Search results for: phone users
1273 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy
Authors: Andrei Bogdan Stanescu, Robert Stana
Abstract:
Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy
Procedia PDF Downloads 881272 Rapid Design Approach for Electric Long-Range Drones
Authors: Adrian Sauer, Lorenz Einberger, Florian Hilpert
Abstract:
The advancements and technical innovations in the field of electric unmanned aviation over the past years opened the third dimension in areas like surveillance, logistics, and mobility for a wide range of private and commercial users. Researchers and companies are faced with the task of integrating their technology into airborne platforms. Especially start-ups and researchers require unmanned aerial vehicles (UAV), which can be quickly developed for specific use cases without spending significant time and money. This paper shows a design approach for the rapid development of a lightweight automatic separate-lift-thrust (SLT) electric vertical take-off and landing (eVTOL) UAV prototype, which is able to fulfill basic transportation as well as surveillance missions. The design approach does not require expensive or time-consuming design loop software. Thereby developers can easily understand, adapt, and adjust the presented method for their own project. The approach is mainly focused on crucial design aspects such as aerofoil, tuning, and powertrain.Keywords: aerofoil, drones, rapid prototyping, powertrain
Procedia PDF Downloads 691271 Simultaneous Interpreting in the European Parliament: Linguistic Quality of the Political Discourse: An Empirical Analysis
Authors: Alicja Zapolnik-Plachetka
Abstract:
The paper examines the impact of the Members’ of the European Parliament (MEPs) language choice on the linguistic quality of their political discourse as delivered by the interpreters. The study, designed by the author, who is an EU interpreter herself, consisted of three phases. First, a number of speeches of Polish and Spanish MEPs were analyzed to determine whether the incidence of use of certain figures of speech depending on whether the speech had been delivered in English or their respective mother tongue. Then the use of figures of speech was also analyzed based on speeches by some British MEPs, in order to determine what was the incidence for the native users of English. Subsequently, the speeches were compared with their interpretations to find out whether the interpreters managed to convey accurately the means of oratory used by the MEPs. The final result shows that in case of institutional environments dependant on simultaneous interpretation the speakers’ choices can, in fact, influence the linguistic quality of the political communication.Keywords: content accuracy, European Parliament, political discourse, simultaneous interpreting
Procedia PDF Downloads 1291270 A Detailed Study of Two Different Airfoils on Flight Performance of MAV of Same Physical Dimension
Authors: Shoeb A. Adeel, Shashant Anand, Vivek Paul, Dinesh, Suraj, Roshan
Abstract:
The paper presents a study of micro air vehicles (MAVs) with wingspans of 20 Cm with two different airfoil configurations. MAVs have vast potential applications in both military and civilian areas. These MAVs are fully autonomous and supply real-time data. The paper focuses on two different designs of the MAVs one being N22 airfoil and the other a flat plate with similar dimension. As designed, the MAV would fly in a low Reynolds-number regime at airspeeds of 15 & 20 m/sec. Propulsion would be provided by an electric motor with an advanced lithium. Because of the close coupling between vehicle elements, system integration would be a significant challenge, requiring tight packaging and multifunction components to meet mass limitations and Centre of Gravity (C.G) balancing. These MAVs are feasible and within a couple of years of technology development in key areas including sensors, propulsion, Aerodynamics, and packaging these would be easily available to the users at affordable prices. The paper finally compares the flight performance of the two configurations.Keywords: airfoil, CFD, MAV, flight performance, endurance, climb, lift, drag
Procedia PDF Downloads 4951269 Sustainable Design Criteria for Beach Resorts to Enhance Physical Activity That Helps Improve Health and Well-being for Adults in Saudi Arabia
Authors: Noorh Albadi, Salha Khayyat
Abstract:
People's moods and well-being are affected by their environment. The built environment impacts one's level of activity and health. In order to enhance users' physical health, sustainable design strategies have been developed for the physical environment to improve users' health. This study aimed to determine whether adult resorts in Saudi Arabia meet standards that ensure physical wellness to identify the needed requirements. It will be significant to the Ministry of Tourism, Sports, developers, and designers. Physical activity affects human health physically and mentally. In Saudi Arabia, the percentage of people who practiced sports in the Kingdom in 2019 was 20.04% - males and females older than 15. On the other hand, there is a lack of physical activity in Saudi Arabia; 90% of the Kingdom's population spends more than two hours sitting down without moving, which puts them at risk of contracting a non-communicable disease. The lack of physical activity and movement led to an increase in the rate of obesity among Saudis by 59% in 2020 and consequently could cause chronic diseases or death. The literature generally endorses that leading an active lifestyle improves physical health and affects mental health. Therefore, the United Nations has set 17 sustainable development goals (SDGs) to ensure healthy lives and promote well-being for all ages. One of SDG3's targets is reducing mortality, which can be achieved by raising physical activity. In order to support sustainable design, many rating systems and strategies have been developed, such as WELL building, Leadership in Energy and Environmental Design, (LEED), Active design strategies, and RIPA plan of work. The survey was used to gather qualitative and quantitative information. It was designed based on the Active Design and WELL building theories targeting beach resorts visitors, professional and beginner athletes, and non-athletics to ask them about the beach resorts they visited in the Kingdom and whether they met the criteria of sports resorts and healthy and active design theories, in addition to gathering information about the preferences of physical activities in the Saudi society in terms of the type of activities that young people prefer, where they prefer to engage in and under any thermal and light conditions. The final section asks about the design of residential units in beach sports resorts, the data collected from 127 participants. Findings revealed that participants prefer outdoor activities in moderate weather and sunlight or the evening with moderate and sufficient lighting and that no beach sports resorts in the country are constructed to support sustainable design criteria for physical activity. Participants agreed that several measures that lessen tension at beach resorts and enhance movement and activity are needed by Saudi society. The study recommends designing resorts that meet the sustainable design criteria regarding physical activity in Saudi Arabia to increase physical activity to achieve psychological and physical benefits and avoid psychological and physical diseases related to physical inactivity.Keywords: sustainable design, SDGs, active design strategies, well building, beach resort design
Procedia PDF Downloads 1181268 Designing User Interfaces for Just in Time Enterprise Solution
Authors: Romi Dey
Abstract:
Introduction: One of the most important criteria for technology to sustain and grow is through it’s elaborate and intuitive design methodology and design thinking. Designing for enterprise applications that cater to Just in Time Technology is one of the most challenging and detailed processes any User Experience Designer would come across. Description: The basic principles of Design, when applied to tailor to these technologies, creates an immense challenge and that’s how a set of redefined and revised design principles that can be applied to designing any Just In Time manufacturing solution. Findings: The thorough process of understanding the end user, their existing pain points which they’ve faced in the real world, their responsibilities and expectations, the core needs and last but not the least the demands, creates havoc nurturing of the design methodologies for the Just in Time solutions. With respect to the business aspect, design and design principles play a strong role in any form of innovation. Conclusion: Innovation and knowledge about the latest technologies are the keywords in the manufacturing industry. It becomes crucial for the product development team to be precise in their understanding of the technology and being sure of end users expectation.Keywords: design thinking, enterprise application, Just in Time, user experience design
Procedia PDF Downloads 1681267 Using Emerging Hot Spot Analysis to Analyze Overall Effectiveness of Policing Policy and Strategy in Chicago
Authors: Tyler Gill, Sophia Daniels
Abstract:
The paper examines how accessing the spatial-temporal constrains of data will help inform policymakers and law enforcement officials. The authors utilize Chicago crime data from 2006-2016 to demonstrate how the Emerging Hot Spot Tool is an ideal hot spot clustering approach to analyze crime data. Traditional approaches include density maps or creating a spatial weights matrix to include the spatial-temporal constrains. This new approach utilizes a space-time implementation of the Getis-Ord Gi* statistic to visualize the data more quickly to make better decisions. The research will help complement socio-cultural research to find key patterns to help frame future policies and evaluate the implementation of prior strategies. Through this analysis, homicide trends and patterns are found more effectively and recommendations for use by non-traditional users of GIS are offered for real life implementation.Keywords: crime mapping, emerging hot spot analysis, Getis-Ord Gi*, spatial-temporal analysis
Procedia PDF Downloads 2441266 Using Business Simulations and Game-Based Learning for Enterprise Resource Planning Implementation Training
Authors: Carin Chuang, Kuan-Chou Chen
Abstract:
An Enterprise Resource Planning (ERP) system is an integrated information system that supports the seamless integration of all the business processes of a company. Implementing an ERP system can increase efficiencies and decrease the costs while helping improve productivity. Many organizations including large, medium and small-sized companies have already adopted an ERP system for decades. Although ERP system can bring competitive advantages to organizations, the lack of proper training approach in ERP implementation is still a major concern. Organizations understand the importance of ERP training to adequately prepare managers and users. The low return on investment, however, for the ERP training makes the training difficult for knowledgeable workers to transfer what is learned in training to the jobs at workplace. Inadequate and inefficient ERP training limits the value realization and success of an ERP system. That is the need to call for a profound change and innovation for ERP training in both workplace at industry and the Information Systems (IS) education in academia. The innovated ERP training approach can improve the users’ knowledge in business processes and hands-on skills in mastering ERP system. It also can be instructed as educational material for IS students in universities. The purpose of the study is to examine the use of ERP simulation games via the ERPsim system to train the IS students in learning ERP implementation. The ERPsim is the business simulation game developed by ERPsim Lab at HEC Montréal, and the game is a real-life SAP (Systems Applications and Products) ERP system. The training uses the ERPsim system as the tool for the Internet-based simulation games and is designed as online student competitions during the class. The competitions involve student teams with the facilitation of instructor and put the students’ business skills to the test via intensive simulation games on a real-world SAP ERP system. The teams run the full business cycle of a manufacturing company while interacting with suppliers, vendors, and customers through sending and receiving orders, delivering products and completing the entire cash-to-cash cycle. To learn a range of business skills, student needs to adopt individual business role and make business decisions around the products and business processes. Based on the training experiences learned from rounds of business simulations, the findings show that learners have reduced risk in making mistakes that help learners build self-confidence in problem-solving. In addition, the learners’ reflections from their mistakes can speculate the root causes of the problems and further improve the efficiency of the training. ERP instructors teaching with the innovative approach report significant improvements in student evaluation, learner motivation, attendance, engagement as well as increased learner technology competency. The findings of the study can provide ERP instructors with guidelines to create an effective learning environment and can be transferred to a variety of other educational fields in which trainers are migrating towards a more active learning approach.Keywords: business simulations, ERP implementation training, ERPsim, game-based learning, instructional strategy, training innovation
Procedia PDF Downloads 1391265 A Case Study of Assessing the Impact of Electronic Payment System on the Service Delivery of Banks in Nigeria
Authors: Idris Lawal
Abstract:
Electronic payment system is simply a payment or monetary transaction made over the internet or a network of computers. This study was carried out in order to assess how electronic payment system has impacted on banks service delivery, to examine the efficiency of electronic payment system in Nigeria and to determine the level of customer's satisfaction as a direct result of the deployment of electronic payment systems. It is an empirical study conducted using structured questionnaire distributed to officials and customers of Access Bank plc. Chi-square(x2) was adopted for the purpose of data analysis. The result of the study showed that the development of electronic payment system offer great benefit to bank customers including improved services, reduced turn-around time, ease of banking transaction, significant cost saving etc. The study recommends that customer protection laws should be properly put in place to safeguard the interest of end users of e-payment instruments.Keywords: bank, electronic payment systems, service delivery, customer's satisfaction
Procedia PDF Downloads 3951264 Effects of Video Games and Online Chat on Mathematics Performance in High School: An Approach of Multivariate Data Analysis
Authors: Lina Wu, Wenyi Lu, Ye Li
Abstract:
Regarding heavy video game players for boys and super online chat lovers for girls as a symbolic phrase in the current adolescent culture, this project of data analysis verifies the displacement effect on deteriorating mathematics performance. To evaluate correlation or regression coefficients between a factor of playing video games or chatting online and mathematics performance compared with other factors, we use multivariate analysis technique and take gender difference into account. We find the most important reason for the negative sign of the displacement effect on mathematics performance due to students’ poor academic background. Statistical analysis methods in this project could be applied to study internet users’ academic performance from the high school education to the college education.Keywords: correlation coefficients, displacement effect, multivariate analysis technique, regression coefficients
Procedia PDF Downloads 3611263 The Sound of Getting Closer: A Phenomenological Research of the Senses of Proximity and Touch
Authors: Marcello Lussana
Abstract:
Closer is a wireless system developed by the “Design Research Lab” of the UdK Berlin that is able to detect the proximity and touch between two (or more) persons. We have been using this system for one performance and one installation: in both cases, the proximity and touch events of the two participants have been sonified using the software Supercollider. In this paper, we are going to focus on the actual experience of the participants involved, especially related to the awareness of their body, their level of proprioception and how they felt in their body and in connection with the other person. In order to give value to the lived experience of the participant, a phenomenological method described and developed by Professor Claire Petitmengin has been used. This strategy allowed the interviewees to become aware of their subjective experience, and describe it with great precision. This is essential in order to understand the actual state of consciousness of the users. Our aim is to research the senses of proprioception, touch, and proximity: as they all involve a pre-reflective state of consciousness, they are central for the understanding of human perception. The interviews revealed how this experience could improve and increase proprioception and awareness of your body.Keywords: interactive sound, phenomenology, pre-reflective, proprioception, subjective experience
Procedia PDF Downloads 2451262 Reframing Service Sector Privatisation Quality Conception with the Theory of Deferred Action
Authors: Mukunda Bastola, Frank Nyame-Asiamah
Abstract:
Economics explanation for privatisation, drawing on neo-liberal market structures and technical efficiency principles has failed to address social imbalance and, distribute the efficiency benefits accrued from privatisation equitably among service users and different classes of people in society. Stakeholders’ interest, which cover ethical values and changing human needs are ignored due to shareholders’ profit maximising strategy with higher service charges. The consequence of these is that, the existing justifications for privatisation have fallen short of customer quality expectations because the underlying plan-based models fail to account for the nuances of customer expectations. We draw on the theory of deferred action to develop a context-based privatisation model, the deferred-based privatisation model, to explain how privatisation could be strategised for the emergent reality of the wider stakeholders’ interests and everyday quality demands of customers which are unpredictable.Keywords: privatisation, service quality, shareholders, deferred action, deferred-based privatisation model
Procedia PDF Downloads 2721261 Knowledge Engineering Based Smart Healthcare Solution
Authors: Rhaed Khiati, Muhammad Hanif
Abstract:
In the past decade, smart healthcare systems have been on an ascendant drift, especially with the evolution of hospitals and their increasing reliance on bioinformatics and software specializing in healthcare. Doctors have become reliant on technology more than ever, something that in the past would have been looked down upon, as technology has become imperative in reducing overall costs and improving the quality of patient care. With patient-doctor interactions becoming more necessary and more complicated than ever, systems must be developed while taking into account costs, patient comfort, and patient data, among other things. In this work, we proposed a smart hospital bed, which mixes the complexity and big data usage of traditional healthcare systems with the comfort found in soft beds while taking certain concerns like data confidentiality, security, and maintaining SLA agreements, etc. into account. This research work potentially provides users, namely patients and doctors, with a seamless interaction with to their respective nurses, as well as faster access to up-to-date personal data, including prescriptions and severity of the condition in contrast to the previous research in the area where there is lack of consideration of such provisions.Keywords: big data, smart healthcare, distributed systems, bioinformatics
Procedia PDF Downloads 1961260 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.Keywords: authentication, gesture-based passwords, shoulder-surfing attacks, usability
Procedia PDF Downloads 1371259 Deployed Confidence: The Testing in Production
Authors: Shreya Asthana
Abstract:
Testers know that the feature they tested on stage is working perfectly in production only after release went live. Sometimes something breaks in production and testers get to know through the end user’s bug raised. The panic mode starts when your staging test results do not reflect current production behavior. And you started doubting your testing skills when finally the user reported a bug to you. Testers can deploy their confidence on release day by testing on production. Once you start doing testing in production, you will see test result accuracy because it will be running on real time data and execution will be a little faster as compared to staging one due to elimination of bad data. Feature flagging, canary releases, and data cleanup can help to achieve this technique of testing. By this paper it will be easier to understand the steps to achieve production testing before making your feature live, and to modify IT company’s testing procedure, so testers can provide the bug free experience to the end users. This study is beneficial because too many people think that testing should be done in staging but not in production and now this is high time to pull out people from their old mindset of testing into a new testing world. At the end of the day, it all just matters if the features are working in production or not.Keywords: bug free production, new testing mindset, testing strategy, testing approach
Procedia PDF Downloads 751258 Automatic Lead Qualification with Opinion Mining in Customer Relationship Management Projects
Authors: Victor Radich, Tania Basso, Regina Moraes
Abstract:
Lead qualification is one of the main procedures in Customer Relationship Management (CRM) projects. Its main goal is to identify potential consumers who have the ideal characteristics to establish a profitable and long-term relationship with a certain organization. Social networks can be an important source of data for identifying and qualifying leads since interest in specific products or services can be identified from the users’ expressed feelings of (dis)satisfaction. In this context, this work proposes the use of machine learning techniques and sentiment analysis as an extra step in the lead qualification process in order to improve it. In addition to machine learning models, sentiment analysis or opinion mining can be used to understand the evaluation that the user makes of a particular service, product, or brand. The results obtained so far have shown that it is possible to extract data from social networks and combine the techniques for a more complete classification.Keywords: lead qualification, sentiment analysis, opinion mining, machine learning, CRM, lead scoring
Procedia PDF Downloads 841257 Large-Scale Electroencephalogram Biometrics through Contrastive Learning
Authors: Mostafa ‘Neo’ Mohsenvand, Mohammad Rasool Izadi, Pattie Maes
Abstract:
EEG-based biometrics (user identification) has been explored on small datasets of no more than 157 subjects. Here we show that the accuracy of modern supervised methods falls rapidly as the number of users increases to a few thousand. Moreover, supervised methods require a large amount of labeled data for training which limits their applications in real-world scenarios where acquiring data for training should not take more than a few minutes. We show that using contrastive learning for pre-training, it is possible to maintain high accuracy on a dataset of 2130 subjects while only using a fraction of labels. We compare 5 different self-supervised tasks for pre-training of the encoder where our proposed method achieves the accuracy of 96.4%, improving the baseline supervised models by 22.75% and the competing self-supervised model by 3.93%. We also study the effects of the length of the signal and the number of channels on the accuracy of the user-identification models. Our results reveal that signals from temporal and frontal channels contain more identifying features compared to other channels.Keywords: brainprint, contrastive learning, electroencephalo-gram, self-supervised learning, user identification
Procedia PDF Downloads 1551256 Annotation Ontology for Semantic Web Development
Authors: Hadeel Al Obaidy, Amani Al Heela
Abstract:
The main purpose of this paper is to examine the concept of semantic web and the role that ontology and semantic annotation plays in the development of semantic web services. The paper focuses on semantic web infrastructure illustrating how ontology and annotation work to provide the learning capabilities for building content semantically. To improve productivity and quality of software, the paper applies approaches, notations and techniques offered by software engineering. It proposes a conceptual model to develop semantic web services for the infrastructure of web information retrieval system of digital libraries. The developed system uses ontology and annotation to build a knowledge based system to define and link the meaning of a web content to retrieve information for users’ queries. The results are more relevant through keywords and ontology rule expansion that will be more accurate to satisfy the requested information. The level of results accuracy would be enhanced since the query semantically analyzed work with the conceptual architecture of the proposed system.Keywords: semantic web services, software engineering, semantic library, knowledge representation, ontology
Procedia PDF Downloads 1711255 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System
Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji
Abstract:
Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.Keywords: Biba model, break the glass, context, cross-domain, fine-grained
Procedia PDF Downloads 5391254 What the Future Holds for Social Media Data Analysis
Authors: P. Wlodarczak, J. Soar, M. Ally
Abstract:
The dramatic rise in the use of Social Media (SM) platforms such as Facebook and Twitter provide access to an unprecedented amount of user data. Users may post reviews on products and services they bought, write about their interests, share ideas or give their opinions and views on political issues. There is a growing interest in the analysis of SM data from organisations for detecting new trends, obtaining user opinions on their products and services or finding out about their online reputations. A recent research trend in SM analysis is making predictions based on sentiment analysis of SM. Often indicators of historic SM data are represented as time series and correlated with a variety of real world phenomena like the outcome of elections, the development of financial indicators, box office revenue and disease outbreaks. This paper examines the current state of research in the area of SM mining and predictive analysis and gives an overview of the analysis methods using opinion mining and machine learning techniques.Keywords: social media, text mining, knowledge discovery, predictive analysis, machine learning
Procedia PDF Downloads 4221253 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 1101252 UWB Open Spectrum Access for a Smart Software Radio
Authors: Hemalatha Rallapalli, K. Lal Kishore
Abstract:
In comparison to systems that are typically designed to provide capabilities over a narrow frequency range through hardware elements, the next generation cognitive radios are intended to implement a broader range of capabilities through efficient spectrum exploitation. This offers the user the promise of greater flexibility, seamless roaming possible on different networks, countries, frequencies, etc. It requires true paradigm shift i.e., liberalization over a wide band of spectrum as well as a growth path to more and greater capability. This work contributes towards the design and implementation of an open spectrum access (OSA) feature to unlicensed users thus offering a frequency agile radio platform that is capable of performing spectrum sensing over a wideband. Thus, an ultra-wideband (UWB) radio, which has the intelligence of spectrum sensing only, unlike the cognitive radio with complete intelligence, is named as a Smart Software Radio (SSR). The spectrum sensing mechanism is implemented based on energy detection. Simulation results show the accuracy and validity of this method.Keywords: cognitive radio, energy detection, software radio, spectrum sensing
Procedia PDF Downloads 4271251 Biometric Identification with Latitude and Longitude Fingerprint Verification for Attendance
Authors: Muhammad Fezan Afzal, Imran Khan, Salma Imtiaz
Abstract:
The need for human verification and identification requires from centuries for authentication. Since it is being used in big institutes like financial, government and crime departments, a continued struggle is important to make this system more efficient to prevent security breaches. Therefore, multiple devices are used to authenticate the biometric for each individual. A large number of devices are required to cover a large number of users. As the number of devices increases, cost will automatically increase. Furthermore, it is time-consuming for biometrics due to the devices being insufficient and are not available at every door. In this paper, we propose the framework and algorithm where the mobile of each individual can also perform the biometric authentication of attendance and security. Every mobile has a biometric authentication system that is used in different mobile applications for security purposes. Therefore, each individual can use the biometric system mobile without moving from one place to another. Moreover, by using the biometrics mobile, the cost of biometric systems can be removed that are mostly deployed in different organizations for the attendance of students, employees and for other security purposes.Keywords: fingerprint, fingerprint authentication, mobile verification, mobile biometric verification, mobile fingerprint sensor
Procedia PDF Downloads 661250 Intrusion Detection System Based on Peer to Peer
Authors: Alireza Pour Ebrahimi, Vahid Abasi
Abstract:
Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.Keywords: network, intrusion detection system, peer to peer, internal and external network
Procedia PDF Downloads 5451249 Learning Materials of Atmospheric Pressure Plasma Process: Application in Wrinkle-Resistant Finishing of Cotton Fabric
Authors: C. W. Kan
Abstract:
Cotton fibre is a commonly-used natural fibre because of its good fibre strength, high moisture absorption behaviour and minimal static problems. However, one of the main drawbacks of cotton fibre is wrinkling after washing, which is recently overcome by wrinkle-resistant treatment. 1,2,3,4-butanetetracarboxylic acid (BTCA) could improve the wrinkle-resistant properties of cotton fibre. Although the BTCA process is an effective method for wrinkle resistant application of cotton fabrics, reduced fabric strength was observed after treatment. Therefore, this paper would explore the use of atmospheric pressure plasma treatment under different discharge powers as a pretreatment process to enhance the application of BTCA process on cotton fabric without generating adverse effect. The aim of this study is to provide learning information to the users to know how the atmospheric pressure plasma treatment can be incorporated in textile finishing process with positive impact.Keywords: learning materials, atmospheric pressure plasma treatment, cotton, wrinkle-resistant, BTCA
Procedia PDF Downloads 3031248 Personality, Coping, Quality of Life, and Distress in Persons with Hearing Loss: A Cross-Sectional Study of Patients Referred to an Audiological Service
Authors: Oyvind Nordvik, Peder O. L. Heggdal, Jonas Brannstrom, Flemming Vassbotn, Anne Kari Aarstad, Hans Jorgen Aarstad
Abstract:
Background: Hearing Loss (HL) is a condition that may affect people in all stages of life, but the prevalence increases with age, mostly because of age-related HL, generally referred to as presbyacusis. As human speech is related to relatively high frequencies, even a limited hearing loss at high frequencies may cause impaired speech intelligibility. Being diagnosed with, treated for and living with a chronic condition such as HL, must for many be a disabling and stressful condition that put ones coping resources to test. Stress is a natural part of life and most people will experience stressful events or periods. Chronic diseases, such as HL, are risk factor for distress in individuals, causing anxiety and lowered mood. How an individual cope with HL may be closely connected to the level of distress he or she is experiencing and to personality, which can be defined as those characteristics of a person that account for consistent patterns of feelings, thinking, and behavior. Thus, as to distress in life, such as illness or disease, available coping strategies may be more important than the challenge itself. The same line of arguments applies to level of experienced health-related quality of life (HRQoL). Aim: The aim of this study was to investigate the relationship between distress, HRQoL, reported hearing loss, personality and coping in patients with HL. Method: 158 adult (aged 18-78 years) patients with HL, referred for hearing aid (HA) fitting at Haukeland University Hospital in western Norway, participated in the study. Both first-time users, as well as patients referred for HA renewals were included. First-time users had been pre-examined by an ENT-specialist. The questionnaires were answered before the actual HA fitting procedure. The pure-tone average (PTA; frequencies 0.5, 1, 2, and 4 kHz) was determined for each ear. The Eysenck personality inventory, neuroticism and lie scales, the Theoretically Originated Measure of the Cognitive Activation Theory of Stress (TOMCATS) measuring active coping, hopelessness and helplessness, as well as distress (General Health Questionnaire (GHQ) - 12 items) and the EORTC Quality of Life Questionnaire general part were answered. In addition, we used a revised and shortened version of the Abbreviated Profile of Hearing Aid Benefit (APHAB) as a measure of patient-reported hearing loss. Results: Significant correlations were determined between APHAB (weak), HRQoL scores (strong), distress scores (strong) on the one side and personality and choice of coping scores on the other side. As measured by stepwise regression analyses, the distress and HRQoL scores were scored secondary to the obtained personality and coping scores. The APHAB scores were as determined by regression analyses scored secondary to PTA (best ear), level of neuroticism and lie score. Conclusion: We found that reported employed coping style, distress/HRQoL and personality are closely connected to each other in this patient group. Patient-reported HL was associated to hearing level and personality. There is need for further investigations on these questions, and how these associations may influence the clinical context.Keywords: coping, distress, hearing loss, personality
Procedia PDF Downloads 1451247 Trend Detection Using Community Rank and Hawkes Process
Authors: Shashank Bhatnagar, W. Wilfred Godfrey
Abstract:
We develop in this paper, an approach to find the trendy topic, which not only considers the user-topic interaction but also considers the community, in which user belongs. This method modifies the previous approach of user-topic interaction to user-community-topic interaction with better speed-up in the range of [1.1-3]. We assume that trend detection in a social network is dependent on two things. The one is, broadcast of messages in social network governed by self-exciting point process, namely called Hawkes process and the second is, Community Rank. The influencer node links to others in the community and decides the community rank based on its PageRank and the number of users links to that community. The community rank decides the influence of one community over the other. Hence, the Hawkes process with the kernel of user-community-topic decides the trendy topic disseminated into the social network.Keywords: community detection, community rank, Hawkes process, influencer node, pagerank, trend detection
Procedia PDF Downloads 3811246 Expert Review on Conceptual Design Model of Assistive Courseware for Low Vision (AC4LV) Learners
Authors: Nurulnadwan Aziz, Ariffin Abdul Mutalib, Siti Mahfuzah Sarif
Abstract:
This paper reports an ongoing project regarding the development of Conceptual Design Model of Assistive Courseware for Low Vision (AC4LV) learners. Having developed the intended model, it has to be validated prior to producing it as guidance for the developers to develop an AC4LV. This study requires two phases of validation process which are through expert review and prototyping method. This paper presents a part of the validation process which is findings from experts review on Conceptual Design Model of AC4LV which has been carried out through a questionnaire. Results from 12 international and local experts from various respectable fields in Human-Computer Interaction (HCI) were discussed and justified. In a nutshell, reviewed Conceptual Design Model of AC4LV was formed. Future works of this study are to validate the reviewed model through prototyping method prior to testing it to the targeted users.Keywords: assistive courseware, conceptual design model, expert review, low vision learners
Procedia PDF Downloads 5441245 The Effectiveness of Using MS SharePoint for the Curriculum Repository System
Authors: Misook Ahn
Abstract:
This study examines the Institutional Curriculum Repository (ICR) developed with MS SharePoint. The purpose of using MS SharePoint is to organize, share, and manage the curriculum data. The ICR aims to build a centralized curriculum infrastructure, preserve all curriculum materials, and provide academic service to users (faculty, students, or other agencies). The ICR collection includes core language curriculum materials developed by each language school—foreign language textbooks, language survival kits, and audio files currently in or not in use at the schools. All core curriculum materials with audio and video files have been coded, collected, and preserved at the ICR. All metadata for the collected curriculum materials have been input by language, code, year, book type, level, user, version, and current status (in use/not in use). The qualitative content analysis, including the survey data, is used to evaluate the effectiveness of using MS SharePoint for the repository system. This study explains how to manage and preserve curriculum materials with MS SharePoint, along with challenges and suggestions for further research. This study will be beneficial to other universities or organizations considering archiving or preserving educational materials.Keywords: digital preservation, ms sharepoint, repository, curriculum materials
Procedia PDF Downloads 1031244 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 13