Search results for: information technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16139

Search results for: information technology

14339 A Feasibility Study of Crowdsourcing Data Collection for Facility Maintenance Management

Authors: Mohamed Bin Alhaj, Hexu Liu, Mohammed Sulaiman, Osama Abudayyeh

Abstract:

An effective facility maintenance management (FMM) system plays a crucial role in improving the quality of services and maintaining the facility in good condition. Current FMM heavily relies on the quality of the data collection function of the FMM systems, at times resulting in inefficient FMM decision-making. The new technology-based crowdsourcing provides great potential to improve the current FMM practices, especially in terms of timeliness and quality of data. This research aims to investigate the feasibility of using new technology-driven crowdsourcing for FMM and highlight its opportunities and challenges. A survey was carried out to understand the human, data, system, geospatial, and automation characteristics of crowdsourcing for an educational campus FMM via social networks. The survey results were analyzed to reveal the challenges and recommendations for the implementation of crowdsourcing for FMM. This research contributes to the body of knowledge by synthesizing the challenges and opportunities of using crowdsourcing for facility maintenance and providing a road map for applying crowdsourcing technology in FMM. In future work, a conceptual framework will be proposed to support data-driven FMM using social networks.

Keywords: crowdsourcing, facility maintenance management, social networks

Procedia PDF Downloads 149
14338 The Influence of Mineraliser Granulometry on Dense Silica Brick Microstructure

Authors: L. Nevrivova, K. Lang, M. Kotoucek, D. Vsiansky

Abstract:

This entry concerned with dense silica microstructure was produced as a part of a project within the Technology Agency of the Czech Republic which is being implemented in cooperation of the biggest producer of refractories the P-D Refractories CZ company with the research organisation Brno University of Technology. The paper is focused on the influence of mixture homogenisation and the influence of grain size of the mineraliser on the resulting utility properties of the material as well as its microstructure. It has a decisive influence on the durability of the material in a building structure. This paper is a continuation of a previously published study dealing with the suitability of various types of mineralising agents in terms of density, strength and mineral composition of silica. The entry describes the influence of the method of mixture homogenisation and the influence of granulometry of the applied Fe-mineralising agent on the resulting silica microstructure. Porosity, density, phase composition and microstructure of the experimentally prepared silica samples were examined and the results were discussed in context with the technology of homogenisation and firing temperature used. The properties of silica brick samples were compared to the sample without any Fe-mineraliser.

Keywords: silica bricks, Fe-mineraliser, mineralogical composition, new developed silica material

Procedia PDF Downloads 322
14337 Analyzing the Attitudes of Prep-Class Students at Higher Education towards Computer-Based Foreign Language Education

Authors: Sakine Sincer

Abstract:

In today’s world, the borders between countries and globalization are getting faster. It is an undeniable fact that this trend mostly results from the developments and improvements in technology. Technology, which dominates our lives to a great extent, has turned out to be one of the most important resources to be used in building an effective and fruitful educational atmosphere. Nowadays, technology is a significant means of arranging educational activities at all levels of education such as primary, secondary or tertiary education. This study aims at analyzing the attitudes of prep-class students towards computer-based foreign language education. Within the scope of this study, prep-class students at a university in Ankara, Turkey in 2013-2014 Academic Year participated in this study. The participants were asked to fill in 'Computer-Based Educational Attitude Scale.' The data gathered in this study were analyzed by means of using statistical devices such as means, standard deviation, percentage as well as t-test and ANOVA. At the end of the analysis, it was found out that the participants had a highly positive attitude towards computer-based language education.

Keywords: computer-based education, foreign language education, higher education, prep-class

Procedia PDF Downloads 418
14336 Scheduling in Cloud Networks Using Chakoos Algorithm

Authors: Masoumeh Ali Pouri, Hamid Haj Seyyed Javadi

Abstract:

Nowadays, cloud processing is one of the important issues in information technology. Since scheduling of tasks graph is an NP-hard problem, considering approaches based on undeterminisitic methods such as evolutionary processing, mostly genetic and cuckoo algorithms, will be effective. Therefore, an efficient algorithm has been proposed for scheduling of tasks graph to obtain an appropriate scheduling with minimum time. In this algorithm, the new approach is based on making the length of the critical path shorter and reducing the cost of communication. Finally, the results obtained from the implementation of the presented method show that this algorithm acts the same as other algorithms when it faces graphs without communication cost. It performs quicker and better than some algorithms like DSC and MCP algorithms when it faces the graphs involving communication cost.

Keywords: cloud computing, scheduling, tasks graph, chakoos algorithm

Procedia PDF Downloads 45
14335 A Communication Signal Recognition Algorithm Based on Holder Coefficient Characteristics

Authors: Hui Zhang, Ye Tian, Fang Ye, Ziming Guo

Abstract:

Communication signal modulation recognition technology is one of the key technologies in the field of modern information warfare. At present, communication signal automatic modulation recognition methods are mainly divided into two major categories. One is the maximum likelihood hypothesis testing method based on decision theory, the other is a statistical pattern recognition method based on feature extraction. Now, the most commonly used is a statistical pattern recognition method, which includes feature extraction and classifier design. With the increasingly complex electromagnetic environment of communications, how to effectively extract the features of various signals at low signal-to-noise ratio (SNR) is a hot topic for scholars in various countries. To solve this problem, this paper proposes a feature extraction algorithm for the communication signal based on the improved Holder cloud feature. And the extreme learning machine (ELM) is used which aims at the problem of the real-time in the modern warfare to classify the extracted features. The algorithm extracts the digital features of the improved cloud model without deterministic information in a low SNR environment, and uses the improved cloud model to obtain more stable Holder cloud features and the performance of the algorithm is improved. This algorithm addresses the problem that a simple feature extraction algorithm based on Holder coefficient feature is difficult to recognize at low SNR, and it also has a better recognition accuracy. The results of simulations show that the approach in this paper still has a good classification result at low SNR, even when the SNR is -15dB, the recognition accuracy still reaches 76%.

Keywords: communication signal, feature extraction, Holder coefficient, improved cloud model

Procedia PDF Downloads 135
14334 Liability of AI in Workplace: A Comparative Approach Between Shari’ah and Common Law

Authors: Barakat Adebisi Raji

Abstract:

In the workplace, Artificial Intelligence has, in recent years, emerged as a transformative technology that revolutionizes how organizations operate and perform tasks. It is a technology that has a significant impact on transportation, manufacturing, education, cyber security, robotics, agriculture, healthcare, and so many other organizations. By harnessing AI technology, workplaces can enhance productivity, streamline processes, and make more informed decisions. Given the potential of AI to change the way we work and its impact on the labor market in years to come, employers understand that it entails legal challenges and risks despite the advantages inherent in it. Therefore, as AI continues to integrate into various aspects of the workplace, understanding the legal and ethical implications becomes paramount. Also central to this study is the question of who is held liable where AI makes any defaults; the person (company) who created the AI, the person who programmed the AI algorithm or the person who uses the AI? Thus, the aim of this paper is to provide a detailed overview of how AI-related liabilities are addressed under each legal tradition and shed light on potential areas of accord and divergence between the two legal cultures. The objectives of this paper are to (i) examine the ability of Common law and Islamic law to accommodate the issues and damage caused by AI in the workplace and the legality of compensation for such injury sustained; (ii) to discuss the extent to which AI can be described as a legal personality to bear responsibility: (iii) examine the similarities and disparities between Common Law and Islamic Jurisprudence on the liability of AI in the workplace. The methodology adopted in this work was qualitative, and the method was purely a doctrinal research method where information is gathered from the primary and secondary sources of law, such as comprehensive materials found in journal articles, expert-authored books and online news sources. Comparative legal method was also used to juxtapose the approach of Islam and Common Law. The paper concludes that since AI, in its current legal state, is not recognized as a legal entity, operators or manufacturers of AI should be held liable for any damage that arises, and the determination of who bears the responsibility should be dependent on the circumstances surrounding each scenario. The study recommends the granting of legal personality to AI systems, the establishment of legal rights and liabilities for AI, the establishment of a holistic Islamic virtue-based AI ethics framework, and the consideration of Islamic ethics.

Keywords: AI, health- care, agriculture, cyber security, common law, Shari'ah

Procedia PDF Downloads 19
14333 The Use of Emerging Technologies in Higher Education Institutions: A Case of Nelson Mandela University, South Africa

Authors: Ayanda P. Deliwe, Storm B. Watson

Abstract:

The COVID-19 pandemic has disrupted the established practices of higher education institutions (HEIs). Most higher education institutions worldwide had to shift from traditional face-to-face to online learning. The online environment and new online tools are disrupting the way in which higher education is presented. Furthermore, the structures of higher education institutions have been impacted by rapid advancements in information and communication technologies. Emerging technologies should not be viewed in a negative light because, as opposed to the traditional curriculum that worked to create productive and efficient researchers, emerging technologies encourage creativity and innovation. Therefore, using technology together with traditional means will enhance teaching and learning. Emerging technologies in higher education not only change the experience of students, lecturers, and the content, but it is also influencing the attraction and retention of students. Higher education institutions are under immense pressure because not only are they competing locally and nationally, but emerging technologies also expand the competition internationally. Emerging technologies have eliminated border barriers, allowing students to study in the country of their choice regardless of where they are in the world. Higher education institutions are becoming indifferent as technology is finding its way into the lecture room day by day. Academics need to utilise technology at their disposal if they want to get through to their students. Academics are now competing for students' attention with social media platforms such as WhatsApp, Snapchat, Instagram, Facebook, TikTok, and others. This is posing a significant challenge to higher education institutions. It is, therefore, critical to pay attention to emerging technologies in order to see how they can be incorporated into the classroom in order to improve educational quality while remaining relevant in the work industry. This study aims to understand how emerging technologies have been utilised at Nelson Mandela University in presenting teaching and learning activities since April 2020. The primary objective of this study is to analyse how academics are incorporating emerging technologies in their teaching and learning activities. This primary objective was achieved by conducting a literature review on clarifying and conceptualising the emerging technologies being utilised by higher education institutions, reviewing and analysing the use of emerging technologies, and will further be investigated through an empirical analysis of the use of emerging technologies at Nelson Mandela University. Findings from the literature review revealed that emerging technology is impacting several key areas in higher education institutions, such as the attraction and retention of students, enhancement of teaching and learning, increase in global competition, elimination of border barriers, and highlighting the digital divide. The literature review further identified that learning management systems, open educational resources, learning analytics, and artificial intelligence are the most prevalent emerging technologies being used in higher education institutions. The identified emerging technologies will be further analysed through an empirical analysis to identify how they are being utilised at Nelson Mandela University.

Keywords: artificial intelligence, emerging technologies, learning analytics, learner management systems, open educational resources

Procedia PDF Downloads 56
14332 A Risk Management Approach for Nigeria Manufacturing Industries

Authors: Olaniyi O. Omoyajowo

Abstract:

To be successful in today’s competitive global environment, manufacturing industry must be able to respond quickly to changes in technology. These changes in technology introduce new risks and hazards. The management of risk/hazard in a manufacturing process recommends method through which the success rate of an organization can be increased. Thus, there is a continual need for manufacturing industries to invest significant amount of resources in risk management, which in turn optimizes the production output and profitability of any manufacturing industry (if implemented properly). To help improve the existing risk prevention and mitigation practices in Small and Medium Enterprise (SME) in Nigeria Manufacturing Industries (NMI), the researcher embarks on this research to develop a systematic Risk Management process.

Keywords: manufacturing management, risk, risk management, SMEs

Procedia PDF Downloads 380
14331 Modeling Core Flooding Experiments for Co₂ Geological Storage Applications

Authors: Avinoam Rabinovich

Abstract:

CO₂ geological storage is a proven technology for reducing anthropogenic carbon emissions, which is paramount for achieving the ambitious net zero emissions goal. Core flooding experiments are an important step in any CO₂ storage project, allowing us to gain information on the flow of CO₂ and brine in the porous rock extracted from the reservoir. This information is important for understanding basic mechanisms related to CO₂ geological storage as well as for reservoir modeling, which is an integral part of a field project. In this work, a different method for constructing accurate models of CO₂-brine core flooding will be presented. Results for synthetic cases and real experiments will be shown and compared with numerical models to exhibit their predictive capabilities. Furthermore, the various mechanisms which impact the CO₂ distribution and trapping in the rock samples will be discussed, and examples from models and experiments will be provided. The new method entails solving an inverse problem to obtain a three-dimensional permeability distribution which, along with the relative permeability and capillary pressure functions, constitutes a model of the flow experiments. The model is more accurate when data from a number of experiments are combined to solve the inverse problem. This model can then be used to test various other injection flow rates and fluid fractions which have not been tested in experiments. The models can also be used to bridge the gap between small-scale capillary heterogeneity effects (sub-core and core scale) and large-scale (reservoir scale) effects, known as the upscaling problem.

Keywords: CO₂ geological storage, residual trapping, capillary heterogeneity, core flooding, CO₂-brine flow

Procedia PDF Downloads 56
14330 Investigation of Resilient Circles in Local Community and Industry: Waju-Traditional Culture in Japan and Modern Technology Application

Authors: R. Ueda

Abstract:

Today global society is seeking resilient partnership in local organizations and individuals, which realizes multi-stakeholders relationship. Although it is proposed by modern global framework of sustainable development, it is conceivable that such affiliation can be found out in the traditional local community in Japan, and that traditional spirit is tacitly sustaining in modern context of disaster mitigation in society and economy. Then this research is aiming to clarify and analyze implication for the global world by actual case studies. Regional and urban resilience is the ability of multi-stakeholders to cooperate flexibly and to adapt in response to changes in the circumstances caused by disasters, but there are various conflicts affecting coordination of disaster relief measures. These conflicts arise not only from a lack of communication and an insufficient network, but also from the difficulty to jointly draw common context from fragmented information. This is because of the weakness of our modern engineering which focuses on maintenance and restoration of individual systems. Here local ‘circles’ holistically includes local community and interacts periodically. Focusing on examples of resilient organizations and wisdom created in communities, what can be seen throughout history is a virtuous cycle where the information and the knowledge are structured, the context to be adapted becomes clear, and an adaptation at a higher level is made possible, by which the collaboration between organizations is deepened and expanded. And the wisdom of a solid and autonomous disaster prevention formed by the historical community called’ Waju’ – an area surrounded by circle embankment to protect the settlement from flood – lives on in government efforts of the coastal industrial island of today. Industrial company there collaborates to create a circle including common evacuation space, road access improvement and infrastructure recovery. These days, people here adopts new interface technology. Large-scale AR- Augmented Reality for more than hundred people is expressing detailed hazard by tsunami and liquefaction. Common experiences of the major disaster space and circle of mutual discussion are enforcing resilience. Collaboration spirit lies in the center of circle. A consistent key point is a virtuous cycle where the information and the knowledge are structured, the context to be adapted becomes clear, and an adaptation at a higher level is made possible, by which the collaboration between organizations is deepened and expanded. This writer believes that both self-governing human organizations and the societal implementation of technical systems are necessary. Infrastructure should be autonomously instituted by associations of companies and other entities in industrial areas for working closely with local governments. To develop advanced disaster prevention and multi-stakeholder collaboration, partnerships among industry, government, academia and citizens are important.

Keywords: industrial recovery, multi-sakeholders, traditional culture, user experience, Waju

Procedia PDF Downloads 101
14329 Development of a Catalogs System for Augmented Reality Applications

Authors: J. Ierache, N. A. Mangiarua, S. A. Bevacqua, N. N. Verdicchio, M. E. Becerra, D. R. Sanz, M. E. Sena, F. M. Ortiz, N. D. Duarte, S. Igarza

Abstract:

Augmented Reality is a technology that involves the overlay of virtual content, which is context or environment sensitive, on images of the physical world in real time. This paper presents the development of a catalog system that facilitates and allows the creation, publishing, management and exploitation of augmented multimedia contents and Augmented Reality applications, creating an own space for anyone that wants to provide information to real objects in order to edit and share it then online with others. These spaces would be built for different domains without the initial need of expert users. Its operation focuses on the context of Web 2.0 or Social Web, with its various applications, developing contents to enrich the real context in which human beings act permitting the evolution of catalog’s contents in an emerging way.

Keywords: augmented reality, catalog system, computer graphics, mobile application

Procedia PDF Downloads 336
14328 Implementation of Building Information Modeling in Turkish Government Sector Projects

Authors: Mohammad Lemar Zalmai, Mustafa Nabi Kocakaya, Cemil Akcay, Ekrem Manisali

Abstract:

In recent years, the Building Information Modeling (BIM) approach has been developed expeditiously. As people see the benefits of this approach, it has begun to be used widely in construction projects and some countries made it mandatory to get more benefits from it. To promote the implementation of BIM in construction projects, it will be helpful to get some relevant information from surveys and interviews. The purpose of this study is to research the current adoption and implementation of BIM in public projects in Turkey. This study specified the challenges of BIM implementation in Turkey and proposed some solutions to overcome them. In this context, the challenges for BIM implementation and the factors that affect the BIM usage are determined based on previous academic researches and expert opinions by conducting interviews and questionnaire surveys. Several methods are used to process information in order to obtain weights of different factors to make BIM widespread in Turkey. This study concluded interviews' and questionnaire surveys' outcomes and proposed some suggestions to promote the implementation of BIM in Turkey. We believe research findings will be a good reference for boosting BIM implementation in Turkey.

Keywords: building information modelling, BIM implementations, Turkish construction industry, Turkish government sector projects

Procedia PDF Downloads 123
14327 Examining Cyber Crime and Its Impacts on E-Banking in Nigeria

Authors: Auwal Nata'ala

Abstract:

The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective.

Keywords: cyber crimes, e-banking, policies, ICT

Procedia PDF Downloads 398
14326 Complex Technology of Virtual Reconstruction: The Case of Kazan Imperial University of XIX-Early XX Centuries

Authors: L. K. Karimova, K. I. Shariukova, A. A. Kirpichnikova, E. A. Razuvalova

Abstract:

This article deals with technology of virtual reconstruction of Kazan Imperial University of XIX - early XX centuries. The paper describes technologies of 3D-visualization of high-resolution models of objects of university space, creation of multi-agent system and connected with these objects organized database of historical sources, variants of use of technologies of immersion into the virtual environment.

Keywords: 3D-reconstruction, multi-agent system, database, university space, virtual reconstruction, virtual heritage

Procedia PDF Downloads 252
14325 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation

Authors: Mohammad Hadi Khorashadi Zadeh

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Keywords: BYOD, mobile cloud computing, mobile security, information management

Procedia PDF Downloads 298
14324 The Issue of Online Fake News and Disinformation: Criminal and Criminological Aspects of Prevention

Authors: Fotios Spyropoulos, Evangelia Androulaki, Vasileios Karagiannopoulos, Aristotelis Kompothrekas, Nikolaos Karagiannis

Abstract:

The problem of 'fake news' and 'hoaxes' has dominated in recent years the field of news, politics, economy, safety, and security as dissemination of false information can intensively affect and mislead public discourse and public opinion. The widespread use of internet and social media platforms can substantially intensify these effects, which often include public fear and insecurity. Misinformation, malinformation, and disinformation have also been blamed for affecting election results in multiple countries, and since then, there have been efforts to tackle the phenomenon both on national and international level. The presentation will focus on methods of prevention of disseminating false information on social media and on the internet and will discuss relevant criminological views. The challenges that have arisen for criminal law will be covered, taking into account the potential need for a multi-national approach required in order to mitigate the extent and negative impact of the fake news phenomenon. Finally, the analysis will include a discussion on the potential usefulness of non-legal modalities of regulation and crime prevention, especially situational and social measures of prevention and the possibility of combining an array of methods to achieve better results on national and international level. This project has received funding from the Hellenic Foundation for Research and Innovation (HFRI) and the General Secretariat for Research and Technology (GSRT), under grant agreement No 80529.

Keywords: cybercrime, disinformation, fake news, prevention

Procedia PDF Downloads 131
14323 Resilience with Spontaneous Volunteers in Disasters-Coordination Using an It System

Authors: Leo Latasch, Mario Di Gennaro

Abstract:

Introduction: The goal of this project was to increase the resilience of the population as well as rescue organizations to make both quality and time-related improvements in handling crises. A helper network was created for this purpose. Methods: Social questions regarding the structure and purpose of helper networks were considered - specifically with regard to helper motivation, the level of commitment and collaboration between populations and agencies. The exchange of information, the coordinated use of volunteers, and the distribution of available resources will be ensured through defined communication and cooperation routines. Helper smartphones will also be used provide a picture of the situation on the ground. Results: The helper network was established and deployed based on the RESIBES information technology system. It consists of a service platform, a web portal and a smartphone app. The service platform is the central element for collaboration between the various rescue organizations, as well as for persons, associations, and companies from the population offering voluntary aid. The platform was used for: Registering helpers and resources and then requesting and assigning it in case of a disaster. These services allow the population's resources to be organized. The service platform also allows for a secure data exchange between services and external systems. Conclusions: The social and technical work priorities have allowed us to cover a full cycle of advance structural work, gaining an overview, damage management, evaluation, and feedback on experiences. This cycle allows experiences gained while handling the crisis to feed back into the cycle and improve preparations and management strategies.

Keywords: coordination, disaster, resilience, volunteers

Procedia PDF Downloads 121
14322 Throughput of Point Coordination Function (PCF)

Authors: Faisel Eltuhami Alzaalik, Omar Imhemed Alramli, Ahmed Mohamed Elaieb

Abstract:

The IEEE 802.11 defines two modes of MAC, distributed coordination function (DCF) and point coordination function (PCF) mode. The first sub-layer of the MAC is the distributed coordination function (DCF). A contention algorithm is used via DCF to provide access to all traffic. The point coordination function (PCF) is the second sub-layer used to provide contention-free service. PCF is upper DCF and it uses features of DCF to establish guarantee access of its users. Some papers and researches that have been published in this technology were reviewed in this paper, as well as talking briefly about the distributed coordination function (DCF) technology. The simulation of the PCF function have been applied by using a simulation program called network simulator (NS2) and have been found out the throughput of a transmitter system by using this function.

Keywords: DCF, PCF, throughput, NS2

Procedia PDF Downloads 565
14321 Water Quality Calculation and Management System

Authors: H. M. B. N Jayasinghe

Abstract:

The water is found almost everywhere on Earth. Water resources contain a lot of pollution. Some diseases can be spread through the water to the living beings. So to be clean water it should undergo a number of treatments necessary to make it drinkable. So it is must to have purification technology for the wastewater. So the waste water treatment plants act a major role in these issues. When considering the procedures taken after the water treatment process was always based on manual calculations and recordings. Water purification plants may interact with lots of manual processes. It means the process taking much time consuming. So the final evaluation and chemical, biological treatment process get delayed. So to prevent those types of drawbacks there are some computerized programmable calculation and analytical techniques going to be introduced to the laboratory staff. To solve this problem automated system will be a solution in which guarantees the rational selection. A decision support system is a way to model data and make quality decisions based upon it. It is widely used in the world for the various kind of process automation. Decision support systems that just collect data and organize it effectively are usually called passive models where they do not suggest a specific decision but only reveal information. This web base system is based on global positioning data adding facility with map location. Most worth feature is SMS and E-mail alert service to inform the appropriate person on a critical issue. The technological influence to the system is HTML, MySQL, PHP, and some other web developing technologies. Current issues in the computerized water chemistry analysis are not much deep in progress. For an example the swimming pool water quality calculator. The validity of the system has been verified by test running and comparison with an existing plant data. Automated system will make the life easier in productively and qualitatively.

Keywords: automated system, wastewater, purification technology, map location

Procedia PDF Downloads 234
14320 Validation of Contemporary Physical Activity Tracking Technologies through Exercise in a Controlled Environment

Authors: Reem I. Altamimi, Geoff D. Skinner

Abstract:

Extended periods engaged in sedentary behavior increases the risk of becoming overweight and/or obese which is linked to other health problems. Adding technology to the term ‘active living’ permits its inclusion in promoting and facilitating habitual physical activity. Technology can either act as a barrier to, or facilitate this lifestyle, depending on the chosen technology. Physical Activity Monitoring Technologies (PAMTs) are a popular example of such technologies. Different contemporary PAMTs have been evaluated based on customer reviews; however, there is a lack of published experimental research into the efficacy of PAMTs. This research aims to investigate the reliability of four PAMTs: two wristbands (Fitbit Flex and Jawbone UP), a waist-clip (Fitbit One), and a mobile application (iPhone Health Application) for recording a specific distance walked on a treadmill (1.5km) at constant speed. Physical activity tracking technologies are varied in their recordings, even while performing the same activity. This research demonstrates that Jawbone UP band recorded the most accurate distance compared to Fitbit One, Fitbit Flex, and iPhone Health Application.

Keywords: Fitbit, jawbone up, mobile tracking applications, physical activity tracking technologies

Procedia PDF Downloads 307
14319 Converse to the Sherman Inequality with Applications in Information Theory

Authors: Ana Barbir, S. Ivelic Bradanovic, D. Pecaric, J. Pecaric

Abstract:

We proved a converse to Sherman's inequality. Using the concept of f-divergence we obtained some inequalities for the well-known entropies, such as Shannon entropies that have many applications in many applied sciences, for example, in information theory, biology and economics Zipf-Mandelbrot law gave improvement in account for the low-rankwords in corpus. Applications of Zipf-Mandelbrot law can be found in linguistics, information sciences and also mostly applicable in ecological eld studies. We also introduced an entropy by applying the Zipf-Mandelbrot law and derived some related inequalities.

Keywords: f-divergence, majorization inequality, Sherman inequality, Zipf-Mandelbrot entropy

Procedia PDF Downloads 154
14318 Using Social Network Analysis for Cyber Threat Intelligence

Authors: Vasileios Anastopoulos

Abstract:

Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.

Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis

Procedia PDF Downloads 146
14317 Corporate Profitability through Effective Supply Chain Performance

Authors: Tareq N. Issa

Abstract:

The main pressuring challenges of global competition and high returns have forced businesses to shift their strategic competitive advantage from physical distribution management to integrated logistics management, finally moving into supply chain management. Conventionally, corporate profitability is a function of cost, capital employed, revenue and customer service. This article gives an insight into the effect of supply chain management on each of the above variables. It investigates the impact of the changing levels/ effects of these variables on corporate profitability and the means of measuring supply chain financial effectiveness. Information technology tools form the basis for supply chain optimal performance through alignment of supply chain systems in this ever increasing complexity in business decisions.

Keywords: corporate profitability, sypply chain systems, business decisions, competitive advanage

Procedia PDF Downloads 319
14316 A Case Study on Indian Translation Ecosystem of Point-Of-Care Solutions

Authors: Tripta Dixit, Smita Sahu, William Selvamurthy, Sadhana Srivastava

Abstract:

The translation of healthcare technologies is an expensive, complex affair, current healthcare challenges in Asian countries and their efforts to meet Millennium Development Goals (MDGs), necessitates continuous technology advancement to save countless lives, improve the quality of life and for socio-economic development. India’s consistently improving global innovation index (57) demonstrates its innovation potential, but access to health care is asymmetric and lacks priority in India. Therefore, there is utmost need of a robust translation system for point-of-care (POC) solutions, inexpensive, low-maintenance, reliable, and easy-to-use diagnostic technologies. Few cases of POC technologies viz. Elisa based diagnostic kits for regional viral disease, a device for detection of cancerous lesions were studied to understand the process and challenges involved in their translation. Accordingly, the entire translation ecosystem was summarized proposing a nexus of various actors such as technology developer, technology transferor technology receiver, funding entities, government/regulatory bodies and their effect on translation of different medical technologies. This study highlights the role and concerns pertaining to these actors for POC such as unsystematic and unvalidated research roadmap, low profit preposition, unfocused approach of up-scaling, low market acceptability and multiple window regulatory framework, etc. This provides an opportunity to devise solutions to overcome problem areas in translation path.

Keywords: healthcare technologies, point-of-care solutions, public health, translation

Procedia PDF Downloads 159
14315 Stereoscopic Motion Design: Design Futures

Authors: Edgar Teixeira, Eurico Carrapatoso

Abstract:

As 3D displays become increasingly affordable, while production techniques and computational resources to create stereoscopic content being ever more accessible, a new dimension is literally introduced along with new expressive and immersive potentialities in support of designing for the screen. Prospective design visionaries have already at the reach of their hands an innovative and powerful visualization technology, which enables them to actively envision future trends and vanguardist directions. This paper explores the aesthetic and informational potentialities of stereoscopic motion graphics, providing insight on the application of 3D displays in design practice, proposing strategies to investigate stereoscopic communication, discussing potential repercussions to extant theory and impacts on audience.

Keywords: design, visual communication, technology, stereoscopy, 3D media

Procedia PDF Downloads 387
14314 Market Competition and the Adoption of Clean Technology: Evidence from the Taxi Industry

Authors: Raúl Bajo-Buenestado

Abstract:

This paper studies the impact of the intensity of market competition on firms' willingness to adopt green technologies —which has become particularly relevant in the light of the debate on whether competition policies should be relaxed to achieve certain environmental targets. We exploit the staggered rollout of different rail-hailing platforms (most notably, Uber) across different metropolitan areas in Spain as a natural experiment that provides time and city-specific exogenous variation in the intensity of competition to study the impact on taxi drivers' decisions to purchase “green” or “dirty” vehicles. It was shown that the entry of these platforms significantly increased the takeout of green vehicles among professional drivers in incumbent (dominant) conventional taxi companies and decreased that of dirty vehicles. The exact opposite effect is observed in the cities where these platforms were extremely unlikely to enter. Back of the envelope calculations suggest that the entry of Uber is associated with an extra green vehicle purchase in every four among taxi drivers, resulting in a substantial drop in the level of emissions from the taxi fleet —still mostly dominated diesel vehicles.

Keywords: technological change, green technology adoption, market competition, diffusion of technology, environmental externalities

Procedia PDF Downloads 129
14313 Health Care Providers' Perceptions on mHealth Workplace Nutrition Wellness Program: A Thematic Analysis

Authors: Kim H. K. Choy, Oliva H. K. Chu, W. Y. Keung, B. Lim, Winnie P. Y. Tang

Abstract:

Background: Health care providers have been identified as an at-risk group for obesity. Mobile health technology can be used to motivate lifestyle behavioral changes. The aim of this study was to investigate hospital-based health care providers’ perceptions of mHealth Workplace Nutrition Wellness Program. Methods: This qualitative study was conducted at a regional hospital in Hong Kong. Ten health care providers were purposively selected for the study. Qualitative data was collected by individual face-to-face semi-structured interviews which were audio-taped, transcribed verbatim and analyzed by thematic analysis. Results: Four themes were identified: (1) mobile health technology motivates lifestyle changes, (2) self-perceived body weight initiates health behavioral changes, (3) organizational support promotes healthy behavior, (4) lack of self-confidence hinders lifestyle modification. The health care providers’ perceptions of mobile health technology, barriers, and facilitators to participation in the mHealth Workplace Nutrition Wellness Program were discussed in the study. Conclusions: Barriers, facilitators, self-perceived body weight and experiences of mobile health technology were associated with intention of participation in mHealth Workplace Nutrition Wellness Program. The knowledge generated from the study could be used to guide the design and implementation of effective interventions, strategies and policies of workplace wellness programs to promote participation for hospital’s employees.

Keywords: workplace wellness program, mobile health, barriers, facilitators, qualitative

Procedia PDF Downloads 242
14312 High Performance Concrete Using “BAUT” (Metal Aggregates) the Gateway to New Concrete Technology for Mega Structures

Authors: Arjun, Gautam, Sanjeev Naval

Abstract:

Concrete technology has been changing rapidly and constantly since its discovery. Concrete is the most widely used man-made construction material, versatility of making concrete is the 2nd largest consumed material on earth. In this paper an effort has been made to use metal aggregates in concrete has been discussed, the metal aggregates has been named as “BAUT” which had outstandingly qualities to resist shear, tension and compression forces. In this paper, COARSE BAUT AGGREGATES (C.B.A.) 10mm & 20mm and FINE BAUT AGGREGATES (F.B.A.) 3mm were divided and used for making high performance concrete (H.P.C). This “BAUT” had cutting edge technology through draft and design by the use of Auto CAD, ANSYS software can be used effectively In this research paper we study high performance concrete (H.P.C) with “BAUT” and consider the grade of M65 and finally we achieved the result of 90-95 Mpa (high compressive strength) for mega structures and irregular structures where center of gravity (CG) is not balanced. High Performance BAUT Concrete is the extraordinary qualities like long-term performance, no sorptivity by BAUT AGGREGATES, better rheological, mechanical and durability proportion that conventional concrete. This high strength BAUT concrete using “BAUT” is applied in the construction of mega structure like skyscrapers, dam, marine/offshore structures, nuclear power plants, bridges, blats and impact resistance structures. High Performance BAUT Concrete which is a controlled concrete possesses invariable high strength, reasonable workability and negligibly permeability as compare to conventional concrete by the mix of Super Plasticizers (SMF), silica fume and fly ash.

Keywords: BAUT, High Strength Concrete, High Performance Concrete, Fine BAUT Aggregate, Coarse BAUT Aggregate, metal aggregates, cutting edge technology

Procedia PDF Downloads 487
14311 Parents-Children Communication in College

Authors: Yin-Chen Liu, Chih-Chun Wu, Mei-He Shih

Abstract:

In this technology society, using ICT(Information and communications technology) to contact each other is very common. Interpersonal ICT communication maintains social support. Therefore, the study investigated the ICT communication between undergraduates and their parents, and gender differences were also detected. The sample size was 1,209 undergraduates, including 624(51.6%) males, 584(48.3%) females, and 1 gender unidentified. In the sample, 91.8% of the sample used phones to contact their fathers and 93.8% of them use phones to contact their mothers. 78.5% and 87.6% of the sample utilized LINE to contact their fathers and mothers respectively. As for Facebook, only 13.4% and 16.5% of the sample would use to contact their fathers and mothers respectively. Aforementioned results implied that the undergraduates nowadays use phone and LINE to contact their parents more common than Facebook. According to results from Pearson correlations, the more undergraduates refused to add their fathers as their Facebook friends, the more they refused to add their mothers as Facebook friends. The possible reasons for it could be that to distinguish different social network such as family and friends. Another possible reason could be avoiding parents’ controlling. It could be why the kids prefer to use phone and LINE to Facebook when contacting their parents. Result from Pearson correlations showed that the more undergraduates actively contact their fathers, the more they actively contact their mothers. On the other hand, the more their fathers actively contact them, the more their mothers actively contact them. Based on the results, this study encourages both parents and undergraduates to contact each other, for any contact between any two family members is associated with contact between other two family members. Obviously, the contact between family members is bidirectional. Future research might want to investigate if this bidirectional contact is associated with the family relation. For gender differences, results from the independent t-tests showed that compared to sons, daughters actively contacted their parents more. Maybe it is because parents keep saying that it is dangerous out there for their daughters, so they build up the habit for their daughters to contact them more. Results from paired sample t-tests showed that the undergraduates agreed that talking to mother on the phone had more satisfaction, felt more intimacy and supported than fathers.

Keywords: family ICT communication, parent-child ICT communication, FACEBOOK and LINE, gender differences

Procedia PDF Downloads 186
14310 Interest Rate of Managers and Tourism Officials over E-Tourism Development: Case Study of Lenjan City

Authors: Akram Shahriyari, Reza Mokhtari Malek Abadi

Abstract:

E-tourism is among the issues that have recently been entered into the field of tourism. In order to achieve this type of tourism, Information and Communications Technology (or ICT) infrastructures as well as Co-governmental organizations and tourism resources are important. In this study, the opinions of managers and tourism officials about the e-tourism in Lenjan city were measured; it also surveyed the impact of level of digital literacy of managers and tourism officials on attracting tourists in Lenjan city. This study was conducted in Lenjan, one of the environs of the Esfahan province. This study is a documentary – survey and the sources include library resources and also questionnaires. The results obtained indicate that if managers use ICT, it may help e-tourism to be developed in the region, and increasing managers’ beliefs on e-tourism and upgrading their level of digital literacy may affect e-tourism development.

Keywords: ICT, e-tourism, opinion of managers and officials, Lejnan

Procedia PDF Downloads 416