia PDF Downloads 375
423 Consumer Trust and Online Payment Options: Determinants of E-Commerce in the Least Developed Countries

Authors: Mohamed Muse Hassan

Abstract:

Selling through the Internet is changing the norms of doing business globally. Today, selling and buying from the Internet is not only an option but the dominant form of shopping. But, this phenomenon is not thriving in the developing countries, mainly in Africa. Therefore, although previous studies focused on the e-retailers’ side, this study investigates the effect of consumer trust and online payment options on the awareness and perception of e-commerce in Africa. We developed a five-construct model and empirically tested the model by targeting professionals and college students who reside in Somalia. We employed structural equation modeling (SEM) technique for path analysis to probe answers for the variables under study. The main findings of the study show that there is significant evidence that online payment option impacts both the awareness level and perception of e-commerce in Somalia. Consumer trust was also found to determine both the awareness and perception of online shopping in the country. Moreover, the current global payment options available ignore local technologies popular in Africa. For example, the inclusion of a mobile payment option alone would make a big difference in Africa. The paper also determined that consumer trust toward online retailers is very low and this can be solved if consumers are given assurances for their financial transactions. The paper concludes that increased online payment options are needed in Somalia and, in Africa, in general. Limitations and further research suggestions are also included at the end of this paper.

Keywords: Africa, consumer trust, e-commerce, online payment

Procedia PDF Downloads 257
422 Additive Carbon Dots Nanocrystals for Enhancement of the Efficiency of Dye-Sensitized Solar Cell in Energy Applications Technology

Authors: Getachew Kuma Watiro

Abstract:

The need for solar energy is constantly increasing and it is widely available on the earth’s surface. Photovoltaic technology is one of the most capable of all viable energy technology and is seen as a promising approach to the control era as it is readily available and has zero carbon emissions. Inexpensive and versatile solar cells have achieved the conversion efficiency and long life of dye-sensitized solar cells, improving the conversion efficiency from the sun to electricity. DSSCs have received a lot of attention for Various potential commercial uses, such as mobile devices and portable electronic devices, as well as integrated solar cell modules. The systematic reviews were used to show the critical impact of additive C-dots in the Dye-Sensitized solar cell for energy application technology. This research focuses on the following methods to synthesize nanoparticles such as facile, polyol, calcination, and hydrothermal technique. In addition to these, there are additives C-dots by the Hydrothermal method. This study deals with the progressive development of DSSC in photovoltaic technology. The applications of single and heterojunction structure technology devices were used (ZnO, NiO, SnO2, and NiO/ZnO/N719) and applied some additives C-dots (ZnO/C-dots /N719, NiO/C-dots /N719, SnO2 /C-dots /N719 and NiO/ZnO/C-dots/N719) and the effects of C-dots were reviewed. More than all, the technology of DSSC with C-dots enhances efficiency. Finally, recommendations have been made for future research on the application of DSSC with the use of these additives.

Keywords: dye-sensitized solar cells, heterojunction’s structure, carbon dot, conversion efficiency

Procedia PDF Downloads 120
421 Using Crowd-Sourced Data to Assess Safety in Developing Countries: The Case Study of Eastern Cairo, Egypt

Authors: Mahmoud Ahmed Farrag, Ali Zain Elabdeen Heikal, Mohamed Shawky Ahmed, Ahmed Osama Amer

Abstract:

Crowd-sourced data refers to data that is collected and shared by a large number of individuals or organizations, often through the use of digital technologies such as mobile devices and social media. The shortage in crash data collection in developing countries makes it difficult to fully understand and address road safety issues in these regions. In developing countries, crowd-sourced data can be a valuable tool for improving road safety, particularly in urban areas where the majority of road crashes occur. This study is -to our best knowledge- the first to develop safety performance functions using crowd-sourced data by adopting a negative binomial structure model and the Full Bayes model to investigate traffic safety for urban road networks and provide insights into the impact of roadway characteristics. Furthermore, as a part of the safety management process, network screening has been undergone through applying two different methods to rank the most hazardous road segments: PCR method (adopted in the Highway Capacity Manual HCM) as well as a graphical method using GIS tools to compare and validate. Lastly, recommendations were suggested for policymakers to ensure safer roads.

Keywords: crowdsourced data, road crashes, safety performance functions, Full Bayes models, network screening

Procedia PDF Downloads 58
420 Context-Aware Alert Method in Hajj Pilgrim Location-Based Tracking System

Authors: Syarif Hidayat

Abstract:

As millions of people with different backgrounds perform hajj every year in Saudi Arabia, it brings out several problems. Missing people is among many crucial problems need to be encountered. Some people might have had insufficient knowledge of using tracking system equipment. Other might become a victim of an accident, lose consciousness, or even died, prohibiting them to perform certain activity. For those reasons, people could not send proper SOS message. The major contribution of this paper is the application of the diverse alert method in pilgrims tracking system. It offers a simple yet robust solution to send SOS message by pilgrims during Hajj. Knowledge of context aware computing is assumed herein. This study presents four methods that could be utilized by pilgrims to send SOS. The first method is simple mobile application contains only a button. The second method is based on behavior analysis based off GPS location movement anomaly. The third method is by introducing pressing pattern to smartwatch physical button as a panic button. The fourth method is by identifying certain accelerometer pattern recognition as a sign of emergency situations. Presented method in this paper would be an important part of pilgrims tracking system. The discussion provided here includes easy to use design whilst maintaining tracking accuracy, privacy, and security of its users.

Keywords: context aware computing, emergency alert system, GPS, hajj pilgrim tracking, location-based services

Procedia PDF Downloads 217
419 E-Payments, COVID-19 Restrictions, and Currency in Circulation: Thailand and Turkey

Authors: Zeliha Sayar

Abstract:

Central banks all over the world appear to be focusing first and foremost on retail central bank digital currency CBDC), i.e., digital cash/money. This approach is predicated on the belief that the use of cash has decreased, owing primarily to technological advancements and pandemic restrictions, and that a suitable foundation for the transition to a cashless society has been revealed. This study aims to contribute to the debate over whether digital money/CBDC can be a substitute or supplement to physical cash by examining the potential effects on cash demand. For this reason, this paper compares two emerging countries, Turkey, and Thailand, to demystify the impact of e-payment and COVID-19 restrictions on cash demand by employing fully modified ordinary least squares (FMOLS), dynamic ordinary least squares (DOLS), and the canonical cointegrating regression (CCR). The currency in circulation in two emerging countries, Turkey and Thailand, was examined in order to estimate the elasticity of different types of retail payments. The results demonstrate that real internet and mobile, cart, contactless payment, and e-money are long-term determinants of real cash demand in these two developing countries. Furthermore, with the exception of contactless payments in Turkey, there is a positive relationship between the currency in circulation and the various types of retail payments. According to findings, COVID-19 restrictions encourage the demand for cash, resulting in cash hoarding.

Keywords: CCR, DOLS, e-money, FMOLS, real cash

Procedia PDF Downloads 107
418 Podcasting: A Tool for an Enhanced Learning Experience of Introductory Courses to Science and Engineering Students

Authors: Yaser E. Greish, Emad F. Hindawy, Maryam S. Al Nehayan

Abstract:

Introductory courses such as General Chemistry I, General Physics I and General Biology need special attention as students taking these courses are usually at their first year of the university. In addition to the language barrier for most of them, they also face other difficulties if these elementary courses are taught in the traditional way. Changing the routine method of teaching of these courses is therefore mandated. In this regard, podcasting of chemistry lectures was used as an add-on to the traditional and non-traditional methods of teaching chemistry to science and non-science students. Podcasts refer to video files that are distributed in a digital format through the Internet using personal computers or mobile devices. Pedagogical strategy is another way of identifying podcasts. Three distinct teaching approaches are evident in the current literature and include receptive viewing, problem-solving, and created video podcasts. The digital format and dispensing of video podcasts have stabilized over the past eight years, the type of podcasts vary considerably according to their purpose, degree of segmentation, pedagogical strategy, and academic focus. In this regard, the whole syllabus of 'General Chemistry I' course was developed as podcasts and were delivered to students throughout the semester. Students used the podcasted files extensively during their studies, especially as part of their preparations for exams. Feedback of students strongly supported the idea of using podcasting as it reflected its effect on the overall understanding of the subject, and a consequent improvement of their grades.

Keywords: podcasting, introductory course, interactivity, flipped classroom

Procedia PDF Downloads 265
417 Mobile Application to Generate Automate Plan for Tourist in The South and West of Saudi Arabia, Saferk

Authors: Hanan M. Alghamdi, Kholud E. Alsalami, Manal I. Alshaikhi, Nouf M. Alsalami, Sara A. Awad, Ruqaya A. Alrabei

Abstract:

Tourism in Saudi Arabia is one of the emerging sectors with rapid growth. The Kingdom of Saudi Arabia is characterized by its wonderful and historical areas, which constitute important cultural and tourist landmarks. These landmarks attract the attention of the government of Saudi Arabia; hence the improvement of the tourism sector becomes one of the important axes of Saudi Arabia's vision 2030. There is a need to enhance the tourist experience by facilitating the tourism process for visitors to the Kingdom of Saudi Arabia. This project aims to design an application to serve domestic tourists and visitors from outside the Kingdom of Saudi Arabia. This application will contain an automated tourist generate plan service by sentiment analysis of comments in Google Map using Lexicon for method Rule-based approach. There are thirteen regions in the kingdom of Saudi Arabia. The regions supported in this application will be Makkah and Asir regions. According to the output of the sentiment analysis, the application will recommend restaurants and cafes, activities (parks, museums) and shopping (shopping centers) in the generated plan. After that, the system will show the user a drop-down list of “Mega-events in Saudi Arabia” containing a link to the site of events in the Kingdom of Saudi Arabia. and “important information for you” public decency regulations.

Keywords: tourist automated plan, sentiment analysis, comments in google map, tourism in Saudi Arabia

Procedia PDF Downloads 144