Search results for: user identification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4981

Search results for: user identification

2461 Efficient Schemes of Classifiers for Remote Sensing Satellite Imageries of Land Use Pattern Classifications

Authors: S. S. Patil, Sachidanand Kini

Abstract:

Classification of land use patterns is compelling in complexity and variability of remote sensing imageries data. An imperative research in remote sensing application exploited to mine some of the significant spatially variable factors as land cover and land use from satellite images for remote arid areas in Karnataka State, India. The diverse classification techniques, unsupervised and supervised consisting of maximum likelihood, Mahalanobis distance, and minimum distance are applied in Bellary District in Karnataka State, India for the classification of the raw satellite images. The accuracy evaluations of results are compared visually with the standard maps with ground-truths. We initiated with the maximum likelihood technique that gave the finest results and both minimum distance and Mahalanobis distance methods over valued agriculture land areas. In meanness of mislaid few irrelevant features due to the low resolution of the satellite images, high-quality accord between parameters extracted automatically from the developed maps and field observations was found.

Keywords: Mahalanobis distance, minimum distance, supervised, unsupervised, user classification accuracy, producer's classification accuracy, maximum likelihood, kappa coefficient

Procedia PDF Downloads 171
2460 Health and Climate Changes: "Ippocrate" a New Alert System to Monitor and Identify High Risk

Authors: A. Calabrese, V. F. Uricchio, D. di Noia, S. Favale, C. Caiati, G. P. Maggi, G. Donvito, D. Diacono, S. Tangaro, A. Italiano, E. Riezzo, M. Zippitelli, M. Toriello, E. Celiberti, D. Festa, A. Colaianni

Abstract:

Climate change has a severe impact on human health. There is a vast literature demonstrating temperature increase is causally related to cardiovascular problem and represents a high risk for human health, but there are not study that improve a solution. In this work, it is studied how the clime influenced the human parameter through the analysis of climatic conditions in an area of the Apulia Region: Capurso Municipality. At the same time, medical personnel involved identified a set of variables useful to define an index describing health condition. These scientific studies are the base of an innovative alert system, IPPOCRATE, whose aim is to asses climate risk and share information to population at risk to support prevention and mitigation actions. IPPOCRATE is an e-health system, it is designed to provide technological support to analysis of health risk related to climate and provide tools for prevention and management of critical events. It is the first integrated system of prevention of human risk caused by climate change. IPPOCRATE calculates risk weighting meteorological data with the vulnerability of monitored subjects and uses mobile and cloud technologies to acquire and share information on different data channels. It is composed of four components: Multichannel Hub. Multichannel Hub is the ICT infrastructure used to feed IPPOCRATE cloud with a different type of data coming from remote monitoring devices, or imported from meteorological databases. Such data are ingested, transformed and elaborated in order to be dispatched towards mobile app and VoIP phone systems. IPPOCRATE Multichannel Hub uses open communication protocols to create a set of APIs useful to interface IPPOCRATE with 3rd party applications. Internally, it uses non-relational paradigm to create flexible and highly scalable database. WeHeart and Smart Application The wearable device WeHeart is equipped with sensors designed to measure following biometric variables: heart rate, systolic blood pressure and diastolic blood pressure, blood oxygen saturation, body temperature and blood glucose for diabetic subjects. WeHeart is designed to be easy of use and non-invasive. For data acquisition, users need only to wear it and connect it to Smart Application by Bluetooth protocol. Easy Box was designed to take advantage from new technologies related to e-health care. EasyBox allows user to fully exploit all IPPOCRATE features. Its name, Easy Box, reveals its purpose of container for various devices that may be included depending on user needs. Territorial Registry is the IPPOCRATE web module reserved to medical personnel for monitoring, research and analysis activities. Territorial Registry allows to access to all information gathered by IPPOCRATE using GIS system in order to execute spatial analysis combining geographical data (climatological information and monitored data) with information regarding the clinical history of users and their personal details. Territorial Registry was designed for different type of users: control rooms managed by wide area health facilities, single health care center or single doctor. Territorial registry manages such hierarchy diversifying the access to system functionalities. IPPOCRATE is the first e-Health system focused on climate risk prevention.

Keywords: climate change, health risk, new technological system

Procedia PDF Downloads 857
2459 New Bioactive Compounds from Two Chrysanthemum Saharian Species (Asteraceae) Growing in Algeria

Authors: Zahia Kabouche, Ouissem Gherboudj, Naima Boutaghane, Ahmed Kabouche, Laurence Voutquenne-Nazabadioko

Abstract:

Chrysanthemum herbs (Asteraceae) are extensively used as food additives and in folk medicine. Anti-cancer, anti-human immunodeficiency virus type 1 (HIV-1), anti-inflammatory, antinociceptive and antiproliferative activities as well as antioxidant effects have been reported for Chrysanthemum species. We report the isolation and identification of flavonoids and new and known terpenoids from the endemic species, C. macrocarpum and C. deserticolum “guertoufa”, used in Algerian Sahara as tea drinks and in “couscous” and soups “Chorba”. Structures of the isolated compounds were established by 1-D and 2-D homo and hetero-nuclear NMR (1H, 13C, COSY, HSQC, HMBC, and NOESY), mass spectrometry, UV and comparison with literature data. C. deserticolum extracts were tested by four methods to identify the antioxidant activity namely, ABTS•+, DPPH• scavenging, CUPRAC and ferrous-ions chelating activity methods. Anti-inflammatory, antinociceptive, antiproliferative and antioxidant activities of C. macrocarpum extracts and isolated compounds are also reported here.

Keywords: Chrysanthemum macrocarpum, C. deserticolum, flavonoids, terpenoids, antioxidant, anti-inflammatory, anti-proliferative

Procedia PDF Downloads 327
2458 [Keynote Speech]: Bridge Damage Detection Using Frequency Response Function

Authors: Ahmed Noor Al-Qayyim

Abstract:

During the past decades, the bridge structures are considered very important portions of transportation networks, due to the fast urban sprawling. With the failure of bridges that under operating conditions lead to focus on updating the default bridge inspection methodology. The structures health monitoring (SHM) using the vibration response appeared as a promising method to evaluate the condition of structures. The rapid development in the sensors technology and the condition assessment techniques based on the vibration-based damage detection made the SHM an efficient and economical ways to assess the bridges. SHM is set to assess state and expects probable failures of designated bridges. In this paper, a presentation for Frequency Response function method that uses the captured vibration test information of structures to evaluate the structure condition. Furthermore, the main steps of the assessment of bridge using the vibration information are presented. The Frequency Response function method is applied to the experimental data of a full-scale bridge.

Keywords: bridge assessment, health monitoring, damage detection, frequency response function (FRF), signal processing, structure identification

Procedia PDF Downloads 334
2457 An Analysis Study of a Participatory Design Workshop from the Perspectives of Communication Strategies and Tools

Authors: Meng-Yu Wun, Jiunde Lee

Abstract:

Participatory design transfers the role of design team becoming the facilitator who manages to work collaboratively with the 'partners of innovation': users. This facilitator role not just concerns the users’ behaviors or insights under the common practice of user-centered design, it emphasizes the importance of communication experience conducted by various strategies and tools in a workshop session which could profoundly impact the quality of the co-creation process. To investigate the communication experience in the participatory design, this study proposed a qualitative research to analyze communication strategies and tools. A participatory design workshop and following in-depth interviews were carried out to explore how participants (facilitators, users) might apply different strategies and tools to enhance the communication process. The major study findings are as follows: (a) roles had influence on communication experience; facilitators’ principles and methods influenced the usage of facilitation strategies in various situations, while users put more emphasis on communication activities and goals aimed to complete the design tasks, (b) communication tools should be both fixed and changeable: participants had fixed cognition on different forms of communication tools; with the fundamental cognition, they could choose and make use of tools according to their needs, (c) the management of workshop communication should be flexible: controlling the schedule, stimulating innovations, and creating the space for conversation are crucial to facilitate in a participatory workshop.

Keywords: communication experience, facilitation, participatory design, workshop

Procedia PDF Downloads 147
2456 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 205
2455 The Influence of Gender and Harmful Alcohol Consumption on Academic Performance in Spanish University Students

Authors: M. S. Rodríguez, F. Cadaveira, M. F. Páramo

Abstract:

First year university students comprise one of the groups most likely to indulge in hazardous alcohol consumption. The transition from secondary school to university presents a range of academic, social and developmental challenges requiring new responses that will meet the demands of this highly competitive environment. The main purpose of this research was to analyze the influence of gender and hazardous alcohol consumption on academic performance of 300 university students in Spain in a three-year follow-up study. Alcohol consumption was measured using the Alcohol Use Identification Test (AUDIT), and the average university grades were provided by the Academic Management Services of the University. Analysis of variance showed that the level of alcohol consumption significantly affected academic performance. Students undertaking hazardous alcohol consumption obtained the lowest grades during the first three years at university. These effects were particularly marked in the sample of women with a hazardous pattern of alcohol consumption, although the interaction between gender and this type of consumption was not significant. The study highlights the impact of hazardous alcohol consumption on the academic trajectory of university students. The findings confirm that alcohol consumption predicts poor academic performance in first year students and that the low level of performance is maintained throughout the university career.

Keywords: academic performance, alcohol consumption, gender, university students

Procedia PDF Downloads 295
2454 Adaptive Architecture: Reformulation of Socio-Ecological Systems

Authors: Pegah Zamani

Abstract:

This multidisciplinary study interrogates the reformulation of socio-ecological systems by bringing different disciplines together and incorporating ecological, social, and technological components to the sustainable design. The study seeks for a holistic sustainable system to understand the multidimensional impact of the evolving innovative technologies on responding to the variable socio-environmental conditions. Through a range of cases, from the vernacular built spaces to the sophisticated optimized systems, the research unfolds how far the environmental elements would impact the performance of a sustainable building, its micro-climatic ecological requirements, and its human inhabitation. As a product of the advancing technologies, an optimized and environmentally responsive building offers new identification, and realization of the built space through reformulating the connection to its internal and external environments (such as solar, thermal, and airflow), as well as its dwellers. The study inquires properties of optimized buildings, by bringing into the equation not only the environmental but also the socio-cultural, morphological, and phenomenal factors. Thus, the research underlines optimized built space as a product and practice which would not be meaningful without addressing and dynamically adjusting to the diversity and complexity of socio-ecological systems.

Keywords: ecology, morphology, socio-ecological systems, sustainability

Procedia PDF Downloads 195
2453 Mailchimp AI Application For Marketing Employees

Authors: Alia El Akhrass, Raheed Al Jifri, Sara Babalghoum, Jana Bushnag

Abstract:

This project delves into exploring the functionalities of Mailchimp, an artificial intelligence application. The objective is to comprehend its operations through the AI tools it offers. To achieve this, a survey was conducted among peers, seeking insights into Mailchimp's functionality, accessibility, efficiency, and overall benefits. The survey aimed to gather valuable feedback for analysis. Subsequently, a thorough analysis of the collected data was performed to identify trends, patterns, and areas of improvement. Visual representations were then crafted to effectively summarize the findings, aiding in conveying the research outcomes clearly. Founded in 2001, Mailchimp initially provided email marketing services but has since expanded into a comprehensive marketing platform. Its focus on simplicity and accessibility has contributed to its success among businesses of all sizes. Alternative platforms such as Constant Contact, AWeber, and GetResponse offer similar services with their own unique strengths. Mailchimp's journey exemplifies the importance of vision and adaptability in the ever-evolving digital marketing landscape. By prioritizing innovation, user-centricity, and customer service, Mailchimp has established itself as a trusted partner in the field of digital marketing, enabling businesses to effectively connect with their customers and achieve their marketing goals.

Keywords: email marketing, ai tool, connect, communicate, generate

Procedia PDF Downloads 30
2452 Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training

Authors: Shaila Rana, Wasim Alhamdani

Abstract:

Effective cybersecurity training is of the utmost importance, given the plethora of attacks that continue to increase in complexity and ubiquity. VR cybersecurity training remains a starkly understudied discipline. Studies that evaluated the effectiveness of VR cybersecurity training over traditional methods are required. An engaging and interactive platform can support knowledge retention of the training material. Consequently, an effective form of cybersecurity training is required to support a culture of cybersecurity awareness. Measurements of effectiveness varied throughout the studies, with surveys and observations being the two most utilized forms of evaluating effectiveness. Further research is needed to evaluate the effectiveness of VR cybersecurity training and traditional training. Additionally, research for evaluating if VR cybersecurity training is more effective than traditional methods is vital. This paper proposes a methodology to compare the two cybersecurity training methods and their effectiveness. The proposed framework includes developing both VR and traditional cybersecurity training methods and delivering them to at least 100 users. A quiz along with a survey will be administered and statistically analyzed to determine if there is a difference in knowledge retention and user satisfaction. The aim of this paper is to bring attention to the need to study VR cybersecurity training and its effectiveness compared to traditional training methods. This paper hopes to contribute to the cybersecurity training field by providing an effective way to train users for security awareness. If VR training is deemed more effective, this could create a new direction for cybersecurity training practices.

Keywords: virtual reality cybersecurity training, VR cybersecurity training, traditional cybersecurity training

Procedia PDF Downloads 201
2451 Gas-Liquid Flow Void Fraction Identification Using Slippage Number Froud Mixture Number Relation in Bubbly Flow

Authors: Jaber Masoud Alyami, Abdelsalam H. Alsrkhi

Abstract:

Characterizing and modeling multi-phase flow is a complicated scientific and technical phenomenon represented by a variety of interrelated elements. Yet, the introduction of dimensionless numbers used to grasp gas-liquid flow is a significant step in controlling and improving the multi-phase flow area. SL (Slippage number), for instance is a strong dimensionless number defined as a the ratio of the difference in gravitational forces between slip and no-slip conditions to the inertial force of the gas. The fact that plotting SL versus Frm provides a single acceptable curve for all of the data provided proves that SL may be used to realize the behavior of gas-liquid flow. This paper creates a numerical link between SL and Froud mixing number using vertical gas-liquid flow and then utilizes that relationship to validate its reliability in practice. An improved correlation in drift flux model generated from the experimental data and its rationality has been verified. The method in this paper is to approach for predicting the void fraction in bubbly flow through SL/Frm relation and the limitations of this method, as well as areas for development, are stated.

Keywords: multiphase flow, gas-liquid flow, slippage, void farction

Procedia PDF Downloads 73
2450 Phenomenological Ductile Fracture Criteria Applied to the Cutting Process

Authors: František Šebek, Petr Kubík, Jindřich Petruška, Jiří Hůlka

Abstract:

Present study is aimed on the cutting process of circular cross-section rods where the fracture is used to separate one rod into two pieces. Incorporating the phenomenological ductile fracture model into the explicit formulation of finite element method, the process can be analyzed without the necessity of realizing too many real experiments which could be expensive in case of repetitive testing in different conditions. In the present paper, the steel AISI 1045 was examined and the tensile tests of smooth and notched cylindrical bars were conducted together with biaxial testing of the notched tube specimens to calibrate material constants of selected phenomenological ductile fracture models. These were implemented into the Abaqus/Explicit through user subroutine VUMAT and used for cutting process simulation. As the calibration process is based on variables which cannot be obtained directly from experiments, numerical simulations of fracture tests are inevitable part of the calibration. Finally, experiments regarding the cutting process were carried out and predictive capability of selected fracture models is discussed. Concluding remarks then make the summary of gained experience both with the calibration and application of particular ductile fracture criteria.

Keywords: ductile fracture, phenomenological criteria, cutting process, explicit formulation, AISI 1045 steel

Procedia PDF Downloads 441
2449 Classification of Traffic Complex Acoustic Space

Authors: Bin Wang, Jian Kang

Abstract:

After years of development, the study of soundscape has been refined to the types of urban space and building. Traffic complex takes traffic function as the core, with obvious design features of architectural space combination and traffic streamline. The acoustic environment is strongly characterized by function, space, material, user and other factors. Traffic complex integrates various functions of business, accommodation, entertainment and so on. It has various forms, complex and varied experiences, and its acoustic environment is turned rich and interesting with distribution and coordination of various functions, division and unification of the mass, separation and organization of different space and the cross and the integration of multiple traffic flow. In this study, it made field recordings of each space of various traffic complex, and extracted and analyzed different acoustic elements, including changes in sound pressure, frequency distribution, steady sound source, sound source information and other aspects, to make cluster analysis of each independent traffic complex buildings. It divided complicated traffic complex building space into several typical sound space from acoustic environment perspective, mainly including stable sound space, high-pressure sound space, rhythm sound space and upheaval sound space. This classification can further deepen the study of subjective evaluation and control of the acoustic environment of traffic complex.

Keywords: soundscape, traffic complex, cluster analysis, classification

Procedia PDF Downloads 243
2448 Developing a Simulation-Based Optimization Framework to Perform Energy Simulation for Indian Buildings

Authors: Sujoy Anirudha Das, Albert Thomas

Abstract:

Building sector is a major consumer of energy globally, and it has corresponding effects to the environment with respect to the carbon emissions. Given the fact that India is expected to add 40-billion square meter of new buildings till 2050, we need frameworks that help in reducing the overall energy consumption in the building sector. Even though several simulation-based frameworks that help in analyzing the building energy consumption are developed globally, in the Indian context, to the best of our knowledge, there is a lack of a comprehensive, yet user-friendly framework to simulate and optimize the effects of various energy influencing factors, specifically for Indian buildings. Therefore, this study is aimed at developing a simulation-based optimization framework to model the energy interactions in different types of Indian buildings by considering the dynamic nature of various energy influencing factors. This comprehensive framework can be used by various building stakeholders to test the energy effects of different factors such as, but not limited to, the various building materials, the orientation, the weather fluctuations, occupancy changes and the type of the building (e.g., office, residential). The results from the case study involving several building types would help us in gaining insights to build new energy-efficient buildings as well as retrofit the existing structures in a more convenient way to consume less energy, exclusively for an Indian scenario.

Keywords: building energy consumption, building energy simulations, energy efficient buildings, optimization framework

Procedia PDF Downloads 162
2447 Conflict Causes within Construction Projects; Conflict Interaction across Project Phases

Authors: Abdullah Mohammed Alshehri

Abstract:

The projects in the construction industry have significantly increased, given its contribution to the overall Gross Domestic Product (GDP) of the countries. Reflecting upon the complex nature and involvement of various agents, the study aims to analyze the conflicts cause within construction projects. Therefore, the study strived to come out with understanding the levels of conflict interaction across project phases. However, this conducted by investigating the association between antecedents and apparent conflicts inherent in. The study used a qualitative approach for collecting the data through a quantitative, semi-structured method. Formation of a questionnaire survey has been conducted for over 30 respondents. However, the survey came out with the identification of 25 conflict cause categories, which can take place in different construction project phases, including pre-design phase, pre-construction phase, construction phase, commissioning, and completion phase. For example, conflicts associated with inconsistencies or discrepancies within or between project documents, which took place at tendering time in the pre-construction phase were relatable with the selection of material specifications that should be supplied or used in the construction projects at the construction phase. Its analysis can provide comprehensive understanding, trace the root of the problem, which offers a roadmap to deepen the understanding of the conflict conditions and ‘course of action’ necessary for project management strategy actions toward avoiding or minimizing conflict causes at project life.

Keywords: construction, conflict causes, levels, interaction, phases

Procedia PDF Downloads 169
2446 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 76
2445 A Web Application for Screening Dyslexia in Greek Students

Authors: Antonios Panagopoulos, Stamoulis Georgios

Abstract:

Dyslexia's diagnosis is made taking into account reading and writing skills and is carried out by qualified scientific staff. In addition, there are screening tests that are designed to give an indication of possible dyslexic difficulties. Their main advantage is that they create a pleasant environment for the user and reduce the stress that can lead to false results. An online application was created for the first time, as far as authors' knowledge, for screening Dyslexia in Greek high school students named «DyScreTe». Thus, a sample of 240 students between 16 and 18 years old in Greece was taken, of which 120 were diagnosed with dyslexia by an official authority in Greece, and 120 were typically developed. The main hypothesis that was examined is that students who were diagnosed with dyslexia by official authorities in Greece had significantly lower performance in the respective software tests. The results verified the hypothesis we made those children with dyslexia in each test had a lower performance com-pared to the type developed in successful responses, except for the intelligence test. After random sampling, it was shown that the new online application was a useful tool for screening dyslexia. However, computer evaluation cannot replace the diagnosis by a professional expert, but with the results of this application, the interdisciplinary team that deals with the differential diagnosis will create and evaluate, at a later time, the appropriate intervention program.

Keywords: dyslexia, screening tests, deficits, application

Procedia PDF Downloads 72
2444 CompPSA: A Component-Based Pairwise RNA Secondary Structure Alignment Algorithm

Authors: Ghada Badr, Arwa Alturki

Abstract:

The biological function of an RNA molecule depends on its structure. The objective of the alignment is finding the homology between two or more RNA secondary structures. Knowing the common functionalities between two RNA structures allows a better understanding and a discovery of other relationships between them. Besides, identifying non-coding RNAs -that is not translated into a protein- is a popular application in which RNA structural alignment is the first step A few methods for RNA structure-to-structure alignment have been developed. Most of these methods are partial structure-to-structure, sequence-to-structure, or structure-to-sequence alignment. Less attention is given in the literature to the use of efficient RNA structure representation and the structure-to-structure alignment methods are lacking. In this paper, we introduce an O(N2) Component-based Pairwise RNA Structure Alignment (CompPSA) algorithm, where structures are given as a component-based representation and where N is the maximum number of components in the two structures. The proposed algorithm compares the two RNA secondary structures based on their weighted component features rather than on their base-pair details. Extensive experiments are conducted illustrating the efficiency of the CompPSA algorithm when compared to other approaches and on different real and simulated datasets. The CompPSA algorithm shows an accurate similarity measure between components. The algorithm gives the flexibility for the user to align the two RNA structures based on their weighted features (position, full length, and/or stem length). Moreover, the algorithm proves scalability and efficiency in time and memory performance.

Keywords: alignment, RNA secondary structure, pairwise, component-based, data mining

Procedia PDF Downloads 446
2443 Perceptions of College Students on Whether an Intelligent Tutoring System Is a Tutor

Authors: Michael Smalenberger

Abstract:

Intelligent tutoring systems (ITS) are computer-based platforms which can incorporate artificial intelligence to provide step-by-step guidance as students practice problem-solving skills. ITS can replicate the benefits of one-on-one tutoring, foster transactivity in collaborative environments, and lead to substantial learning gains when used to supplement the instruction of a teacher or when used as the sole method of instruction. Developments improving the ease of ITS creation have recently increased their proliferation, leading many K-12 schools and institutions of higher education in the United States to regularly use ITS within classrooms. We investigated how students perceive their experience using an ITS. In this study, 111 undergraduate students used an ITS in a college-level introductory statistics course and were subsequently asked for feedback on their experience. Results show that their perceptions were generally favorable of the ITS, and most would seek to use an ITS both for STEM and non-STEM courses in the future. Along with detailed transaction-level data, this feedback also provides insights on the design of user-friendly interfaces, guidance on accessibility for students with impairments, the sequencing of exercises, students’ expectation of achievement, and comparisons to other tutoring experiences. We discuss how these findings are important for the creation, implementation, and evaluation of ITS as a mode and method of teaching and learning.

Keywords: college statistics course, intelligent tutoring systems, in vivo study, student perceptions of tutoring

Procedia PDF Downloads 93
2442 Applying Pre-Accident Observational Methods for Accident Assessment and Prediction at Intersections in Norrkoping City in Sweden

Authors: Ghazwan Al-Haji, Adeyemi Adedokun

Abstract:

Traffic safety at intersections is highly represented, given the fact that accidents occur randomly in time and space. It is necessary to judge whether the intersection is dangerous or not based on short-term observations, and not waiting for many years of assessing historical accident data. There are active and pro-active road infrastructure safety methods for assessing safety at intersections. This study aims to investigate the use of quantitative and qualitative pre-observational methods as the best practice for accident prediction, future black spot identification, and treatment. Historical accident data from STRADA (the Swedish Traffic Accident Data Acquisition) was used within Norrkoping city in Sweden. The ADT (Average Daily Traffic), capacity and speed were used to predict accident rates. Locations with the highest accident records and predicted accident counts were identified and hence audited qualitatively by using Street Audit. The results from these quantitative and qualitative methods were analyzed, validated and compared. The paper provides recommendations on the used methods as well as on how to reduce the accident occurrence at the chosen intersections.

Keywords: intersections, traffic conflict, traffic safety, street audit, accidents predictions

Procedia PDF Downloads 223
2441 Development of an Energy Independant DC Building Demonstrator for Insulated Island Site

Authors: Olivia Bory Devisme, Denis Genon-Catalot, Frederic Alicalapa, Pierre-Olivier Lucas De Peslouan, Jean-Pierre Chabriat

Abstract:

In the context of climate change, it is essential that island territories gain energy autonomy. Currently mostly dependent on fossil fuels, the island of Reunion lo- cated in the Indian Ocean nevertheless has a high potential for solar energy. As the market for photovoltaic panels has been growing in recent years, the issues of energy losses linked to the multiple conversions from direct current to alternating current are emerging. In order to quantify these advantages and disadvantages by a comparative study, this document present the measurements carried out on a direct current test bench, particularly for lighting, ventilation, air condi- tioning and office equipment for the tertiary sector. All equipment is supplied with DC power from energy produced by photovoltaic panels. A weather sta- tion, environmental indoor sensors, and drivers are also used to control energy. Self-consumption is encouraged in order to manage different priorities between user consumption and energy storage in a lithium iron phosphate battery. The measurements are compared to a conventional electrical architecture (DC-AC- DC) for energy consumption, equipment overheating, cost, and life cycle analysis.

Keywords: DC microgrids, solar energy, smart buildings, storage

Procedia PDF Downloads 151
2440 Value Chain Identification of Beekeeping Business in Indonesia: Case Study of Four Beekeeping Business in West Java

Authors: Dwi Purnomo, Anas Bunyamin, Fajar Susilo, Akbar Anugrah

Abstract:

Beekeeping became a rural economic buffer, especially for people who lived by forest side to diversify their food or sell the honey and bee colony. Aside from the high price of honey and it’s derivative products, there is another revenue stream along beekeeping value chain that could be optimized by the people. There are five of nine honey bee species in the world, exist in Indonesia, such as Apis Cerana, Apis Dorsata, Apis Andreniformis, Apis Koschevnikovi, and Apis Nigrocincta. Indonesian farmer generally developed Apis Cerana and two other honey bees species, like Apis Mellifera and Trigona. This study tried to identify, how beekeeping business practices, challenges and opportunities in four beekeeping business in West Java through the value chain along the business. Data carried out by literature review, interview and focus group discussion with key actors in beekeeping business. There are six revenue stream in beekeeping business in West Java, such as brood hunter, beehives maker, agroforestry, agro-tourism, honey and derivatives products and bee acupuncture. This assesses conclude any criteria that should grasp for developing and sustaining beekeeping business in West Java.

Keywords: beekeeping business, business developing, value chain, West Java

Procedia PDF Downloads 194
2439 Sexual Behaviors and Condom Attitude among Injecting Drug Users in Hai Phong, Vietnam: Qualitative Findings

Authors: Tanvir Ahmed, Thanh N. Long, Phan T. Huong, Donald E. Stewart

Abstract:

This paper presents views on condom use and the contexts of safe and unsafe sexual practices with different sexual partners and their relationships among Injecting Drug Users (IDUs) in Hai Phong, Vietnam. Fifteen IDUs participated and two local interviewers conducted qualitative semi-structured face-to-face interviews in September-October, 2012 in Vietnamese language. Data were analyzed thematically. Non-protective condom attitudes include negotiate or convince Female Sex Workers (FSW); not realizing risk, importance or necessity; partner doesn’t like, and having extra money/drug from clients. On the other hand, self-awareness, family-consciousness, suspicion of STI presence, fear of getting HIV, and client negotiation sometimes resulted in a safe-sex practice. A thematic diagram was developed to present the relationship (strong/weak) between condom attitude and sexual practice (safe/unsafe) by partner types. The experiences and views reflected in the qualitative information emphasize the heightened need for safe-sex education especially among young IDUs (male/female) highlighting sexual transmission risk.

Keywords: AIDS, HIV, injecting drug user, risk behaviors, Vietnam

Procedia PDF Downloads 849
2438 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 205
2437 The Use of Building Energy Simulation Software in Case Studies: A Literature Review

Authors: Arman Ameen, Mathias Cehlin

Abstract:

The use of Building Energy Simulation (BES) software has increased in the last two decades, parallel to the development of increased computing power and easy to use software applications. This type of software is primarily used to simulate the energy use and the indoor environment for a building. The rapid development of these types of software has raised their level of user-friendliness, better parameter input options and the increased possibility of analysis, both for a single building component or an entire building. This, in turn, has led to many researchers utilizing BES software in their research in various degrees. The aim of this paper is to carry out a literature review concerning the use of the BES software IDA Indoor Climate and Energy (IDA ICE) in the scientific community. The focus of this paper will be specifically the use of the software for whole building energy simulation, number and types of articles and publications dates, the area of application, types of parameters used, the location of the studied building, type of building, type of analysis and solution methodology. Another aspect that is examined, which is of great interest, is the method of validations regarding the simulation results. The results show that there is an upgoing trend in the use of IDA ICE and that researchers use the software in their research in various degrees depending on case and aim of their research. The satisfactory level of validation of the simulations carried out in these articles varies depending on the type of article and type of analysis.

Keywords: building simulation, IDA ICE, literature review, validation

Procedia PDF Downloads 125
2436 The Impact of Website Quality on Customers' Usage and Purchasing Intentions: The Case of Airlines and Online Travel Agencies

Authors: Nermin A. Morsy, Amany N. Beshay

Abstract:

The tourism industry has seen considerable transformations due to the emergency of e-commerce. For instance, airlines are increasingly dependent on achieving online sales instead of their traditional platform. Online travel agencies’ (OTAs) websites have been able to reach a broader range of customers and generate more revenue. Therefore, website quality plays an important role in attaining website effectiveness. It is now considered as a critical factor in attracting customers' attention and build loyalty. Customers are more likely to visit and purchase at websites that exhibit highly desirable qualities. A user-friendly website can help tourists find their target information easily and make decisions quickly. This research focuses on analyzing the impact of airline and OTAs’ websites quality on the actual customer usage and purchase intentions. An online survey was distributed among internet users to assess the various dimensions of website quality in the context of online booking and their effect on customer’s usage and purchase intentions. The data from the survey was analyzed statistically using correlation, t-tests and other statistical tests. Results revealed the direct impact of website quality on customer usage and purchase intentions.

Keywords: airlines, OTAs, purchasing intention, website quality

Procedia PDF Downloads 168
2435 Developing Measurement Instruments for Enterprise Resources Planning (ERP) Post-Implementation Failure Model

Authors: Malihe Motiei, Nor Hidayati Zakaria, Davide Aloini

Abstract:

This study aims to present a method to develop the failure measurement model for ERP post-implementation. To achieve this outcome, the study firstly evaluates the suitability of Technology-Organization-Environment framework for the proposed conceptual model. This study explains how to discover the constructs and subsequently to design and evaluate the constructs as formative or reflective. Constructs are used including reflective and purely formative. Then, the risk dimensions are investigated to determine the instruments to examine the impact of risk on ERP failure after implementation. Two construct as formative constructs consist inadequate implementation and poor organizational decision making. Subsequently six construct as reflective construct include technical risks, operational risks, managerial risks, top management risks, lack of external risks, and user’s inefficiency risks. A survey was conducted among Iranian industries to collect data. 69 data were collected from manufacturing sectors and the data were analyzed by Smart PLS software. The results indicated that all measurements included 39 critical risk factors were acceptable for the ERP post-implementation failure model.

Keywords: critical risk factors (CRFs), ERP projects, ERP post-implementation, measurement instruments, ERP system failure measurement model

Procedia PDF Downloads 349
2434 Haptic Cycle: Designing Enhanced Museum Learning Activities

Authors: Menelaos N. Katsantonis, Athanasios Manikas, Alexandros Chatzis, Stavros Doropoulos, Anastasios Avramis, Ioannis Mavridis

Abstract:

Museums enhance their potential by adopting new technologies and techniques to appeal to more visitors and engage them in creative and joyful activities. In this study, the Haptic Cycle is presented, a cycle of museum activities proposed for the development of museum learning approaches with optimized effectiveness and engagement. Haptic Cycle envisages the improvement of the museum’s services by offering a wide range of activities. Haptic Cycle activities make the museum’s exhibitions more approachable by bringing them closer to the visitors. Visitors can interact with the museum’s artifacts and explore them haptically and sonically. Haptic Cycle proposes constructivist learning activities in which visitors actively construct their knowledge by exploring the artifacts, experimenting with them and realizing their importance. Based on the Haptic Cycle, we developed the HapticSOUND system, an innovative virtual reality system that includes an advanced user interface that employs gesture-based technology. HapticSOUND’s interface utilizes the leap motion gesture recognition controller and a 3D-printed traditional Cretan lute, utilized by visitors to perform various activities such as exploring the lute and playing notes and songs.

Keywords: haptic cycle, HapticSOUND, museum learning, gesture-based, leap motion

Procedia PDF Downloads 77
2433 Interspecific Hybridization in Natural Sturgeon Populations of the Eastern Black Sea: The Consequence of Drastic Population Decline

Authors: Tamar Beridze, Elisa Boscari, Fleur Scheele, Tamari Edisherashvili, Cort Anderson, Leonardo Congiu

Abstract:

The eastern part of the Black Sea and its tributaries are suitable habitats for several sturgeon species, among which Acipenser gueldenstaedtii, A. stellatus, A. nudiventris, A. persicus, A. sturio, and H. huso are well documented. However, different threats have led these species to a dramatic decline; all of them are currently listed as Critically Endangered and some Locally Extinct in that area. We tested 94 wild sturgeon samples from the Black Sea and Rioni River by analyzing the mitochondrial Control Region and nuclear markers for hybrid identification. The data analyses (1) assessed mitochondrial diversity among samples, (2) identified their species, as well as (3) indicated instances of hybridization. The data collected, besides confirming a sharp decrease of catches of Beluga and Stellate sturgeon in recent years, also revealed four juvenile hybrids between Russian and Stellate sturgeon, providing the first evidence of natural interspecific hybridization in the Rioni. The present communication raises concerns about the status of sturgeon species in this area and underlines the urgent need for conservation programs to restore self-sustaining populations.

Keywords: black sea, sturgeon, Rioni river, interspecific hybridization

Procedia PDF Downloads 120
2432 Molecular Identification of Pneumocystis SPP Isolated from Wild Rats in Tehran, Iran

Authors: Babak Rezavand

Abstract:

Pneumocystis carinii pneumonia (PCP) is one of the main causes of morbidity and mortality among immunocompromised and HIV-positive patients and remained one of the most important common opportunistic infections in these individuals in the world. Pneumocystis infection has been reported in many mammals. The aim of this study was to determine the Pneumocystis infection in wild rats as natural reservoirs of this organism in Tehran city, Iran. Fifty three rats (Rattus rattus) were live trapped in different areas of Tehran city, Iran. After isolation of their lung tissues and homogenization in sterile conditions, DNA was extracted. DNAs from all of the Pneumocystis species were amplified by pAZ102-H and pAZ102-E primers, and Nested PCR was performed using pAZ102-X and pAZ102-W primers from the initial PCR product for all the species of Pneumocystis. Amplification of the genome revealed the presence of Pneumocystis in the lungs of 17 rats (32%) through a PCR product with a bandwidth of 346 bp. In the Nested PCR amplification, from the PCR product of 53 rats, 64.2% of the samples were positive with a bandwidth of 261bp. Pneumocystis SPP infestation is highly prevalent among wild rats in Tehran city, indicating the existence of infection in the natural ecosystem of these rodents. As a host, rat plays an important role in the transmission of the microorganism in the world.

Keywords: pneumocystis SPP, rattus rattus, nested PCR, Tehran

Procedia PDF Downloads 203