Search results for: arts based research
42050 A Deep Learning Approach to Detect Complete Safety Equipment for Construction Workers Based on YOLOv7
Authors: Shariful Islam, Sharun Akter Khushbu, S. M. Shaqib, Shahriar Sultan Ramit
Abstract:
In the construction sector, ensuring worker safety is of the utmost significance. In this study, a deep learning-based technique is presented for identifying safety gear worn by construction workers, such as helmets, goggles, jackets, gloves, and footwear. The suggested method precisely locates these safety items by using the YOLO v7 (You Only Look Once) object detection algorithm. The dataset utilized in this work consists of labeled images split into training, testing and validation sets. Each image has bounding box labels that indicate where the safety equipment is located within the image. The model is trained to identify and categorize the safety equipment based on the labeled dataset through an iterative training approach. We used custom dataset to train this model. Our trained model performed admirably well, with good precision, recall, and F1-score for safety equipment recognition. Also, the model's evaluation produced encouraging results, with a [email protected] score of 87.7%. The model performs effectively, making it possible to quickly identify safety equipment violations on building sites. A thorough evaluation of the outcomes reveals the model's advantages and points up potential areas for development. By offering an automatic and trustworthy method for safety equipment detection, this research contributes to the fields of computer vision and workplace safety. The proposed deep learning-based approach will increase safety compliance and reduce the risk of accidents in the construction industry.Keywords: deep learning, safety equipment detection, YOLOv7, computer vision, workplace safety
Procedia PDF Downloads 7242049 Building an Ontology for Researchers: An Application of Topic Maps and Social Information
Authors: Yu Hung Chiang, Hei Chia Wang
Abstract:
In the academic area, it is important for research to find proper research domain. Many researchers may refer to conference issues to find their interesting or new topics. Furthermore, conferences issues can help researchers realize current research trends in their field and learn about cutting-edge developments in their specialty. However, online published conference information may widely be distributed; it is not easy to be concluded. Many researchers use search engine of journals or conference issues to filter information in order to get what they want. However, this search engine has its limitation. There will still be some issues should be considered; i.e. researchers cannot find the associated topics which may be useful information for them. Hence, use Knowledge Management (KM) could be a way to resolve these issues. In KM, ontology is widely adopted; but most existed ontology construction methods do not consider social information between target users. To effective in academic KM, this study proposes a method of constructing research Topic Maps using Open Directory Project (ODP) and Social Information Processing (SIP). Through catching of social information in conference website: i.e. the information of co-authorship or collaborator, research topics can be associated among related researchers. Finally, the experiments show Topic Maps successfully help researchers to find the information they need more easily and quickly as well as construct associations between research topics.Keywords: knowledge management, topic map, social information processing, ontology extraction
Procedia PDF Downloads 29442048 Digital Marketing Maturity Models: Overview and Comparison
Authors: Elina Bakhtieva
Abstract:
The variety of available digital tools, strategies and activities might confuse and disorient even an experienced marketer. This applies in particular to B2B companies, which are usually less flexible in uptaking of digital technology than B2C companies. B2B companies are lacking a framework that corresponds to the specifics of the B2B business, and which helps to evaluate a company’s capabilities and to choose an appropriate path. A B2B digital marketing maturity model helps to fill this gap. However, modern marketing offers no widely approved digital marketing maturity model, and thus, some marketing institutions provide their own tools. The purpose of this paper is building an optimized B2B digital marketing maturity model based on a SWOT (strengths, weaknesses, opportunities, and threats) analysis of existing models. The current study provides an analytical review of the existing digital marketing maturity models with open access. The results of the research are twofold. First, the provided SWOT analysis outlines the main advantages and disadvantages of existing models. Secondly, the strengths of existing digital marketing maturity models, helps to identify the main characteristics and the structure of an optimized B2B digital marketing maturity model. The research findings indicate that only one out of three analyzed models could be used as a separate tool. This study is among the first examining the use of maturity models in digital marketing. It helps businesses to choose between the existing digital marketing models, the most effective one. Moreover, it creates a base for future research on digital marketing maturity models. This study contributes to the emerging B2B digital marketing literature by providing a SWOT analysis of the existing digital marketing maturity models and suggesting a structure and main characteristics of an optimized B2B digital marketing maturity model.Keywords: B2B digital marketing strategy, digital marketing, digital marketing maturity model, SWOT analysis
Procedia PDF Downloads 34942047 Numerical Investigation of Wave Run-Up on Curved Dikes
Authors: Suba Periyal Subramaniam, Babette Scheres, Altomare Corrado, Holger Schuttrumpf
Abstract:
Due to the climatic change and the usage of coastal areas, there is an increasing risk of dike failures along the coast worldwide. Wave run-up plays a key role in planning and design of a coastal structure. The coastal dike lines are bent either due to geological characteristics or due to influence of anthropogenic activities. The effect of the curvature of coastal dikes on wave run-up and overtopping is not yet investigated. The scope of this research is to find the effects of the dike curvature on wave run-up by employing numerical model studies for various dike opening angles. Numerical simulation is carried out using DualSPHysics, a meshless method, and OpenFOAM, a mesh-based method. The numerical results of the wave run-up on a curved dike and the wave transformation process for various opening angles, wave attacks, and wave parameters will be compared and discussed. This research aims to contribute a more precise analysis and understanding the influence of the curvature in the dike line and thus ensuring a higher level of protection in the future development of coastal structures.Keywords: curved dikes, DualSPHysics, OpenFOAM, wave run-up
Procedia PDF Downloads 14942046 Cracking the ‘Glass Ceiling’ Code: The Intricate Dance of Gender and Discipline in Chinese Research University’s Career Promotion
Authors: Yu Yitian, Chen Kaizhe, Liu Jin
Abstract:
'Glass ceiling' phenomenon refers to the invisible barriers that specific groups encounter in career advancement within organizations. This phenomenon is widespread all over the world and is prevalent among university faculty. However, there has been limited attention in the previous studies on Chinese university faculty. This research mainly focuses on whether the existence of 'glass ceiling' phenomenon exists among female faculty in the Chinese academic community and the characteristics among different disciplines in China. By utilizing the big data from education faculty members in 149 research-oriented universities in China, the research employs a Curriculum Vitae analysis to draw the academic career trajectories of faculty, along with potential variations across different academic disciplines within the Chinese academic landscape. This research addresses the existing gap in the scholarly investigation of gender equality in China and is helpful to promote gender equality in the academic community.Keywords: big data, China academic community, curriculum vitae analysis, glass ceiling
Procedia PDF Downloads 5642045 Conceptual Design of a Wi-Fi and GPS Based Robotic Library Using an Intelligent System
Authors: M. S. Sreejith, Steffy Joy, Abhishesh Pal, Beom-Sahng Ryuh, V. R. Sanal Kumar
Abstract:
In this paper an attempt has been made for the design of a robotic library using an intelligent system. The robot works on the ARM microprocessor, motor driver circuit with 5 degrees of freedom with Wi-Fi and GPS based communication protocol. The authenticity of the library books is controlled by RFID. The proposed robotic library system is facilitated with embedded system and ARM. In this library issuance system the previous potential readers’ authentic review reports have been taken into consideration for recommending suitable books to the deserving new users and the issuance of books or periodicals is based on the users’ decision. We have conjectured that the Wi-Fi based robotic library management system would allow fast transaction of books issuance and it also produces quality readers.Keywords: GPS bsed based Robotic library, library management system, robotic library, Wi-Fi library
Procedia PDF Downloads 31042044 Multi-Sender MAC Protocol Based on Temporal Reuse in Underwater Acoustic Networks
Authors: Dongwon Lee, Sunmyeng Kim
Abstract:
Underwater acoustic networks (UANs) have become a very active research area in recent years. Compared with wireless networks, UANs are characterized by the limited bandwidth, long propagation delay and high channel dynamic in acoustic modems, which pose challenges to the design of medium access control (MAC) protocol. The characteristics severely affect network performance. In this paper, we study a MS-MAC (Multi-Sender MAC) protocol in order to improve network performance. The proposed protocol exploits temporal reuse by learning the propagation delays to neighboring nodes. A source node locally calculates the transmission schedules of its neighboring nodes and itself based on the propagation delays to avoid collisions. Performance evaluation is conducted using simulation, and confirms that the proposed protocol significantly outperforms the previous protocol in terms of throughput.Keywords: acoustic channel, MAC, temporal reuse, UAN
Procedia PDF Downloads 35442043 Polyethylene Terephthalate (PET) Fabrics Decoloring for PET Textile Recycle
Authors: Chung-Yang Chuang, Hui-Min Wang, Min-Yan Dong, Chang-Jung Chang
Abstract:
PET fiber is the most widely used fiber worldwide. This man-made fiber is prepared from petroleum chemicals, which may cause environmental pollution and resource exhausting issues, such as the use of non-renewable sources, greenhouse gas emission and discharge of wastewater. Therefore, the textile made by recycle-PET is the trend in the future. Recycle-PET fiber, compared with petroleum-made PET, shows lower carbon emissions and resource exhaustion. However, “fabric decoloring” is the key barrier to textile recycling. The dyes existing in the fabrics may cause PET chain degradation and appearance drawbacks during the textile recycling process. In this research, the water-based decoloring agent was used to remove the dispersed dye in the PET fabrics in order to obtain the colorless PET fabrics after the decoloring process. The decoloring rate of PET fabrics after the decoloring process was up to 99.0%. This research provides a better solution to resolve the issues of appearance and physical properties degradation of fabrics-recycle PET materials due to the residual dye. It may be possible to convert waste PET textiles into new high-quality PET fiber and build up the loop of PET textile recycling.Keywords: PET, decoloring, disperse dye, textile recycle
Procedia PDF Downloads 14642042 Cross Analysis of Gender Discrimination in Print Media of Subcontinent via James Paul Gee Model
Authors: Luqman Shah
Abstract:
The myopic gender discrimination is now a well-documented and recognized fact. However, gender is only one facet of an individual’s multiple identities. The aim of this work is to investigate gender discrimination highlighted in print media in the subcontinent with a specific focus on Pakistan and India. In this study, an approach is adopted by using the James Paul Gee model for the identification of gender discrimination. As a matter of fact, gender discrimination is not consistent in its nature and intensity across global societies and varies as social, geographical, and cultural background change. The World has been changed enormously in every aspect of life, and there are also obvious changes towards gender discrimination, prejudices, and biases, but still, the world has a long way to go to recognize women as equal as men in every sphere of life. The history of the world is full of gender-based incidents and violence. Now the time came that this issue must be seriously addressed and to eradicate this evil, which will lead to harmonize society and consequently heading towards peace and prosperity. The study was carried out by a mixed model research method. The data was extracted from the contents of five Pakistani English newspapers out of a total of 23 daily English newspapers, and likewise, five Indian daily English newspapers out of 52 those were published 2018-2019. Two news stories from each of these newspapers, in total, twenty news stories were taken as sampling for this research. Content and semiotic analysis techniques were used to analyze through James Paul Gee's seven building tasks of language. The resources of renowned e-papers are utilized, and the highlighted cases in Pakistani newspapers of Indian gender-based stories and vice versa are scrutinized as per the requirement of this research paper. For analysis of the written stretches of discourse taken from e-papers and processing of data for the focused problem, James Paul Gee 'Seven Building Tasks of Language' is used. Tabulation of findings is carried to pinpoint the issue with certainty. Findings after processing the data showed that there is a gross human rights violation on the basis of gender discrimination. The print media needs a more realistic representation of what is what not what seems to be. The study recommends the equality and parity of genders.Keywords: gender discrimination, print media, Paul Gee model, subcontinent
Procedia PDF Downloads 22442041 Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4
Authors: Mardiyansyah Mardiyansyah, Hendrik Maulana, Eka Kurnia Sari, Imam Baehaki, Mohammad Agus Prihandono
Abstract:
Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia.Keywords: mobile security, mobile security framework, NIST SP 1800-4, regulations
Procedia PDF Downloads 15642040 Bibliometric Analysis of the Research Progress on Graphene Inks from 2008 to 2018
Authors: Jean C. A. Sousa, Julio Cesar Maciel Santos, Andressa J. Rubio, Edneia A. S. Paccola, Natália U. Yamaguchi
Abstract:
A bibliometric analysis in the Web of Science database was used to identify overall scientific results of graphene inks to date (2008 to 2018). The objective of this study was to evaluate the evolutionary tendency of graphene inks research and to identify its aspects, aiming to provide data that can guide future work. The contributions of different researches, languages, thematic categories, periodicals, place of publication, institutes, funding agencies, articles cited and applications were analyzed. The results revealed a growing number of annual publications, of 258 papers found, 107 were included because they met the inclusion criteria. Three main applications were identified: synthesis and characterization, electronics and surfaces. The most relevant research on graphene inks has been summarized in this article, and graphene inks for electronic devices presented the most incident theme according to the research trends during the studied period. It is estimated that this theme will remain in evidence and will contribute to the direction of future research in this area.Keywords: bibliometric, coating, nanomaterials, scientometrics
Procedia PDF Downloads 17342039 Caged in Concrete Jungles: Reasserting Cultural Identity and Environmental Sustainability through Material Choice and Design Expression in Architecture
Authors: Ikenna Michael Onuorah
Abstract:
The relentless march of globalization in architecture has led to a homogenization of built environments, often characterized by an overreliance on imported, resource-intensive materials and a disregard for local cultural contexts. This research posits that such practices pose significant environmental and cultural perils, trapping communities in "caged concrete jungles" devoid of both ecological sustainability and a meaningful connection to their heritage. Through a mixed-method approach encompassing quantitative and qualitative data analysis, the study investigated the impacts of neglecting local materials and cultural expression in architectural design. The research is anticipated to yield significant insights into the multifaceted consequences of neglecting locally available materials and cultural expression in architecture. It creates a compelling case for reasserting local materials and cultural expression in architectural design. Based on the anticipated research findings, the study proposed series of actionable recommendations for architects, policymakers, and communities to promote sustainable and culturally sensitive built environments. This will serve as a wake-up call, urging architects, policymakers, and communities to break free from the confines of "caged concrete jungles" and embrace a more sustainable and culturally sensitive approach to design.Keywords: sustainability, cultural identity, building materials, sustainable dsigns
Procedia PDF Downloads 5942038 Towards Women Empowerment: An Examination of Gender Equity and Access to Tertiary Education in Nigeria
Authors: Funmilayo Florence Adegoke
Abstract:
The study looks into the issue of gender equity among the staff and students of tertiary institutions in Osun State, Nigeria, specifically the study examined the opinion of the staff and students concerning equity of gender and also examined access to tertiary Education and related courses vis-à-vis gender. A total of 800 subjects consisting of six hundred and forty students, eighty lecturers and eighty non-teaching staff were drawn from four tertiary institutions namely a University, a Polytechnic and two Colleges of Education in the State. The main research instruments used for the study are two sets of questionnaires (one for the students and one for the staff) and records of students’ analyzed for the purpose of testing the research questions that were raised. The result showed among others that the staff and the students opined that there are generally inequalities in the attributes of the two genders. It was also found that significantly more boys enrolled in science and related courses than girls. Based on the findings, useful recommendations that would enhance the contribution of both male and female to science education and the nation as a whole were made.Keywords: gender, access, tertiary, education, Nigeria
Procedia PDF Downloads 39742037 The Implications of Kinship Terms in Newspaper Accident Reports
Authors: Tharwat El-Sakran
Abstract:
The linguistic choices accident news reporters make when reporting killing cases within family circles aid in augmenting the wrath readers feel towards the perpetrators. Undoubtedly, when killers or murderers are labelled with particular words, prospective readers will associate them with the cultural connotations and emotions, whether positive or negative, attached to those words. One of these strategies is the use of kinship terms to anaphorically or cataphorically refer to the defendants. While some articles opt for using the killer’s name, others make use of other kinship labels such as “the mother,” “the father,” “the step-father, and “the step-mother.” The preference for proper nouns over kinship terms and vice versa can be indicative of some of the underlying implications that the article writer may be trying to make about either the status of the killer or the overall incident circumstances. This research examines how the use of referential kinship labels could point to hidden and shared connotations between writers and their prospective readers. This study examined seventy newspaper articles from English-medium publications based in the United Arab Emirates (UAE), the USA, and several other countries. Some of these articles make use of proper nouns referring to the individual directly by name, whereas others refer to individuals based on their kinship relation with the victim or by their occupational status. Furthermore, information was collected from two hundred fifty-one students at several UAE-based universities by asking them what certain kinship words meant to them. The survey questions allowed for real insight into some of the most prevalent interpretations attached to kinship labels and the possible implications for preferring kinship terms over occupational labels and persons’ proper names. Results indicate that newspaper writers employ kinship labels to inspire an emotion in their future readers’ reactions that may not be achieved through the use of the person’s proper name(s). Additionally, respondents to the survey believe that the use of kinship nouns like “mother,” “father,” “step-mother,” and “step-father” tends to inspire a stronger emotional response, as they are almost always associated with particular behavioral cultural codes and conventions. The study concludes with recommendations for teaching the grammar of English words to EFL and mass communication students and with suggestions for translation theorists and further research.Keywords: kinship terms, accident reports, cultural connotations, translation of kinship terms
Procedia PDF Downloads 13742036 Knowledge Management Efficiency of Personnel in Rajamangala University of Technology Srivijaya Songkhla, Thailand
Authors: Nongyao Intasaso, Atchara Rattanama, Navarat Pewnual
Abstract:
This research is survey research purposed to study the factor affected to knowledge management efficiency of personnel in Rajamangala University of Technology Srivijaya, and study the problem of knowledge management affected to knowledge development of personnel in the university. The tool used in this study is structures questioner standardize rating scale in 5 levels. The sample selected by purposive sampling and there are 137 participation calculated in 25% of population. The result found that factor affected to knowledge management efficiency in the university included (1) result from the organization factor found that the university provided project or activity that according to strategy and mission of knowledge management affected to knowledge management efficiency in highest level (x̅ = 4.30) (2) result from personnel factor found that the personnel are eager for knowledge and active to learning to develop themselves and work (Personal Mastery) affected to knowledge management efficiency in high level (x̅ = 3.75) (3) result from technological factor found that the organization brought multimedia learning aid to facilitate learning process affected to knowledge management efficiency in high level (x̅ = 3.70) and (4) the result from learning factor found that the personnel communicated and sharing knowledge and opinion based on acceptance to each other affected to knowledge management efficiency in high level (x̅ = 3.78). The problem of knowledge management in the university included the personnel do not change their work behavior, insufficient of collaboration, lack of acceptance in knowledge and experience to each other, and limited budget. The solutions to solve these problems are the university should be support sufficient budget, the university should follow up and evaluate organization development based on knowledge using, the university should provide the activity emphasize to personnel development and assign the committee to process and report knowledge management procedure.Keywords: knowledge management, efficiency, personnel, learning process
Procedia PDF Downloads 30242035 Evaluation of Planned and Organically Transformed Public Spaces in Urban Indian Market Places: A Case of Bhopal City, India
Authors: Piyush Hajela
Abstract:
Public spaces within Indian markets are vibrant, colorful and contain dimensions that make them attractive and therefore act as popular gathering spaces. Most of these public spaces emerge as squares, plazas of varied shapes and sizes spread at different locations within the market. These public spaces grow organically and are discovered by the people themselves as they respond positively to the collective human senses. On the other hand, there are the planned and designed public spaces as well that are less active. This research evaluates both the planned and the organically transformed public spaces in Indian markets from an Urban Design point of view. The purpose of such research is to provide a basis for design solutions to ensure the success of designed public spaces. The evaluation is done for identified Attributes, namely Comfort, Protection, Familiarity, Activities, Form, Legibility, Engagement, Safety, Accessibility, Environment and Transformations by which a Public Space attains its recognition. The evaluation is based on a rating done for forty-four parameters falling under eleven attributes of public space. An opinion survey of professionals is conducted for their priorities of attributes while designing Public spaces. A comparison is made to rank these attributes between Planned and Organically transformed Public spaces and, opinion of the professionals. After dues analysis, the research suggests the learning from the organically transformed Public spaces for ensuring the success of designed public spaces. The suggestions may be in the form of Design decisions or administrative regulations, or both for achieving the desirables.Keywords: assessment, attributes, engagement, interaction
Procedia PDF Downloads 21442034 Impact of Revenue Reform on Vulnerable Communities
Authors: Pauliasi Tony Fakahau
Abstract:
This paper provides an overview of the impact of the revenue reform programme on vulnerable communities in the Kingdom of Tonga. Economic turmoil and mismanagement during the late 1990s forced the government to seek technical and financial assistance from the Asian Development Bank to undertake a comprehensive Economic and Public Sector Reform (EPSR) programme. The EPSR is a Western model recommended by donor agencies as the solution to Tonga’s economic challenges. The EPSR programme included public sector reform, private sector growth, and revenue generation. Tax reform was the main tool for revenue generation, which set out to strengthen tax compliance and administration as well as implement a value-added consumption tax. The EPSR is based on Western values and ideology but failed to recognise that Tongan cultural values are important to the local community. Two participant groups were interviewed. Participant group one consisted of 51 people representing vulnerable communities. Participant group two consisted of six people from the government and business sector who were from the elite of Tongan society. The Kakala Research Methodology provided the framework for the research, and the Talanoa Research Method was used to conduct semi-structured interviews in the homes of the first group and in the workplaces of the second group. The research found a heavy burden of the consumption tax on the purchasing power of participant group one (vulnerable participants), having an impact on nearly every financial transaction they made. Participant group ones’ main financial priorities were kavenga fakalotu (obligations to the church), kavenga fakafāmili (obligations to the family) and kavenga fakafonua (obligations to cultural events for the village, nobility, and royalty). The findings identified inequalities of the revenue reform, especially from consumption tax, for vulnerable people and communities compared to the elite of society. The research concluded that government and donor agencies need ameliorating policies to reduce the burden of tax on vulnerable groups more susceptible to the impact of revenue reform.Keywords: tax reform, tonga vulnerable community revenue, revenue reform, public sector reform
Procedia PDF Downloads 13742033 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment
Authors: Emmanuel Ogala
Abstract:
Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment
Procedia PDF Downloads 14642032 Analyzing the Effects of Bio-fibers on the Stiffness and Strength of Adhesively Bonded Thermoplastic Bio-fiber Reinforced Composites by a Mixed Experimental-Numerical Approach
Authors: Sofie Verstraete, Stijn Debruyne, Frederik Desplentere
Abstract:
Considering environmental issues, the interest to apply sustainable materials in industry increases. Specifically for composites, there is an emerging need for suitable materials and bonding techniques. As an alternative to traditional composites, short bio-fiber (cellulose-based flax) reinforced Polylactic Acid (PLA) is gaining popularity. However, these thermoplastic based composites show issues in adhesive bonding. This research focusses on analyzing the effects of the fibers near the bonding interphase. The research applies injection molded plate structures. A first important parameter concerns the fiber volume fraction, which directly affects adhesion characteristics of the surface. This parameter is varied between 0 (pure PLA) and 30%. Next to fiber volume fraction, the orientation of fibers near the bonding surface governs the adhesion characteristics of the injection molded parts. This parameter is not directly controlled in this work, but its effects are analyzed. Surface roughness also greatly determines surface wettability, thus adhesion. Therefore, this research work considers three different roughness conditions. Different mechanical treatments yield values up to 0.5 mm. In this preliminary research, only one adhesive type is considered. This is a two-part epoxy which is cured at 23 °C for 48 hours. In order to assure a dedicated parametric study, simple and reproduceable adhesive bonds are manufactured. Both single lap (substrate width 25 mm, thickness 3 mm, overlap length 10 mm) and double lap tests are considered since these are well documented and quite straightforward to conduct. These tests are conducted for the different substrate and surface conditions. Dog bone tensile testing is applied to retrieve the stiffness and strength characteristics of the substrates (with different fiber volume fractions). Numerical modelling (non-linear FEA) relates the effects of the considered parameters on the stiffness and strength of the different joints, obtained through the abovementioned tests. Ongoing work deals with developing dedicated numerical models, incorporating the different considered adhesion parameters. Although this work is the start of an extensive research project on the bonding characteristics of thermoplastic bio-fiber reinforced composites, some interesting results are already prominent. Firstly, a clear correlation between the surface roughness and the wettability of the substrates is observed. Given the adhesive type (and viscosity), it is noticed that an increase in surface energy is proportional to the surface roughness, to some extent. This becomes more pronounced when fiber volume fraction increases. Secondly, ultimate bond strength (single lap) also increases with increasing fiber volume fraction. On a macroscopic level, this confirms the positive effect of fibers near the adhesive bond line.Keywords: adhesive bonding, bio-fiber reinforced composite, flax fibers, lap joint
Procedia PDF Downloads 13042031 Change Management as a Critical Success Factor In E-Government initiatives
Authors: Mohammed Alassim
Abstract:
In 2014, a UN survey stated that: "The greatest challenge to the adoption of whole-of government, which fundamentally rests on increased collaboration, is resistance to change among government actors". Change management has experienced both theoretically and practically many transformation over the years. When organizations have to implement radical changes, they have to encounter a plethora of issues which leads to ineffective or inefficient implementation of change in most cases. 70% of change projects fail because of human issues. It has been cited that” most studies still show a 60-70% failure rate for organizational change projects — a statistic that has stayed constant from the 1970’s to the present.”. E-government involves not just technical change but cultural, policy, social and organizational evolution. Managing change and overcoming resistance to change is seen as crucial in the success of E-government projects. Resistance can be from different levels in the organization (top management, middle management or employees at operational levels). There can be many reasons for resistance including fear of change and insecurity, lack of knowledge and absence of commitment from management to implement the change. The purpose of this study is to conduct in-depth research to understand the process of change and to identify the critical factors that have led to resistance from employees at different levels (top management, Middle management and operational employees) during e-government initiatives in the public sector in Saudi Arabia. The study is based on qualitative and empirical research methods conducted in the public sector in the Kingdom of Saudi Arabia. This research will use triangulation in data method (interview, group discussion and document review). This research will contribute significantly to knowledge in this field and will identify the measures that can be taken to reduce resistance to change, Upon analysis recommendations or model will be offered which can enable decision makers in public sector in Saudi Arabia how to plan, implement and evaluate change in e-government initiatives via change management strategy.Keywords: change management, e-government, managing change, resistance to change
Procedia PDF Downloads 32042030 What the Future Holds for Social Media Data Analysis
Authors: P. Wlodarczak, J. Soar, M. Ally
Abstract:
The dramatic rise in the use of Social Media (SM) platforms such as Facebook and Twitter provide access to an unprecedented amount of user data. Users may post reviews on products and services they bought, write about their interests, share ideas or give their opinions and views on political issues. There is a growing interest in the analysis of SM data from organisations for detecting new trends, obtaining user opinions on their products and services or finding out about their online reputations. A recent research trend in SM analysis is making predictions based on sentiment analysis of SM. Often indicators of historic SM data are represented as time series and correlated with a variety of real world phenomena like the outcome of elections, the development of financial indicators, box office revenue and disease outbreaks. This paper examines the current state of research in the area of SM mining and predictive analysis and gives an overview of the analysis methods using opinion mining and machine learning techniques.Keywords: social media, text mining, knowledge discovery, predictive analysis, machine learning
Procedia PDF Downloads 42942029 Meanings and Concepts of Standardization in Systems Medicine
Authors: Imme Petersen, Wiebke Sick, Regine Kollek
Abstract:
In systems medicine, high-throughput technologies produce large amounts of data on different biological and pathological processes, including (disturbed) gene expressions, metabolic pathways and signaling. The large volume of data of different types, stored in separate databases and often located at different geographical sites have posed new challenges regarding data handling and processing. Tools based on bioinformatics have been developed to resolve the upcoming problems of systematizing, standardizing and integrating the various data. However, the heterogeneity of data gathered at different levels of biological complexity is still a major challenge in data analysis. To build multilayer disease modules, large and heterogeneous data of disease-related information (e.g., genotype, phenotype, environmental factors) are correlated. Therefore, a great deal of attention in systems medicine has been put on data standardization, primarily to retrieve and combine large, heterogeneous datasets into standardized and incorporated forms and structures. However, this data-centred concept of standardization in systems medicine is contrary to the debate in science and technology studies (STS) on standardization that rather emphasizes the dynamics, contexts and negotiations of standard operating procedures. Based on empirical work on research consortia that explore the molecular profile of diseases to establish systems medical approaches in the clinic in Germany, we trace how standardized data are processed and shaped by bioinformatics tools, how scientists using such data in research perceive such standard operating procedures and which consequences for knowledge production (e.g. modeling) arise from it. Hence, different concepts and meanings of standardization are explored to get a deeper insight into standard operating procedures not only in systems medicine, but also beyond.Keywords: data, science and technology studies (STS), standardization, systems medicine
Procedia PDF Downloads 34442028 Effects of an Online Positive Psychology Program on Stress, Depression, and Anxiety Symptoms of Emerging Adults
Authors: Gabriela R. Silveira, Claudia S. Rocha, Lais S. Vitti, Jeane L. Borges, Helen B. Durgante
Abstract:
Emerging adulthood occurs after adolescence in a period that maybe be marked by experimentation, identity reconfigurations, labor life demands, and insertion in the work environment, which tends to generate stress and emotional instability. Health promotion programs for the development of strengths and virtues, based on Positive Psychology, for emerging adults are sparse in Brazil. The aim of this study was to evaluate the preliminary effects of an online multi-component Positive Psychology program for the health promotion of emerging adults based on Cognitive Behavioural Therapy and Positive Psychology. The program included six online (synchronous) weekly group sessions of approximately two hours each and homework (asynchronous) activities. The themes worked were Values and self-care/Prudence, Optimism, Empathy, Gratitude, Forgiveness, and Meaning of life and work. This study presents data from a longitudinal, pre-experimental design with pre (T1) and post-test (T2) evaluation in the intervention group. 47 individuals aged between 19-30 years old participated, mean age of 24.53 years (SD=3.13), 37 females (78.7%). 42 (89.4%) self-defined as heterosexual, four (8.5%) as homosexual, and one (2.5%) as bisexual. 33 (70.2%) had incomplete higher education, four (8.5%) completed higher education, and seven (14.9%) had a graduate level of education. 27 participants worked (57.4%), out of which 25 were health workers (53.2%). 14 (29.8%) were caregivers, 27 (57.4%) had a spiritual belief, 36 (76.6%) had access to leisure, and 38 (80.9%) had perceived social support. The instruments used were a sociodemographic questionnaire, the 10-item Perceived Stress Scale, and the 12-item General Health Questionnaire. The program was advertised on social networks and interested participants filled out the Consent Form and the evaluation protocol at T1 and T2 via Google Docs form. The main research was approved (CEP n.1,899,368; 4,143,219; CAAE: 61997516.5.0000.5334) and complied with sanitary and Ethics criteria in research with human beings. Wilcoxon statistics revealed significant improvements in indicators of perceived stress between T1 (X=22.21, SD=6.79) and T2 (X=15.10, SD=5.82); (Z=-4.353; p=0.001) as well as depression and anxiety symptoms (T1:X=26.72, SD=8.84; T2: X=19.23, SD=4.68); (Z=-3.945, p=0.001) of the emerging adults after their participation in the programme. The programme has an innovative character not only for presenting an online Positive Psychology approach but also for being based on an intervention developed, evaluated, and manualized in Brazil. By focusing on emerging adults, this study contributes to advancing research on a relatively new field in developmental studies. As a limitation, this is a pre-experimental and pilot study, requiring an increase in sample size for greater statistical robustness, also qualitative data analysis is crucial for methodological complementarity. The importance of investing efforts to accompany this age group and provide advances in longitudinal research in the area of health promotion and disease prevention is highlighted.Keywords: emerging adults, disease prevention, health promotion, online program
Procedia PDF Downloads 10842027 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique
Authors: Veysel Çelik, Aynur Aker, Ebru Güç
Abstract:
Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy
Procedia PDF Downloads 13042026 State of the Science: Digital Therapies in Pediatric Mental Health
Authors: Billy Zou
Abstract:
Statement of the Problem: The burden of mental illness and problem behaviors in adolescence has risen worldwide. While less than 50% of teens have access to traditional mental health care, more than 73% have smartphones. Internet-based interventions offer advantages such as cost-effectiveness, availability, and flexibility. Methodology & Theoretical Orientation: A literature review was done using a PubMed search with the words mental health app yielding 2113 results. 103 articles that met inclusion criteria were reviewed, and findings were then described and synthesized. Findings: 1. Computer-based CBT was found to be effective for OCD, depression, social phobia, and panic disorder. 2. Web-based psychoeducation reduced problem behavior and improved parental well-being. 3. There is limited evidence for mobile-phone-based apps, but preliminary results suggest computer-based interventions are transferrable to mobile apps. 4. Adherence to app-based treatment was correlated with impressions about the user interface Conclusion & Significance: There is evidence for the effectiveness of computer-based programs in filling the significant gaps that currently exist in mental health delivery in the United States and internationally. There is also potential and theoretical validity for mobile-based apps to do the same, though more data is needed.Keywords: children's mental health, mental health app, child and adolecent psychiatry, digital therapy
Procedia PDF Downloads 7642025 Synchronous Reference Frame and Instantaneous P-Q Theory Based Control of Unified Power Quality Conditioner for Power Quality Improvement of Distribution System
Authors: Ambachew Simreteab Gebremedhn
Abstract:
Context: The paper explores the use of synchronous reference frame theory (SRFT) and instantaneous reactive power theory (IRPT) based control of Unified Power Quality Conditioner (UPQC) for improving power quality in distribution systems. Research Aim: To investigate the performance of different control configurations of UPQC using SRFT and IRPT for mitigating power quality issues in distribution systems. Methodology: The study compares three control techniques (SRFT-IRPT, SRFT-SRFT, IRPT-IRPT) implemented in series and shunt active filters of UPQC. Data is collected under various control algorithms to analyze UPQC performance. Findings: Results indicate the effectiveness of SRFT and IRPT based control techniques in addressing power quality problems such as voltage sags, swells, unbalance, harmonics, and current harmonics in distribution systems. Theoretical Importance: The study provides insights into the application of SRFT and IRPT in improving power quality, specifically in mitigating unbalanced voltage sags, where conventional methods fall short. Data Collection: Data is collected under various control algorithms using simulation in MATLAB Simulink and real-time operation executed with experimental results obtained using RT-LAB. Analysis Procedures: Performance analysis of UPQC under different control algorithms is conducted to evaluate the effectiveness of SRFT and IRPT based control techniques in mitigating power quality issues. Questions Addressed: How do SRFT and IRPT based control techniques compare in improving power quality in distribution systems? What is the impact of using different control configurations on the performance of UPQC? Conclusion: The study demonstrates the efficacy of SRFT and IRPT based control of UPQC in mitigating power quality issues in distribution systems, highlighting their potential for enhancing voltage and current quality.Keywords: power quality, UPQC, shunt active filter, series active filter, non-linear load, RT-LAB, MATLAB
Procedia PDF Downloads 2042024 Direct Growth Rates of the Information Model for Traffic at the Service of Sustainable Development of Tourism in Dubrovacko-Neretvanska County 2014-2020
Authors: Vinko Viducic, Jelena Žanic Mikulicic, Maja Racic, Kristina Sladojevic
Abstract:
The research presented in this paper has been focused on analyzing the impact of traffic on the sustainable development of tourism in Croatia's Dubrovacko-Neretvanska County by the year 2020, based on the figures and trends reported in 2014 and using the relevant variables that characterise the synergy of traffic and tourism in, speaking from the geographic viewpoint, the most problematic county in the Republic of Croatia. The basic hypothesis has been confirmed through scientifically obtained research results, through the quantification of the model's variables and the direct growth rates of the designed model. On the basis of scientific insights into the sustainable development of traffic and tourism in Dubrovacko-Neretvanska County, it is possible to propose a new information model for traffic at the service of the sustainable development of tourism in the County for the period 2014-2020.Keywords: environment protection, hotel industry, private sector, quantification
Procedia PDF Downloads 28342023 Differentiated Instruction for All Learners: Strategies for Full Inclusion
Authors: Susan Dodd
Abstract:
This presentation details the methodology for teachers to identify and support a population of students who have historically been overlooked in regards to their educational needs. The twice exceptional (2e) student is a learner who is considered gifted and also has a learning disability, as defined by the Individuals with Disabilities Education Act (IDEA). Many of these students remain underserved throughout their educational careers because their exceptionalities may mask each other, resulting in a special population of students who are not achieving to their fullest potential. There are three common scenarios that may make the identification of a 2e student challenging. First, the student may have been identified as gifted, and her disability may go unnoticed. She could also be considered an under-achiever, or she may be able to compensate for her disability under the school works becomes more challenging. In the second scenario, the student may be identified as having a learning disability and is only receiving remedial services where his giftedness will not be highlighted. His overall IQ scores may be misleading because they were impacted by his learning disability. In the third scenario, the student is able to compensate for her ability well enough to maintain average scores, and she goes undetected as both gifted and learning disabled. Research in the area identifies the complexity involved in identifying 2e students, and how multiple forms of assessment are required. It is important for teachers to be aware of the common characteristics exhibited by many 2e students, so these learners can be identified and appropriately served. Once 2e students have been identified, teachers are then challenged to meet the varying needs of these exceptional learners. Strength-based teaching entails simultaneously providing gifted instruction as well as individualized accommodations for those students. Research in this field has yielded strategies that have proven helpful for teaching 2e students, as well as other students who may be struggling academically. Differentiated instruction, while necessary in all classrooms, is especially important for 2e students, as is encouragement for academic success. Teachers who take the time to really know their students will have a better understanding of each student’s strengths and areas for growth, and therefore tailor instruction to extend the intellectual capacities for optimal achievement. Teachers should also understand that some learning activities can prove very frustrating to students, and these activities can be modified based on individual student needs. Because 2e students can often become discouraged by their learning challenges, it is especially important for teachers to assist students in recognizing their own strengths and maintaining motivation for learning. Although research on the needs of 2e students has spanned across two decades, this population remains underserved in many educational institutions. Teacher awareness of the identification of and the support strategies for 2e students is critical for their success.Keywords: gifted, learning disability, special needs, twice exceptional
Procedia PDF Downloads 18342022 Effective Use of X-Box Kinect in Rehabilitation Centers of Riyadh
Authors: Reem Alshiha, Tanzila Saba
Abstract:
Physical rehabilitation is the process of helping people to recover and be able to go back to their former activities that have been delayed due to external factors such as car accidents, old age and victims of strokes (chronic diseases and accidents, and those related to sport activities).The cost of hiring a personal nurse or driving the patient to and from the hospital could be costly and time-consuming. Also, there are other factors to take into account such as forgetfulness, boredom and lack of motivation. In order to solve this dilemma, some experts came up with rehabilitation software to be used with Microsoft Kinect to help the patients and their families for in-home rehabilitation. In home rehabilitation software is becoming more and more popular, since it is more convenient for all parties affiliated with the patient. In contrast to the other costly market-based systems that have no portability, Microsoft’s Kinect is a portable motion sensor that reads body movements and interprets it. New software development has made rehabilitation games available to be used at home for the convenience of the patient. The game will benefit its users (rehabilitation patients) in saving time and money. There are many software's that are used with the Kinect for rehabilitation, but the software that is chosen in this research is Kinectotherapy. Kinectotherapy software is used for rehabilitation patients in Riyadh clinics to test its acceptance by patients and their physicians. In this study, we used Kinect because it was affordable, portable and easy to access in contrast to expensive market-based motion sensors. This paper explores the importance of in-home rehabilitation by using Kinect with Kinectotherapy software. The software targets both upper and lower limbs, but in this research, the main focus is on upper-limb functionality. However, the in-home rehabilitation is applicable to be used by all patients with motor disability, since the patient must have some self-reliance. The targeted subjects are patients with minor motor impairment that are somewhat independent in their mobility. The presented work is the first to consider the implementation of in-home rehabilitation with real-time feedback to the patient and physician. This research proposes the implementation of in-home rehabilitation in Riyadh, Saudi Arabia. The findings show that most of the patients are interested and motivated in using the in-home rehabilitation system in the future. The main value of the software application is due to these factors: improve patient engagement through stimulating rehabilitation, be a low cost rehabilitation tool and reduce the need for expensive one-to-one clinical contact. Rehabilitation is a crucial treatment that can improve the quality of life and confidence of the patient as well as their self-esteem.Keywords: x-box, rehabilitation, physical therapy, rehabilitation software, kinect
Procedia PDF Downloads 34742021 Improvement of Students’ Active Experience through the Provision of Foundational Architecture Pedagogy by Virtual Reality Tools
Authors: Mehdi Khakzand, Flora Fakourian
Abstract:
It has been seen in recent years that architects are using virtual modeling to help them visualize their projects. Research has indicated that virtual media, particularly virtual reality, enhances architects' comprehension of design and spatial perception. Creating a communal experience for active learning is an essential component of the design process in architecture pedagogy. It has been particularly challenging to replicate design principles as a critical teaching function, and this is a complex issue that demands comprehension. Nonetheless, the usage of simulation should be studied and limited as appropriate. In conjunction with extensive technology, 3D geometric illustration can bridge the gap between the real and virtual worlds. This research intends to deliver a pedagogical experience in the architecture basics course to improve the architectural design process utilizing virtual reality tools. This tool seeks to tackle current challenges in current ways of architectural illustration by offering building geometry illustration, building information (data from the building information model), and simulation results. These tools were tested over three days in a design workshop with 12 architectural students. This article provided an architectural VR-based course and explored its application in boosting students' active experiences. According to the research, this technology can improve students' cognitive skills from challenging simulations by boosting visual understanding.Keywords: active experience, architecture pedagogy, virtual reality, spatial perception
Procedia PDF Downloads 91