Search results for: user compliance
1305 The Use of Learning Management Systems during Emerging the Tacit Knowledge
Authors: Ercan Eker, Muhammer Karaman, Akif Aslan, Hakan Tanrikuluoglu
Abstract:
Deficiency of institutional memory and knowledge management can result in information security breaches, loss of prestige and trustworthiness and the worst the loss of know-how and institutional knowledge. Traditional learning management within organizations is generally handled by personal efforts. That kind of struggle mostly depends on personal desire, motivation and institutional belonging. Even if an organization has highly motivated employees at a certain time, the institutional knowledge and memory life cycle will generally remain limited to these employees’ spending time in this organization. Having a learning management system in an organization can sustain the institutional memory, knowledge and know-how in the organization. Learning management systems are much more needed especially in public organizations where the job rotation is frequently seen and managers are appointed periodically. However, a learning management system should not be seen as an organizations’ website. It is a more comprehensive, interactive and user-friendly knowledge management tool for organizations. In this study, the importance of using learning management systems in the process of emerging tacit knowledge is underlined.Keywords: knowledge management, learning management systems, tacit knowledge, institutional memory
Procedia PDF Downloads 3801304 The Impact of ChatGPT on the Healthcare Domain: Perspectives from Healthcare Majors
Authors: Su Yen Chen
Abstract:
ChatGPT has shown both strengths and limitations in clinical, educational, and research settings, raising important concerns about accuracy, transparency, and ethical use. Despite an improved understanding of user acceptance and satisfaction, there is still a gap in how general AI perceptions translate into practical applications within healthcare. This study focuses on examining the perceptions of ChatGPT's impact among 266 healthcare majors in Taiwan, exploring its implications for their career development, as well as its utility in clinical practice, medical education, and research. By employing a structured survey with precisely defined subscales, this research aims to probe the breadth of ChatGPT's applications within healthcare, assessing both the perceived benefits and the challenges it presents. Additionally, to further enhance the comprehensiveness of our methodology, we have incorporated qualitative data collection methods, which provide complementary insights to the quantitative findings. The findings from the survey reveal that perceptions and usage of ChatGPT among healthcare majors vary significantly, influenced by factors such as its perceived utility, risk, novelty, and trustworthiness. Graduate students and those who perceive ChatGPT as more beneficial and less risky are particularly inclined to use it more frequently. This increased usage is closely linked to significant impacts on personal career development. Furthermore, ChatGPT's perceived usefulness and novelty contribute to its broader impact within the healthcare domain, suggesting that both innovation and practical utility are key drivers of acceptance and perceived effectiveness in professional healthcare settings. Trust emerges as an important factor, especially in clinical settings where the stakes are high. The trust that healthcare professionals place in ChatGPT significantly affects its integration into clinical practice and influences outcomes in medical education and research. The reliability and practical value of ChatGPT are thus critical for its successful adoption in these areas. However, an interesting paradox arises with regard to the ease of use. While making ChatGPT more user-friendly is generally seen as beneficial, it also raises concerns among users who have lower levels of trust and perceive higher risks associated with its use. This complex interplay between ease of use and safety concerns necessitates a careful balance, highlighting the need for robust security measures and clear, transparent communication about how AI systems work and their limitations. The study suggests several strategic approaches to enhance the adoption and integration of AI in healthcare. These include targeted training programs for healthcare professionals to increase familiarity with AI technologies, reduce perceived risks, and build trust. Ensuring transparency and conducting rigorous testing are also vital to foster trust and reliability. Moreover, comprehensive policy frameworks are needed to guide the implementation of AI technologies, ensuring high standards of patient safety, privacy, and ethical use. These measures are crucial for fostering broader acceptance of AI in healthcare, as the study contributes to enriching the discourse on AI's role by detailing how various factors affect its adoption and impact.Keywords: ChatGPT, healthcare, survey study, IT adoption, behaviour, applcation, concerns
Procedia PDF Downloads 291303 Agile Software Development Implementation in Developing a Diet Tracker Mobile Application
Authors: Dwi Puspita Sari, Gulnur Baltabayeva, Nadia Salman, Maxut Toleuov, Vijay Kanabar
Abstract:
Technology era drives people to use mobile phone to support their daily life activities. Technology development has a rapid phase which pushes the IT company to adjust any technology changes in order to fulfill customer’s satisfaction. As a result of that, many companies in the USA emerged from systematics software development approach to agile software development approach in developing systems and applications to develop many mobile phone applications in a short phase to fulfill user’s needs. As a systematic approach is considered as time consuming, costly, and too risky, agile software development has become a more popular approach to use for developing software including mobile applications. This paper reflects a short-term project to develop a diet tracker mobile application using agile software development that focused on applying scrum framework in the development process.Keywords: agile software development, scrum, diet tracker, mobile application
Procedia PDF Downloads 2571302 The Impact of Gamification on Self-Assessment for English Language Learners in Saudi Arabia
Authors: Wala A. Bagunaid, Maram Meccawy, Arwa Allinjawi, Zilal Meccawy
Abstract:
Continuous self-assessment becomes crucial in self-paced online learning environments. Students often depend on themselves to assess their progress; which is considered an essential requirement for any successful learning process. Today’s education institutions face major problems around student motivation and engagement. Thus, personalized e-learning systems aim to help and guide the students. Gamification provides an opportunity to help students for self-assessment and social comparison with other students through attempting to harness the motivational power of games and apply it to the learning environment. Furthermore, Open Social Student Modeling (OSSM) as considered as the latest user modeling technologies is believed to improve students’ self-assessment and to allow them to social comparison with other students. This research integrates OSSM approach and gamification concepts in order to provide self-assessment for English language learners at King Abdulaziz University (KAU). This is achieved through an interactive visual representation of their learning progress.Keywords: e-learning system, gamification, motivation, social comparison, visualization
Procedia PDF Downloads 1531301 Specified Human Motion Recognition and Unknown Hand-Held Object Tracking
Authors: Jinsiang Shaw, Pik-Hoe Chen
Abstract:
This paper aims to integrate human recognition, motion recognition, and object tracking technologies without requiring a pre-training database model for motion recognition or the unknown object itself. Furthermore, it can simultaneously track multiple users and multiple objects. Unlike other existing human motion recognition methods, our approach employs a rule-based condition method to determine if a user hand is approaching or departing an object. It uses a background subtraction method to separate the human and object from the background, and employs behavior features to effectively interpret human object-grabbing actions. With an object’s histogram characteristics, we are able to isolate and track it using back projection. Hence, a moving object trajectory can be recorded and the object itself can be located. This particular technique can be used in a camera surveillance system in a shopping area to perform real-time intelligent surveillance, thus preventing theft. Experimental results verify the validity of the developed surveillance algorithm with an accuracy of 83% for shoplifting detection.Keywords: Automatic Tracking, Back Projection, Motion Recognition, Shoplifting
Procedia PDF Downloads 3331300 Road Safety and Accident Prevention in Third World Countries: A Case Study of NH-7 in India
Authors: Siddegowda, Y. A. Sathish, G. Krishnegowda, T. M. Mohan Kumar
Abstract:
Road accidents are a human tragedy. They involve high human suffering and monetary costs in terms of untimely death, injuries and social problems. India had earned the dubious distinction of having more number of fatalities due to road accidents in the world. Road safety is emerging as a major social concern around the world especially in India because of infrastructure project works. A case study was taken on NH – 07 which connects to various major cities and industries. The study shows that major cases of fatalities are due to bus, trucks and high speed vehicles. The main causes of accidents are due to high density, non-restriction of speed, use of mobile phones, lack of board signs on road parking, visibility restriction, improper geometric design, road use characteristics, environmental aspects, social aspects etc. Data analysis and preventive measures are enlightened in this paper.Keywords: accidents, environmental aspects, fatalities, geometric design, road user characteristics
Procedia PDF Downloads 2551299 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time
Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl
Abstract:
In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.Keywords: SQL injection, attacks, web application, accuracy, database
Procedia PDF Downloads 1511298 Enforcement against Illegal Logging: Issues and Challenges
Authors: Muhammad Nur Haniff Mohd Noor, Rokiah Kadir, Suriyani Muhamad
Abstract:
Sustainable forest management and forest protection can be hampered by illegal logging. Illegal logging is not uncommon in many wood-producing countries. Hence, law enforcement, especially in timber-producing countries, is crucial in ensuring compliance with forestry related regulations, as well as confirming that all parties obey the rules and regulations prescribed by the authorities. However, enforcement officers are encountering various challenges and difficulties which have undermined the enforcement capacity and efficiency. The appropriate policy responses for these issues are important to resolve the problems in the long term and empowering enforcement capacity to meet future challenges of forest law enforcement. This paper is written according to extensive review of the articles and publications by The International Criminal Police Organization (INTERPOL), The International Tropical Timber Organization (ITTO), Chatham House and The Food and Agriculture Organization of the United Nations (FAO). Subsequently, various books and journal articles are reviewed to gain further insight towards enforcement issues and challenges. This paper identifies several issues which consist of (1) insufficient enforcement capacity and resources (2) lack of coordination between various enforcement agencies, (3) corruption in the government and private sectors and (4) unclear legal frameworks related to the forestry sector. Next, this paper discusses appropriate policy responses to address each enforcement challenges according to various publications. This includes specific reports concerning forest law enforcement published by international forestry-related organizations. Therefore, lack of resources, inadequate synchronization between agencies, corruption, and legal issues present challenges to enforcement officers in their daily routines. Recommendations regarding proper policy responses to overcome the issues are of great importance in assisting forest authorities in prioritizing their resources appropriately.Keywords: corruption, enforcement challenges, enforcement capacity, forest law enforcement, insufficient agency coordination, legislative ambiguity
Procedia PDF Downloads 1871297 Gamification Using Stochastic Processes: Engage Children to Have Healthy Habits
Authors: Andre M. Carvalho, Pedro Sebastiao
Abstract:
This article is based on a dissertation that intends to analyze and make a model, intelligently, algorithms based on stochastic processes of a gamification application applied to marketing. Gamification is used in our daily lives to engage us to perform certain actions in order to achieve goals and gain rewards. This strategy is an increasingly adopted way to encourage and retain customers through game elements. The application of gamification aims to encourage children between 6 and 10 years of age to have healthy habits and the purpose of serving as a model for use in marketing. This application was developed in unity; we implemented intelligent algorithms based on stochastic processes, web services to respond to all requests of the application, a back-office website to manage the application and the database. The behavioral analysis of the use of game elements and stochastic processes in children’s motivation was done. The application of algorithms based on stochastic processes in-game elements is very important to promote cooperation and to ensure fair and friendly competition between users which consequently stimulates the user’s interest and their involvement in the application and organization.Keywords: engage, games, gamification, randomness, stochastic processes
Procedia PDF Downloads 3311296 Characteristics and Challenges of Post-Burn Contractures in Adults and Children: A Descriptive Study
Authors: Hardisiswo Soedjana, Inne Caroline
Abstract:
Deep dermal or full thickness burns are inevitably lead to post-burn contractures. These contractures remain to be one of the most concerning late complications of burn injuries. Surgical management includes releasing the contracture followed by resurfacing the defect accompanied by post-operative rehabilitation. Optimal treatment of post-burn contractures depends on the characteristics of the contractures. This study is aimed to describe clinical characteristics, problems, and management of post-burn contractures in adults and children. A retrospective analysis was conducted from medical records of patients suffered from contractures after burn injuries admitted to Hasan Sadikin general hospital between January 2016 and January 2018. A total of 50 patients with post burn contractures were included in the study. There were 17 adults and 33 children. Most patients were male, whose age range within 15-59 years old and 5-9 years old. Educational background was mostly senior high school among adults, while there was only one third of children who have entered school. Etiology of burns was predominantly flame in adults (82.3%); whereas flame and scald were the leading cause of burn injury in children (11%). Based on anatomical regions, hands were the most common affected both in adults (35.2%) and children (48.5%). Contractures were identified in 6-12 months since the initial burns. Most post-burn hand contractures were resurfaced with full-thickness skin graft (FTSG) both in adults and children. There were 11 patients who presented with recurrent contracture after previous history of contracture release. Post-operative rehabilitation was conducted for all patients; however, it is important to highlight that it is still challenging to control splinting and exercise when patients are discharged and especially the compliance in children. In order to improve quality of life in patients with history of deep burn injuries, prevention of contractures should begin right after acute care has been established. Education for the importance of splinting and exercise should be administered as comprehensible as possible for adult patients and parents of pediatric patients.Keywords: burn, contracture, education, exercise, splinting
Procedia PDF Downloads 1301295 Topic Modelling Using Latent Dirichlet Allocation and Latent Semantic Indexing on SA Telco Twitter Data
Authors: Phumelele Kubheka, Pius Owolawi, Gbolahan Aiyetoro
Abstract:
Twitter is one of the most popular social media platforms where users can share their opinions on different subjects. As of 2010, The Twitter platform generates more than 12 Terabytes of data daily, ~ 4.3 petabytes in a single year. For this reason, Twitter is a great source for big mining data. Many industries such as Telecommunication companies can leverage the availability of Twitter data to better understand their markets and make an appropriate business decision. This study performs topic modeling on Twitter data using Latent Dirichlet Allocation (LDA). The obtained results are benchmarked with another topic modeling technique, Latent Semantic Indexing (LSI). The study aims to retrieve topics on a Twitter dataset containing user tweets on South African Telcos. Results from this study show that LSI is much faster than LDA. However, LDA yields better results with higher topic coherence by 8% for the best-performing model represented in Table 1. A higher topic coherence score indicates better performance of the model.Keywords: big data, latent Dirichlet allocation, latent semantic indexing, telco, topic modeling, twitter
Procedia PDF Downloads 1501294 Six Tropical Medicinal Plants Effects in the Treatment of Prostate Diseases in Forty Different Patients
Authors: T. Nalowa, L. Foncha, S. Eposi
Abstract:
Prostate enlargement, prostate cancer are major global health problems affecting many men as they advance in age. It is highly recommended to encourage older men to get Prostate Specific Antigen test screening frequently. Conventional treatments like radiation, chemotherapy are associated with many side effects. And this situation is a call for concern. Traditional medicine is affordable, easily prepared with little or no side effects and it contains many phytochemicals. The study aims to find the cure for prostate cancer and prostate enlargement by extracting products from plant tissues of specific herbs to determine anti-inflammatory, anti-cancer, and anti-hematuria properties. Descriptive statistical analysis was applied to describe the data process. The commonly used method of preparation was extraction. Overall, 40 patients were classified based on their medical conditions on their underlying user report. Rural communities in Fako are rich sources of plants with medicinal properties. The used plants consequently provide basic information and aid to investigate the cure of prostate cancer and prostate enlargement, with great significance.Keywords: cancer, enlargement, metastases, prostate
Procedia PDF Downloads 751293 Youth Intelligent Personal Decision Aid
Authors: Norfiza Ibrahim, Norshuhada Shiratuddin, Siti Mahfuzah Sarif
Abstract:
Decision-making system is used to facilitate people in making the right choice for their important daily activities. For the youth, proper guidance in making important decisions is needed. Their skills in decision-making aid decisions will indirectly affect their future. For that reason, this study focuses on the intelligent aspects in the development of intelligent decision support application. The aid apparently integrates Personality Traits (PT) and Multiple Intelligence (MI) data in development of a computerized personal decision aid for youth named as Youth Personal Decision Aid (Youth PDA). This study is concerned with the aid’s helpfulness based on the hybrid intelligent process. There are four main items involved which are reliability, decision making effort, confidence, as well as decision process awareness. Survey method was applied to the actual user of this system, namely the school and the Institute of Higher Education (IPT)’s students. An establish instrument was used to evaluate the study. The results of the analysis and findings in the assessment indicates a high mean value of the four dimensions in helping Youth PDA to be accepted as a useful tool for the youth in decision-making.Keywords: decision support, multiple intelligent, personality traits, youth personal decision aid
Procedia PDF Downloads 6321292 Rejuvenate: Face and Body Retouching Using Image Inpainting
Authors: Hossam Abdelrahman, Sama Rostom, Reem Yassein, Yara Mohamed, Salma Salah, Nour Awny
Abstract:
In today’s environment, people are becoming increasingly interested in their appearance. However, they are afraid of their unknown appearance after a plastic surgery or treatment. Accidents, burns and genetic problems such as bowing of body parts of people have a negative impact on their mental health with their appearance and this makes them feel uncomfortable and underestimated. The approach presents a revolutionary deep learning-based image inpainting method that analyses the various picture structures and corrects damaged images. In this study, A model is proposed based on the in-painting of medical images with Stable Diffusion Inpainting method. Reconstructing missing and damaged sections of an image is known as image inpainting is a key progress facilitated by deep neural networks. The system uses the input of the user of an image to indicate a problem, the system will then modify the image and output the fixed image, facilitating for the patient to see the final result.Keywords: generative adversarial network, large mask inpainting, stable diffusion inpainting, plastic surgery
Procedia PDF Downloads 741291 A Review of Encryption Algorithms Used in Cloud Computing
Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele
Abstract:
Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.Keywords: cloud computing, data integrity, confidentiality, privacy, availability
Procedia PDF Downloads 1351290 Marketing Mixed Factors Affecting on Commercial Transactions Expectations through Social Networks
Authors: Ladaporn Pithuk
Abstract:
This study aims to investigate the marketing mixed factors that affecting on expectations about commercial transactions through social networks. The research method will using quantitative research, data was collected by questionnaires to person have experience access to trading over the internet for 400 sample by purposive sampling method. Data was analyzed by descriptive statistic including percentage, mean, standard deviation and using quality function deployment for hypothesis testing. Finding the most significant interrelationship between marketing mixed factors and commercial transactions expectations through social networks are product and place the relationship of five ties product and place (location) is involved in almost all will make the site a model that meets the needs of the user visit. In terms of price, the promotion, privacy, personalization and providing a process technical. This will make operations more efficient, reduce confusion, duplication, delays in data transmission, including the creation of different elements in products and services.Keywords: commercial transactions expectations, marketing mixed factors, social networks, consumer behavior
Procedia PDF Downloads 2371289 Consumer Behavior Towards Online Shopping in Kuwait: A Quantitative Analysis
Authors: Mitra Arami
Abstract:
The main objective of this paper is to identify the factors that influence Kuwaiti consumers’ behavior towards online shopping. A survey was conducted among B2C e-commerce customers using a structured self-administered questionnaire. The findings of this study show that B2C e-commerce customer behavior in Kuwait is strongly influenced by customer entertainment but weakly influenced by customer trust. While the overall research project involves exploratory research using mixed methods, the focus of this paper is on a quantitative analysis of responses obtained from a survey of Kuwaiti customers, with the design of the questionnaire instrument being based on the findings of a qualitative analysis. The main findings of the analysis include a list of key factors that affect Kuwait online shoppers, and quantitative indications of the relative strengths of the various relationships. This study provides a basis for further research and more in depth studies to find the scope of online shopping in Kuwait especially, the influence of hedonic and utilitarian motivations on user engagement.Keywords: e-commerce, online shopping, customer behavior, quantitative analysis, Kuwait
Procedia PDF Downloads 3781288 R Software for Parameter Estimation of Spatio-Temporal Model
Authors: Budi Nurani Ruchjana, Atje Setiawan Abdullah, I. Gede Nyoman Mindra Jaya, Eddy Hermawan
Abstract:
In this paper, we propose the application package to estimate parameters of spatiotemporal model based on the multivariate time series analysis using the R open-source software. We build packages mainly to estimate the parameters of the Generalized Space Time Autoregressive (GSTAR) model. GSTAR is a combination of time series and spatial models that have parameters vary per location. We use the method of Ordinary Least Squares (OLS) and use the Mean Average Percentage Error (MAPE) to fit the model to spatiotemporal real phenomenon. For case study, we use oil production data from volcanic layer at Jatibarang Indonesia or climate data such as rainfall in Indonesia. Software R is very user-friendly and it is making calculation easier, processing the data is accurate and faster. Limitations R script for the estimation of model parameters spatiotemporal GSTAR built is still limited to a stationary time series model. Therefore, the R program under windows can be developed either for theoretical studies and application.Keywords: GSTAR Model, MAPE, OLS method, oil production, R software
Procedia PDF Downloads 2431287 Design and Implementation of Pseudorandom Number Generator Using Android Sensors
Authors: Mochamad Beta Auditama, Yusuf Kurniawan
Abstract:
A smartphone or tablet require a strong randomness to establish secure encrypted communication, encrypt files, etc. Therefore, random number generation is one of the main keys to provide secrecy. Android devices are equipped with hardware-based sensors, such as accelerometer, gyroscope, etc. Each of these sensors provides a stochastic process which has a potential to be used as an extra randomness source, in addition to /dev/random and /dev/urandom pseudorandom number generators. Android sensors can provide randomness automatically. To obtain randomness from Android sensors, each one of Android sensors shall be used to construct an entropy source. After all entropy sources are constructed, output from these entropy sources are combined to provide more entropy. Then, a deterministic process is used to produces a sequence of random bits from the combined output. All of these processes are done in accordance with NIST SP 800-22 and the series of NIST SP 800-90. The operation conditions are done 1) on Android user-space, and 2) the Android device is placed motionless on a desk.Keywords: Android hardware-based sensor, deterministic process, entropy source, random number generation/generators
Procedia PDF Downloads 3761286 Development of a Smart Liquid Level Controller
Authors: Adamu Mudi, Ibrahim Wahab Fawole, Abubakar Abba Kolo
Abstract:
In this research paper, we present a microcontroller-based liquid level controller that identifies the various levels of a liquid, carries out certain actions, and is capable of communicating with the human being and other devices through the GSM network. This project is useful in ensuring that a liquid is not wasted. It also contributes to the internet of things paradigm, which is the future of the internet. The method used in this work includes designing the circuit and simulating it. The circuit is then implemented on a solderless breadboard, after which it is implemented on a strip board. A C++ computer program is developed and uploaded into the microcontroller. This program instructs the microcontroller on how to carry out its actions. In other to determine levels of the liquid, an ultrasonic wave is sent to the surface of the liquid similar to radar or the method for detecting the level of sea bed. Message is sent to the phone of the user similar to the way computers send messages to phones of GSM users. It is concluded that the routine of observing the levels of a liquid in a tank, refilling the tank when the liquid level is too low can be entirely handled by a programmable device without wastage of the liquid or bothering a human being with such tasks.Keywords: Arduino Uno, HC-SR04 ultrasonic sensor, internet of things, IoT, SIM900 GSM module
Procedia PDF Downloads 1301285 An Era of Arts: Examining Intersection of Technology and Museums
Authors: Vivian Li
Abstract:
With the rapid development of technology, virtual reality (VR) and augmented reality (AR) are becoming increasingly prominent in our lives. Museums have led the way in digitization, offering their collections to the wider public through the open internet, which is dramatically changing our experience of art. Technology is also being implemented into our physical art-viewing experience, enabling museums to capture historical sites while creating a more immersive experience for patrons. This study takes a qualitative approach, examining secondary sources and synthesizing information from interviews with field professionals to answer the question: to what extent is the contemporary perception of art transformed by the digitization of art museums? The findings establish that museums are becoming increasingly open with their collections, utilizing digitization to spread their intellectual content to people worldwide and to diversify their audiences. The use of VR and AR is also enabling museums to preserve and showcase historical artifacts and sites in a more interactive and user-focused way. Technology is also crafting new forms of art and art museums. Ultimately, the intersection of technology and museums is not changing the definition of art but rather offering new modes for the public to experience and learn about arts and history.Keywords: art, augmented reality, digitization, museums, technology, virtual reality
Procedia PDF Downloads 1271284 3D Remote Sensing Images Parallax Refining Based On HTML5
Authors: Qian Pei, Hengjian Tong, Weitao Chen, Hai Wang, Yanrong Feng
Abstract:
Horizontal parallax is the foundation of stereoscopic viewing. However, the human eye will feel uncomfortable and it will occur diplopia if horizontal parallax is larger than eye separation. Therefore, we need to do parallax refining before conducting stereoscopic observation. Although some scholars have been devoted to online remote sensing refining, the main work of image refining is completed on the server side. There will be a significant delay when multiple users access the server at the same time. The emergence of HTML5 technology in recent years makes it possible to develop rich browser web application. Authors complete the image parallax refining on the browser side based on HTML5, while server side only need to transfer image data and parallax file to browser side according to the browser’s request. In this way, we can greatly reduce the server CPU load and allow a large number of users to access server in parallel and respond the user’s request quickly.Keywords: 3D remote sensing images, parallax, online refining, rich browser web application, HTML5
Procedia PDF Downloads 4611283 Designing for Wearable Interactions: Exploring Care Design for Design Anthropology and Participatory Design
Authors: Wei-Chen Chang, Yu-Cheng Pei
Abstract:
This research examines wearable interaction design to mediate the design anthropology and participatory design found in technology and fashion. We will discuss the principles of design anthropology and participatory design using a wearable and fashion product process to transmit the ‘people-situation-reason-object’ method and analyze five sense applied examples that provide new thinking for designers engaged in future industry. Design anthropology and Participatory Design attempt to engage physiological and psychological design through technology-function, meaning-form and fashion aesthetics to achieve cognition between user and environment. The wearable interaction provides technological characteristics and semantic ideas transmitted to craft-cultural, collective, cheerful and creative performance. It is more confident and innovative attempt, that is able to achieve a joyful, fundamental interface. This study takes two directions for cultural thinking as the basis to establish a set of life-craft designs with interactive experience objects by users that assist designers in examining the sensual feelings to initiate a new lifestyle value.Keywords: design anthropology, wearable design, design communication, participatory design
Procedia PDF Downloads 2381282 Analyzing the Quality of Cloud-Based E-Learning Systems on the Perception of the Learners and the Teachers
Authors: R. W. C. Devindi, S. M. Buddika Harshanath
Abstract:
E-learning is a widely used technology for learning in the modern world. With the pandemic situation the popularity of using e-learning has been increased in a larger capacity. The e-learning educational systems require software resources as well as hardware usually but it is hard for most of the education institutions to afford those resources. Also with the massive user load e-learning has to broaden the server side resources as well. Therefore, in the present cloud computing was implemented in order to make the e – learning systems more efficient. The researcher has analyzed the quality of the e-learning systems on the perception of the learners and the teachers with the aid of hypothesis and has given the analyzed results and the discussion in this report. Therefore, the future research will be able to get some steps to increase the quality of the online learning systems furthermore. In the case of e-learning, quality assurance and cost effectiveness are essential. A complex quality assurance system is used in the stated project. There are no well-defined standard evaluation measures in this field. As a result, accurately assessing the e-learning system's overall quality is challenging. The researcher has done the analysis with the aid of standard methods and software.Keywords: LMS–learning management system, SPSS–statistical package for social sciences (software), eigen value, hypothesis
Procedia PDF Downloads 1071281 An Unexpected Hand Injury with Pluridigital Fractures Due to Premature Explosion of a Ramadan Cannon
Authors: Hakan Akgul
Abstract:
Purpose: The use of firecrackers (i.e., Ramadan Cannon) during the month of Ramadan is a traditional way of indicating that the fasting period is over in Muslim countries. Here, we report the rehabilitation of a case of hand injury with pluridigital fractures due to premature explosion of a Ramadan cannon. Materials and Methods: A 48-year old man admitted to the Emergency Department due to left hand injury as a result of a premature explosion of a Ramadan cannon. The patient was immediately taken to operation room because of the multiple fractures, tendon loss, and soft tissue loss in the left hand. Range of motion (ROM) of joints was measured with goniometer, pain and oedema were measured and splinting was performed. Results: Rehabilitation team took over the patient at postoperative 9th week. During the 3 month rehabilitation, range of motion increased, oedema was taken under control, pain was reduced, the colour of the skin turned to the normal tone. According to the visual analog scale (VAS), pain decreased from 9 to 4. Oedema, around the metacarpofalangeal (MCP) joints, decreased from 27,5 cm to 23,5 cm. Total active range of motion of the wrist increased from 5 degrees to 50 degrees.Total active range of motion of supination and pronation increased from 55 degrees to 70 degrees. Discussion: The rehabilitation of multiple hand injury is quite difficult. Different aspects of trauma should be taken into consideration when rehabilitation is planned. Factors such as waiting for the bone union, wound healing, and use of external fixators may delay rehabilitation process. Joint mobilization, massage for reducing oedema and preventing scar tissue, exercise within the range of motion are efficient measures. Poor patient compliance to treatment may lead to poor outcome. First of all, oedema and scar formation must be taken under control. Removing fixators should not be delayed depending on the bone union, and exercise within the range of motion should be started.Keywords: explosion, fracture, hand, injury
Procedia PDF Downloads 2431280 Beyond Classic Program Evaluation and Review Technique: A Generalized Model for Subjective Distributions with Flexible Variance
Authors: Byung Cheol Kim
Abstract:
The Program Evaluation and Review Technique (PERT) is widely used for project management, but it struggles with subjective distributions, particularly due to its assumptions of constant variance and light tails. To overcome these limitations, we propose the Generalized PERT (G-PERT) model, which enhances PERT by incorporating variability in three-point subjective estimates. Our methodology extends the original PERT model to cover the full range of unimodal beta distributions, enabling the model to handle thick-tailed distributions and offering formulas for computing mean and variance. This maintains the simplicity of PERT while providing a more accurate depiction of uncertainty. Our empirical analysis demonstrates that the G-PERT model significantly improves performance, particularly when dealing with heavy-tail subjective distributions. In comparative assessments with alternative models such as triangular and lognormal distributions, G-PERT shows superior accuracy and flexibility. These results suggest that G-PERT offers a more robust solution for project estimation while still retaining the user-friendliness of the classic PERT approach.Keywords: PERT, subjective distribution, project management, flexible variance
Procedia PDF Downloads 201279 The Voluntary Audit of Semi-Annual Consolidated Financial Statements Decision and Accounting Conservatism
Authors: Shuofen Hsu, Ya-Yi Chao, Chao-Wei Li
Abstract:
This paper investigates the relationship between voluntary audit (hereafter, VA) of semi-annual consolidated financial statements decision and accounting conservatism. In general, there are four kinds of auditors' assurance services, which include audit, review, agreed-upon procedure and compliance engagements base on degree of assurance. The VA work by auditors may not only have the higher audit quality but an important signal of more reliable information than the review work. In Taiwan, The listed companies must prepare the semi-annual consolidated financial statements and with auditors' review before 2012, but some of the listed companies choose the assurance work from review to audit voluntarily. Due to the adoption of International Financial Reporting Standards, the listed companies were required to prepare the second quarterly consolidated financial statements which should be reviewed by auditors since 2013. This rule will change some of the assurance work from audit to review by auditors, and the information asymmetry maybe increased. To control the selection bias, we use two-stage model to test the relationship between VA decision and accounting conservatism. Our empirical results indicate that the VA decision and accounting conservatism have a significant positive relationship in firms with family-controlled. That is, firms with family-controlled are more likely to do VA and to prepare more conservative consolidated financial statements to reduce the information asymmetry, meaning that there is a complementary effect between VA and accounting conservatism for firms with more information asymmetry. But on the contrary, we find that the VA decision and accounting conservatism have a significant negative relationship in firms with professional managers-controlled, meaning that there is a substitution effect between VA and accounting conservatism for firms with less information asymmetry. Finally, the accounting conservatism of consolidated financial statements decrease after the adoption of IFRSs (International Financial Reporting Standards) in Taiwan. It means that the disclosure and transparency of consolidated financial statements had be improved.Keywords: voluntary audit, accounting conservatism, audit quality, information asymmetry
Procedia PDF Downloads 2261278 RFID Laptop Monitoring and Management System
Authors: Francis E. Idachaba, Sarah Uyimeh Tommy
Abstract:
This paper describes the design of an RFID laptop monitoring and management system. Laptops embedded with RFID chips are monitored and tracked to provide a monitoring system for the purpose of tracking as well as monitoring movement of the laptops in and out of a building. The proposed system is implemented with both hardware and software components. The hardware architecture consists of RFID passive tag, RFID module (reader), and a server hosting the application and database. The RFID readers are distributed at major exits of a building or premises. The tags are programmed with owner laptop details are concealed in the laptops. The software architecture consists of application software that has the APIs (Applications Programming Interface) necessary to interface the RFID system with the PC, to achieve automated laptop monitoring system. A friendly graphic user interface (GUI) and a database that saves all readings and owners details. The system is capable of reducing laptop theft especially in students’ hostels as laptops can be monitored as they are taken either in or out of the building.Keywords: asset tracking, GUI, laptop monitoring, radio frequency identification, passive tags
Procedia PDF Downloads 3901277 The Impact of Legislation on Waste and Losses in the Food Processing Sector in the UK/EU
Authors: David Lloyd, David Owen, Martin Jardine
Abstract:
Introduction: European weight regulations with respect to food products require a full understanding of regulation guidelines to assure regulatory compliance. It is suggested that the complexity of regulation leads to practices which result to over filling of food packages by food processors. Purpose: To establish current practices by food processors and the financial, sustainable and societal impacts on the food supply chain of ineffective food production practices. Methods: An analysis of food packing controls with 10 companies of varying food categories and quantitative based research of a further 15 food processes on the confidence in weight control analysis of finished food packs within their organisation. Results: A process floor analysis of manufacturing operations focussing on 10 products found over fill of packages ranging from 4.8% to 20.2%. Standard deviation figures for all products showed a potential for reducing average weight of the pack whilst still retain the legal status of the product. In 20% of cases, an automatic weight analysis machine was in situ however weight packs were still significantly overweight. Collateral impacts noted included the effect of overfill on raw material purchase and added food miles often on a global basis with one raw material alone creating 10,000 extra food miles due to the poor weight control of the processing unit. A case study of a meat and bakery product will be discussed with the impact of poor controls resulting from complex legislation. The case studies will highlight extra energy costs in production and the impact of the extra weight on fuel usage. If successful a risk assessment model used primarily on food safety but adapted to identify waste /sustainability risks will be discussed within the presentation.Keywords: legislation, overfill, profile, waste
Procedia PDF Downloads 4071276 A Study to Identify Resistant Hypertension and Role of Spironolactone in its Management
Authors: A. Kumar, D. Himanshu, Ak Vaish, K. Usman , A. Singh, R. Misra, V. Atam, S. P. Verma, S. Singhal
Abstract:
Introduction: Resistant and uncontrolled hypertension offer great challenge, in terms of higher risk of morbidity, mortality and not the least, difficulty in diagnosis and management. Our study tries to identify the importance of two crucial aspects of hypertension management, i.e. drug compliance and optimum dosing and also the effect of spironolactone on blood pressure in cases of resistant hypertension. Methodology: A prospective study was carried out among patients, who were referred as case of resistant hypertension to Hypertension Clinic at Gandhi memorial and associated hospital, Lucknow, India from August, 2013 to July 2014. A total of 122 Subjects having uncontrolled BP with ≥3 antihypertensives were selected. After ruling out secondary resistance and with appropriate lifestyle modifications, effect of adherence and optimum doses was seen with monitoring of BP. Only those having blood pressure still uncontrolled were true resistant. These patients were given spironolactone to see its effect on BP over next 12 weeks. Results: Mean baseline BP of all (n=122) patients was 150.4±7.2 mmHg systolic and 92.1±5.7 mmHg diastolic. After promoting adherence to the regimen, there was reduction of 4.20±3.65 mmHg systolic and 2.08±4.74 mmHg Diastolic blood pressure, with 26 patients achieving target blood pressure goal. Further reduction of 6.66±5.99 mmHg in systolic and 2.59±3.67 mmHg in diastolic BP was observed after optimizing the drug doses with another 66 patients achieving target blood pressure goal. Only 30 patients were true resistant hypertensive and prescribed spironolactone. Over 12 weeks, mean reduction of 20.62±3.65 mmHg in systolic and 10.08 ± 6.46 mmHg in diastolic BP was observed. Out of these 30, BP was controlled in 24 patients. Side effects observed were hyperkalemia in 2 patients and breast tenderness in 2 patients. Conclusion: Improper adherence and suboptimal regimen appear to be the important reasons for uncontrolled hypertension. By virtue of maintaining proper adherence to an optimum regimen, target BP goal can be reached in many without adding much to the regimen. Spironolactone is effective in patients with resistant hypertension, in terms of blood pressure reduction with minimal side effects.Keywords: resistant, hypertension, spironolactone, blood pressure
Procedia PDF Downloads 278