Search results for: multiple users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6875

Search results for: multiple users

4805 Treating Voxels as Words: Word-to-Vector Methods for fMRI Meta-Analyses

Authors: Matthew Baucum

Abstract:

With the increasing popularity of fMRI as an experimental method, psychology and neuroscience can greatly benefit from advanced techniques for summarizing and synthesizing large amounts of data from brain imaging studies. One promising avenue is automated meta-analyses, in which natural language processing methods are used to identify the brain regions consistently associated with certain semantic concepts (e.g. “social”, “reward’) across large corpora of studies. This study builds on this approach by demonstrating how, in fMRI meta-analyses, individual voxels can be treated as vectors in a semantic space and evaluated for their “proximity” to terms of interest. In this technique, a low-dimensional semantic space is built from brain imaging study texts, allowing words in each text to be represented as vectors (where words that frequently appear together are near each other in the semantic space). Consequently, each voxel in a brain mask can be represented as a normalized vector sum of all of the words in the studies that showed activation in that voxel. The entire brain mask can then be visualized in terms of each voxel’s proximity to a given term of interest (e.g., “vision”, “decision making”) or collection of terms (e.g., “theory of mind”, “social”, “agent”), as measured by the cosine similarity between the voxel’s vector and the term vector (or the average of multiple term vectors). Analysis can also proceed in the opposite direction, allowing word cloud visualizations of the nearest semantic neighbors for a given brain region. This approach allows for continuous, fine-grained metrics of voxel-term associations, and relies on state-of-the-art “open vocabulary” methods that go beyond mere word-counts. An analysis of over 11,000 neuroimaging studies from an existing meta-analytic fMRI database demonstrates that this technique can be used to recover known neural bases for multiple psychological functions, suggesting this method’s utility for efficient, high-level meta-analyses of localized brain function. While automated text analytic methods are no replacement for deliberate, manual meta-analyses, they seem to show promise for the efficient aggregation of large bodies of scientific knowledge, at least on a relatively general level.

Keywords: FMRI, machine learning, meta-analysis, text analysis

Procedia PDF Downloads 434
4804 Water Saving and Awareness Actions

Authors: R. Morbidelli, C. Saltalippi, A. Flammini, J. Dari

Abstract:

This work analyses what effect systematic awareness-raising of the population on domestic water consumption produces. In a period where the availability of water is continually decreasing due to reduced rainfall, it is of paramount importance to raise awareness among the population. We conducted an experiment on a large sample of homes in urban areas of Central Italy. In a first phase, lasting three weeks, normal per capita water consumption was quantified. Subsequently, instructions were given on how to save water during various uses in the household (showers, cleaning hands, use of water in toilets, watering small green areas, use of water in the kitchen, ...), and small visual messages were posted at water dispensers to remind users to behave properly. Finally, household consumption was assessed again for a further 3 weeks. This experiment made it possible to quantify the effect of the awareness-raising action on the reduction of water consumption without the use of any structural action (replacement of dispensers, improvement of the water system, ...).

Keywords: water saving, urban areas, awareness-raising, climate change

Procedia PDF Downloads 28
4803 A Multidisciplinary Team Approach for Limb Salvage in a Rare Case of Pyoderma Gangrenosum in a Significant Circumferential Lower Extremity Wound Complicated by Diabetes and End-stage Renal Disease

Authors: Jenee Gooden, Kevin Vasquez-monterroso, Lady Paula Dejesus, Sandra Wainwright, Daniel Kim, Mackenzie Walker

Abstract:

Introduction: Pyoderma gangrenosum (PG) is a rare, rapidly progressive, neutrophilic ulcerative colitis condition with an incidence of 3 to 10 cases per year ¹ ². Due to the similar appearance, PG is often misdiagnosed as a diabetic ulcer in diabetic patients. Though they may clinically appear similar in appearance, the treatment protocol and diagnostic criteria differ. Also, end-stage renal disease (ESRD) is often a condition seen in diabetic patients, which can have a significant impact on wound healing due to the wide range of uremic toxins³. This case study demonstrates a multidisciplinary team and multimodal treatment approach by podiatric surgery, general surgery, rheumatology, infectious disease, interventional cardiology, wound care and hyperbaric medicine for an uncontrolled diabetic with pyoderma gangrenosum of a significant circumferential wound, covering almost the entire right lower extremity. Methods:56 y.o male presents with multiple PG ulcerations, including the chest, right posterior lower extremity and sacrum. All ulcerations were previously managed by the same wound care specialist. His chief complaint was worsening PG ulcerations accompanied by a fever of 103 °F . This case study focuses on the wound to his RLE. Past medical history significant for diabetes mellitus type 2 with hemoglobin A1c of 10% and end stage renal disease (ESRD) on hemodialysis. A multidisciplinary team approach by podiatric surgery, general surgery, rheumatology, infectious disease, interventional cardiology, wound care and hyperbaric medicine was successfully used to perform right lower extremity limb salvage. The patient was managed by rheumatology for the continuation of prior medication, as well as the mutual agreement with wound care for the addition of dapsone. A coronary CT angiogram was performed by interventional cardiology, but no significant disease was noted, and no further vascular workup was necessary. Multiple surgical sharp wide excisional debridements with application of allografts and split thickness skin grafts for the circumferential ulceration that encompassed almost the entire right lower extremity were performed by both podiatric surgery and general surgery. Wound cultures and soft tissue biopsies were performed, and infectious disease managed antibiotic therapy. Hyperbaric oxygen therapy and wound vac therapy by wound care were also completed as adjunct management. Results: Prevention of leg amputation by limb salvage of the RLE was accomplished by a multidisciplinary team approach, with the wound size decreasing over a total of 29 weeks from 600 cm² to 12.0 x 3.5 x 0.2 cm. Our multidisciplinary team included podiatric surgery, general surgery, rheumatology, infectious disease, interventional cardiology, wound care and hyperbaric medicine. Discussion: Wound healing, in general, can have its challenges, and those challenges are only magnified when accompanied by multiple systemic illnesses. Though the negative impact of diabetes on wound healing is well known, the compound impact of being a diabetic with ESRD and having pyoderma gangrenosum is not. This case demonstrates the necessity for a multidisciplinary team approach with a wide array of treatment modalities to optimize wound healing and perform limb salvage with prevention of lower extremity amputation.

Keywords: diabetes, podiatry, pyoderma gangrenosum, end stage renal disease

Procedia PDF Downloads 60
4802 A User Study on the Adoption of Context-Aware Destination Mobile Applications

Authors: Shu-Lu Hsu, Fang-Yi Chu

Abstract:

With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.

Keywords: mobile application, context-aware, privacy concern, TAM

Procedia PDF Downloads 244
4801 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 373
4800 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario

Authors: Shuqi Zhang

Abstract:

Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.

Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning

Procedia PDF Downloads 83
4799 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 318
4798 Generating Music with More Refined Emotions

Authors: Shao-Di Feng, Von-Wun Soo

Abstract:

To generate symbolic music with specific emotions is a challenging task due to symbolic music datasets that have emotion labels are scarce and incomplete. This research aims to generate more refined emotions based on the training datasets that are only labeled with four quadrants in Russel’s 2D emotion model. We focus on the theory of Music Fadernet and map arousal and valence to the low-level attributes, and build a symbolic music generation model by combining transformer and GM-VAE. We adopt an in-attention mechanism for the model and improve it by allowing modulation by conditional information. And we show the music generation model could control the generation of music according to the emotions specified by users in terms of high-level linguistic expression and by manipulating their corresponding low-level musical attributes. Finally, we evaluate the model performance using a pre-trained emotion classifier against a pop piano midi dataset called EMOPIA, and by subjective listening evaluation, we demonstrate that the model could generate music with more refined emotions correctly.

Keywords: music generation, music emotion controlling, deep learning, semi-supervised learning

Procedia PDF Downloads 71
4797 Design of Collaborative Web System: Based on Case Study of PBL Support Systems

Authors: Kawai Nobuaki

Abstract:

This paper describes the design and implementation of web system for continuable and viable collaboration. This study proposes the improvement of the system based on a result of a certain practice. As contemporary higher education information environments transform, this study highlights the significance of university identity and college identity that are formed continuously through independent activities of the students. Based on these discussions, the present study proposes a practical media environment design which facilitates the processes of organizational identity formation based on a continuous and cyclical model. Even if users change by this system, the communication system continues operation and cooperation. The activity becomes the archive and produces new activity. Based on the result, this study elaborates a plan with a re-design by a system from the viewpoint of second-order cybernetics. Systems theory is a theoretical foundation for our study.

Keywords: collaborative work, learning management system, second-order cybernetics, systems theory, user generated contents, viable system model

Procedia PDF Downloads 200
4796 Critical Design - Concepts, Methods and Practices for Innovative Societal Relationships

Authors: Martina Maria Keitsch

Abstract:

Critical Design (CD) confronts traditional design practice. Instead of reproducing and reinforcing contemporary perceptions of products and services, CD seeks to challenge them with the goal to stimulate debates and visions on societal innovation. CD methods comprise, among other narratives and design of critical objects. The oral presentation is based on a study that discusses concepts, methods, and applications of CD links CD to traditional design, and identifies CD benefits and challenges for design research and practice. The objective of the study is to introduce CD as an alternative for design researchers and practitioners supplementing commercially oriented design approaches. The study utilizes a literature review on CD concepts and methods based on current publications and online documents and illustrates CD practice with help of selected case studies. Findings of the study indicate that CD contribute, among others, to create new societal roles for designers, foster innovative relationships between designers and users, and encourage creativity through imaginative aesthetics.

Keywords: critical design, postmodern design theories, narratives, rhizome

Procedia PDF Downloads 155
4795 Key Concepts of 5th Generation Mobile Technology

Authors: Magri Hicham, Noreddine Abghour, Mohamed Ouzzif

Abstract:

The 5th generation of mobile networks is term used in various research papers and projects to identify the next major phase of mobile telecommunications standards. 5G wireless networks will support higher peak data rate, lower latency and provide best connections with QoS guarenty. In this article, we discuss various promising technologies for 5G wireless communication systems, such as IPv6 support, World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN), BEAM DIVISION MULTIPLE ACCESS (BDMA), Cloud Computing and cognitive radio technology.

Keywords: WWWW, BDMA, DAWN, 5G, 4G, IPv6, Cloud Computing

Procedia PDF Downloads 497
4794 The Consumer Responses toward the Offensive Product Advertising

Authors: Chin Tangtarntana

Abstract:

The main purpose of this study was to investigate the effects of animation in offensive product advertising. Experiment was conducted to collect consumer responses toward animated and static ads of offensive and non-offensive products. The study was conducted by distributing questionnaires to the target respondents. According to statistics from Innovative Internet Research Center, Thailand, majority of internet users are 18 – 44 years old. The results revealed an interaction between ad design and offensive product. Specifically, when used in offensive product advertisements, animated ads were not effective for consumer attention, but yielded positive response in terms of attitude toward product. The findings support that information processing model is accurate in predicting consumer cognitive response toward cartoon ads, whereas U&G, arousal, and distinctive theory is more accurate in predicting consumer affective response. In practical, these findings can also be used to guide ad designers and marketers that are suitable for offensive products.

Keywords: animation, banner ad design, consumer responses, offensive product advertising, stock exchange of Thailand

Procedia PDF Downloads 252
4793 Energy Efficiency of Secondary Refrigeration with Phase Change Materials and Impact on Greenhouse Gases Emissions

Authors: Michel Pons, Anthony Delahaye, Laurence Fournaison

Abstract:

Secondary refrigeration consists of splitting large-size direct-cooling units into volume-limited primary cooling units complemented by secondary loops for transporting and distributing cold. Such a design reduces the refrigerant leaks, which represents a source of greenhouse gases emitted into the atmosphere. However, inserting the secondary circuit between the primary unit and the ‘users’ heat exchangers (UHX) increases the energy consumption of the whole process, which induces an indirect emission of greenhouse gases. It is thus important to check whether that efficiency loss is sufficiently limited for the change to be globally beneficial to the environment. Among the likely secondary fluids, phase change slurries offer several advantages: they transport latent heat, they stabilize the heat exchange temperature, and the formerly evaporators still can be used as UHX. The temperature level can also be adapted to the desired cooling application. Herein, the slurry {ice in mono-propylene-glycol solution} (melting temperature Tₘ of 6°C) is considered for food preservation, and the slurry {mixed hydrate of CO₂ + tetra-n-butyl-phosphonium-bromide in aqueous solution of this salt + CO₂} (melting temperature Tₘ of 13°C) is considered for air conditioning. For the sake of thermodynamic consistency, the analysis encompasses the whole process, primary cooling unit plus secondary slurry loop, and the various properties of the slurries, including their non-Newtonian viscosity. The design of the whole process is optimized according to the properties of the chosen slurry and under explicit constraints. As a first constraint, all the units must deliver the same cooling power to the user. The other constraints concern the heat exchanges areas, which are prescribed, and the flow conditions, which prevent deposition of the solid particles transported in the slurry, and their agglomeration. Minimization of the total energy consumption leads to the optimal design. In addition, the results are analyzed in terms of exergy losses, which allows highlighting the couplings between the primary unit and the secondary loop. One important difference between the ice-slurry and the mixed-hydrate one is the presence of gaseous carbon dioxide in the latter case. When the mixed-hydrate crystals melt in the UHX, CO₂ vapor is generated at a rate that depends on the phase change kinetics. The flow in the UHX, and its heat and mass transfer properties are significantly modified. This effect has never been investigated before. Lastly, inserting the secondary loop between the primary unit and the users increases the temperature difference between the refrigerated space and the evaporator. This results in a loss of global energy efficiency, and therefore in an increased energy consumption. The analysis shows that this loss of efficiency is not critical in the first case (Tₘ = 6°C), while the second case leads to more ambiguous results, partially because of the higher melting temperature.The consequences in terms of greenhouse gases emissions are also analyzed.

Keywords: exergy, hydrates, optimization, phase change material, thermodynamics

Procedia PDF Downloads 117
4792 Impact of Early Father Involvement on Middle Childhood Cognitive and Behavioral Outcomes

Authors: Jamel Slaughter

Abstract:

Father involvement across the development of a child has been linked to children’s psychological adjustment, fewer behavioral problems, and higher educational attainment. Conversely, there is much less research that highlights father involvement in relation to childhood development during early childhood period prior to preschool age (ages 1-3 years). Most research on fathers and child outcomes have been limited by its focus on the stages of adolescence, middle childhood, and infancy. This study examined the influence of father involvement, during the toddler stage, on 5th grade cognitive development, rule-breaking, and behavior outcomes measured by Child Behavior Checklist (CBCL) scores. Using data from the Early Head Start Research and Evaluation (EHSRE) Study, 1996-2010: United States, a total of 3,001 children and families were identified in 17 sites (cities), representing a diverse demographic sample. An independent samples t-test was run to compare cognitive development, aggressive, and rule-breaking behavior mean scores among children who had early continuous father involvement for the first 14 – 36 months to children who did not have early continuous father involvement for the first 14 – 36 months. Multiple linear regression was conducted to determine if continuous, or non-continuous father involvement (14 month-36 months), can be used to predict outcome scores on the Child Behavior Checklist in aggressive behavior, rule-breaking behavior, and cognitive development, at 5th grade. A statistically significant mean difference in cognitive development scores were found for children who had continuous father involvement (M=1.92, SD=2.41, t (1009) =2.81, p =.005, 95% CI=.146 to .828) compared to those who did not (M=2.60, SD=3.06, t (1009) =-2.38, p=.017, 95% CI= -1.08 to -.105). There was also a statistically significant mean difference in rule-breaking behavior scores between children who had early continuous father involvement (M=1.95, SD=2.33, t (1009) = 3.69, p <.001, 95% CI= .287 to .940), compared to those that did not (M=2.87, SD=2.93, t (1009) = -3.49, p =.001, 95% CI= -1.30 to -.364). No statistically significant difference was found in aggressive behavior scores. Multiple linear regression was performed using continuous father involvement to determine which has the largest relationship to rule-breaking behavior and cognitive development based on CBCL scores. Rule-breaking behavior was found to be significant (F (2, 1008) = 8.353, p<.001), with an R2 of .016. Cognitive development was also significant (F (2, 1008) = 4.44, p=.012), with an R2 of .009. Early continuous father involvement was a significant predictor of rule-breaking behavior and cognitive development at middle childhood. Findings suggest early continuous father involvement during the first 14 – 36 months of their children’s life, may lead to lower levels of rule-breaking behaviors and thought problems at 5th grade.

Keywords: cognitive development, early continuous father involvement, middle childhood, rule-breaking behavior

Procedia PDF Downloads 282
4791 Geospatial Data Complexity in Electronic Airport Layout Plan

Authors: Shyam Parhi

Abstract:

Airports GIS program collects Airports data, validate and verify it, and stores it in specific database. Airports GIS allows authorized users to submit changes to airport data. The verified data is used to develop several engineering applications. One of these applications is electronic Airport Layout Plan (eALP) whose primary aim is to move from paper to digital form of ALP. The first phase of development of eALP was completed recently and it was tested for a few pilot program airports across different regions. We conducted gap analysis and noticed that a lot of development work is needed to fine tune at least six mandatory sheets of eALP. It is important to note that significant amount of programming is needed to move from out-of-box ArcGIS to a much customized ArcGIS which will be discussed. The ArcGIS viewer capability to display essential features like runway or taxiway or the perpendicular distance between them will be discussed. An enterprise level workflow which incorporates coordination process among different lines of business will be highlighted.

Keywords: geospatial data, geology, geographic information systems, aviation

Procedia PDF Downloads 400
4790 A Weighted Approach to Unconstrained Iris Recognition

Authors: Yao-Hong Tsai

Abstract:

This paper presents a weighted approach to unconstrained iris recognition. Nowadays, commercial systems are usually characterized by strong acquisition constraints based on the subject’s cooperation. However, it is not always achievable for real scenarios in our daily life. Researchers have been focused on reducing these constraints and maintaining the performance of the system by new techniques at the same time. With large variation in the environment, there are two main improvements to develop the proposed iris recognition system. For solving extremely uneven lighting condition, statistic based illumination normalization is first used on eye region to increase the accuracy of iris feature. The detection of the iris image is based on Adaboost algorithm. Secondly, the weighted approach is designed by Gaussian functions according to the distance to the center of the iris. Furthermore, local binary pattern (LBP) histogram is then applied to texture classification with the weight. Experiment showed that the proposed system provided users a more flexible and feasible way to interact with the verification system through iris recognition.

Keywords: authentication, iris recognition, adaboost, local binary pattern

Procedia PDF Downloads 207
4789 Factors Influencing University Students' Online Disinhibition Behavior: The Moderating Effects of Deterrence and Social Identity

Authors: Wang, Kuei-Ing, Jou-Fan Shih

Abstract:

This study adopts deterrence theory as well as social identities as moderators, and explores their moderating affects on online toxic disinhibition. Survey and Experimental methodologies are applied to test the research model and four hypotheses are developed in this study. The controllability of identity positively influenced the behavior of toxic disinhibition both in experimental and control groups while the fluidity of the identity did not have significant influences on online disinhibition. Punishment certainty, punishment severity as well as social identity negatively moderated the relation between the controllability of the identity and the toxic disinhibition. The result of this study shows that internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the inappropriate behavior will be found and punished severely, the inappropriate behavior then will be weakened.

Keywords: seductive properties of internet, online disinhibition, punishment certainty, punishment severity, social identity

Procedia PDF Downloads 498
4788 Improving School Design through Diverse Stakeholder Participation in the Programming Phase

Authors: Doris C. C. K. Kowaltowski, Marcella S. Deliberador

Abstract:

The architectural design process, in general, is becoming more complex, as new technical, social, environmental, and economical requirements are imposed. For school buildings, this scenario is also valid. The quality of a school building depends on known design criteria and professional knowledge, as well as feedback from building performance assessments. To attain high-performance school buildings, a design process should add a multidisciplinary team, through an integrated process, to ensure that the various specialists contribute at an early stage to design solutions. The participation of stakeholders is of special importance at the programming phase when the search for the most appropriate design solutions is underway. The composition of a multidisciplinary team should comprise specialists in education, design professionals, and consultants in various fields such as environmental comfort and psychology, sustainability, safety and security, as well as administrators, public officials and neighbourhood representatives. Users, or potential users (teachers, parents, students, school officials, and staff), should be involved. User expectations must be guided, however, toward a proper understanding of a response of design to needs to avoid disappointment. In this context, appropriate tools should be introduced to organize such diverse participants and ensure a rich and focused response to needs and a productive outcome of programming sessions. In this paper, different stakeholder in a school design process are discussed in relation to their specific contributions and a tool in the form of a card game is described to structure the design debates and ensure a comprehensive decision-making process. The game is based on design patterns for school architecture as found in the literature and is adapted to a specific reality: State-run public schools in São Paulo, Brazil. In this State, school buildings are managed by a foundation called Fundação para o Desenvolvimento da Educação (FDE). FDE supervises new designs and is responsible for the maintenance of ~ 5000 schools. The design process of this context was characterised with a recommendation to improve the programming phase. Card games can create a common environment, to which all participants can relate and, therefore, can contribute to briefing debates on an equal footing. The cards of the game described here represent essential school design themes as found in the literature. The tool was tested with stakeholder groups and with architecture students. In both situations, the game proved to be an efficient tool to stimulate school design discussions and to aid in the elaboration of a rich, focused and thoughtful architectural program for a given demand. The game organizes the debates and all participants are shown to spontaneously contribute each in his own field of expertise to the decision-making process. Although the game was specifically based on a local school design process it shows potential for other contexts because the content is based on known facts, needs and concepts of school design, which are global. A structured briefing phase with diverse stakeholder participation can enrich the design process and consequently improve the quality of school buildings.

Keywords: architectural program, design process, school building design, stakeholder

Procedia PDF Downloads 393
4787 Integrating Eye-Tracking Analysis to Enhance Web Usability Evaluation

Authors: Johanna Renny Octavia, Meliana Nurdin, Ignatius Kevin Kurniawan, Ricca Aksara

Abstract:

It is widely believed that usability evaluation is necessary to evaluate a website design for further improvement. Traditional methods of usability evaluation have given sufficient insights to reveal usability problems of websites. Eye-tracking analysis has been considered as a useful method that adds a powerful dimension to web usability evaluation. It allows web designers and usability researchers to understand exactly what users do and do not see on a web page, thus disclose more information on web usability and provide a more complete insights on a website design. This paper elaborates on moving beyond traditional methods of web usability evaluation by integrating eye-tracking analysis to enhance the evaluation of website design, and presents three case studies to support this approach. In these case studies, eye movement metrics such as gaze plots and fixation-derived metrics, and user performance data such as task completion times and number of errors were recorded as objective measurements that can inform the necessity for website design improvements.

Keywords: design, eye-tracking, usability evaluation, website

Procedia PDF Downloads 287
4786 All at Sea: Why OT / IT Infrastructure Is So Complex and the Challenges of Securing These on a Cruise Ship

Authors: Ken Munro

Abstract:

Cruise ships are possibly the most complex collection of systems it is possible to find in one physical, moving location. Propulsion, navigation, power generation and more, combined with a hotel, restaurant, casino, theatre etc, with safety and fire control systems to boot. That complexity creates huge challenges with keeping OT and IT systems apart. Ships engines are often remotely managed, network segregation is often defeated through troubleshooting when at sea. This session will refer to multiple entertaining and informative tales of taking control of ships, including accessing a ships Azipods via a game simulator for passengers. Fortunately, genuine attacks against vessels are very rare, but the effects and impacts to world trade are becoming increasingly obvious.

Keywords: maritime security, cybersecurity, OT, IT, networks

Procedia PDF Downloads 3
4785 Vr-GIS and Ar-GIS In Education: A Case Study

Authors: Ilario Gabriele Gerloni, Vincenza Carchiolo, Alessandro Longheu, Ugo Becciani, Eva Sciacca, Fabio Vitello

Abstract:

ICT tools and platforms endorse more and more educational process. Many models and techniques for people to be educated and trained about specific topics and skills do exist, as classroom lectures with textbooks, computers, handheld devices and others. The choice to what extent ICT is applied within learning contexts is related to personal access to technologies as well as to the infrastructure surrounding environment. Among recent techniques, the adoption of Virtual Reality (VR) and Augmented Reality (AR) provides significant impulse in fully engaging users senses. In this paper, an application of AR/VR within Geographic Information Systems (GIS) context is presented. It aims to provide immersive environment experiences for educational and training purposes (e.g. for civil protection personnel), useful especially for situations where real scenarios are not easily accessible by humans. First acknowledgments are promising for building an effective tool that helps civil protection personnel training with risk reduction.

Keywords: education, virtual reality, augmented reality, GIS, civil protection

Procedia PDF Downloads 163
4784 An Efficient Strategy for Relay Selection in Multi-Hop Communication

Authors: Jung-In Baik, Seung-Jun Yu, Young-Min Ko, Hyoung-Kyu Song

Abstract:

This paper proposes an efficient relaying algorithm to obtain diversity for improving the reliability of a signal. The algorithm achieves time or space diversity gain by multiple versions of the same signal through two routes. Relays are separated between a source and destination. The routes between the source and destination are set adaptive in order to deal with different channels and noises. The routes consist of one or more relays and the source transmits its signal to the destination through the routes. The signals from the relays are combined and detected at the destination. The proposed algorithm provides a better performance than the conventional algorithms in bit error rate (BER).

Keywords: multi-hop, OFDM, relay, relaying selection

Procedia PDF Downloads 433
4783 Usability Evaluation of a Mobile Application to Enhance the Use of Smartphone, by Visually Impaired Users in Indonesia

Authors: Johanna Renny Octavia, Kamila Okta Saarah

Abstract:

Smartphone nowadays is widely used by many people all over the world. However, people with vision impairment may experience difficulties that interfere with the proper usage of the smartphone. In Indonesia, the population of visually impaired is about 13 million people (estimated 285 million people worldwide). There are a number of mobile applications developed to enhance the use of smartphone by visually impaired. This paper discusses the usability evaluation of a mobile application, namely Ray Vision, designed to help visually impaired in using smartphone. A series of usability testing with a number of Indonesian visually impaired revealed 28 usability problems in the mobile application that led to 14 design recommendations. The redesigned application was then re-evaluated through another usability testing series. The results showed that all five usability criteria assessed were increased (usefulness by 13%, effectiveness by 27%, efficiency by 27%, satisfaction by 23%, and learnability by 12%). The System Usability Score (SUS) was also increased by 14.92%.

Keywords: mobile application, smartphone, usability evaluation, vision impaired

Procedia PDF Downloads 295
4782 Perception of Consumer Behavior on Mobile Banking Offered by the National and Multinational Banks in UAE with Special Reference to Emirates NBD and Citibank

Authors: Aarohi Surya

Abstract:

The number of mobile banking users continues to climb across the world due to its increasing popularity, and UAE is no exception. This type of banking is part of the core strategy of most of the financial institutions that allows its customers to conduct a range of financial transactions through mobile apps to cash in the high demand from the bankers. This study aims at evaluating service quality of online banking in Dubai, one of the swiftly growing cities of Middle East. The paper mainly compares online banking services of Multinational bank and National Bank with special reference to Citibank and Emirates NBD. A structured questionnaire survey is conducted among various target groups. The research has been focused on mainly 4 significant areas of online banking, i.e. Privacy, Responsiveness, Reliability, and Efficiency of customer data. Information was analyzed statistically on SPSS to investigate the service quality of e-banking.

Keywords: customer satisfaction, service quality, responsiveness, online banking

Procedia PDF Downloads 256
4781 Information Extraction Based on Search Engine Results

Authors: Mohammed R. Elkobaisi, Abdelsalam Maatuk

Abstract:

The search engines are the large scale information retrieval tools from the Web that are currently freely available to all. This paper explains how to convert the raw resulted number of search engines into useful information. This represents a new method for data gathering comparing with traditional methods. When a query is submitted for a multiple numbers of keywords, this take a long time and effort, hence we develop a user interface program to automatic search by taking multi-keywords at the same time and leave this program to collect wanted data automatically. The collected raw data is processed using mathematical and statistical theories to eliminate unwanted data and converting it to usable data.

Keywords: search engines, information extraction, agent system

Procedia PDF Downloads 414
4780 Software Assessment Using Ant Colony Optimization Algorithm

Authors: Saad M. Darwish

Abstract:

Recently, software quality issues have come to be seen as important subject as we see an enormous growth of agencies involved in software industries. However,these agencies cannot guarantee the quality of their products, thus leaving users in uncertainties. Software certification is the extension of quality by means that quality needs to be measured prior to certification granting process. This research participates in solving the problem of software assessment by proposing a model for assessment and certification of software product that uses a fuzzy inference engine to integrate both of process–driven and application-driven quality assurance strategies. The key idea of the on hand model is to improve the compactness and the interpretability of the model’s fuzzy rules via employing an ant colony optimization algorithm (ACO), which tries to find good rules description by dint of compound rules initially expressed with traditional single rules. The model has been tested by case study and the results have demonstrated feasibility and practicability of the model in a real environment.

Keywords: optimization technique, quality assurance, software certification model, software assessment

Procedia PDF Downloads 472
4779 Evaluation of Random Forest and Support Vector Machine Classification Performance for the Prediction of Early Multiple Sclerosis from Resting State FMRI Connectivity Data

Authors: V. Saccà, A. Sarica, F. Novellino, S. Barone, T. Tallarico, E. Filippelli, A. Granata, P. Valentino, A. Quattrone

Abstract:

The work aim was to evaluate how well Random Forest (RF) and Support Vector Machine (SVM) algorithms could support the early diagnosis of Multiple Sclerosis (MS) from resting-state functional connectivity data. In particular, we wanted to explore the ability in distinguishing between controls and patients of mean signals extracted from ICA components corresponding to 15 well-known networks. Eighteen patients with early-MS (mean-age 37.42±8.11, 9 females) were recruited according to McDonald and Polman, and matched for demographic variables with 19 healthy controls (mean-age 37.55±14.76, 10 females). MRI was acquired by a 3T scanner with 8-channel head coil: (a)whole-brain T1-weighted; (b)conventional T2-weighted; (c)resting-state functional MRI (rsFMRI), 200 volumes. Estimated total lesion load (ml) and number of lesions were calculated using LST-toolbox from the corrected T1 and FLAIR. All rsFMRIs were pre-processed using tools from the FMRIB's Software Library as follows: (1) discarding of the first 5 volumes to remove T1 equilibrium effects, (2) skull-stripping of images, (3) motion and slice-time correction, (4) denoising with high-pass temporal filter (128s), (5) spatial smoothing with a Gaussian kernel of FWHM 8mm. No statistical significant differences (t-test, p < 0.05) were found between the two groups in the mean Euclidian distance and the mean Euler angle. WM and CSF signal together with 6 motion parameters were regressed out from the time series. We applied an independent component analysis (ICA) with the GIFT-toolbox using the Infomax approach with number of components=21. Fifteen mean components were visually identified by two experts. The resulting z-score maps were thresholded and binarized to extract the mean signal of the 15 networks for each subject. Statistical and machine learning analysis were then conducted on this dataset composed of 37 rows (subjects) and 15 features (mean signal in the network) with R language. The dataset was randomly splitted into training (75%) and test sets and two different classifiers were trained: RF and RBF-SVM. We used the intrinsic feature selection of RF, based on the Gini index, and recursive feature elimination (rfe) for the SVM, to obtain a rank of the most predictive variables. Thus, we built two new classifiers only on the most important features and we evaluated the accuracies (with and without feature selection) on test-set. The classifiers, trained on all the features, showed very poor accuracies on training (RF:58.62%, SVM:65.52%) and test sets (RF:62.5%, SVM:50%). Interestingly, when feature selection by RF and rfe-SVM were performed, the most important variable was the sensori-motor network I in both cases. Indeed, with only this network, RF and SVM classifiers reached an accuracy of 87.5% on test-set. More interestingly, the only misclassified patient resulted to have the lowest value of lesion volume. We showed that, with two different classification algorithms and feature selection approaches, the best discriminant network between controls and early MS, was the sensori-motor I. Similar importance values were obtained for the sensori-motor II, cerebellum and working memory networks. These findings, in according to the early manifestation of motor/sensorial deficits in MS, could represent an encouraging step toward the translation to the clinical diagnosis and prognosis.

Keywords: feature selection, machine learning, multiple sclerosis, random forest, support vector machine

Procedia PDF Downloads 227
4778 Automating Test Activities: Test Cases Creation, Test Execution, and Test Reporting with Multiple Test Automation Tools

Authors: Loke Mun Sei

Abstract:

Software testing has become a mandatory process in assuring the software product quality. Hence, test management is needed in order to manage the test activities conducted in the software test life cycle. This paper discusses on the challenges faced in the software test life cycle, and how the test processes and test activities, mainly on test cases creation, test execution, and test reporting is being managed and automated using several test automation tools, i.e. Jira, Robot Framework, and Jenkins.

Keywords: test automation tools, test case, test execution, test reporting

Procedia PDF Downloads 562
4777 Design of a Pulse Generator Based on a Programmable System-on-Chip (PSoC) for Ultrasonic Applications

Authors: Pedro Acevedo, Carlos Díaz, Mónica Vázquez, Joel Durán

Abstract:

This paper describes the design of a pulse generator based on the Programmable System-on-Chip (PSoC) module. In this module, using programmable logic is possible to implement different pulses which are required for ultrasonic applications, either in a single channel or multiple channels. This module can operate with programmable frequencies from 3-74 MHz; its programming may be versatile covering a wide range of ultrasonic applications. It is ideal for low-power ultrasonic applications where PZT or PVDF transducers are used.

Keywords: PSoC, pulse generator, PVDF, ultrasonic transducer

Procedia PDF Downloads 272
4776 Cooperation of Unmanned Vehicles for Accomplishing Missions

Authors: Ahmet Ozcan, Onder Alparslan, Anil Sezgin, Omer Cetin

Abstract:

The use of unmanned systems for different purposes has become very popular over the past decade. Expectations from these systems have also shown an incredible increase in this parallel. But meeting the demands of the tasks are often not possible with the usage of a single unmanned vehicle in a mission, so it is necessary to use multiple autonomous vehicles with different abilities together in coordination. Therefore the usage of the same type of vehicles together as a swarm is helped especially to satisfy the time constraints of the missions effectively. In other words, it allows sharing the workload by the various numbers of homogenous platforms together. Besides, it is possible to say there are many kinds of problems that require the usage of the different capabilities of the heterogeneous platforms together cooperatively to achieve successful results. In this case, cooperative working brings additional problems beyond the homogeneous clusters. In the scenario presented as an example problem, it is expected that an autonomous ground vehicle, which is lack of its position information, manage to perform point-to-point navigation without losing its way in a previously unknown labyrinth. Furthermore, the ground vehicle is equipped with very limited sensors such as ultrasonic sensors that can detect obstacles. It is very hard to plan or complete the mission for the ground vehicle by self without lost its way in the unknown labyrinth. Thus, in order to assist the ground vehicle, the autonomous air drone is also used to solve the problem cooperatively. The autonomous drone also has limited sensors like downward looking camera and IMU, and it also lacks computing its global position. In this context, it is aimed to solve the problem effectively without taking additional support or input from the outside, just benefiting capabilities of two autonomous vehicles. To manage the point-to-point navigation in a previously unknown labyrinth, the platforms have to work together coordinated. In this paper, cooperative work of heterogeneous unmanned systems is handled in an applied sample scenario, and it is mentioned that how to work together with an autonomous ground vehicle and the autonomous flying platform together in a harmony to take advantage of different platform-specific capabilities. The difficulties of using heterogeneous multiple autonomous platforms in a mission are put forward, and the successful solutions are defined and implemented against the problems like spatially distributed tasks planning, simultaneous coordinated motion, effective communication, and sensor fusion.

Keywords: unmanned systems, heterogeneous autonomous vehicles, coordination, task planning

Procedia PDF Downloads 113