Search results for: user stories
1140 Numerical Analysis of Fire Performance of Timber Structures
Authors: Van Diem Thi, Mourad Khelifa, Mohammed El Ganaoui, Yann Rogaume
Abstract:
An efficient numerical method has been developed to incorporate the effects of heat transfer in timber panels on partition walls exposed to real building fires. The procedure has been added to the software package Abaqus/Standard as a user-defined subroutine (UMATHT) and has been verified using both time-and spatially dependent heat fluxes in two- and three-dimensional problems. The aim is to contribute to the development of simulation tools needed to assist structural engineers and fire testing laboratories in technical assessment exercises. The presented method can also be used under the developmental stages of building components to optimize performance in real fire conditions. The accuracy of the used thermal properties and the finite element models was validated by comparing the predicted results with three different available fire tests in literature. It was found that the model calibrated to results from standard fire conditions provided reasonable predictions of temperatures within assemblies exposed to real building fire.Keywords: Timber panels, heat transfer, thermal properties, standard fire tests
Procedia PDF Downloads 3461139 Clustering Performance Analysis using New Correlation-Based Cluster Validity Indices
Authors: Nathakhun Wiroonsri
Abstract:
There are various cluster validity measures used for evaluating clustering results. One of the main objectives of using these measures is to seek the optimal unknown number of clusters. Some measures work well for clusters with different densities, sizes and shapes. Yet, one of the weaknesses that those validity measures share is that they sometimes provide only one clear optimal number of clusters. That number is actually unknown and there might be more than one potential sub-optimal option that a user may wish to choose based on different applications. We develop two new cluster validity indices based on a correlation between an actual distance between a pair of data points and a centroid distance of clusters that the two points are located in. Our proposed indices constantly yield several peaks at different numbers of clusters which overcome the weakness previously stated. Furthermore, the introduced correlation can also be used for evaluating the quality of a selected clustering result. Several experiments in different scenarios, including the well-known iris data set and a real-world marketing application, have been conducted to compare the proposed validity indices with several well-known ones.Keywords: clustering algorithm, cluster validity measure, correlation, data partitions, iris data set, marketing, pattern recognition
Procedia PDF Downloads 1061138 Exploring the Situational Approach to Decision Making: User eConsent on a Health Social Network
Authors: W. Rowan, Y. O’Connor, L. Lynch, C. Heavin
Abstract:
Situation Awareness can offer the potential for conscious dynamic reflection. In an era of online health data sharing, it is becoming increasingly important that users of health social networks (HSNs) have the information necessary to make informed decisions as part of the registration process and in the provision of eConsent. This research aims to leverage an adapted Situation Awareness (SA) model to explore users’ decision making processes in the provision of eConsent. A HSN platform was used to investigate these behaviours. A mixed methods approach was taken. This involved the observation of registration behaviours followed by a questionnaire and focus group/s. Early results suggest that users are apt to automatically accept eConsent, and only later consider the long-term implications of sharing their personal health information. Further steps are required to continue developing knowledge and understanding of this important eConsent process. The next step in this research will be to develop a set of guidelines for the improved presentation of eConsent on the HSN platform.Keywords: eConsent, health social network, mixed methods, situation awareness
Procedia PDF Downloads 2981137 Deep Learning-Based Channel Estimation for Reconfigurable Intelligent Surface-Assisted Unmanned Aerial Vehicle-Enabled Wireless Communication System
Authors: Getaneh Berie Tarekegn
Abstract:
Wireless communication via unmanned aerial vehicles (UAVs) has drawn a great deal of attention due to its flexibility in establishing line-of-sight (LoS) communications. However, in complex urban and dynamic environments, the movement of UAVs can be blocked by trees and high-rise buildings that obstruct directional paths. With reconfigurable intelligent surfaces (RIS), this problem can be effectively addressed. To achieve this goal, accurate channel estimation in RIS-assisted UAV-enabled wireless communications is crucial. This paper proposes an accurate channel estimation model using long short-term memory (LSTM) for a multi-user RIS-assisted UAV-enabled wireless communication system. According to simulation results, LSTM can improve the channel estimation performance of RIS-assisted UAV-enabled wireless communication.Keywords: channel estimation, reconfigurable intelligent surfaces, long short-term memory, unmanned aerial vehicles
Procedia PDF Downloads 1211136 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes
Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi
Abstract:
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing
Procedia PDF Downloads 3111135 Institutional Repository ePrints at Indian Institute of Science: A Special Reference to JRD Tata Memorial Library, Bangalore, India
Authors: Nagarjuna Pitty
Abstract:
Over the past decade there has been substantial progress in the usage of ePrints resources national and international research community. JRD Tata Memorial Library has hosting for the web based ePrints services and maintenance to online user community. This paper provides an overview how to share JRDTML experiences in using GNU EPrints.org software to create and maintain the open-access institutional repository of IISc, ePrints@IISc. This paper states that the GNU EPrints.org is the first generic software for creating Open Access Initiative (OAI)-compliant repositories, which enables the researchers to self-archive their research publications thus facilitating open access to their publications. IISc has been using this software since early 2002. This paper tells that the GNU EPrints.org software is an excellent tool for creating and maintaining OAI-compliant repositories. It can be setup easily even by those who are not too much experts in computer. In this paper, author is sharing JRDTML experiences in using GNU ePrints.org software.Keywords: digital library, open access initiative, scholarly publications, institutional repository, ePrints@IISc
Procedia PDF Downloads 5611134 Public Opinion Polls as an Instrument of Propaganda of the Invasion of Ukraine
Authors: Daria Lozovskaia
Abstract:
This paper is focused on the news coverage of public opinion polls about Russian full-scale invasion of Ukraine in Russian state-controlled media. After the announcement of the start of the so-called “Special Military Operation” on February 24, 2022, the number of publications of the results of public opinion polls increased many times over, and the poll numbers began to be discussed on social media and in the Kremlin’s official informational agenda. Headlines like "72 Percent of Russian Citizens Support the Operation " or "Russians Believe in Victory in the Special Military Operation" have become prominent parts of Russian state propaganda news stories and newspapers. At the same time, public opinion in Russia, as a concept and model, differs from the generally accepted democratic concept and has its own specifics. As a result, public opinion polls and their results, especially after February 24, have a number of features in the form of the dominance of the discourse of political elites in the media, which leads to a decrease in public awareness, the prevalence of the effect of joining the majority and a high number of non-responses due to fear of reprisals. The aim of this study was to determine the role of public opinion polls in the system of Russian war propaganda in Ukraine. For this purpose, were selected publications of the Russian media, the agenda of which corresponds to the official information policy of the Russian authorities. First, using frame analysis for the categories "Explicit trust", "Implicit trust", "Implicit distrust" and "Explicit distrust", provided by Irina Dusakova, the broadcast level of trust in the data of public opinion polls was determined. The results of this phase of the study showed that the Russian media broadcast an absolute level of confidence in public opinion polls regarding support for the war in Ukraine. The second stage of the study was the content analysis of publications. The categories of this analysis were derived from Anna Morelli's 10 Principles of Military Propaganda and Haavard Koppang's Definition of Propaganda to determine the purposes of the use of public opinion polls by Russian propaganda. The results of the study not only confirmed the widespread hypothesis that public opinion polls in Russia are used as a tool of state propaganda, but also showed that their purpose is to demonstrate the consolidation of society in support of the war and President Vladimir Putin.Keywords: propaganda, public opinion, public opinion polls, Russian studies
Procedia PDF Downloads 801133 Narrative Research in Secondary Teacher Education: Examining the Self-Efficacy of Content Area Teacher Candidates
Authors: Tiffany Karalis Noel
Abstract:
The purpose of this study was to examine the factors attributed to the self-efficacy of beginning secondary content area teachers as they moved through their student teaching experiences. This study used a narrative inquiry methodology to understand the variables attributed to teacher self-efficacy among a group of secondary content area teacher candidates. The primary purpose of using a narrative inquiry methodology was to share the stories of content area teacher candidates’ student teaching experiences. Focused research questions included: (1) To what extent does teacher education preparation affect the self-efficacy of beginning content area teachers? (2) Which recurrent elements of teacher education affect the self-efficacy of beginning teachers, regardless of content area? (3) How do the findings from research questions 1 and 2 inform teacher educators? The findings of this study suggest that teacher education preparation affects the self-efficacy of beginning secondary teacher candidates across the content areas; accordingly, the findings of this study provide insight for teacher educators to consider the areas where teacher education programs are failing to provide adequate preparation. These teacher candidates emphasized the value of adequate preparation throughout their teacher education programs to help inform their student teaching experiences. In order to feel effective and successful as beginning teachers, these teacher candidates required additional opportunities to apply the practical application of their teaching skills prior to the student teaching experience, the incorporation of classroom management strategy coursework into their curriculum, and opportunities to explore the extensive demands of the teaching profession ranging from time management to dealing with difficult parents, to name a few referenced examples. The teacher candidates experienced feelings of self-doubt related to their effectiveness as teachers when they were unable to employ successful classroom management strategies, pedagogical techniques, or even feel confidence in navigating challenging conversations with students, parents, and/or administrators. In order to help future teacher candidates and beginning teachers in general overcome these barriers, additional coursework, fieldwork, and practical application experiences should be provided in teacher education programs to help boost the self-efficacy of student teachers.Keywords: self-efficacy, teacher efficacy, secondary preservice teacher education, teacher candidacy, student teaching
Procedia PDF Downloads 1561132 Realization of Wearable Inertial Measurement Units-Sensor-Fusion Harness to Control Therapeutic Smartphone Applications
Authors: Svilen Dimitrov, Manthan Pancholi, Norbert Schmitz, Didier Stricker
Abstract:
This paper presents the end-to-end development of a wearable motion sensing harness consisting of computational unit and four inertial measurement units to control three smartphone therapeutic games for children. The inertial data is processed in real time to obtain lower body motion information like knee raises, feet taps and squads. By providing a Wi-Fi connection interface the sensor harness acts wireless remote control for smartphone applications. By performing various lower body movements the users provoke corresponding game state changes. In contrary to the current similar offers, like Nintendo Wii Remote, Xbox Kinect and Playstation Move, this product, consisting of the sensor harness and the applications on top of it, are fully wearable, which means they do not rely on the user to be bound to concrete soft- or hardwareequipped space.Keywords: wearable harness, inertial measurement units, smartphone therapeutic games, motion tracking, lower-body activity monitoring
Procedia PDF Downloads 4071131 Pallet Tracking and Cost Optimization of the Flow of Goods in Logistics Operations by Serial Shipping Container Code
Authors: Dominika Crnjac Milic, Martina Martinovic, Vladimir Simovic
Abstract:
The case study method in this paper shows the implementation of Information Technology (IT) and the Serial Shipping Container Code (SSCC) in a Croatian company that deals with logistics operations and provides logistics services in the cold chain segment. This company is aware of the sensitivity of the goods entrusted to them by the user of the service, as well as of the importance of speed and accuracy in providing logistics services. To that end, it has implemented and used the latest IT to ensure the highest standard of high-quality logistics services to its customers. Looking for efficiency and optimization of supply chain management, while maintaining a high level of quality of the products that are sold, today's users of outsourced logistics services are open to the implementation of new IT products that ultimately deliver savings. By analysing the positive results and the difficulties that arise when using this technology, we aim to provide an insight into the potential of this approach of the logistics service provider.Keywords: logistics operations, serial shipping container code, information technology, cost optimization
Procedia PDF Downloads 3631130 In the Valley of the Shadow of Death: Gossip, God, and Scapegoating in Susannah, an American Opera by Carlisle Floyd
Authors: Shirl H. Terrell
Abstract:
In the telling of mythologies, stories of cultural and religious histories, the creative arts provide an archetypal lens through which the personal and collective unconscious are viewed, thus revealing mysteries of the unknown psyche. To that end, the author of this paper, using the hermeneutic approach, proves that Carlisle Floyd’s (1955) English language opera Susannah illuminates humanity’s instinctual nature and behaviors through music, libretto, and drama. While impressive musical works such as Wagner’s Ring Cycle and Webber’s Phantom of the Opera have received extensive Jungian analyses, critics and scholars often ignore lesser esteemed works, such as Susannah, notwithstanding the fact that they have been consistently performed on the theater circuit. Such pieces, when given notice, allow viewers to grasp the soul-making depth and timeless quality of productions which may otherwise go unrecognized as culturally or psychologically significant. Although Susannah has sometimes been described as unsophisticated and simple in scope, the author demonstrates why Floyd’s 'little' opera, set in New Hope Valley, Appalachia, a cultural region in the Eastern United States known for its prevailing myths and distortions of isolation, temperament, and the judgmentally conservative behavior of its inhabitants, belongs to opera’s hallmark works. Its approach to powerful underlying archetypal themes, which give rise to the poignant and haunting depictions of the darker and destructive side of the human soul, the Shadow, provides crucial significance to the work. The Shadow’s manifestation in the form of the scapegoating complex is central to the plot of Susannah; the church’s meting out of rules, judgment, and reparation for sins point to the foreboding aspects of human behavior that evoke their intrinsic nature. The scapegoating complex is highlighted in an eight-step process gleaned from the works of Kenneth Burke and Rene Girard. In summary, through depth psychological terms and mythological motifs, the author provides an insightful approach to perceiving instinctual behaviors as they play out in an American opera that has been staged over eight-hundred times, yet, unfortunately, remains in the shadows. Susannah’s timelessness is now.Keywords: archetypes, mythology, opera, scapegoating, Shadow, Susannah
Procedia PDF Downloads 1531129 Inclusive Design for Regaining Lost Identity: Accessible, Aesthetic and Effortless Clothing
Authors: S. Tandon, A. Oussoren
Abstract:
Clothing is a need for all humans. Besides serving the commonly understood function of protection, it also is a means of self-expression and adornment. However, most clothing for people with disabilities is developed to respond to their functional needs merely. Such clothing aggravates feelings of inadequacy and lowers their self-esteem. Investigations into apparel-related barriers faced by women with disabilities and their expectations and desires about clothing pointed to a huge void in terms of well-designed inclusive clothing. The incredible stories and experiences shared by the participants in this research highlighted the fact that people with disabilities wanted to feel, dress, and look at how they wanted to look by wearing what they wanted to wear. Clothing should be about self-expression – reflecting their moods, taste, and style and not limited to fulfilling merely their functional needs. Inclusive Design for Regaining Lost Identity was undertaken to design and develop accessible clothing that is inclusive and fashionable to foster psycho-social well-being and to enhance the self-esteem of women with disabilities. The research explored inclusive design solutions for the saree – a traditional Indian garment for women. The saree is an elaborate garment that requires precise draping, which makes the saree complicated to wear and inconvenient to carry, particularly for women with physical disabilities. For many women in India, the saree remains the customary dress, especially for work and occasions, yet minimal advancement has been made to enhance its accessibility and ease of use. The project followed a qualitative research approach whilst incorporating a combination of methods, which consisted of a questionnaire, an interview, and co-creation workshops. The research adhered to the principles of applied research such that the designed products aim to solve a problem that is functional and purposeful. In order to reduce the complications and to simplify the wrapping of the garment fabric around the body, different combinations of pre-stitching of the layers of the saree were created to investigate the outcomes. The technology of 3D drawing and printing was employed to develop feasible fasteners keeping in mind the participants’ movement limitations and to enhance their agency with these newly designed fasteners. The underlying principle of the project is that every individual should be able to access life the way they wish to and should not have to compromise their desires due to their disability.Keywords: accessibility, co-creation, design ethics, inclusive
Procedia PDF Downloads 1181128 An Adaptive Virtual Desktop Service in Cloud Computing Platform
Authors: Shuen-Tai Wang, Hsi-Ya Chang
Abstract:
Cloud computing is becoming more and more matured over the last few years and consequently the demands for better cloud services is increasing rapidly. One of the research topics to improve cloud services is the desktop computing in virtualized environment. This paper aims at the development of an adaptive virtual desktop service in cloud computing platform based on our previous research on the virtualization technology. We implement cloud virtual desktop and application software streaming technology that make it possible for providing Virtual Desktop as a Service (VDaaS). Given the development of remote desktop virtualization, it allows shifting the user’s desktop from the traditional PC environment to the cloud-enabled environment, which is stored on a remote virtual machine rather than locally. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for online cloud service. Users no longer need to burden the platform maintenances and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote desktop service represents the next significant step to the mobile workplace, and it lets users access their desktop environments from virtually anywhere.Keywords: cloud computing, virtualization, virtual desktop, VDaaS
Procedia PDF Downloads 2881127 Anomaly Detection with ANN and SVM for Telemedicine Networks
Authors: Edward Guillén, Jeisson Sánchez, Carlos Omar Ramos
Abstract:
In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.Keywords: anomaly detection, back-propagation neural networks, network intrusion detection systems, support vector machines
Procedia PDF Downloads 3621126 A Mechanism of Reusable, Portable, and Reliable Script Generator on Android
Authors: Kuei-Chun Liu, Yu-Yu Lai, Ching-Hong Wu
Abstract:
A good automated testing tool could reduce as much as possible the manual work done by testers. Traditional record-replay testing tool provides an automated testing solution by recording mouse coordinates as test scripts, but it will be easily broken if any change of resolutions. Therefore, more and more testers design multiple test scripts to automate the testing process for different devices. In order to improve the traditional record-replay approach and reduce the effort that the testers spending on writing test scripts, we propose an approach for generating the Android application test scripts based on accessibility service without connecting to a computer. This approach simulates user input actions and replays them correctly even at the different conditions such as the internet connection is unstable when the device under test, the different resolutions on Android devices. In this paper, we describe how to generate test scripts automatically and make a comparison with existing tools for Android such as Robotium, Appium, UIAutomator, and MonkeyTalk.Keywords: accessibility service, Appium, automated testing, MonkeyTalk, Robotium, testing, UIAutomator
Procedia PDF Downloads 3821125 Water Monitoring Sentinel Cloud Platform: Water Monitoring Platform Based on Satellite Imagery and Modeling Data
Authors: Alberto Azevedo, Ricardo Martins, André B. Fortunato, Anabela Oliveira
Abstract:
Water is under severe threat today because of the rising population, increased agricultural and industrial needs, and the intensifying effects of climate change. Due to sea-level rise, erosion, and demographic pressure, the coastal regions are of significant concern to the scientific community. The Water Monitoring Sentinel Cloud platform (WORSICA) service is focused on providing new tools for monitoring water in coastal and inland areas, taking advantage of remote sensing, in situ and tidal modeling data. WORSICA is a service that can be used to determine the coastline, coastal inundation areas, and the limits of inland water bodies using remote sensing (satellite and Unmanned Aerial Vehicles - UAVs) and in situ data (from field surveys). It applies to various purposes, from determining flooded areas (from rainfall, storms, hurricanes, or tsunamis) to detecting large water leaks in major water distribution networks. This service was built on components developed in national and European projects, integrated to provide a one-stop-shop service for remote sensing information, integrating data from the Copernicus satellite and drone/unmanned aerial vehicles, validated by existing online in-situ data. Since WORSICA is operational using the European Open Science Cloud (EOSC) computational infrastructures, the service can be accessed via a web browser and is freely available to all European public research groups without additional costs. In addition, the private sector will be able to use the service, but some usage costs may be applied, depending on the type of computational resources needed by each application/user. Although the service has three main sub-services i) coastline detection; ii) inland water detection; iii) water leak detection in irrigation networks, in the present study, an application of the service to Óbidos lagoon in Portugal is shown, where the user can monitor the evolution of the lagoon inlet and estimate the topography of the intertidal areas without any additional costs. The service has several distinct methodologies implemented based on the computations of the water indexes (e.g., NDWI, MNDWI, AWEI, and AWEIsh) retrieved from the satellite image processing. In conjunction with the tidal data obtained from the FES model, the system can estimate a coastline with the corresponding level or even topography of the inter-tidal areas based on the Flood2Topo methodology. The outcomes of the WORSICA service can be helpful for several intervention areas such as i) emergency by providing fast access to inundated areas to support emergency rescue operations; ii) support of management decisions on hydraulic infrastructures operation to minimize damage downstream; iii) climate change mitigation by minimizing water losses and reduce water mains operation costs; iv) early detection of water leakages in difficult-to-access water irrigation networks, promoting their fast repair.Keywords: remote sensing, coastline detection, water detection, satellite data, sentinel, Copernicus, EOSC
Procedia PDF Downloads 1301124 Investigation on Hand-Woven School Uniform Initiative and Sustainability: The Kerala Model from India
Authors: Abhilash Balan Paleri
Abstract:
Hand woven fabric embellishes an exceptional identity in the social milieu of Kerala; still, the artisans and handloom sector is undergoing crisis due to various reasons. The hand woven school uniform initiative of Govt. of Kerala launched in 2016 aims at enhancing the sector, ensuring sustainability at artisan and end-user levels. The Kerala Government already distributed 23 lakhs meters of cloth (for shirting, suiting, and skirting) woven by 4085 artisans in their traditional looms covering 4.5 lakhs of students in the public education sector which covers cover 3,701 schools in the state. The 2019-20 year production is expected to be 42 Lakhs meters of hand woven clothing catering 8.6 lakhs of students in the primary sector. This particular investigation unveils the upshots of the initiative, and the observations are derived through systematic enquiry with artisans, authorities, and end-users. The findings show a remarkable positive impact in the livelihood of artisans and the entire handloom sector.Keywords: handloom school uniform initiative of Kerala, hand woven fabric, sustainability, handloom weavers
Procedia PDF Downloads 1501123 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics
Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan
Abstract:
The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning
Procedia PDF Downloads 1541122 Influence of Scalable Energy-Related Sensor Parameters on Acoustic Localization Accuracy in Wireless Sensor Swarms
Authors: Joyraj Chakraborty, Geoffrey Ottoy, Jean-Pierre Goemaere, Lieven De Strycker
Abstract:
Sensor swarms can be a cost-effectieve and more user-friendly alternative for location based service systems in different application like health-care. To increase the lifetime of such swarm networks, the energy consumption should be scaled to the required localization accuracy. In this paper we have investigated some parameter for energy model that couples localization accuracy to energy-related sensor parameters such as signal length,Bandwidth and sample frequency. The goal is to use the model for the localization of undetermined environmental sounds, by means of wireless acoustic sensors. we first give an overview of TDOA-based localization together with the primary sources of TDOA error (including reverberation effects, Noise). Then we show that in localization, the signal sample rate can be under the Nyquist frequency, provided that enough frequency components remain present in the undersampled signal. The resulting localization error is comparable with that of similar localization systems.Keywords: sensor swarms, localization, wireless sensor swarms, scalable energy
Procedia PDF Downloads 4251121 Post Occupancy Evaluation of the Green Office Building with Different Air-Conditioning Systems
Authors: Ziwei Huang, Jian Ge, Jie Shen, Jiantao Weng
Abstract:
Retrofitting of existing buildings plays a critical role to achieve sustainable development. This is being considered as one of the approaches to achieving sustainability in the built environment. In order to evaluate the different air-conditioning systems effectiveness and user satisfaction of the existing building which had transformed into green building effectively and accurately. This article takes the green office building in Zhejiang province, China as an example, analyzing the energy consumption, occupant satisfaction and indoor environment quality (IEQ) from the perspective of the thermal environment. This building is special because it combines ground source heat pump system and Variable Refrigerant Flow (VRF) air-conditioning system. Results showed that the ground source heat pump system(EUIa≈25.6) consumes more energy than VRF(EUIb≈23.8). In terms of a satisfaction survey, the use of the VRF air-conditioning was more satisfactory in temperature. However, the ground source heat pump is more satisfied in air quality.Keywords: post-occupancy evaluation, green office building, air-conditioning systems, ground source heat pump system
Procedia PDF Downloads 2001120 Urban Ecological Interaction: Air, Water, Light and New Transit at the Human Scale of Barcelona’s Superilles
Authors: Philip Speranza
Abstract:
As everyday transit options are shifting from autocentric to pedestrian and bicycle oriented modes for healthy living, downtown streets are becoming more attractive places to live. However, tools and methods to measure the natural environment at the small scale of streets do not exist. Fortunately, a combination of mobile data collection technology and parametric urban design software now allows an interface to relate urban ecological conditions. This paper describes creation of an interactive tool to measure urban phenomena of air, water, and heat/light at the scale of new three-by-three block pedestrianized areas in Barcelona called Superilles. Each Superilla limits transit to the exterior of the blocks and to create more walkable and bikeable interior streets for healthy living. The research will describe the integration of data collection, analysis, and design output via a live interface using parametric software Rhino Grasshopper and the Human User Interface (UI) plugin.Keywords: transit, urban design, GIS, parametric design, Superilles, Barcelona, urban ecology
Procedia PDF Downloads 2511119 Physical Interaction Mappings: Utilizing Cognitive Load Theory in Order to Enhance Physical Product Interaction
Authors: Bryan Young, Andrew Wodehouse, Marion Sheridan
Abstract:
The availability of working memory has long been identified as a critical aspect of an instructional design. Many conventional instructional procedures impose irrelevant or unrelated cognitive loads on the learner due to the fact that they were created without contemplation, or understanding, of cognitive work load. Learning to physically operate traditional products can be viewed as a learning process akin to any other. As such, many of today's products, such as cars, boats, and planes, which have traditional controls that predate modern user-centered design techniques may be imposing irrelevant or unrelated cognitive loads on their operators. The goal of the research was to investigate the fundamental relationships between physical inputs, resulting actions, and learnability. The results showed that individuals can quickly adapt to input/output reversals across dimensions, however, individuals struggle to cope with the input/output when the dimensions are rotated due to the resulting increase in cognitive load.Keywords: cognitive load theory, instructional design, physical product interactions, usability design
Procedia PDF Downloads 5401118 Understanding the Coping Experience of Mothers with Childhood Trauma Histories: A Qualitative Study
Authors: Chan Yan Nok
Abstract:
The present study is a qualitative study based on the coping experiences of six Hong Kong Chinese mothers who had childhood trauma from their first-person perspective. Expanding the perspective beyond the dominant discourse of “inter-generation transmission of trauma”, this study explores the experiences and meanings of child trauma embedded in their narratives through the process of thematic analysis and narrative analysis. The interviewees painted a nuanced picture of their process of coping and trauma resolution. First, acknowledgement; second, feel safe and start to tell the story of trauma; third, feel the feelings and expression of emotions; fourth, clarifying and coping with the impacts of trauma; fifth, integration and transformation; and sixth, using their new understanding of experience to have a better life. It was seen that there was no “end” within the process of trauma resolution. Instead, this is an ongoing process with positive healing trajectory. Analysis of the stories of the mothers revealed recurrent themes around continuous self-reflective awareness in the process of trauma coping. Rather than being necessarily negative and detrimental, childhood trauma could highlight the meanings of being a mother and reveal opportunities for continuous personal growth and self-enhancement. Utilizing the sense of inadequacy as a core driver in the trauma recovery process while developing a heightened awareness of the unfinished business embedded in their “automatic pattern” of behaviors, emotions, and thoughts can help these mothers become more flexible to formulate new methods in facing future predicaments. Future social work and parent education practices should help mothers deal with unresolved trauma, make sense of their impacts of childhood trauma and discover the growth embedded in the past traumatic experience. They should be facilitated in “acknowledging the reality of the trauma”, including understanding their complicated emotions arising from the traumatic experiences and voicing their struggles. In addition, helping these mothers to be aware of short-term and long-term trauma impacts (i.e., secondary responses to the trauma) and explore their effective coping strategies in “overcoming secondary responses to the trauma” are crucial for their future positive adjustment and transformation. Through affirming their coping abilities and lessons learnt from past experiences, mothers can reduce feelings of shame and powerlessness and enhance their parental capacity.Keywords: childhood trauma, coping, mothers, self-awareness, self-reflection, trauma resolution
Procedia PDF Downloads 1721117 Availability Strategy of Medical Information for Telemedicine Services
Authors: Rozo D. Juan Felipe, Ramírez L. Leonardo Juan, Puerta A. Gabriel Alberto
Abstract:
The telemedicine services require correct computing resource management to guarantee productivity and efficiency for medical and non-medical staff. The aim of this study was to examine web management strategies to ensure the availability of resources and services in telemedicine so as to provide medical information management with an accessible strategy. In addition, to evaluate the quality-of-service parameters, the followings were measured: delays, throughput, jitter, latency, available bandwidth, percent of access and denial of services based of web management performance map with profiles permissions and database management. Through 24 different test scenarios, the results show 100% in availability of medical information, in relation to access of medical staff to web services, and quality of service (QoS) of 99% because of network delay and performance of computer network. The findings of this study suggest that the proposed strategy of web management is an ideal solution to guarantee the availability, reliability, and accessibility of medical information. Finally, this strategy offers seven user profile used at telemedicine center of Bogota-Colombia keeping QoS parameters suitable to telemedicine services.Keywords: availability, medical information, QoS, strategy, telemedicine
Procedia PDF Downloads 2101116 Crack Width Evaluation for Flexural RC Members with Axial Tension
Authors: Sukrit Ghorai
Abstract:
Proof of controlling crack width is a basic condition for securing suitable performance in serviceability limit state. The cracking in concrete can occur at any time from the casting of time to the years after the concrete has been set in place. Most codes struggle with offering procedure for crack width calculation. There is lack in availability of design charts for designers to compute crack width with ease. The focus of the study is to utilize design charts and parametric equations in calculating crack width with minimum error. The paper contains a simplified procedure to calculate crack width for reinforced concrete (RC) sections subjected to bending with axial tensile force following the guidelines of Euro code [DS EN-1992-1-1 & DS EN-1992-1-2]. Numerical examples demonstrate the application of the suggested procedure. Comparison with parallel analytical tools support the validity of result and show the percentage deviation of crack width in both the procedures. The technique is simple, user-friendly and ready to evolve for a greater spectrum of section sizes and materials.Keywords: concrete structures, crack width calculation, serviceability limit state, structural design, bridge engineering
Procedia PDF Downloads 3851115 Multichannel Scheme under Fairness Environment for Cognitive Radio Networks
Authors: Hans Marquez Ramos, Cesar Hernandez, Ingrid Páez
Abstract:
This paper develops a multiple channel assignment model, which allows to take advantage in most efficient way, spectrum opportunities in cognitive radio networks. Developed scheme allows make several available and frequency adjacent channel assignments, which require a bigger wide band, under an equality environment. The hybrid assignment model it is made by to algorithms, one who makes the ranking and select available frequency channels and the other one in charge of establishing an equality criteria, in order to not restrict spectrum opportunities for all other secondary users who wish to make transmissions. Measurements made were done for average bandwidth, average delay, as well fairness computation for several channel assignment. Reached results were evaluated with experimental spectrum occupational data from GSM frequency band captured. Developed model, shows evidence of improvement in spectrum opportunity use and a wider average transmit bandwidth for each secondary user, maintaining equality criteria in channel assignment.Keywords: bandwidth, fairness, multichannel, secondary users
Procedia PDF Downloads 5081114 Impression Evaluation by Design Change of Anthropomorphic Agent
Authors: Kazuko Sakamoto
Abstract:
Anthropomorphic agents have been successful in areas where there are many human interactions, such as education and medical care. The persuasive effect is also expected in e-shopping sites on the web. This indicates that customer service is not necessarily human but can play that role. However, the 'humanity' in anthropomorphism sometimes has a risk of working negatively. In general, as the appearance of anthropomorphic agents approaches humans, it is thought that their affinity with humans increases. However, when the degree of similarity reaches a certain level, it gives the user a weird feeling. This is the 'eerie valley' phenomenon. This is a concept used in the world of robotics, but it seems to be applicable to anthropomorphic agents such as characters. Then what kind of design can you accept as an anthropomorphic agent that gives you a feeling of friendliness or good feeling without causing discomfort or fear to people? This study focused on this point and examined what design and characteristics would be effective for marketing communication. As a result of the investigation, it was found that there is no need for gaze and blinking, the size of the eyes is normal or large, and the impression evaluation is higher when the structure is as simple as possible. Conversely, agents with high eye-gaze and white-eye ratios had low evaluations, and the negative impact on eye-gaze was particularly large.Keywords: anthropomorphicgents, design evaluation, marketing communication, customer service
Procedia PDF Downloads 1161113 Impact of Similarity Ratings on Human Judgement
Authors: Ian A. McCulloh, Madelaine Zinser, Jesse Patsolic, Michael Ramos
Abstract:
Recommender systems are a common artificial intelligence (AI) application. For any given input, a search system will return a rank-ordered list of similar items. As users review returned items, they must decide when to halt the search and either revise search terms or conclude their requirement is novel with no similar items in the database. We present a statistically designed experiment that investigates the impact of similarity ratings on human judgement to conclude a search item is novel and halt the search. 450 participants were recruited from Amazon Mechanical Turk to render judgement across 12 decision tasks. We find the inclusion of ratings increases the human perception that items are novel. Percent similarity increases novelty discernment when compared with star-rated similarity or the absence of a rating. Ratings reduce the time to decide and improve decision confidence. This suggests the inclusion of similarity ratings can aid human decision-makers in knowledge search tasks.Keywords: ratings, rankings, crowdsourcing, empirical studies, user studies, similarity measures, human-centered computing, novelty in information retrieval
Procedia PDF Downloads 1431112 Coronavirus Academic Paper Sorting Application
Authors: Christina A. van Hal, Xiaoqian Jiang, Luyao Chen, Yan Chu, Robert D. Jolly, Yaobin Lin, Jitian Zhao, Kang Lin Hsieh
Abstract:
The COVID-19 Literature Summary App was created for the primary purpose of enabling academicians and clinicians to quickly sort through the vast array of recent coronavirus publications by topics of interest. Multiple methods of summarizing and sorting the manuscripts were created. A summary page introduces the application function and capabilities, while an interactive map provides daily updates on infection, death, and recovery rates. A page with a pivot table allows publication sorting by topic, with an interactive data table that allows sorting topics by columns, as wells as the capability to view abstracts. Additionally, publications may be sorted by the medical topics they cover. We used the CORD-19 database to compile lists of publications. The data table can sort binary variables, allowing the user to pick desired publication topics, such as papers that describe COVID-19 symptoms. The application is primarily designed for use by researchers but can be used by anybody who wants a faster and more efficient means of locating papers of interest.Keywords: COVID-19, literature summary, information retrieval, Snorkel
Procedia PDF Downloads 1571111 An Ultrasonic Signal Processing System for Tomographic Imaging of Reinforced Concrete Structures
Authors: Edwin Forero-Garcia, Jaime Vitola, Brayan Cardenas, Johan Casagua
Abstract:
This research article presents the integration of electronic and computer systems, which developed an ultrasonic signal processing system that performs the capture, adaptation, and analog-digital conversion to later carry out its processing and visualization. The capture and adaptation of the signal were carried out from the design and implementation of an analog electronic system distributed in stages: 1. Coupling of impedances; 2. Analog filter; 3. Signal amplifier. After the signal conditioning was carried out, the ultrasonic information was digitized using a digital microcontroller to carry out its respective processing. The digital processing of the signals was carried out in MATLAB software for the elaboration of A-Scan, B and D-Scan types of ultrasonic images. Then, advanced processing was performed using the SAFT technique to improve the resolution of the Scan-B-type images. Thus, the information from the ultrasonic images was displayed in a user interface developed in .Net with Visual Studio. For the validation of the system, ultrasonic signals were acquired, and in this way, the non-invasive inspection of the structures was carried out and thus able to identify the existing pathologies in them.Keywords: acquisition, signal processing, ultrasound, SAFT, HMI
Procedia PDF Downloads 111