Search results for: interactive user navigation
1345 Synergistic Effects of Hydrogen Sulfide and Melatonin in Alleviating Vanadium Toxicity in Solanum lycopersicum L. Plants
Authors: Abazar Ghorbani, W. M. Wishwajith W. Kandegama, Seyed Mehdi Razavi, Moxian Chen
Abstract:
The roles of hydrogen sulfide (H₂S) and melatonin (MT) as gasotransmitters in plants are widely recognised. Nevertheless, the precise nature of their involvement in defensive reactions remains uncertain. This study investigates the impact of the ML-H2S interaction on tomato plants exposed to vanadium (V) toxicity, focusing on synthesising secondary metabolites and V metal sequestration. The treatments applied in this study included a control (T1), V stress (T2), MT+V (T3), MT+H2S+V (T4), MT+hypotaurine (HT)+V (T5), and MT+H2S+HT+V (T6). These treatments were administered: MT (150 µM) as a foliar spray pre-treatment (3X), HT treatment (0.1 mM, an H2S scavenger) as root immersion for 12 hours as pre-treatments, and H2S (NaHS, 0.2 mM) and V (40 mg/L) treatments added to the Hoagland solution for 2 weeks. Results demonstrate that ML and H2S+ML treatments alleviate V toxicity by promoting the transcription of key genes (ANS, F3H, CHS, DFR, PAL, and CHI) involved in phenolic and anthocyanin biosynthesis. Moreover, they decreased V uptake and accumulation and enhanced the transcription of genes involved in glutathione and phytochelatin synthesis (GSH1, PCS, and ABC1), leading to V sequestration in roots and protection against V-induced damage. Additionally, ML and H2S+ML treatments optimize chlorophyll metabolism, and increase internal H2S levels, thereby promoting tomato growth under V stress. The combined treatment of ML+H2S shows superior effects compared to ML alone, suggesting synergistic/interactive effects between these two substances. Furthermore, inhibition of the beneficial impact of ML+H2S and ML treatments by HT, an H2S scavenger, underscores the significant involvement of H₂S in the signaling pathway activated by ML during V toxicity. Overall, these findings suggest that ML requires the presence of endogenous H₂S to mitigate V-induced adverse effects on tomato seedlings.Keywords: vanadium toxicity, secondary metabolites, vanadium sequestration, h2s-melatonin crosstalk
Procedia PDF Downloads 451344 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids
Authors: Xun Li, Haojie Wang
Abstract:
Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense
Procedia PDF Downloads 1141343 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users
Authors: Haydar Teymourlouei
Abstract:
It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.Keywords: cyber-attacks, home user, prevention, security, technology
Procedia PDF Downloads 3931342 Triadic Relationship of Icon Design for Semi-Literate Communities
Authors: Peng-Hui Maffee Wan, Klarissa Ting Ting Chang, Rax Suen Chun Lung
Abstract:
Icons, or pictorial and graphical objects, are commonly used in Human-Computer Interaction (HCI) fields as the mediator in order to communicate information to users. Yet there has been little studies focusing on a majority of the world’s population, semi-literate communities, in terms of the fundamental know-how for designing icons for such population. In this study, two sets of icons belonging in different icon taxonomy, abstract and concrete are designed for a mobile application for semi-literate agricultural communities. In this paper, we propose a triadic relationship of an icon, namely meaning, task and mental image, which inherits the triadic relationship of a sign. User testing with the application and a post-pilot questionnaire are conducted as the experimental approach in two rural villages in India. Icons belonging to concrete taxonomy perform better than abstract icons on the premise that the design of the icon fulfills the underlying rules of the proposed triadic relationship.Keywords: icon, GUI, mobile app, semi-literate
Procedia PDF Downloads 4891341 Employing Visual Culture to Enhance Initial Adult Maltese Language Acquisition
Authors: Jacqueline Żammit
Abstract:
Recent research indicates that the utilization of right-brain strategies holds significant implications for the acquisition of language skills. Nevertheless, the utilization of visual culture as a means to stimulate these strategies and amplify language retention among adults engaging in second language (L2) learning remains a relatively unexplored area. This investigation delves into the impact of visual culture on activating right-brain processes during the initial stages of language acquisition, particularly in the context of teaching Maltese as a second language (ML2) to adult learners. By employing a qualitative research approach, this study convenes a focus group comprising twenty-seven educators to delve into a range of visual culture techniques integrated within language instruction. The collected data is subjected to thematic analysis using NVivo software. The findings underscore a variety of impactful visual culture techniques, encompassing activities such as drawing, sketching, interactive matching games, orthographic mapping, memory palace strategies, wordless picture books, picture-centered learning methodologies, infographics, Face Memory Game, Spot the Difference, Word Search Puzzles, the Hidden Object Game, educational videos, the Shadow Matching technique, Find the Differences exercises, and color-coded methodologies. These identified techniques hold potential for application within ML2 classes for adult learners. Consequently, this study not only provides insights into optimizing language learning through specific visual culture strategies but also furnishes practical recommendations for enhancing language competencies and skills.Keywords: visual culture, right-brain strategies, second language acquisition, maltese as a second language, visual aids, language-based activities
Procedia PDF Downloads 611340 The Effect of User Comments on Traffic Application Usage
Authors: I. Gokasar, G. Bakioglu
Abstract:
With the unprecedented rates of technological improvements, people start to solve their problems with the help of technological tools. According to application stores and websites in which people evaluate and comment on the traffic apps, there are more than 100 traffic applications which have different features with respect to their purpose of usage ranging from the features of traffic apps for public transit modes to the features of traffic apps for private cars. This study focuses on the top 30 traffic applications which were chosen with respect to their download counts. All data about the traffic applications were obtained from related websites. The purpose of this study is to analyze traffic applications in terms of their categorical attributes with the help of developing a regression model. The analysis results suggest that negative interpretations (e.g., being deficient) does not lead to lower star ratings of the applications. However, those negative interpretations result in a smaller increase in star rate. In addition, women use higher star rates than men for the evaluation of traffic applications.Keywords: traffic app, real–time information, traffic congestion, regression analysis, dummy variables
Procedia PDF Downloads 4291339 Eco-Friendly Silicone/Graphene-Based Nanocomposites as Superhydrophobic Antifouling Coatings
Authors: Mohamed S. Selim, Nesreen A. Fatthallah, Shimaa A. Higazy, Hekmat R. Madian, Sherif A. El-Safty, Mohamed A. Shenashen
Abstract:
After the 2003 prohibition on employing TBT-based antifouling coatings, polysiloxane antifouling nano-coatings have gained in popularity as environmentally friendly and cost-effective replacements. A series of non-toxic polydimethylsiloxane nanocomposites filled with nanosheets of graphene oxide (GO) decorated with magnetite nanospheres (GO-Fe₃O₄ nanospheres) were developed and cured via a catalytic hydrosilation method. Various GO-Fe₃O₄ hybrid concentrations were mixed with the silicone resin via solution casting technique to evaluate the structure–property connection. To generate GO nanosheets, a modified Hummers method was applied. A simple co-precipitation method was used to make spherical magnetite particles under inert nitrogen. Hybrid GO-Fe₃O₄ composite fillers were developed by a simple ultrasonication method. Superhydrophobic PDMS/GO-Fe₃O₄ nanocomposite surface with a micro/nano-roughness, reduced surface-free energy (SFE), high fouling release (FR) efficiency was achieved. The physical, mechanical, and anticorrosive features of the virgin and GO-Fe₃O₄ filled nanocomposites were investigated. The synergistic effects of GO-Fe₃O4 hybrid's well-dispersion on the water-repellency and surface topological roughness of the PDMS/GO-Fe₃O₄ nanopaints were extensively studied. The addition of the GO-Fe₃O₄ hybrid fillers till 1 wt.% could increase the coating's water contact angle (158°±2°), minimize its SFE to 12.06 mN/m, develop outstanding micro/nano-roughness, and improve its bulk mechanical and anticorrosion properties. Several microorganisms were employed for examining the fouling-resistance of the coated specimens for 1 month. Silicone coatings filled with 1 wt.% GO-Fe₃O₄ nanofiller showed the least biodegradability% among all the tested microorganisms. Whereas GO-Fe₃O4 with 5 wt.% nanofiller possessed the highest biodegradability% potency by all the microorganisms. We successfully developed non-toxic and low cost nanostructured FR composite coating with high antifouling-resistance, reproducible superhydrophobic character, and enhanced service-time for maritime navigation.Keywords: silicone antifouling, environmentally friendly, nanocomposites, nanofillers, fouling repellency, hydrophobicity
Procedia PDF Downloads 1141338 Forensic Analysis of Thumbnail Images in Windows 10
Authors: George Kurian, Hongmei Chi
Abstract:
Digital evidence plays a critical role in most legal investigations. In many cases, thumbnail databases show important information in that investigation. The probability of having digital evidence retrieved from a computer or smart device has increased, even though the previous user removed data and deleted apps on those devices. Due to the increase in digital forensics, the ability to store residual information from various thumbnail applications has improved. This paper will focus on investigating thumbnail information from Windows 10. Thumbnail images of interest in forensic investigations may be intact even when the original pictures have been deleted. It is our research goal to recover useful information from thumbnails. In this research project, we use various forensics tools to collect left thumbnail information from deleted videos or pictures. We examine and describe the various thumbnail sources in Windows and propose a methodology for thumbnail collection and analysis from laptops or desktops. A machine learning algorithm is adopted to help speed up content from thumbnail pictures.Keywords: digital forensic, forensic tools, soundness, thumbnail, machine learning, OCR
Procedia PDF Downloads 1321337 Stepping in Sustainability: Walkability an Upcoming Design Parameter for Transit Based Communities in Lahore, Pakistan
Authors: Sadaf Saeed
Abstract:
The consideration of walkability as an urban design parameter in conjunction with transit-oriented development is an established trend in the developed countries but an upcoming trend in developing countries. In Pakistan, the first Bus Rapid Transit (locally called as Metro Bus) has been introduced in the city of Lahore in 2013 where around 40 percent of the riders access to transit stations by walking. To what extent the aspect of walkability has been considered in the local scenario? To address this question, this paper presents an account of urban design parameters regarding pedestrian provisions and quality of walking environment between Metro Bus stations and users’ destination in the transit neighbourhoods (areas up to 500-meter radius). The primary and secondary data for objective and subjective walkability measurements has been used for neighbourhoods of five selected transit stations ranked against the predefined critical assessed factors (CAF). The multi-criteria approach including visual and geospatially-based parameters at street level, along with walkability index score at selected sites linked with CAF evaluation were the selected methods for this study. The acceptability of walkability as an urban design parameter for transit planning in terms of connectivity and social implications of the concept has also been analysed in the local context. The paper highlights that the aspect of walkability in Lahore is being derelict owing to the focus of government on other initiatives such as park and ride and feeder bus services for mobility of passengers. However, the pedestrian-friendly design parameters as a part of future transit planning can enhance social, liveable and interactive walking environment within transit neighbourhoods.Keywords: walkability, sustainability, transit neighborhoods, social communities
Procedia PDF Downloads 2451336 Development of a Data Security Model Using Steganography
Authors: Terungwa Simon Yange, Agana Moses A.
Abstract:
This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.Keywords: steganography, cryptography, encryption, decryption, secrecy
Procedia PDF Downloads 2651335 Design and Implementation of an AI-Enabled Task Assistance and Management System
Authors: Arun Prasad Jaganathan
Abstract:
In today's dynamic industrial world, traditional task allocation methods often fall short in adapting to evolving operational conditions. This paper introduces an AI-enabled task assistance and management system designed to overcome the limitations of conventional approaches. By using artificial intelligence (AI) and machine learning (ML), the system intelligently interprets user instructions, analyzes tasks, and allocates resources based on real-time data and environmental factors. Additionally, geolocation tracking enables proactive identification of potential delays, ensuring timely interventions. With its transparent reporting mechanisms, the system provides stakeholders with clear insights into task progress, fostering accountability and informed decision-making. The paper presents a comprehensive overview of the system architecture, algorithm, and implementation, highlighting its potential to revolutionize task management across diverse industries.Keywords: artificial intelligence, machine learning, task allocation, operational efficiency, resource optimization
Procedia PDF Downloads 591334 Cost-Based Analysis of Cloud and Traditional ERP Systems in Small and Medium Enterprises
Authors: Indu Saini, Ashu Khanna, S. K. Peddoju
Abstract:
Cloud computing is the new buzz word today attracting high interest among various domains like business enterprises, Particularly in Small and Medium Enterprises. As it is a pay-per-use model, SMEs have high expectations that adapting this model will not only make them flexible, hassle-free but also economic. In view of such expectations, this paper analyses the possibility of adapting cloud computing technologies in SMEs in light of economic concerns. In this paper, two hypotheses are developed to compare the average annual per-user costs of using Enterprise Resource Planning systems in two ways, The traditional approach and the cloud approach. A web based survey is conducted apart from the Interviews with the peers to collect the data across the selected SMEs and t-test is performed to compare both the technologies on the proposed hypothesis. Results achieved are produced and discussed.Keywords: cloud computing, small and medium enterprises, enterprise resource solutions, interviews
Procedia PDF Downloads 3361333 Impact of an Instructional Design Model in a Mathematics Game for Enhancing Students’ Motivation in Developing Countries
Authors: Shafaq Rubab
Abstract:
One of the biggest reasons of dropouts from schools is lack of motivation and interest among the students, particularly in mathematics. Many developing countries are facing this problem and this issue is lowering the literacy rate in these developing countries. The best solution for increasing motivation level and interest among the students is using tablet game-based learning. However, a pedagogically sound game required a well-planned instructional design model to enhance learner’s attention and confidence otherwise effectiveness of the learning games suffers badly. This research aims to evaluate the impact of the pedagogically sound instructional design model on students’ motivation by using tablet game-based learning. This research was conducted among the out-of-school-students having an age range from 7 to 12 years and the sample size of two hundred students was purposively selected without any gender discrimination. Qualitative research was conducted by using a survey tool named Instructional Material Motivational Survey (IMMS) adapted from Keller Arcs model. A comparison of results from both groups’ i.e. experimental group and control group revealed that motivation level of the students taught by the game was higher than the students instructed by using conventional methodologies. Experimental group’s students were more attentive, confident and satisfied as compared to the control group’s students. This research work not only promoted the trend of digital game-based learning in developing countries but also supported that a pedagogically sound instructional design model utilized in an educational game can increase the motivation level of the students and can make the learning process a totally immersive and interactive fun loving activity.Keywords: digital game-based learning, student’s motivation, instructional design model, learning process
Procedia PDF Downloads 4321332 Continuous Wave Interference Effects on Global Position System Signal Quality
Authors: Fang Ye, Han Yu, Yibing Li
Abstract:
Radio interference is one of the major concerns in using the global positioning system (GPS) for civilian and military applications. Interference signals are produced not only through all electronic systems but also illegal jammers. Among different types of interferences, continuous wave (CW) interference has strong adverse impacts on the quality of the received signal. In this paper, we make more detailed analysis for CW interference effects on GPS signal quality. Based on the C/A code spectrum lines, the influence of CW interference on the acquisition performance of GPS receivers is further analysed. This influence is supported by simulation results using GPS software receiver. As the most important user parameter of GPS receivers, the mathematical expression of bit error probability is also derived in the presence of CW interference, and the expression is consistent with the Monte Carlo simulation results. The research on CW interference provides some theoretical gist and new thoughts on monitoring the radio noise environment and improving the anti-jamming ability of GPS receivers.Keywords: GPS, CW interference, acquisition performance, bit error probability, Monte Carlo
Procedia PDF Downloads 2591331 The Effect of Artificial Intelligence on Construction Development
Authors: Shady Gamal Aziz Shehata
Abstract:
Difficulty in defining construction quality arises due to perception based on the nature and requirements of the market, the different partners themselves and the results they want. Quantitative research was used in this constructivist research. A case-based study was conducted to assess the structures of positive attitudes and expectations in the context of quality improvement. A survey based on expert opinions was analyzed among construction organizations/companies operating in the construction industry in Pakistan. The financial strength, management structure and construction experience of the construction companies formed the basis of their selection. A good concept is visible at the project level and is seen as the most valuable part of the construction project. Each quality improvement technique was expected to increase the user's profits by improving the efficiency of the construction project. The Survey is useful for construction professionals to evaluate current construction concepts and expectations for the application of quality improvement techniques in construction projects.Keywords: correlation analysis, lean construction tools, lean construction, logistic regression analysis, risk management, safety construction quality, expectation, improvement, perception
Procedia PDF Downloads 591330 The Delone and McLean Model: A Review and Reconceptualisation for Explaining Organisational IS Success
Authors: Probir Kumar Banerjee
Abstract:
Though the revised DeLone and McLean (DM) model of IS success is found to be effective at the individual level of analysis, there is lack of consensus in regard to its effectiveness at the organisational level. This research reviews the DM model in the light of business/IT alignment theory and supporting literature, and suggests its reconceptualization. Specifically, arguments are made for augmenting it with business process quality. Business process quality, it is argued, captures the effect of intent to use, use and user satisfaction interactions, thus eliminating the need to capture their interaction effects in explaining organisational IS success. It is also argued that ‘operational performance’ driven by systems and business process quality, and higher order measures of organisational performance tied to operational performance are appropriate measures of ‘net benefit’. Suggestions are made for reconceptualisation of the other constructs and an adapted model of organisational IS success is proposed.Keywords: organisational IS success, business/IT alignment, systems quality, business process quality, operational performance, market performance
Procedia PDF Downloads 3951329 Smart Surveillance with 5G: A Performance Study in Adama City
Authors: Shenko Chura Aredo, Hailu Belay, Kevin T. Kornegay
Abstract:
In light of Adama City’s smart city development vision, this study thoroughly investigates the performance of smart security systems with Fifth Generation (5G) network capabilities. It can be logistically difficult to install a lot of cabling, particularly in big or dynamic settings. Moreover, latency issues might affect linked systems, making it difficult for them to monitor in real time. Through a focused analysis that employs Adama City as a case study, the performance has been evaluated in terms of spectrum and energy efficiency using empirical data and basic signal processing formulations at different frequency resources. The findings also demonstrate that cameras working at higher 5G frequencies have more capacity than those operating at sub-6 GHz, notwithstanding frequency-related issues. It has also been noted that when the beams of such cameras are adaptively focussed based on the distance of the last cell edge user rather than the maximum cell radius, less energy is required than with conventional fixed power ramping.Keywords: 5G, energy efficiency, safety, smart security, spectral efficiency
Procedia PDF Downloads 181328 Flexible 3D Virtual Desktop Using Handles for Cloud Environments
Abstract:
Due to the improvement in performance of computer hardware and the development of operating systems, a multi-tasking for several programs has become one of the basic functions to computer users. It is natural for computer users to want more functional, convenient, and visual GUI functions (Graphic User Interface). In this paper, a 3D virtual desktop system was proposed to meet users’ requirements for cloud environments such as a virtual desktop function in the Windows environment. The proposed system uses the handles of the windows to hide or restore several windows. It connects the list of task spaces using the circular double linked list to manage the handles. Each handle list is registered in the corresponding task space being executed. The 3D virtual desktop is efficient and flexible in handling the numbers of task spaces and can help users to work under more comfortable environments. Acknowledgment: This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Korea government (MSIP) (NRF-2015R1D1A1A01057680).Keywords: virtual desktop, GUI, cloud, virtualization
Procedia PDF Downloads 2101327 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack
Authors: Faraji Sepideh
Abstract:
Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack
Procedia PDF Downloads 1611326 Rationalizing the Utilization of Interactive Engagement Strategies in Teaching Specialized Science Courses of STEM and GA Strands in the Academic Track of Philippine Senior High School Curriculum
Authors: Raul G. Angeles
Abstract:
The Philippine government instituted major reforms in its educational system. The Department of Education pushes the K to 12 program that makes kindergarten mandatory and adds two years of senior high school to the country's basic education. In essence, the students’ stay in basic education particularly those who are supposedly going to college is extended. The majority of the students expressed that they will be taking the Academic Track of the Senior High School curriculum specifically the Science, Technology, Engineering and Mathematics (STEM) and General Academic (GA) strands. Almost certainly, instruction should match the students' styles and thus through this descriptive study a city survey was conducted to explore the teaching strategies preferences of junior high school students and teachers who will be promoted to senior high school during the Academic Year 2016-2017. This study was conducted in selected public and private secondary schools in Metro Manila. Questionnaires were distributed to students and teachers; and series of follow-up interviews were also carried out to generate additional information. Preferences of students are centered on employing innovations such as technology, cooperative and problem-based learning. While the students will still be covered by basic education their interests in science are sparking to a point where the usual teaching styles may no longer work to them and for that cause, altering the teaching methods is recommended to create a teacher-student style matching. Other effective strategies must likewise be implemented.Keywords: curriculum development, effective teaching strategies, problem-based learning, senior high school, science education, technology
Procedia PDF Downloads 2591325 The Application of Participatory Social Media in Collaborative Planning: A Systematic Review
Authors: Yujie Chen , Zhen Li
Abstract:
In the context of planning transformation, how to promote public participation in the formulation and implementation of collaborative planning has been the focused issue of discussion. However, existing studies have often been case-specific or focused on a specific design field, leaving the role of participatory social media (PSM) in urban collaborative planning generally questioned. A systematic database search was conducted in December 2019. Articles and projects were eligible if they reported a quantitative empirical study applying participatory social media in the collaborative planning process (a prospective, retrospective, experimental, longitudinal research, or collective actions in planning practices). Twenty studies and seven projects were included in the review. Findings showed that social media are generally applied in public spatial behavior, transportation behavior, and community planning fields, with new technologies and new datasets. PSM has provided a new platform for participatory design, decision analysis, and collaborative negotiation most widely used in participatory design. Findings extracted several existing forms of PSM. PSM mainly act as three roles: the language of decision-making for communication, study mode for spatial evaluation, and decision agenda for interactive decision support. Three optimization content of PSM were recognized, including improving participatory scale, improvement of the grass-root organization, and promotion of politics. However, basically, participants only could provide information and comment through PSM in the future collaborative planning process, therefore the issues of low data response rate, poor spatial data quality, and participation sustainability issues worth more attention and solutions.Keywords: participatory social media, collaborative planning, planning workshop, application mode
Procedia PDF Downloads 1331324 Modeling Influence on Petty Corruption Attitudes
Authors: Nina Bijedic, Drazena Gaspar, Mirsad Hadzikadic
Abstract:
Corruption is an influential and widespread problem. One part of it is so-called petty corruption, related to large-scale bribe giving by ordinary citizens trying to influence the works of public administration or public services. As it is with all means of corruption, petty corruption is related to the level of democracy (or administration efficiency) in a society. The developed model captures some of the factors related to corruptive behavior, as well as people’s attitude towards petty corruption. It has four basic elements: user’s perception of corruption in the society of interest, the influence of social interactions, the influence of penalizing mechanism, and influence of campaigns against petty corruption. The model is agent-based, developed in NetLogo, with a lot of random settings that provide a wider scope of responses. Interactions of different settings for variables of elements provide insight into the influence of each element on attitude towards petty corruption, as well as petty corruptive behavior.Keywords: agent-based model, attitude, influence, petty corruption, society
Procedia PDF Downloads 1991323 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme
Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme
Procedia PDF Downloads 4801322 A Relational Data Base for Radiation Therapy
Authors: Raffaele Danilo Esposito, Domingo Planes Meseguer, Maria Del Pilar Dorado Rodriguez
Abstract:
As far as we know, it is still unavailable a commercial solution which would allow to manage, openly and configurable up to user needs, the huge amount of data generated in a modern Radiation Oncology Department. Currently, available information management systems are mainly focused on Record & Verify and clinical data, and only to a small extent on physical data. Thus, results in a partial and limited use of the actually available information. In the present work we describe the implementation at our department of a centralized information management system based on a web server. Our system manages both information generated during patient planning and treatment, and information of general interest for the whole department (i.e. treatment protocols, quality assurance protocols etc.). Our objective it to be able to analyze in a simple and efficient way all the available data and thus to obtain quantitative evaluations of our treatments. This would allow us to improve our work flow and protocols. To this end we have implemented a relational data base which would allow us to use in a practical and efficient way all the available information. As always we only use license free software.Keywords: information management system, radiation oncology, medical physics, free software
Procedia PDF Downloads 2411321 Flexible and Integrated Transport System in India
Authors: Aayushi Patidar, Nishant Parihar
Abstract:
One of the principal causes of failure in existing vehicle brokerage solutions is that they require the introduction of a single trusted third party to whom transport offers and requirements are sent, and which solves the scheduling problem. Advances in planning and scheduling could be utilized to address the scalability issues inherent here, but such refinements do not address the key need to decentralize decision-making. This is not to say that matchmaking of potential transport suppliers to consumers is not essential, but information from such a service should inform rather than determining the transport options for customers. The approach that is proposed, is the use of intelligent commuters that act within the system and to identify options open to users, weighing the evidence for desirability of each option given a model of the user’s priorities, and to drive dialogue among commuters in aiding users to solve their individual (or collective) transport goals. Existing research in commuter support for transport resource management has typically been focused on the provider. Our vision is to explore both the efficient use of limited transport resources and also to support the passengers in the transportation flexibility & integration among various modes in India.Keywords: flexibility, integration, service design, technology
Procedia PDF Downloads 3521320 Performance Analysis of Multichannel OCDMA-FSO Network under Different Pervasive Conditions
Authors: Saru Arora, Anurag Sharma, Harsukhpreet Singh
Abstract:
To meet the growing need of high data rate and bandwidth, various efforts has been made nowadays for the efficient communication systems. Optical Code Division Multiple Access over Free space optics communication system seems an effective role for providing transmission at high data rate with low bit error rate and low amount of multiple access interference. This paper demonstrates the OCDMA over FSO communication system up to the range of 7000 m at a data rate of 5 Gbps. Initially, the 8 user OCDMA-FSO system is simulated and pseudo orthogonal codes are used for encoding. Also, the simulative analysis of various performance parameters like power and core effective area that are having an effect on the Bit error rate (BER) of the system is carried out. The simulative analysis reveals that the length of the transmission is limited by the multi-access interference (MAI) effect which arises when the number of users increases in the system.Keywords: FSO, PSO, bit error rate (BER), opti system simulation, multiple access interference (MAI), q-factor
Procedia PDF Downloads 3651319 Effectiveness of Conflict Resolution Board Game: An Experimental Research
Authors: Safa Abdussalam
Abstract:
Adolescence is a period of storm and stress. It is a transitional period. Adolescents undergo a lot of changes physically, emotionally and mentally during adolescence. Physical changes include puberty, sexual maturation, changes in height, weight, hormonal changes, changes in body image, changes in brain and in sexuality. Changes also occur in their cognition. According to Piaget’s theory, adolescent enter formal operational stage and engage in hypothetical-deductive reasoning. Main characteristic of adolescent cognition is adolescent egocentrism: imaginary audience and personal fable. One of the most common struggle majority of adolescents face is the conflict between parent and adolescent. They often complain that parents do not understand them/their situation. Common topics of conflict include identity crisis, issues with personal freedom and issues over personal preferences. Conflict resolution refers to solving conflicts in a healthy way. There is a lack of resources in dealing with such conflicts creatively. To deal with parent-adolescent conflict, a conflict resolution board game is designed. The board game consists of tokens, dice, 10 conflict situation cards and two conflict resolution sheets. Purpose of using a board game is to help adolescents understand the conflict situations and resolutions in a fun, creative and interactive way. It can be used for self-help or even therapists can use it in their clinical practice. The study aims to assess the effectiveness of the board game in dealing with the conflict. Experimental design will be used. Samples include 15 adolescents belonging to age group 10-19. Samples will be divided into two groups: Experimental group and control group. A pre-test and post-test will be conducted. The board game will be demonstrated to the experimental group. Results will be obtained after statistical analysis. Board games are a great way to be used with children and adolescents.Keywords: adolescent, adolescence, parent-child conflict, conflict resolution
Procedia PDF Downloads 961318 Analytical Downlink Effective SINR Evaluation in LTE Networks
Authors: Marwane Ben Hcine, Ridha Bouallegue
Abstract:
The aim of this work is to provide an original analytical framework for downlink effective SINR evaluation in LTE networks. The classical single carrier SINR performance evaluation is extended to multi-carrier systems operating over frequency selective channels. Extension is achieved by expressing the link outage probability in terms of the statistics of the effective SINR. For effective SINR computation, the exponential effective SINR mapping (EESM) method is used on this work. Closed-form expression for the link outage probability is achieved assuming a log skew normal approximation for single carrier case. Then we rely on the lognormal approximation to express the exponential effective SINR distribution as a function of the mean and standard deviation of the SINR of a generic subcarrier. Achieved formulas is easily computable and can be obtained for a user equipment (UE) located at any distance from its serving eNodeB. Simulations show that the proposed framework provides results with accuracy within 0.5 dB.Keywords: LTE, OFDMA, effective SINR, log skew normal approximation
Procedia PDF Downloads 3651317 Development of an Online Raw-Vegan Eating Program to Reduce Sugar Intake
Authors: Sara D. Garduno-Diaz, Lorena Loriato
Abstract:
Food selection is one of the main modifiable risk factors for the avoidance of several detrimental health conditions. Excessive and regular sugar intake has been identified as highly unfavorable, yet a highly occurring practice. A proposed approach to modify this eating practice is the online program developed here. The program targets a modification of mindset and lifestyle habits around food, through a four week raw-vegan guided eating program. While the focus of the program is to set up sustainable changes in sugar intake reduction, it also aims to promote a plant-based eating style. Three pilot sessions have been run with participants from seven different countries. Participants are guided through the program via a combination of daily e-mails, a 24-hour support platform, and by-weekly remote live sessions. Meal preparation techniques, as well as cooking instructions, are provided, following set menus developed by a team of professional chefs and nutritionists. Goal setting, as well as alternatives to specific food-related challenges, is addressed. While the program is intended for both women and men, the majority of participants to date have been female. Feedback has been positive, with changes in eating habits have included an elimination of added sugars, an increase in home cooking and vegetable intake, and a reduction in foods of animal origin. Difficulties in following the program have been reported as unavailability of certain ingredients depending on the country of residence of the participants, social and cultural hurdles, and time restrictions. Nevertheless, the results obtained to date indicate this to be a highly interactive program with the potential to be scaled up and applied to various populations as a public health measure on the way to better health.Keywords: eating habits, food addiction, nutrition education, plant-based, remote practice
Procedia PDF Downloads 1081316 Global Culture Museums: Bridging Societies, Fostering Understanding, and Preserving Heritage
Authors: Hossam Hegazi
Abstract:
Global culture museums play a pivotal role in fostering cross-cultural connections, enhancing mutual understanding, and safeguarding the rich tapestry of cultural heritage. These institutions serve as dynamic bridges, facilitating the exchange of ideas and values among diverse societies. One of the primary functions of global culture museums is to connect people from different backgrounds. By showcasing the artistic expressions, traditions, and historical artifacts of various civilizations, these museums create a shared space for dialogue. Visitors are afforded the opportunity to explore and appreciate the nuances of cultures different from their own, promoting a sense of global interconnectedness. Moreover, these museums contribute significantly to mutual understanding. Through interactive exhibits, innovative technologies, and educational programs, they offer immersive experiences that transcend linguistic and geographical barriers. Visitors gain insights into the customs, beliefs, and lifestyles of others, fostering empathy and appreciation for cultural diversity. Preserving cultural heritage stands as another key objective of global culture museums. By housing and curating artifacts, artworks, and historical items, these institutions play a crucial role in safeguarding the collective memory of humanity. This preservation effort ensures that future generations have access to the cultural legacies that have shaped societies across the globe. In conclusion, global culture museums serve as dynamic hubs that bring people together, promote understanding, and safeguard the wealth of human cultural heritage. Their impact extends beyond the walls of exhibition halls, contributing to a more interconnected and culturally enriched world.Keywords: global culture museums, cross-cultural connections, mutual understanding, societal dialogue
Procedia PDF Downloads 29