Search results for: user stories
1200 Cellular Architecture of Future Wireless Communication Networks
Authors: Mohammad Yahaghifar
Abstract:
Nowadays Wireless system designers have been facing the continuously increasing demand for high data rates and mobility required by new wireless applications. Evolving future communication network generation cellular wireless networks are envisioned to overcome the fundamental challenges of existing cellular networks, for example, higher data rates, excellent end-to-end performance, and user coverage in hot-spots and crowded areas with lower latency,energy consumption and cost per information transfer. In this paper we propose a potential cellular architecture that separates indoor and outdoor scenarios and discuss various promising technologies for future wireless communication systemssystems, such as massive MIMO, energy-efficient communications,cognitive radio networks, and visible light communications and we disscuse about 5G that is next generation of wireless networks.Keywords: future challenges in networks, cellur architecture, visible light communication, 5G wireless technologies, spatial modulation, massiva mimo, cognitive radio network, green communications
Procedia PDF Downloads 4911199 Usability Assessment of a Bluetooth-Enabled Resistance Exercise Band among Young Adults
Authors: Lillian M. Seo, Curtis L. Petersen, Ryan J. Halter, David Kotz, John A. Batsis
Abstract:
Background: Resistance-based exercises effectively enhance muscle strength, which is especially important in older populations as it reduces the risk of disability. Our group developed a Bluetooth-enabled handle for resistance exercise bands that wirelessly transmits relative force data through low-energy Bluetooth to a local smartphone or similar device. The system has the potential to measure home-based exercise interventions, allowing health professionals to monitor compliance. Its feasibility has already been demonstrated in both clinical and field-based settings, but it remained unclear whether the system’s usability persisted upon repeated use. The current study sought to assess the usability of this system and its users’ satisfaction with repeated use by deploying the device among younger adults to gather formative information that can ultimately improve the device’s design for older adults. Methods: A usability study was conducted in which 32 participants used the above system. Participants executed 10 repetitions of four commonly performed exercises: bicep flexion, shoulder abduction, elbow extension, and triceps extension. Each completed three exercise sessions, separated by at least 24 hours to minimize muscle fatigue. At its conclusion, subjects completed an adapted version of the usefulness, satisfaction, and ease (USE) questionnaire – assessing the system across four domains: usability, satisfaction, ease of use, and ease of learning. The 20-item questionnaire examined how strongly a participant agrees with positive statements about the device on a seven-point Likert scale, with one representing ‘strongly disagree’ and seven representing ‘strongly agree.’ Participants’ data were aggregated to calculate mean response values for each question and domain, effectively assessing the device’s performance across different facets of the user experience. Summary force data were visualized using a custom web application. Finally, an optional prompt at the end of the questionnaire allowed for written comments and feedback from participants to elicit qualitative indicators of usability. Results: Of the n=32 participants, 13 (41%) were female; their mean age was 32.4 ± 11.8 years, and no participants had a physical impairment. No usability questions received a mean score < 5 of seven. The four domains’ mean scores were: usefulness 5.66 ± 0.35; satisfaction 6.23 ± 0.06; ease of use 6.25 ± 0.43; and ease of learning 6.50 ± 0.19. Representative quotes of the open-ended feedback include: ‘A non-rigid strap-style handle might be useful for some exercises,’ and, ‘Would need different bands for each exercise as they use different muscle groups with different strength levels.’ General impressions were favorable, supporting the expectation that the device would be a useful tool in exercise interventions. Conclusions: A simple usability assessment of a Bluetooth-enabled resistance exercise band supports a consistent and positive user experience among young adults. This study provides adequate formative data, assuring the next steps can be taken to continue testing and development for the target population of older adults.Keywords: Bluetooth, exercise, mobile health, mHealth, usability
Procedia PDF Downloads 1201198 Performance-Based Quality Evaluation of Database Conceptual Schemas
Authors: Janusz Getta, Zhaoxi Pan
Abstract:
Performance-based quality evaluation of database conceptual schemas is an important aspect of database design process. It is evident that different conceptual schemas provide different logical schemas and performance of user applications strongly depends on logical and physical database structures. This work presents the entire process of performance-based quality evaluation of conceptual schemas. First, we show format. Then, the paper proposes a new specification of object algebra for representation of conceptual level database applications. Transformation of conceptual schemas and expression of object algebra into implementation schema and implementation in a particular database system allows for precise estimation of the processing costs of database applications and as a consequence for precise evaluation of performance-based quality of conceptual schemas. Then we describe an experiment as a proof of concept for the evaluation procedure presented in the paper.Keywords: conceptual schema, implementation schema, logical schema, object algebra, performance evaluation, query processing
Procedia PDF Downloads 2971197 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model
Abstract:
The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model
Procedia PDF Downloads 1031196 Development of a Wind Resource Assessment Framework Using Weather Research and Forecasting (WRF) Model, Python Scripting and Geographic Information Systems
Authors: Jerome T. Tolentino, Ma. Victoria Rejuso, Jara Kaye Villanueva, Loureal Camille Inocencio, Ma. Rosario Concepcion O. Ang
Abstract:
Wind energy is rapidly emerging as the primary source of electricity in the Philippines, although developing an accurate wind resource model is difficult. In this study, Weather Research and Forecasting (WRF) Model, an open source mesoscale Numerical Weather Prediction (NWP) model, was used to produce a 1-year atmospheric simulation with 4 km resolution on the Ilocos Region of the Philippines. The WRF output (netCDF) extracts the annual mean wind speed data using a Python-based Graphical User Interface. Lastly, wind resource assessment was produced using a GIS software. Results of the study showed that it is more flexible to use Python scripts than using other post-processing tools in dealing with netCDF files. Using WRF Model, Python, and Geographic Information Systems, a reliable wind resource map is produced.Keywords: wind resource assessment, weather research and forecasting (WRF) model, python, GIS software
Procedia PDF Downloads 4441195 Effects of Incident Angle and Distance on Visible Light Communication
Authors: Taegyoo Woo, Jong Kang Park, Jong Tae Kim
Abstract:
Visible Light Communication (VLC) provides wireless communication features in illumination systems. One of the key applications is to recognize the user location by indoor illuminators such as light emitting diodes. For localization of individual receivers in these systems, we usually assume that receivers and transmitters are placed in parallel. However, it is difficult to satisfy this assumption because the receivers move randomly in real case. It is necessary to analyze the case when transmitter is not placed perfectly parallel to receiver. It is also important to identify changes on optical gain by the tilted angles and distances of them against the illuminators. In this paper, we simulate optical gain for various cases where the tilt of the receiver and the distance change. Then, we identified changing patterns of optical gains according to tilted angles of a receiver and distance. These results can help many VLC applications understand the extent of the location errors with regard to optical gains of the receivers and identify the root cause.Keywords: visible light communication, incident angle, optical gain, light emitting diode
Procedia PDF Downloads 3371194 Transformer Design Optimization Using Artificial Intelligence Techniques
Authors: Zakir Husain
Abstract:
Main objective of a power transformer design optimization problem requires minimizing the total overall cost and/or mass of the winding and core material by satisfying all possible constraints obligatory by the standards and transformer user requirement. The constraints include appropriate limits on winding fill factor, temperature rise, efficiency, no-load current and voltage regulation. The design optimizations tasks are a constrained minimum cost and/or mass solution by optimally setting the parameters, geometry and require magnetic properties of the transformer. In this paper, present the above design problems have been formulated by using genetic algorithm (GA) and simulated annealing (SA) on the MATLAB platform. The importance of the presented approach is stems for two main features. First, proposed technique provides reliable and efficient solution for the problem of design optimization with several variables. Second, it guaranteed to obtained solution is global optimum. This paper includes a demonstration of the application of the genetic programming GP technique to transformer design.Keywords: optimization, power transformer, genetic algorithm (GA), simulated annealing technique (SA)
Procedia PDF Downloads 5881193 Transforming Water-Energy-Gas Industry through Smart Metering and Blockchain Technology
Authors: Khoi A. Nguyen, Rodney A. Stewart, Hong Zhang
Abstract:
Advanced metering technologies coupled with informatics creates an opportunity to form digital multi-utility service providers. These providers will be able to concurrently collect a customers’ medium-high resolution water, electricity and gas demand data and provide user-friendly platforms to feed this information back to customers and supply/distribution utility organisations. With the emergence of blockchain technology, a new research area has been explored which helps bring this multi-utility service provider concept to a much higher level. This study aims at introducing a breakthrough system architecture where smart metering technology in water, energy, and gas (WEG) are combined with blockchain technology to provide customer a novel real-time consumption report and decentralized resource trading platform. A pilot study on 4 properties in Australia has been undertaken to demonstrate this system, where benefits for customers and utilities are undeniable.Keywords: blockchain, digital multi-utility, end use, demand forecasting
Procedia PDF Downloads 1741192 Applying Theory of Self-Efficacy in Intelligent Transportation Systems by Potential Usage of Vehicle as a Sensor
Authors: Aby Nesan Raj, Sumil K. Raj, Sumesh Jayan
Abstract:
The objective of the study is to formulate a self-regulation model that shall enhance the usage of Intelligent Transportation Systems by understanding the theory of self-efficacy. The core logic of the self-regulation model shall monitor driver's behavior based on the situations related to the various sources of Self Efficacy like enactive mastery, vicarious experience, verbal persuasion and physiological arousal in addition to the vehicle data. For this study, four different vehicle data, speed, drowsiness, diagnostic data and surround camera views are considered. This data shall be given to the self-regulation model for evaluation. The oddness, which is the output of self-regulation model, shall feed to Intelligent Transportation Systems where appropriate actions are being taken. These actions include warning to the user as well as the input to the related transportation systems. It is also observed that the usage of vehicle as a sensor reduces the wastage of resource utilization or duplication. Altogether, this approach enhances the intelligence of the transportation systems especially in safety, productivity and environmental performance.Keywords: emergency management, intelligent transportation system, self-efficacy, traffic management
Procedia PDF Downloads 2491191 Digital Transformation in Fashion System Design: Tools and Opportunities
Authors: Margherita Tufarelli, Leonardo Giliberti, Elena Pucci
Abstract:
The fashion industry's interest in virtuality is linked, on the one hand, to the emotional and immersive possibilities of digital resources and the resulting languages and, on the other, to the greater efficiency that can be achieved throughout the value chain. The interaction between digital innovation and deep-rooted manufacturing traditions today translates into a paradigm shift for the entire fashion industry where, for example, the traditional values of industrial secrecy and know-how give way to experimentation in an open as well as participatory way, and the complete emancipation of virtual reality from actual 'reality'. The contribution aims to investigate the theme of digitisation in the Italian fashion industry, analysing its opportunities and the criticalities that have hindered its diffusion. There are two reasons why the most common approach in the fashion sector is still analogue: (i) the fashion product lives in close contact with the human body, so the sensory perception of materials plays a central role in both the use and the design of the product, but current technology is not able to restore the sense of touch; (ii) volumes are obtained by stitching flat surfaces that once assembled, given the flexibility of the material, can assume almost infinite configurations. Managing the fit and styling of virtual garments involves a wide range of factors, including mechanical simulation, collision detection, and user interface techniques for garment creation. After briefly reviewing some of the salient historical milestones in the resolution of problems related to the digital simulation of deformable materials and the user interface for the procedures for the realisation of the clothing system, the paper will describe the operation and possibilities offered today by the latest generation of specialised software. Parametric avatars and digital sartorial approach; drawing tools optimised for pattern making; materials both from the point of view of simulated physical behaviour and of aesthetic performance, tools for checking wearability, renderings, but also tools and procedures useful to companies both for dialogue with prototyping software and machinery and for managing the archive and the variants to be made. The article demonstrates how developments in technology and digital procedures now make it possible to intervene in different stages of design in the fashion industry. An integrated and additive process in which the constructed 3D models are usable both in the prototyping and communication of physical products and in the possible exclusively digital uses of 3D models in the new generation of virtual spaces. Mastering such tools requires the acquisition of specific digital skills and, at the same time, traditional skills for the design of the clothing system, but the benefits are manifold and applicable to different business dimensions. We are only at the beginning of the global digital transformation: the emergence of new professional figures and design dynamics leaves room for imagination, but in addition to applying digital tools to traditional procedures, traditional fashion know-how needs to be transferred into emerging digital practices to ensure the continuity of the technical-cultural heritage beyond the transformation.Keywords: digital fashion, digital technology and couture, digital fashion communication, 3D garment simulation
Procedia PDF Downloads 781190 Mobile Application Set to Empower SME Farmers in Peri-Urban Sydney Region
Authors: A. Hol
Abstract:
Even in the well developed countries like Australia, Small to Medium Farmers do not often have the power over the market prices as they are more often than not set by the farming agents. This in turn creates problems as farmers only get to know for how much their produce has been sold for by the agents three to four weeks after the sale has taken the place. To see and identify if and how peri-urban Sydney farmers could be assisted, carefully selected group of peri-urban Sydney farmers of the stone fruit has been interviewed. Following the case based interviews collected data was analyzed in detail using the Scenario Based Transformation principles. Analyzed data was then used to create a most common transformation case. The case identified that a mobile web based system could be develop so that framers can monitor agent earnings and in turn gain more power over the markets. It is expected that after the system has been in action for six months to a year, farmers will become empowered and they will gain means to monitor the market and negotiate agent prices.Keywords: mobile applications, farming, scenario-based analysis, scenario-based transformation, user empowerment
Procedia PDF Downloads 3841189 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak
Authors: Andrei Bogdan Stanescu, Laura Diaconescu
Abstract:
With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.Keywords: identity and access management, passwordless authentication, privacy, zero-trust security
Procedia PDF Downloads 931188 Generative AI: A Comparison of Conditional Tabular Generative Adversarial Networks and Conditional Tabular Generative Adversarial Networks with Gaussian Copula in Generating Synthetic Data with Synthetic Data Vault
Authors: Lakshmi Prayaga, Chandra Prayaga. Aaron Wade, Gopi Shankar Mallu, Harsha Satya Pola
Abstract:
Synthetic data generated by Generative Adversarial Networks and Autoencoders is becoming more common to combat the problem of insufficient data for research purposes. However, generating synthetic data is a tedious task requiring extensive mathematical and programming background. Open-source platforms such as the Synthetic Data Vault (SDV) and Mostly AI have offered a platform that is user-friendly and accessible to non-technical professionals to generate synthetic data to augment existing data for further analysis. The SDV also provides for additions to the generic GAN, such as the Gaussian copula. We present the results from two synthetic data sets (CTGAN data and CTGAN with Gaussian Copula) generated by the SDV and report the findings. The results indicate that the ROC and AUC curves for the data generated by adding the layer of Gaussian copula are much higher than the data generated by the CTGAN.Keywords: synthetic data generation, generative adversarial networks, conditional tabular GAN, Gaussian copula
Procedia PDF Downloads 871187 Psychoanalytical Foreshadowing: The Application of a Literary Device in Quranic Narratology
Authors: Fateme Montazeri
Abstract:
Literary approaches towards the text of the Quran predate the modern period. Suyuti (d.1505)’s encyclopedia of Quranic sciences, Al-Itqan, provides a notable example. In the modern era, the study of the Quranic rhetorics received particular attention in the second half of the twentieth century by Egyptian scholars. Amin Al-Khouli (d. 1966), who might be considered the first to argue for the necessity of applying a literary-rhetorical lens toward the tafseer, Islamic exegesis, and his students championed the literary analysis as the most effective approach to the comprehension of the holy text. Western scholars continued the literary criticism of the Islamic scripture by applying to the Quran similar methodologies used in biblical studies. In the history of the literary examination of the Quran, the scope of the critical methods applied to the Quranic text has been limited. For, the rhetorical approaches to the Quran, in the premodern as well as the modern period, concerned almost exclusively with the lexical layer of the text, leaving the narratological dimensions insufficiently examined. Recent contributions, by Leyla Ozgur Alhassen, for instance, attempt to fill this lacunae. This paper aims at advancing the studies of the Quranic narratives by investigating the application of a literary device whose role in the Quranic stories remains unstudied, that is, “foreshadowing.” This paper shall focus on Chapter 12, “Surah al-Yusuf,” as its case study. Chapter 12, the single chapter that includes the story of Joseph in one piece, contains several instances in which the events of the story are foreshadowed. As shall be discussed, foreshadowing occurs either through a monolog or dialogue whereby one or more of the characters allude to the future happenings or through the manner in which the setting is described. Through a close reading of the text, it will be demonstrated that the usage of the rhetorical tool of foreshadowing meets a dual purpose: on the one hand, foreshadowing prepares the reader/audience for the upcoming events in the plot, and on the other hand, it highlights the psychological dimensions of the characters, their thoughts, intentions, and disposition. In analyzing the story, this study shall draw on psychoanalytical criticism to explore the layers of meanings embedded in the Quranic narrative that are unfolded through foreshadowing.Keywords: foreshadowing, quranic narrative, literary criticism, surah yusuf
Procedia PDF Downloads 1581186 Installing Cloud Computing Model for E-Businesses in Small Organizations
Authors: Khader Titi
Abstract:
Information technology developments have changed the way how businesses are working. Organizations are required to become visible online and stay connected to take advantages of costs reduction and improved operation of existing resources. The approval and the application areas of the cloud computing has significantly increased since it was presented by Google in 2007. Internet Cloud computing has attracted the IT enterprise attention especially the e-business enterprise. At this time, there is a great issue of environmental costs during the enterprises apply the e- business, but with the coming of cloud computing, most of the problem will be solved. Organizations around the world are facing with the continued budget challenges and increasing in the size of their computational data so, they need to find a way to deliver their services to clients as economically as possible without negotiating the achievement of anticipated outcomes. E- business companies need to provide better services to satisfy their clients. In this research, the researcher proposed a paradigm that use and deploy cloud computing technology environment to be used for e-business in small enterprises. Cloud computing might be a suitable model for implementing e-business and e-commerce architecture to improve efficiency and user satisfaction.Keywords: E-commerce, cloud computing, B2C, SaaS
Procedia PDF Downloads 3201185 Enhancing Rural Agricultural Value Chains through Electric Mobility Services in Ethiopia
Authors: Clemens Pizzinini, Philipp Rosner, David Ziegler, Markus Lienkamp
Abstract:
Transportation is a constitutional part of most supply and value chains in modern economies. Smallholder farmers in rural Ethiopia face severe challenges along their supply and value chains. In particular, suitable, affordable, and available transport services are in high demand. To develop a context-specific technical solutions, a problem-to-solution methodology based on the interaction with technology is developed. With this approach, we fill the gap between proven transportation assessment frameworks and general user-centered techniques. Central to our approach is an electric test vehicle that is implemented in rural supply and value chains for research, development, and testing. Based on our objective and the derived methodological requirements, a set of existing methods is selected. Local partners are integrated into an organizational framework that executes major parts of this research endeavour in the Arsi Zone, Oromia Region, Ethiopia.Keywords: agricultural value chain, participatory methods, agile methods, sub-Saharan Africa, Ethiopia, electric vehicle, transport service
Procedia PDF Downloads 781184 Deep Learning-Based Channel Estimation for RIS-Assisted Unmanned Aerial Vehicle-Enabled Wireless Communication System
Authors: Getaneh Berie Tarekegn
Abstract:
Wireless communication via unmanned aerial vehicles (UAVs) has drawn a great deal of attention due to its flexibility in establishing line-of-sight (LoS) communications. However, in complex urban and dynamic environments, the movement of UAVs can be blocked by trees and high-rise buildings that obstruct directional paths. With reconfigurable intelligent surfaces (RIS), this problem can be effectively addressed. To achieve this goal, accurate channel estimation in RIS-assisted UAV-enabled wireless communications is crucial. This paper proposes an accurate channel estimation model using long short-term memory (LSTM) for a multi-user RIS-assisted UAV-enabled wireless communication system. According to simulation results, LSTM can improve the channel estimation performance of RIS-assisted UAV-enabled wireless communication.Keywords: channel estimation, reconfigurable intelligent surfaces, long short-term memory, unmanned aerial vehicles
Procedia PDF Downloads 621183 The Role of Women in Criminal Organizations
Authors: Rossella Marzullo
Abstract:
Family plays a central role in the Calabrian criminal organization, which draws its strength from blood ties and gender stereotypes that still impose a strong verticalization of intra-family relationships for the benefit of men. However, female figures are of great importance in the organizational structure of the 'Ndrangheta families, despite the fact that they appear to be formally suffocated by the culture of gender subordination still strongly present in the archaic world of criminal organizations. And this is so much true that over time, the women of the 'Ndrangheta have added to the function of ‘internal containment’, the increasingly explicit function of intermediaries in the ‘external’ activities of the clan. But what happens in the 'Ndrangheta if women break the bond and decide to speak? The results are shocking. When a woman starts talking to ask the institutions for help, the system ‘goes crazy’, because the woman is considered the means of consolidating and transmitting family codes: she educates, forges, holds the structure together. If a woman from the 'Ndrangheta decides to speak out and get out of the family bottlenecks of the clan, she does not exclusively destroy the family; she destroys the system. This happens because, while not playing the same roles as men within organizations, women carry out support activities as intermediaries for the circulation of communications, thus ensuring the operability of the gang in practice and on a daily basis. Crossing the border means breaking the bonds of belonging, thus questioning one's own identity and reconstructing it according to other points of reference. How much these disruptive choices are feared by the men of the 'Ndrangheta has been seen in the dramatic stories of Lea Garofalo and Maria Concetta Cacciola: the fear of the breaking of the family pact, of the earthquake that arises from within, has marked their fate of death, useful both to stop the judicial action and to recompose the organization's estate under the aegis of terror. With physical, psychological violence, underhanded torture, and moral blackmail, the men of the mafia family tried to heal the shock caused by the voices of women, relying on violence and yet another attempt to subordinate them. This proves that the 'Ndrangheta is really afraid of them. The female voices of the 'Ndrangheta, who have shaken a consolidated and considered intangible system, represent the anti-'ndrangheta par excellence; in their choices, there is an even stronger desire to break with the mafia world.Keywords: families, gender, ‘Ndrangheta, stereotypes
Procedia PDF Downloads 1191182 The Use of Learning Management Systems during Emerging the Tacit Knowledge
Authors: Ercan Eker, Muhammer Karaman, Akif Aslan, Hakan Tanrikuluoglu
Abstract:
Deficiency of institutional memory and knowledge management can result in information security breaches, loss of prestige and trustworthiness and the worst the loss of know-how and institutional knowledge. Traditional learning management within organizations is generally handled by personal efforts. That kind of struggle mostly depends on personal desire, motivation and institutional belonging. Even if an organization has highly motivated employees at a certain time, the institutional knowledge and memory life cycle will generally remain limited to these employees’ spending time in this organization. Having a learning management system in an organization can sustain the institutional memory, knowledge and know-how in the organization. Learning management systems are much more needed especially in public organizations where the job rotation is frequently seen and managers are appointed periodically. However, a learning management system should not be seen as an organizations’ website. It is a more comprehensive, interactive and user-friendly knowledge management tool for organizations. In this study, the importance of using learning management systems in the process of emerging tacit knowledge is underlined.Keywords: knowledge management, learning management systems, tacit knowledge, institutional memory
Procedia PDF Downloads 3841181 The Impact of ChatGPT on the Healthcare Domain: Perspectives from Healthcare Majors
Authors: Su Yen Chen
Abstract:
ChatGPT has shown both strengths and limitations in clinical, educational, and research settings, raising important concerns about accuracy, transparency, and ethical use. Despite an improved understanding of user acceptance and satisfaction, there is still a gap in how general AI perceptions translate into practical applications within healthcare. This study focuses on examining the perceptions of ChatGPT's impact among 266 healthcare majors in Taiwan, exploring its implications for their career development, as well as its utility in clinical practice, medical education, and research. By employing a structured survey with precisely defined subscales, this research aims to probe the breadth of ChatGPT's applications within healthcare, assessing both the perceived benefits and the challenges it presents. Additionally, to further enhance the comprehensiveness of our methodology, we have incorporated qualitative data collection methods, which provide complementary insights to the quantitative findings. The findings from the survey reveal that perceptions and usage of ChatGPT among healthcare majors vary significantly, influenced by factors such as its perceived utility, risk, novelty, and trustworthiness. Graduate students and those who perceive ChatGPT as more beneficial and less risky are particularly inclined to use it more frequently. This increased usage is closely linked to significant impacts on personal career development. Furthermore, ChatGPT's perceived usefulness and novelty contribute to its broader impact within the healthcare domain, suggesting that both innovation and practical utility are key drivers of acceptance and perceived effectiveness in professional healthcare settings. Trust emerges as an important factor, especially in clinical settings where the stakes are high. The trust that healthcare professionals place in ChatGPT significantly affects its integration into clinical practice and influences outcomes in medical education and research. The reliability and practical value of ChatGPT are thus critical for its successful adoption in these areas. However, an interesting paradox arises with regard to the ease of use. While making ChatGPT more user-friendly is generally seen as beneficial, it also raises concerns among users who have lower levels of trust and perceive higher risks associated with its use. This complex interplay between ease of use and safety concerns necessitates a careful balance, highlighting the need for robust security measures and clear, transparent communication about how AI systems work and their limitations. The study suggests several strategic approaches to enhance the adoption and integration of AI in healthcare. These include targeted training programs for healthcare professionals to increase familiarity with AI technologies, reduce perceived risks, and build trust. Ensuring transparency and conducting rigorous testing are also vital to foster trust and reliability. Moreover, comprehensive policy frameworks are needed to guide the implementation of AI technologies, ensuring high standards of patient safety, privacy, and ethical use. These measures are crucial for fostering broader acceptance of AI in healthcare, as the study contributes to enriching the discourse on AI's role by detailing how various factors affect its adoption and impact.Keywords: ChatGPT, healthcare, survey study, IT adoption, behaviour, applcation, concerns
Procedia PDF Downloads 361180 Agile Software Development Implementation in Developing a Diet Tracker Mobile Application
Authors: Dwi Puspita Sari, Gulnur Baltabayeva, Nadia Salman, Maxut Toleuov, Vijay Kanabar
Abstract:
Technology era drives people to use mobile phone to support their daily life activities. Technology development has a rapid phase which pushes the IT company to adjust any technology changes in order to fulfill customer’s satisfaction. As a result of that, many companies in the USA emerged from systematics software development approach to agile software development approach in developing systems and applications to develop many mobile phone applications in a short phase to fulfill user’s needs. As a systematic approach is considered as time consuming, costly, and too risky, agile software development has become a more popular approach to use for developing software including mobile applications. This paper reflects a short-term project to develop a diet tracker mobile application using agile software development that focused on applying scrum framework in the development process.Keywords: agile software development, scrum, diet tracker, mobile application
Procedia PDF Downloads 2581179 The Impact of Gamification on Self-Assessment for English Language Learners in Saudi Arabia
Authors: Wala A. Bagunaid, Maram Meccawy, Arwa Allinjawi, Zilal Meccawy
Abstract:
Continuous self-assessment becomes crucial in self-paced online learning environments. Students often depend on themselves to assess their progress; which is considered an essential requirement for any successful learning process. Today’s education institutions face major problems around student motivation and engagement. Thus, personalized e-learning systems aim to help and guide the students. Gamification provides an opportunity to help students for self-assessment and social comparison with other students through attempting to harness the motivational power of games and apply it to the learning environment. Furthermore, Open Social Student Modeling (OSSM) as considered as the latest user modeling technologies is believed to improve students’ self-assessment and to allow them to social comparison with other students. This research integrates OSSM approach and gamification concepts in order to provide self-assessment for English language learners at King Abdulaziz University (KAU). This is achieved through an interactive visual representation of their learning progress.Keywords: e-learning system, gamification, motivation, social comparison, visualization
Procedia PDF Downloads 1561178 Specified Human Motion Recognition and Unknown Hand-Held Object Tracking
Authors: Jinsiang Shaw, Pik-Hoe Chen
Abstract:
This paper aims to integrate human recognition, motion recognition, and object tracking technologies without requiring a pre-training database model for motion recognition or the unknown object itself. Furthermore, it can simultaneously track multiple users and multiple objects. Unlike other existing human motion recognition methods, our approach employs a rule-based condition method to determine if a user hand is approaching or departing an object. It uses a background subtraction method to separate the human and object from the background, and employs behavior features to effectively interpret human object-grabbing actions. With an object’s histogram characteristics, we are able to isolate and track it using back projection. Hence, a moving object trajectory can be recorded and the object itself can be located. This particular technique can be used in a camera surveillance system in a shopping area to perform real-time intelligent surveillance, thus preventing theft. Experimental results verify the validity of the developed surveillance algorithm with an accuracy of 83% for shoplifting detection.Keywords: Automatic Tracking, Back Projection, Motion Recognition, Shoplifting
Procedia PDF Downloads 3361177 Road Safety and Accident Prevention in Third World Countries: A Case Study of NH-7 in India
Authors: Siddegowda, Y. A. Sathish, G. Krishnegowda, T. M. Mohan Kumar
Abstract:
Road accidents are a human tragedy. They involve high human suffering and monetary costs in terms of untimely death, injuries and social problems. India had earned the dubious distinction of having more number of fatalities due to road accidents in the world. Road safety is emerging as a major social concern around the world especially in India because of infrastructure project works. A case study was taken on NH – 07 which connects to various major cities and industries. The study shows that major cases of fatalities are due to bus, trucks and high speed vehicles. The main causes of accidents are due to high density, non-restriction of speed, use of mobile phones, lack of board signs on road parking, visibility restriction, improper geometric design, road use characteristics, environmental aspects, social aspects etc. Data analysis and preventive measures are enlightened in this paper.Keywords: accidents, environmental aspects, fatalities, geometric design, road user characteristics
Procedia PDF Downloads 2561176 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time
Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl
Abstract:
In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.Keywords: SQL injection, attacks, web application, accuracy, database
Procedia PDF Downloads 1571175 Welcome to 'Almanya': Effects of Displacement among Refugee Women
Authors: Carmen Nechita
Abstract:
This research explores the world of Syrian refugee women living in Dresden and their efforts to reconstruct their lives in the state of Saxony in Germany. The focus is on the initial period of adjustment and understanding how refugee women use culture, family ties, and tradition to contest and rebuild new relationships with the host country. Faced with a new status as “the refugee”, women have to re-imagine their ethno-cultural identity in order to cope with life in Diaspora. In order to understand the coping mechanism and the displacement effects on Syrian women, interviews with twelve refugee women were conducted. Traumatic experiences of loss and oppression are at the core of their confessions. While gender violence, abuse and patriarchal framework shape their narratives, this research argues that there is a need to look at this from a cultural perspective and try to distance ourselves from the western paradigm. The way Syrian women refute and rebuild their national and ethno-cultural identity in order to negotiate for themselves new space within German borders is explored. Two discourses are bridged: one of multiculturalism and one of tradition in order to explain how Syrian women experience western notions of family, womanhood and spousal dynamics. The process is painful, traumatic and marked by feelings of low self-worth, but in the end, new codes emerge and these women come out more empowered. The paper includes the migration experience and explores the ways in which Syrian refugee women tend to tell their complex stories, and how they reconstruct their identity in a new territory while faced with a different culture that discriminates against them. During the research, four distinct phases in the acculturation period were identified: “the survival”, “the honeymoon period”, “the isolation period” and “the anger period”. Each phase is analyzed in order to understand what triggers them, how women migrate from one phase to another and what can be done to make the process easier. This paper contributes to the field of refugee studies by offering a thorough understanding of the initial phases of the acculturation process in the case of Syrian refugee women. The study examines the fleeing and settlement experience in order to understand the complex ways that refugee women cope with the traumatic experience of settlement in another country and in a different culture. *Almanya: The Arabic word for Germany.Keywords: displacement, migration, refugee women, Syria
Procedia PDF Downloads 2601174 Santo Niño in Canada: Religion, Migration, and the Filipino Underside
Authors: Alison Marshall
Abstract:
“Santo Niño in Canada – Religion, Migration, and the Filipino Underside” seeks to explore the intersection of religion, migration and the Filipino underside through research participant narratives, archival research, and fieldwork on the cult of Santo Niño in Canada. Santo Niño is the single most revered saint in Filipino religiosity. According to popular lore, the original statue of Santo Niño was brought to the Philippines by Portuguese explorer Ferdinand Magellan in 1521, who claimed the islands on behalf of Spain. While Santo Niño is meant to be a manifestation of Jesus as a child, in Filipino thought and culture he very much resembles pre-Hispanic spirits, as well as patron saints introduced by the Spanish. Santo Niño shrines appear in churches, restaurants, businesses, and homes throughout the diaspora suggesting that he was much more than a Catholic image. He represents a deity who often shares a business or home shrine with non-Christian statues such as lucky cats, the Buddha, Guanyin, and Guangong, and sometimes the Chinese God of the Earth. He represents how Christian culture has been refashioned through indigenous, Chinese, Malay, and Indonesian influences. He embodies the religious superstructure that defines Christian piety and habits. On the one hand, he stands for Jesus, a pious son of God, and yet, on the other hand, he can be a simple vindictive child who punishes those who ignore him. Santo Niño is a complex character linked to the past before Christianity. As Filipinos engage with Santo Niño in Canada, they connect to him as Jesus, the son of God. They are also connecting to a childlike figure who sometimes uses his spiritual power to punish. A hybrid figure who comes came into being at the beginning of the Spanish colonial moment, he is maintained throughout the American one and continues to be a powerful reminder of Filipino identity and resilience when people leave the Philippines for migrant work. As this paper argues, Santo Niño beliefs, practices, and stories unite people in the diaspora regardless of language, gender, or nation. Santo Niño enables one to think about and understand what it means to be Filipino and living migrant lives in the diaspora today. In this way, the cult of Santo Niño expresses both Catholic orthodoxy and the heterodox Filipino underside that includes the use of magical amulets, healing, visions, and spirit mediumship.Keywords: ethnography, migration, Philippines, religion
Procedia PDF Downloads 2331173 Gamification Using Stochastic Processes: Engage Children to Have Healthy Habits
Authors: Andre M. Carvalho, Pedro Sebastiao
Abstract:
This article is based on a dissertation that intends to analyze and make a model, intelligently, algorithms based on stochastic processes of a gamification application applied to marketing. Gamification is used in our daily lives to engage us to perform certain actions in order to achieve goals and gain rewards. This strategy is an increasingly adopted way to encourage and retain customers through game elements. The application of gamification aims to encourage children between 6 and 10 years of age to have healthy habits and the purpose of serving as a model for use in marketing. This application was developed in unity; we implemented intelligent algorithms based on stochastic processes, web services to respond to all requests of the application, a back-office website to manage the application and the database. The behavioral analysis of the use of game elements and stochastic processes in children’s motivation was done. The application of algorithms based on stochastic processes in-game elements is very important to promote cooperation and to ensure fair and friendly competition between users which consequently stimulates the user’s interest and their involvement in the application and organization.Keywords: engage, games, gamification, randomness, stochastic processes
Procedia PDF Downloads 3341172 Leveraging Digital Cyber Technology for Self-Care and Improved Management of DMPA-SC Clients
Authors: Oluwaseun Adeleke, Grace Amarachi Omenife, Jennifer Adebambo, Mopelola Raji, Anthony Nwala, Mogbonjubade Adesulure
Abstract:
Introduction: The incorporation of digital technology in healthcare systems is instrumental in transforming the delivery, management, and overall experience of healthcare and holds the potential to scale up access through over 200 million active mobile phones used in Nigeria. Digital tools enable increased access to care, stronger client engagement, progress in research and data-driven insights, and more effective promotion of self-care and do-it-yourself practices. The Delivering Innovation in Self-Care (DISC) project 2021 has played a pivotal role in granting women greater autonomy over their sexual and reproductive health (SRH) through a variety of approaches, including information and training to self-inject contraception (DMPA-SC). To optimize its outcomes, the project also leverages digital technology platforms like social media: Facebook, Instagram, and Meet Tina (Chatbot) via WhatsApp, Customer Relationship Management (CRM) applications Freshworks, and Viamo. Methodology: The project has been successful at optimizing in-person digital cyberspace interaction to sensitize individuals effectively about self-injection and provide linkages to SI services. This platform employs the Freshworks CRM software application, along with specially trained personnel known as Cyber IPC Agents and DHIS calling centers. Integration of Freshworks CRM software with social media allows a direct connection with clients to address emerging issues, schedule follow-ups, send reminders to improve compliance with self-injection schedules, enhance the overall user experience for self-injection (SI) clients, and generate comprehensive reports and analytics on client interactions. Interaction covers a range of topics, including – How to use SI, learning more about SI, side-effects and its management, accessing services, fertility, ovulation, other family planning methods, inquiries related to Sexual Reproductive Health as well as uses an address log to connect them with nearby facilities or online pharmaceuticals. Results: Between the months of March to September, a total of 5,403 engagements were recorded. Among these, 4,685 were satisfactorily resolved. Since the program's inception, digital advertising has created 233,633,075 impressions, reached 12,715,582 persons, and resulted in 3,394,048 clicks. Conclusion: Leveraging digital technology has proven to be an invaluable tool in client management and improving client experience. The use of Cyber technology has enabled the successful development and maintenance of client relationships, which have been effective at providing support, facilitating delivery and compliance with DMPA-SC self-injection services, and ensuring overall client satisfaction. Concurrently, providing qualitative data, including user experience feedback, has enabled the derivation of crucial insights that inform the decision-making process and guide in normalizing self-care behavior.Keywords: selfcare, DMPA-SC self-injection, digital technology, cyber technology, freshworks CRM software
Procedia PDF Downloads 711171 Topic Modelling Using Latent Dirichlet Allocation and Latent Semantic Indexing on SA Telco Twitter Data
Authors: Phumelele Kubheka, Pius Owolawi, Gbolahan Aiyetoro
Abstract:
Twitter is one of the most popular social media platforms where users can share their opinions on different subjects. As of 2010, The Twitter platform generates more than 12 Terabytes of data daily, ~ 4.3 petabytes in a single year. For this reason, Twitter is a great source for big mining data. Many industries such as Telecommunication companies can leverage the availability of Twitter data to better understand their markets and make an appropriate business decision. This study performs topic modeling on Twitter data using Latent Dirichlet Allocation (LDA). The obtained results are benchmarked with another topic modeling technique, Latent Semantic Indexing (LSI). The study aims to retrieve topics on a Twitter dataset containing user tweets on South African Telcos. Results from this study show that LSI is much faster than LDA. However, LDA yields better results with higher topic coherence by 8% for the best-performing model represented in Table 1. A higher topic coherence score indicates better performance of the model.Keywords: big data, latent Dirichlet allocation, latent semantic indexing, telco, topic modeling, twitter
Procedia PDF Downloads 156