Search results for: user preference
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2794

Search results for: user preference

934 Offline Signature Verification in Punjabi Based On SURF Features and Critical Point Matching Using HMM

Authors: Rajpal Kaur, Pooja Choudhary

Abstract:

Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capabilities to the reliably distinguish between an authorized person and an imposter. The Signature recognition systems can categorized as offline (static) and online (dynamic). This paper presents Surf Feature based recognition of offline signatures system that is trained with low-resolution scanned signature images. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However the signatures of human can be handled as an image and recognized using computer vision and HMM techniques. With modern computers, there is need to develop fast algorithms for signature recognition. There are multiple techniques are defined to signature recognition with a lot of scope of research. In this paper, (static signature) off-line signature recognition & verification using surf feature with HMM is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified depended on parameters extracted from the signature using various image processing techniques. The Off-line Signature Verification and Recognition is implemented using Mat lab platform. This work has been analyzed or tested and found suitable for its purpose or result. The proposed method performs better than the other recently proposed methods.

Keywords: offline signature verification, offline signature recognition, signatures, SURF features, HMM

Procedia PDF Downloads 385
933 Electric Vehicle Market Penetration Impact on Greenhouse Gas Emissions for Policy-Making: A Case Study of United Arab Emirates

Authors: Ahmed Kiani

Abstract:

The United Arab Emirates is clearly facing a multitude of challenges in curbing its greenhouse gas emissions to meet its pre-allotted framework of Kyoto protocol and COP21 targets due to its hunger for modernization, industrialization, infrastructure growth, soaring population and oil and gas activity. In this work, we focus on the bonafide zero emission electric vehicles market penetration in the country’s transport industry for emission reduction. We study the global electric vehicle market trends, the complementary battery technologies and the trends by manufacturers, emission standards across borders and prioritized advancements which will ultimately dictate the terms of future conditions for the United Arab Emirate transport industry. Based on our findings and analysis at every stage of current viability and state-of-transport-affairs, we postulate policy recommendations to local governmental entities from a supply and demand perspective covering aspects of technology, infrastructure requirements, change in power dynamics, end user incentives program, market regulators behavior and communications amongst key stakeholders. 

Keywords: electric vehicles, greenhouse gas emission reductions, market analysis, policy recommendations

Procedia PDF Downloads 310
932 Efficient HVAC System in Green Building Design

Authors: Omid Khabiri, Maryam Ghavami

Abstract:

Buildings designed and built as high performance, sustainable or green are the vanguard in a movement to make buildings more energy efficient and less environmentally harmful. Although Heating, Ventilating, and Air Conditioning (HVAC) systems offer many opportunities for recovery and re-use of thermal energy; however, the amount of energy used annually by these systems typically ranges from 40 to 60 percent of the overall energy consumption in a building, depending on the building design, function, condition, climate, and the use of renewable energy strategies. HVAC systems may also damage the environment by unnecessary use of non-renewable energy sources, which contribute to environmental pollution, and by creating noise and discharge of contaminated water and air containing chemicals, lubricating oils, refrigerants, heat transfer fluids, and particulate (gases matter). In fact, HVAC systems will significantly impact how “green” a building is, where an efficient HVAC system design can result in considerable energy, emissions and cost savings as well as providing increased user thermal comfort. This paper presents the basic concepts of green building design and discusses the role of efficient HVAC system and practical strategies for ensuring high performance sustainable buildings in design and operation.

Keywords: green building, hvac system, design strategies, high-performance equipment, efficient technologies

Procedia PDF Downloads 577
931 Internet of Things Based Patient Health Monitoring System

Authors: G. Yoga Sairam Teja, K. Harsha Vardhan, A. Vinay Kumar, K. Nithish Kumar, Ch. Shanthi Priyag

Abstract:

The emergence of the Internet of Things (IoT) has facilitated better device control and monitoring in the modern world. The constant monitoring of a patient would be drastically altered by the usage of IoT in healthcare. As we've seen in the case of the COVID-19 pandemic, it's important to keep oneself untouched while continuously checking on the patient's heart rate and temperature. Additionally, patients with paralysis should be closely watched, especially if they are elderly and in need of special care. Our "IoT BASED PATIENT HEALTH MONITORING SYSTEM" project uses IoT to track patient health conditions in an effort to address these issues. In this project, the main board is an 8051 microcontroller that connects a number of sensors, including a heart rate sensor, a temperature sensor (LM-35), and a saline water measuring circuit. These sensors are connected via an ESP832 (WiFi) module, which enables the sending of recorded data directly to the cloud so that the patient's health status can be regularly monitored. An LCD is used to monitor the data in offline mode, and a buzzer will sound if any variation from the regular readings occurs. The data in the cloud may be viewed as a graph, making it simple for a user to spot any unusual conditions.

Keywords: IoT, ESP8266, 8051 microcontrollers, sensors

Procedia PDF Downloads 88
930 An Implementation of Incentive Systems within Property Life Cycles Will Reward Investors, Planners and Users

Authors: Nadine Wills

Abstract:

The whole life thinking of buildings (independent if these are commercial properties or residential properties) will raise if incentive systems are provided to investors, planners and users. The Use of Building Information Modelling (BIM)-Systems offers planners the possibility to plan and re-plan buildings for decades after a period of utilization without spending many capacities. The strategy-incentive should be to plan the building in a way that makes rescheduling possible by changing just parameters in the system and not re-planning the whole building. If users receive the chance to patient incentive systems, the building stock will have a long life period. Business models of tenant electricity or self-controlled operating costs are incentive systems for building –users to let fixed running costs decline without producing damages due to wrong purposes. BIM is the controlling body to ensure that users do not abuse the incentive solution and take negative influence on the building stock. The investor benefits from the planner’s and user’s incentives: the fact that the building becomes useful for the whole life without making unnecessary investments provides possibilities to make investments in different assets. Moreover, the investor gains the facility to achieve higher rents by merchandise the property with low operating costs. To execute BIM offers whole property life cycles.

Keywords: BIM, incentives, life cycle, sustainability

Procedia PDF Downloads 299
929 Efficacy of a Wiener Filter Based Technique for Speech Enhancement in Hearing Aids

Authors: Ajish K. Abraham

Abstract:

Hearing aid is the most fundamental technology employed towards rehabilitation of persons with sensory neural hearing impairment. Hearing in noise is still a matter of major concern for many hearing aid users and thus continues to be a challenging issue for the hearing aid designers. Several techniques are being currently used to enhance the speech at the hearing aid output. Most of these techniques, when implemented, result in reduction of intelligibility of the speech signal. Thus the dissatisfaction of the hearing aid user towards comprehending the desired speech amidst noise is prevailing. Multichannel Wiener Filter is widely implemented in binaural hearing aid technology for noise reduction. In this study, Wiener filter based noise reduction approach is experimented for a single microphone based hearing aid set up. This method checks the status of the input speech signal in each frequency band and then selects the relevant noise reduction procedure. Results showed that the Wiener filter based algorithm is capable of enhancing speech even when the input acoustic signal has a very low Signal to Noise Ratio (SNR). Performance of the algorithm was compared with other similar algorithms on the basis of improvement in intelligibility and SNR of the output, at different SNR levels of the input speech. Wiener filter based algorithm provided significant improvement in SNR and intelligibility compared to other techniques.

Keywords: hearing aid output speech, noise reduction, SNR improvement, Wiener filter, speech enhancement

Procedia PDF Downloads 247
928 User Selections on Social Network Applications

Authors: C. C. Liang

Abstract:

MSN used to be the most popular application for communicating among social networks, but Facebook chat is now the most popular. Facebook and MSN have similar characteristics, including usefulness, ease-of-use, and a similar function, which is the exchanging of information with friends. Facebook outperforms MSN in both of these areas. However, the adoption of Facebook and abandonment of MSN have occurred for other reasons. Functions can be improved, but users’ willingness to use does not just depend on functionality. Flow status has been established to be crucial to users’ adoption of cyber applications and to affects users’ adoption of software applications. If users experience flow in using software application, they will enjoy using it frequently, and even change their preferred application from an old to this new one. However, no investigation has examined choice behavior related to switching from Facebook to MSN based on a consideration of flow experiences and functions. This investigation discusses the flow experiences and functions of social-networking applications. Flow experience is found to affect perceived ease of use and perceived usefulness; perceived ease of use influences information ex-change with friends, and perceived usefulness; information exchange influences perceived usefulness, but information exchange has no effect on flow experience.

Keywords: consumer behavior, social media, technology acceptance model, flow experience

Procedia PDF Downloads 357
927 Developing a Web-Based Workflow Management System in Cloud Computing Platforms

Authors: Wang Shuen-Tai, Lin Yu-Ching, Chang Hsi-Ya

Abstract:

Cloud computing is the innovative and leading information technology model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. In this paper, we aim at the development of workflow management system for cloud computing platforms based on our previous research on the dynamic allocation of the cloud computing resources and its workflow process. We took advantage of the HTML 5 technology and developed web-based workflow interface. In order to enable the combination of many tasks running on the cloud platform in sequence, we designed a mechanism and developed an execution engine for workflow management on clouds. We also established a prediction model which was integrated with job queuing system to estimate the waiting time and cost of the individual tasks on different computing nodes, therefore helping users achieve maximum performance at lowest payment. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud computing platform. This development also helps boost user productivity by promoting a flexible workflow interface that lets users design and control their tasks' flow from anywhere.

Keywords: web-based, workflow, HTML5, Cloud Computing, Queuing System

Procedia PDF Downloads 309
926 An Evaluation of the Impact of Social Media on Nigerian Youths

Authors: Haruna Shola Adeosun, Lekan M. Togunwa, Ajoke F. Adebiyi

Abstract:

This paper examines the impact of social media on Nigerian Youths particularly in Nigeria. This study reviewed secondary sources data. The research adopted survey method which involves the use of questionnaire that was administered to gather primary data analysis and presentation were done with the use of tables, figures, percentages and chi-square were used to test the hypotheses formulated. The study revealed that social media consumers, especially Facebook are prone to the benefits or risks aspect of its contents. At this expense, what user derived, seeks, sought and gains from such media depend on the motive they are being used for. The study also revealed that users have the tendency to be positively influenced through heavy or over exposure to numerous contents that are damaging and harmful. This means that social media usage may be considered as good or bad. As its contents may or may not subject consumers to vulnerable use depending on what is saved from it. The study recommends that the use of Facebook should be subjected to gate keeping and monitoring in order to control the activities of users that embrace depression, bullying, sexing and sexual harassment as a way of life. Parents should close watch on their children and caution them towards cultivating the habit of over exposure to social sites so at to protect them form risks social media poses.

Keywords: evaluation, impact, soocial media, nigerian youths

Procedia PDF Downloads 287
925 System for the Detecting of Fake Profiles on Online Social Networks Using Machine Learning and the Bio-Inspired Algorithms

Authors: Sekkal Nawel, Mahammed Nadir

Abstract:

The proliferation of online activities on Online Social Networks (OSNs) has captured significant user attention. However, this growth has been hindered by the emergence of fraudulent accounts that do not represent real individuals and violate privacy regulations within social network communities. Consequently, it is imperative to identify and remove these profiles to enhance the security of OSN users. In recent years, researchers have turned to machine learning (ML) to develop strategies and methods to tackle this issue. Numerous studies have been conducted in this field to compare various ML-based techniques. However, the existing literature still lacks a comprehensive examination, especially considering different OSN platforms. Additionally, the utilization of bio-inspired algorithms has been largely overlooked. Our study conducts an extensive comparison analysis of various fake profile detection techniques in online social networks. The results of our study indicate that supervised models, along with other machine learning techniques, as well as unsupervised models, are effective for detecting false profiles in social media. To achieve optimal results, we have incorporated six bio-inspired algorithms to enhance the performance of fake profile identification results.

Keywords: machine learning, bio-inspired algorithm, detection, fake profile, system, social network

Procedia PDF Downloads 68
924 Acceptability Process of a Congestion Charge

Authors: Amira Mabrouk

Abstract:

This paper deals with the acceptability of urban toll in Tunisia. The price-based regulation, i.e. urban toll, is the outcome of a political process hampered by three-fold objectives: effectiveness, equity and social acceptability. This produces both economic interest groups and functions that are of incongruent preferences. The plausibility of this speculation goes hand in hand with the fact that these economic interest groups are also taxpayers who undeniably perceive urban toll as an additional charge. This wariness is coupled with an inquiry about the conditions of usage, the redistribution of the collected tax revenue and the idea of the leviathan state completes the picture. In a nutshell, if researches related to road congestion proliferate, no de facto legitimacy can be pleaded. Nonetheless, the theory on urban tolls engenders economists’ questioning of ways to reduce negative external effects linked to it. Only then does the urban toll appear to bear an answer to these issues. Undeniably, the urban toll suggests inherent conflicts due to the apparent no-payment principal of a public asset as well as to the social perception of the new measure as a mere additional charge. However, when the main concern is effectiveness is its broad sense and the social well-being, the main factors that determine the acceptability of such a tariff measure along with the type of incentives should be the object of a thorough, in-depth analysis. Before adopting this economic role, one has to recognize the factors that intervene in the acceptability of a congestion toll which brought about a copious number of articles and reports that lacked mostly solid theoretical content. It is noticeable that nowadays uncertainties float over the exact nature of the acceptability process. Accepting a congestion tariff could differ from one era to another, from one region to another and from one population to another, etc. Notably, this article, within a convenient time frame, attempts at bringing into focus a link between the social acceptability of the urban congestion toll and the value of time through a survey method barely employed in Tunisia, that of stated preference method. How can the urban toll, as a tax, be defined, justified and made acceptable? How can an equitable and effective tariff of congestion toll be reached? How can the costs of this urban toll be covered? In what way can we make the redistribution of the urban toll revenue visible and economically equitable? How can the redistribution of the revenue of urban toll compensate the disadvantaged while introducing such a tariff measure? This paper will offer answers to these research questions and it follows the line of contribution of JULES DUPUIT in 1844.

Keywords: congestion charge, social perception, acceptability, stated preferences

Procedia PDF Downloads 287
923 The Trigger-DAQ System in the Mu2e Experiment

Authors: Antonio Gioiosa, Simone Doanti, Eric Flumerfelt, Luca Morescalchi, Elena Pedreschi, Gianantonio Pezzullo, Ryan A. Rivera, Franco Spinella

Abstract:

The Mu2e experiment at Fermilab aims to measure the charged-lepton flavour violating neutrino-less conversion of a negative muon into an electron in the field of an aluminum nucleus. With the expected experimental sensitivity, Mu2e will improve the previous limit of four orders of magnitude. The Mu2e data acquisition (DAQ) system provides hardware and software to collect digitized data from the tracker, calorimeter, cosmic ray veto, and beam monitoring systems. Mu2e’s trigger and data acquisition system (TDAQ) uses otsdaq as its solution. developed at Fermilab, otsdaq uses the artdaq DAQ framework and art analysis framework, under-the-hood, for event transfer, filtering, and processing. Otsdaq is an online DAQ software suite with a focus on flexibility and scalability while providing a multi-user, web-based interface accessible through the Chrome or Firefox web browser. The detector read out controller (ROC) from the tracker and calorimeter stream out zero-suppressed data continuously to the data transfer controller (DTC). Data is then read over the PCIe bus to a software filter algorithm that selects events which are finally combined with the data flux that comes from a cosmic ray veto system (CRV).

Keywords: trigger, daq, mu2e, Fermilab

Procedia PDF Downloads 155
922 IAM Smart – A Sustainable Way to Reduce Plastics in Organizations

Authors: Krithika Kumaragurubaran, Mannu Thareja

Abstract:

Saving our planet Earth is the responsibility of every human being. Global warming and carbon emissions are killing our planet. We must adopt sustainable practices to give our future generations an equal opportunity to enjoy this planet Earth, our home. One of the most used unsustainable materials is plastic. Plastics are used everywhere. They are cheap, durable, strong, waterproof, non-corrosive with a long life. So longthat it makes plastic unsustainable. With this paper, we want to bring awareness on the usage of plastic in the organizations and how to reduce it by adopting sustainable practices powered by technology. We have taken a case study on the usage of photo ID cards, which are commonly used for authentication and authorization. These ID cards are used by employees or visitors to get access to the restricted areas inside the office buildings. The scale of these plastic cards can be in thousands for a bigger organization. This paper proposes smart alternatives to Identity and Access Management (IAM) which could replace the traditional method of using plastic ID cards. Further, the proposed solution is secure with multi-factor authentication (MFA), cost effective as there is no need to manage the supply chain of ID cards, provides instant IAM with self-service, and has the convenience of smart phone. Smart IAM is not only user friendly however also environment friendly.

Keywords: sustainability, reduce plastic, IAM (Identity and Access Management), multi-factor authentication

Procedia PDF Downloads 110
921 Exploring the Influence of Normative, Financial and Environmental Decision Frames in Nudging 'Green' Behaviour, and Increasing Uptake of Energy-Efficient Technologies

Authors: Rebecca Hafner, Daniel Read, David Elmes

Abstract:

The persuasive potential of normative and feedback (financial vs. environmental) information in ‘nudging’ people towards making environmentally sound decisions was explored in a hypothetical choice experiment. The research was specifically focused on determining how subtle variations in the decision frame could be used to increase the selection of energy efficient vs. standard technologies, using the context of home heating choice. Participants were given a choice of a standard heating system (a gas boiler) and a relatively more-energy efficient option (a heat pump). The experiment had a 2 (normative vs. no normative information) by 3 feedback type (financial, environmental, none) design. The last group constituted the control. Half of the participants were given normative information about what the majority of others in their neighbourhood had opted to do when faced with the same choice set, prior to making their decision. The other half received no such information. Varying feedback frames were incorporated by providing participants with information on either financial or environmental savings that could be achieved by choosing the heat pump. No such information was provided in the control group. A significant interaction was found between normative information and feedback frame type. Specifically, the impact of feedback frames was found to be reduced when normative information was provided; illustrating the overriding influence of normative information on option preference. Participants were significantly more likely to select the heat pump if they were vs. were not given normative information. Yet when no normative information was provided, the persuasive influence of the financial frame was increased – highlighting this as an effective means of encouraging uptake of new technologies in this instance. Conversely, the environmental frame was not found to differ significantly from the control. Marginal carryover effects were also found for stated future real-life decision-making behaviour, with participants who were versus were not given normative information being marginally more likely to state they would consider installing a heat pump when they next need to replace their heating system in real life. We conclude that normative and financial feedback framing techniques are highly effective in increasing uptake of new, energy efficient heating technologies involving significant upfront financial outlay. The implications for researchers looking to promote ‘green’ choice in the context of new technology adoption are discussed.

Keywords: energy-efficient technology adoption, environmental decision making, financial vs. environmental feedback framing techniques, social norms

Procedia PDF Downloads 308
920 Efficient Schemes of Classifiers for Remote Sensing Satellite Imageries of Land Use Pattern Classifications

Authors: S. S. Patil, Sachidanand Kini

Abstract:

Classification of land use patterns is compelling in complexity and variability of remote sensing imageries data. An imperative research in remote sensing application exploited to mine some of the significant spatially variable factors as land cover and land use from satellite images for remote arid areas in Karnataka State, India. The diverse classification techniques, unsupervised and supervised consisting of maximum likelihood, Mahalanobis distance, and minimum distance are applied in Bellary District in Karnataka State, India for the classification of the raw satellite images. The accuracy evaluations of results are compared visually with the standard maps with ground-truths. We initiated with the maximum likelihood technique that gave the finest results and both minimum distance and Mahalanobis distance methods over valued agriculture land areas. In meanness of mislaid few irrelevant features due to the low resolution of the satellite images, high-quality accord between parameters extracted automatically from the developed maps and field observations was found.

Keywords: Mahalanobis distance, minimum distance, supervised, unsupervised, user classification accuracy, producer's classification accuracy, maximum likelihood, kappa coefficient

Procedia PDF Downloads 184
919 Health and Climate Changes: "Ippocrate" a New Alert System to Monitor and Identify High Risk

Authors: A. Calabrese, V. F. Uricchio, D. di Noia, S. Favale, C. Caiati, G. P. Maggi, G. Donvito, D. Diacono, S. Tangaro, A. Italiano, E. Riezzo, M. Zippitelli, M. Toriello, E. Celiberti, D. Festa, A. Colaianni

Abstract:

Climate change has a severe impact on human health. There is a vast literature demonstrating temperature increase is causally related to cardiovascular problem and represents a high risk for human health, but there are not study that improve a solution. In this work, it is studied how the clime influenced the human parameter through the analysis of climatic conditions in an area of the Apulia Region: Capurso Municipality. At the same time, medical personnel involved identified a set of variables useful to define an index describing health condition. These scientific studies are the base of an innovative alert system, IPPOCRATE, whose aim is to asses climate risk and share information to population at risk to support prevention and mitigation actions. IPPOCRATE is an e-health system, it is designed to provide technological support to analysis of health risk related to climate and provide tools for prevention and management of critical events. It is the first integrated system of prevention of human risk caused by climate change. IPPOCRATE calculates risk weighting meteorological data with the vulnerability of monitored subjects and uses mobile and cloud technologies to acquire and share information on different data channels. It is composed of four components: Multichannel Hub. Multichannel Hub is the ICT infrastructure used to feed IPPOCRATE cloud with a different type of data coming from remote monitoring devices, or imported from meteorological databases. Such data are ingested, transformed and elaborated in order to be dispatched towards mobile app and VoIP phone systems. IPPOCRATE Multichannel Hub uses open communication protocols to create a set of APIs useful to interface IPPOCRATE with 3rd party applications. Internally, it uses non-relational paradigm to create flexible and highly scalable database. WeHeart and Smart Application The wearable device WeHeart is equipped with sensors designed to measure following biometric variables: heart rate, systolic blood pressure and diastolic blood pressure, blood oxygen saturation, body temperature and blood glucose for diabetic subjects. WeHeart is designed to be easy of use and non-invasive. For data acquisition, users need only to wear it and connect it to Smart Application by Bluetooth protocol. Easy Box was designed to take advantage from new technologies related to e-health care. EasyBox allows user to fully exploit all IPPOCRATE features. Its name, Easy Box, reveals its purpose of container for various devices that may be included depending on user needs. Territorial Registry is the IPPOCRATE web module reserved to medical personnel for monitoring, research and analysis activities. Territorial Registry allows to access to all information gathered by IPPOCRATE using GIS system in order to execute spatial analysis combining geographical data (climatological information and monitored data) with information regarding the clinical history of users and their personal details. Territorial Registry was designed for different type of users: control rooms managed by wide area health facilities, single health care center or single doctor. Territorial registry manages such hierarchy diversifying the access to system functionalities. IPPOCRATE is the first e-Health system focused on climate risk prevention.

Keywords: climate change, health risk, new technological system

Procedia PDF Downloads 869
918 An Analysis Study of a Participatory Design Workshop from the Perspectives of Communication Strategies and Tools

Authors: Meng-Yu Wun, Jiunde Lee

Abstract:

Participatory design transfers the role of design team becoming the facilitator who manages to work collaboratively with the 'partners of innovation': users. This facilitator role not just concerns the users’ behaviors or insights under the common practice of user-centered design, it emphasizes the importance of communication experience conducted by various strategies and tools in a workshop session which could profoundly impact the quality of the co-creation process. To investigate the communication experience in the participatory design, this study proposed a qualitative research to analyze communication strategies and tools. A participatory design workshop and following in-depth interviews were carried out to explore how participants (facilitators, users) might apply different strategies and tools to enhance the communication process. The major study findings are as follows: (a) roles had influence on communication experience; facilitators’ principles and methods influenced the usage of facilitation strategies in various situations, while users put more emphasis on communication activities and goals aimed to complete the design tasks, (b) communication tools should be both fixed and changeable: participants had fixed cognition on different forms of communication tools; with the fundamental cognition, they could choose and make use of tools according to their needs, (c) the management of workshop communication should be flexible: controlling the schedule, stimulating innovations, and creating the space for conversation are crucial to facilitate in a participatory workshop.

Keywords: communication experience, facilitation, participatory design, workshop

Procedia PDF Downloads 157
917 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 220
916 Mailchimp AI Application For Marketing Employees

Authors: Alia El Akhrass, Raheed Al Jifri, Sara Babalghoum, Jana Bushnag

Abstract:

This project delves into exploring the functionalities of Mailchimp, an artificial intelligence application. The objective is to comprehend its operations through the AI tools it offers. To achieve this, a survey was conducted among peers, seeking insights into Mailchimp's functionality, accessibility, efficiency, and overall benefits. The survey aimed to gather valuable feedback for analysis. Subsequently, a thorough analysis of the collected data was performed to identify trends, patterns, and areas of improvement. Visual representations were then crafted to effectively summarize the findings, aiding in conveying the research outcomes clearly. Founded in 2001, Mailchimp initially provided email marketing services but has since expanded into a comprehensive marketing platform. Its focus on simplicity and accessibility has contributed to its success among businesses of all sizes. Alternative platforms such as Constant Contact, AWeber, and GetResponse offer similar services with their own unique strengths. Mailchimp's journey exemplifies the importance of vision and adaptability in the ever-evolving digital marketing landscape. By prioritizing innovation, user-centricity, and customer service, Mailchimp has established itself as a trusted partner in the field of digital marketing, enabling businesses to effectively connect with their customers and achieve their marketing goals.

Keywords: email marketing, ai tool, connect, communicate, generate

Procedia PDF Downloads 43
915 Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training

Authors: Shaila Rana, Wasim Alhamdani

Abstract:

Effective cybersecurity training is of the utmost importance, given the plethora of attacks that continue to increase in complexity and ubiquity. VR cybersecurity training remains a starkly understudied discipline. Studies that evaluated the effectiveness of VR cybersecurity training over traditional methods are required. An engaging and interactive platform can support knowledge retention of the training material. Consequently, an effective form of cybersecurity training is required to support a culture of cybersecurity awareness. Measurements of effectiveness varied throughout the studies, with surveys and observations being the two most utilized forms of evaluating effectiveness. Further research is needed to evaluate the effectiveness of VR cybersecurity training and traditional training. Additionally, research for evaluating if VR cybersecurity training is more effective than traditional methods is vital. This paper proposes a methodology to compare the two cybersecurity training methods and their effectiveness. The proposed framework includes developing both VR and traditional cybersecurity training methods and delivering them to at least 100 users. A quiz along with a survey will be administered and statistically analyzed to determine if there is a difference in knowledge retention and user satisfaction. The aim of this paper is to bring attention to the need to study VR cybersecurity training and its effectiveness compared to traditional training methods. This paper hopes to contribute to the cybersecurity training field by providing an effective way to train users for security awareness. If VR training is deemed more effective, this could create a new direction for cybersecurity training practices.

Keywords: virtual reality cybersecurity training, VR cybersecurity training, traditional cybersecurity training

Procedia PDF Downloads 217
914 Phenomenological Ductile Fracture Criteria Applied to the Cutting Process

Authors: František Šebek, Petr Kubík, Jindřich Petruška, Jiří Hůlka

Abstract:

Present study is aimed on the cutting process of circular cross-section rods where the fracture is used to separate one rod into two pieces. Incorporating the phenomenological ductile fracture model into the explicit formulation of finite element method, the process can be analyzed without the necessity of realizing too many real experiments which could be expensive in case of repetitive testing in different conditions. In the present paper, the steel AISI 1045 was examined and the tensile tests of smooth and notched cylindrical bars were conducted together with biaxial testing of the notched tube specimens to calibrate material constants of selected phenomenological ductile fracture models. These were implemented into the Abaqus/Explicit through user subroutine VUMAT and used for cutting process simulation. As the calibration process is based on variables which cannot be obtained directly from experiments, numerical simulations of fracture tests are inevitable part of the calibration. Finally, experiments regarding the cutting process were carried out and predictive capability of selected fracture models is discussed. Concluding remarks then make the summary of gained experience both with the calibration and application of particular ductile fracture criteria.

Keywords: ductile fracture, phenomenological criteria, cutting process, explicit formulation, AISI 1045 steel

Procedia PDF Downloads 458
913 Classification of Traffic Complex Acoustic Space

Authors: Bin Wang, Jian Kang

Abstract:

After years of development, the study of soundscape has been refined to the types of urban space and building. Traffic complex takes traffic function as the core, with obvious design features of architectural space combination and traffic streamline. The acoustic environment is strongly characterized by function, space, material, user and other factors. Traffic complex integrates various functions of business, accommodation, entertainment and so on. It has various forms, complex and varied experiences, and its acoustic environment is turned rich and interesting with distribution and coordination of various functions, division and unification of the mass, separation and organization of different space and the cross and the integration of multiple traffic flow. In this study, it made field recordings of each space of various traffic complex, and extracted and analyzed different acoustic elements, including changes in sound pressure, frequency distribution, steady sound source, sound source information and other aspects, to make cluster analysis of each independent traffic complex buildings. It divided complicated traffic complex building space into several typical sound space from acoustic environment perspective, mainly including stable sound space, high-pressure sound space, rhythm sound space and upheaval sound space. This classification can further deepen the study of subjective evaluation and control of the acoustic environment of traffic complex.

Keywords: soundscape, traffic complex, cluster analysis, classification

Procedia PDF Downloads 253
912 Developing a Simulation-Based Optimization Framework to Perform Energy Simulation for Indian Buildings

Authors: Sujoy Anirudha Das, Albert Thomas

Abstract:

Building sector is a major consumer of energy globally, and it has corresponding effects to the environment with respect to the carbon emissions. Given the fact that India is expected to add 40-billion square meter of new buildings till 2050, we need frameworks that help in reducing the overall energy consumption in the building sector. Even though several simulation-based frameworks that help in analyzing the building energy consumption are developed globally, in the Indian context, to the best of our knowledge, there is a lack of a comprehensive, yet user-friendly framework to simulate and optimize the effects of various energy influencing factors, specifically for Indian buildings. Therefore, this study is aimed at developing a simulation-based optimization framework to model the energy interactions in different types of Indian buildings by considering the dynamic nature of various energy influencing factors. This comprehensive framework can be used by various building stakeholders to test the energy effects of different factors such as, but not limited to, the various building materials, the orientation, the weather fluctuations, occupancy changes and the type of the building (e.g., office, residential). The results from the case study involving several building types would help us in gaining insights to build new energy-efficient buildings as well as retrofit the existing structures in a more convenient way to consume less energy, exclusively for an Indian scenario.

Keywords: building energy consumption, building energy simulations, energy efficient buildings, optimization framework

Procedia PDF Downloads 178
911 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 90
910 A Web Application for Screening Dyslexia in Greek Students

Authors: Antonios Panagopoulos, Stamoulis Georgios

Abstract:

Dyslexia's diagnosis is made taking into account reading and writing skills and is carried out by qualified scientific staff. In addition, there are screening tests that are designed to give an indication of possible dyslexic difficulties. Their main advantage is that they create a pleasant environment for the user and reduce the stress that can lead to false results. An online application was created for the first time, as far as authors' knowledge, for screening Dyslexia in Greek high school students named «DyScreTe». Thus, a sample of 240 students between 16 and 18 years old in Greece was taken, of which 120 were diagnosed with dyslexia by an official authority in Greece, and 120 were typically developed. The main hypothesis that was examined is that students who were diagnosed with dyslexia by official authorities in Greece had significantly lower performance in the respective software tests. The results verified the hypothesis we made those children with dyslexia in each test had a lower performance com-pared to the type developed in successful responses, except for the intelligence test. After random sampling, it was shown that the new online application was a useful tool for screening dyslexia. However, computer evaluation cannot replace the diagnosis by a professional expert, but with the results of this application, the interdisciplinary team that deals with the differential diagnosis will create and evaluate, at a later time, the appropriate intervention program.

Keywords: dyslexia, screening tests, deficits, application

Procedia PDF Downloads 85
909 CompPSA: A Component-Based Pairwise RNA Secondary Structure Alignment Algorithm

Authors: Ghada Badr, Arwa Alturki

Abstract:

The biological function of an RNA molecule depends on its structure. The objective of the alignment is finding the homology between two or more RNA secondary structures. Knowing the common functionalities between two RNA structures allows a better understanding and a discovery of other relationships between them. Besides, identifying non-coding RNAs -that is not translated into a protein- is a popular application in which RNA structural alignment is the first step A few methods for RNA structure-to-structure alignment have been developed. Most of these methods are partial structure-to-structure, sequence-to-structure, or structure-to-sequence alignment. Less attention is given in the literature to the use of efficient RNA structure representation and the structure-to-structure alignment methods are lacking. In this paper, we introduce an O(N2) Component-based Pairwise RNA Structure Alignment (CompPSA) algorithm, where structures are given as a component-based representation and where N is the maximum number of components in the two structures. The proposed algorithm compares the two RNA secondary structures based on their weighted component features rather than on their base-pair details. Extensive experiments are conducted illustrating the efficiency of the CompPSA algorithm when compared to other approaches and on different real and simulated datasets. The CompPSA algorithm shows an accurate similarity measure between components. The algorithm gives the flexibility for the user to align the two RNA structures based on their weighted features (position, full length, and/or stem length). Moreover, the algorithm proves scalability and efficiency in time and memory performance.

Keywords: alignment, RNA secondary structure, pairwise, component-based, data mining

Procedia PDF Downloads 459
908 Perceptions of College Students on Whether an Intelligent Tutoring System Is a Tutor

Authors: Michael Smalenberger

Abstract:

Intelligent tutoring systems (ITS) are computer-based platforms which can incorporate artificial intelligence to provide step-by-step guidance as students practice problem-solving skills. ITS can replicate the benefits of one-on-one tutoring, foster transactivity in collaborative environments, and lead to substantial learning gains when used to supplement the instruction of a teacher or when used as the sole method of instruction. Developments improving the ease of ITS creation have recently increased their proliferation, leading many K-12 schools and institutions of higher education in the United States to regularly use ITS within classrooms. We investigated how students perceive their experience using an ITS. In this study, 111 undergraduate students used an ITS in a college-level introductory statistics course and were subsequently asked for feedback on their experience. Results show that their perceptions were generally favorable of the ITS, and most would seek to use an ITS both for STEM and non-STEM courses in the future. Along with detailed transaction-level data, this feedback also provides insights on the design of user-friendly interfaces, guidance on accessibility for students with impairments, the sequencing of exercises, students’ expectation of achievement, and comparisons to other tutoring experiences. We discuss how these findings are important for the creation, implementation, and evaluation of ITS as a mode and method of teaching and learning.

Keywords: college statistics course, intelligent tutoring systems, in vivo study, student perceptions of tutoring

Procedia PDF Downloads 102
907 Development of an Energy Independant DC Building Demonstrator for Insulated Island Site

Authors: Olivia Bory Devisme, Denis Genon-Catalot, Frederic Alicalapa, Pierre-Olivier Lucas De Peslouan, Jean-Pierre Chabriat

Abstract:

In the context of climate change, it is essential that island territories gain energy autonomy. Currently mostly dependent on fossil fuels, the island of Reunion lo- cated in the Indian Ocean nevertheless has a high potential for solar energy. As the market for photovoltaic panels has been growing in recent years, the issues of energy losses linked to the multiple conversions from direct current to alternating current are emerging. In order to quantify these advantages and disadvantages by a comparative study, this document present the measurements carried out on a direct current test bench, particularly for lighting, ventilation, air condi- tioning and office equipment for the tertiary sector. All equipment is supplied with DC power from energy produced by photovoltaic panels. A weather sta- tion, environmental indoor sensors, and drivers are also used to control energy. Self-consumption is encouraged in order to manage different priorities between user consumption and energy storage in a lithium iron phosphate battery. The measurements are compared to a conventional electrical architecture (DC-AC- DC) for energy consumption, equipment overheating, cost, and life cycle analysis.

Keywords: DC microgrids, solar energy, smart buildings, storage

Procedia PDF Downloads 163
906 Sexual Behaviors and Condom Attitude among Injecting Drug Users in Hai Phong, Vietnam: Qualitative Findings

Authors: Tanvir Ahmed, Thanh N. Long, Phan T. Huong, Donald E. Stewart

Abstract:

This paper presents views on condom use and the contexts of safe and unsafe sexual practices with different sexual partners and their relationships among Injecting Drug Users (IDUs) in Hai Phong, Vietnam. Fifteen IDUs participated and two local interviewers conducted qualitative semi-structured face-to-face interviews in September-October, 2012 in Vietnamese language. Data were analyzed thematically. Non-protective condom attitudes include negotiate or convince Female Sex Workers (FSW); not realizing risk, importance or necessity; partner doesn’t like, and having extra money/drug from clients. On the other hand, self-awareness, family-consciousness, suspicion of STI presence, fear of getting HIV, and client negotiation sometimes resulted in a safe-sex practice. A thematic diagram was developed to present the relationship (strong/weak) between condom attitude and sexual practice (safe/unsafe) by partner types. The experiences and views reflected in the qualitative information emphasize the heightened need for safe-sex education especially among young IDUs (male/female) highlighting sexual transmission risk.

Keywords: AIDS, HIV, injecting drug user, risk behaviors, Vietnam

Procedia PDF Downloads 857
905 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 219