Search results for: online monitoring
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5679

Search results for: online monitoring

3069 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 487
3068 Bienzymatic Nanocomposites Biosensors Complexed with Gold Nanoparticles, Polyaniline, Recombinant MN Peroxidase from Corn, and Glucose Oxidase to Measure Glucose

Authors: Anahita Izadyar

Abstract:

Using a recombinant enzyme derived from corn and a simple modification, we are fabricating a facile, fast, and cost-beneficial novel biosensor to measure glucose. We are applying Plant Produced Mn Peroxidase (PPMP), glucose oxidase (GOx), polyaniline (PANI) as conductive polymer and gold nanoparticles (AuNPs) on Au electrode using electrochemical response to detect glucose. We applied the entrapment method of enzyme composition, which is generally used to immobilize conductive polymer and facilitate electron transfer from the enzyme oxidation-reduction center to the sample solution. In this work, the oxidation of glucose on the modified gold electrode was quantified with Linear Sweep Voltammetry(LSV). We expect that the modified biosensor has the potential for monitoring various biofluids.

Keywords: plant-produced manganese peroxidase, enzyme-based biosensors, glucose, modified gold nanoparticles electrode, polyaniline

Procedia PDF Downloads 200
3067 Proposing a Boundary Coverage Algorithm ‎for Underwater Sensor Network

Authors: Seyed Mohsen Jameii

Abstract:

Wireless underwater sensor networks are a type of sensor networks that are located in underwater environments and linked together by acoustic waves. The application of these kinds of network includes monitoring of pollutants (chemical, biological, and nuclear), oil fields detection, prediction of the likelihood of a tsunami in coastal areas, the use of wireless sensor nodes to monitor the passing submarines, and determination of appropriate locations for anchoring ships. This paper proposes a boundary coverage algorithm for intrusion detection in underwater sensor networks. In the first phase of the proposed algorithm, optimal deployment of nodes is done in the water. In the second phase, after the employment of nodes at the proper depth, clustering is executed to reduce the exchanges of messages between the sensors. In the third phase, the algorithm of "divide and conquer" is used to save energy and increase network efficiency. The simulation results demonstrate the efficiency of the proposed algorithm.

Keywords: boundary coverage, clustering, divide and ‎conquer, underwater sensor nodes

Procedia PDF Downloads 341
3066 Social Media Marketing Efforts and Hospital Brand Equity: An Empirical Investigation

Authors: Abrar R. Al-Hasan

Abstract:

Despite the widespread use of social media by consumers and marketers, empirical research investigating their economic value in the healthcare industry still lags. This study explores the impact of the use of social media marketing efforts on a hospital's brand equity and, ultimately, consumer response. Using social media data from Twitter and Facebook, along with an online and offline survey methodology, data is analyzed using logistic regression models. A random sample of (728) residents of the Kuwaiti population is used. The results of this study found that social media marketing efforts (SMME) in terms of use and validation lead to higher hospital brand equity and in turn, patient loyalty and patient visit. The study highlights the impact of SMME on hospital brand equity and patient response. Healthcare organizations should guide their marketing efforts to better manage this new way of marketing and communicating with patients to enhance their consumer loyalty and financial performance.

Keywords: brand equity, healthcare marketing, patient visit, social media, SMME

Procedia PDF Downloads 173
3065 Coherent Ku-Band Radar for Monitoring Ocean Waves

Authors: Richard Mitchell, Robert Mitchell, Thai Duong, Kyungbin Bae, Daegon Kim, Youngsub Lee, Inho Kim, Inho Park, Hyungseok Lee

Abstract:

Although X-band radar is commonly used to measure the properties of ocean waves, the use of a higher frequency has several advantages, such as increased backscatter coefficient, better Doppler sensitivity, lower power, and a smaller package. A low-power Ku-band radar system was developed to demonstrate these advantages. It is fully coherent, and it interleaves short and long pulses to achieve a transmit duty ratio of 25%, which makes the best use of solid-state amplifiers. The range scales are 2 km, 4 km, and 8 km. The minimum range is 100 m, 200 m, and 400 m for the three range scales, and the range resolution is 4 m, 8 m, and 16 m for the three range scales. Measurements of the significant wave height, wavelength, wave period, and wave direction have been made using traditional 3D-FFT methods. Radar and ultrasonic sensor results collected over an extended period of time at a coastal site in South Korea are presented.

Keywords: measurement of ocean wave parameters, Ku-band radar, coherent radar, compact radar

Procedia PDF Downloads 169
3064 X̄ and S Control Charts based on Weighted Standard Deviation Method

Authors: Derya Karagöz

Abstract:

A Shewhart chart based on normality assumption is not appropriate for skewed distributions since its Type-I error rate is inflated. This study presents X̄ and S control charts for monitoring the process variability for skewed distributions. We propose Weighted Standard Deviation (WSD) X̄ and S control charts. Standard deviation estimator is applied to monitor the process variability for estimating the process standard deviation, in the case of the W SD X̄ and S control charts as this estimator is simple and easy to compute. Unlike the Shewhart control chart, the proposed charts provide asymmetric limits in accordance with the direction and degree of skewness to construct the upper and lower limits. The performances of the proposed charts are compared with other heuristic charts for skewed distributions by using Simulation study. The Simulation studies show that the proposed control charts have good properties for skewed distributions and large sample sizes.

Keywords: weighted standard deviation, MAD, skewed distributions, S control charts

Procedia PDF Downloads 399
3063 Indirect Relationship between Perfectionism and Depression through Self-Silencing and Guilt: A Cross-Cultural Study

Authors: Elham Davoodi, Kylie King, Laura Jobson

Abstract:

Depression is one of the most common mental health disorders. Self-silencing theory adopts a socio-cultural lens to examine the development and maintenance of depression. Self-silencing can be a vulnerability factor in depression, and personality vulnerabilities (e.g., perfectionism) and moral emotions (e.g., guilt) are strongly related to self-silencing and depression. Yet, the relationships between all four variables among different cultural groups are not clear. We aimed to address this gap by examining whether perfectionism and depression are related indirectly through self-silencing and guilt and whether cultural group moderates these associations. Participants (N=288) from either European Australian or Iranian Australian cultural backgrounds completed an online survey assessing self-silencing, guilt, perfectionism, and depression. First, we found an indirect relationship between perfectionism and depression through self-silencing. Second, using a serial mediation model, we found an indirect association between perfectionism and depression through self-silencing and guilt. There was no evidence that cultural groups moderated these indirect relationships. Our findings leave an important question for future longitudinal studies to answer; that is, whether the association between self-silencing and depression is oversimplified and whether moral emotions in this relationship have been overlooked.

Keywords: perfectionism, depression, self-silencing, culture, guilt

Procedia PDF Downloads 8
3062 Effects of the Visual and Auditory Stimuli with Emotional Content on Eyewitness Testimony

Authors: İrem Bulut, Mustafa Z. Söyük, Ertuğrul Yalçın, Simge Şişman-Bal

Abstract:

Eyewitness testimony is one of the most frequently used methods in criminal cases for the determination of crime and perpetrator. In the literature, the number of studies about the reliability of eyewitness testimony is increasing. The study aims to reveal the factors that affect the short-term and long-term visual memory performance of the participants in the event of an accident. In this context, the effect of the emotional content of the accident and the sounds during the accident on visual memory performance was investigated with eye-tracking. According to the results, the presence of visual and auditory stimuli with emotional content during the accident decreases the participants' both short-term and long-term recall performance. Moreover, the data obtained from the eye monitoring device showed that the participants had difficulty in answering even the questions they focused on at the time of the accident.

Keywords: eye tracking, eyewitness testimony, long-term recall, short-term recall, visual memory

Procedia PDF Downloads 162
3061 Energy Metabolism and Mitochondrial Biogenesis in Muscles of Rats Subjected to Cold Water Immersion

Authors: Bosiacki Mateusz, Anna Lubkowska, Dariusz Chlubek, Irena Baranowska-Bosiacka

Abstract:

Exposure to cold temperatures can be considered a stressor that can lead to adaptive responses. The present study hypothesized the possibility of a positive effect of cold water exercise on mitochondrial biogenesis and muscle energy metabolism in aging rats. The purpose of this study was to evaluate the effects of cold water exercise on energy status, purine compounds, and mitochondrial biogenesis in the muscles of aging rats as indicators of the effects of cold water exercise and their usefulness in monitoring adaptive changes. The study was conducted on 64 aging rats of both sexes, 15 months old at the time of the experiment. The rats (male and female separately) were randomly assigned to the following study groups: control, sedentary animals; 5°C groups animals - training swimming in cold water at 5°C; 36°C groups - animals training swimming in water at thermal comfort temperature. The study was conducted with the approval of the Local Ethical Committee for Animal Experiments. The animals in the experiment were subjected to swimming training for 9 weeks. During the first week of the study, the duration of the first swimming training was 2 minutes (on the first day), increasing daily by 0.5 minutes up to 4 minutes on the fifth day of the first week. From the second to the eighth week, the swimming training was 4 minutes per day, five days a week. At the end of the study, forty-eight hours after the last swim training, the animals were dissected. In the skeletal muscle tissue of the thighs of the rats, we determined the concentrations of ATP, ADP, AMP, Ado (HPLC), PGC-1a protein expression (Western blot), PGC1A, Mfn1, Mfn2, Opa1, and Drp1 gene expression (qRT PCR). The study showed that swimming in water at a thermally comfortable temperature improved the energy metabolism of the aging rat muscles by increasing the metabolic rate (increase in ATP, ADP, TAN, AEC) and enhancing mitochondrial fusion (increase in mRNA expression of regulatory proteins Mfn1 and Mfn2). Cold water swimming improved muscle energy metabolism in aging rats by increasing the rate of muscle energy metabolism (increase in ATP, ADP, TAN, AEC concentrations) and enhancing mitochondrial biogenesis and dynamics (increase in the mRNA expression of proteins of fusion-regulating factors – Mfn1, Mfn2, and Opa1, and the factor regulating mitochondrial fission – Drp1). The concentration of high-energy compounds and the expression of proteins regulating mitochondrial dynamics in the muscle may be a useful indicator in monitoring adaptive changes occurring in aging muscles under the influence of exercise in cold water. It represents a short-term adaptation to changing environmental conditions and has a beneficial effect on maintaining the bioenergetic capacity of muscles in the long term. Conclusion: exercise in cold water can exert positive effects on energy metabolism, biogenesis and dynamics of mitochondria in aging rat muscles. Enhancement of mitochondrial dynamics under cold water exercise conditions can improve mitochondrial function and optimize the bioenergetic capacity of mitochondria in aging rat muscles.

Keywords: cold water immersion, adaptive responses, muscle energy metabolism, aging

Procedia PDF Downloads 81
3060 Assessment of Tidal Influence in Spatial and Temporal Variations of Water Quality in Masan Bay, Korea

Authors: S. J. Kim, Y. J. Yoo

Abstract:

Slack-tide sampling was carried out at seven stations at high and low tides for a tidal cycle, in summer (7, 8, 9) and fall (10), 2016 to determine the differences of water quality according to tides in Masan Bay. The data were analyzed by Pearson correlation and factor analysis. The mixing state of all the water quality components investigated is well explained by the correlation with salinity (SAL). Turbidity (TURB), dissolved silica (DSi), nitrite and nitrate nitrogen (NNN) and total nitrogen (TN), which find their way into the bay from the streams and have no internal source and sink reaction, showed a strong negative correlation with SAL at low tide, indicating the property of conservative mixing. On the contrary, in summer and fall, dissolved oxygen (DO), hydrogen sulfide (H2S) and chemical oxygen demand with KMnO4 (CODMn) of the surface and bottom water, which were sensitive to an internal source and sink reaction, showed no significant correlation with SAL at high and low tides. The remaining water quality parameters showed a conservative or a non-conservative mixing pattern depending on the mixing characteristics at high and low tides, determined by the functional relationship between the changes of the flushing time and the changes of the characteristics of water quality components of the end-members in the bay. Factor analysis performed on the concentration difference data sets between high and low tides helped in identifying the principal latent variables for them. The concentration differences varied spatially and temporally. Principal factors (PFs) scores plots for each monitoring situation showed high associations of the variations to the monitoring sites. At sampling station 1 (ST1), temperature (TEMP), SAL, DSi, TURB, NNN and TN of the surface water in summer, TEMP, SAL, DSi, DO, TURB, NNN, TN, reactive soluble phosphorus (RSP) and total phosphorus (TP) of the bottom water in summer, TEMP, pH, SAL, DSi, DO, TURB, CODMn, particulate organic carbon (POC), ammonia nitrogen (AMN), NNN, TN and fecal coliform (FC) of the surface water in fall, TEMP, pH, SAL, DSi, H2S, TURB, CODMn, AMN, NNN and TN of the bottom water in fall commonly showed up as the most significant parameters and the large concentration differences between high and low tides. At other stations, the significant parameters showed differently according to the spatial and temporal variations of mixing pattern in the bay. In fact, there is no estuary that always maintains steady-state flow conditions. The mixing regime of an estuary might be changed at any time from linear to non-linear, due to the change of flushing time according to the combination of hydrogeometric properties, inflow of freshwater and tidal action, And furthermore the change of end-member conditions due to the internal sinks and sources makes the occurrence of concentration difference inevitable. Therefore, when investigating the water quality of the estuary, it is necessary to take a sampling method considering the tide to obtain average water quality data.

Keywords: conservative mixing, end-member, factor analysis, flushing time, high and low tide, latent variables, non-conservative mixing, slack-tide sampling, spatial and temporal variations, surface and bottom water

Procedia PDF Downloads 130
3059 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment

Authors: Arslan Murtaza

Abstract:

RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.

Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient

Procedia PDF Downloads 334
3058 Single Ended Primary Inductance Converter with Internal Model Controller

Authors: Fatih Suleyman Taskincan, Ahmet Karaarslan

Abstract:

In this article, the study and analysis of Single Ended Primary Inductance Converter (SEPIC) are presented for battery charging applications that will be used in military applications. The usage of this kind of converters come from its advantage of non-reverse polarity at outputs. As capacitors charge and discharge through inductance, peak current does not occur on capacitors. Therefore, the efficiency will be high compared to buck-boost converters. In this study, the converter (SEPIC) is designed to be operated with Internal Model Controller (IMC). The traditional controllers like Proportional Integral Controller are not preferred as its linearity behavior. Hence IMC is designed for this converter. This controller is a model-based control and provides more robustness and better set point monitoring. Moreover, it can be used for an unstable process where the conventional controller cannot handle the dynamic operation. Matlab/Simulink environment is used to simulate the converter and its controller, then, the results are shown and discussed.

Keywords: DC/DC converter, single ended primary inductance converter, SEPIC, internal model controller, IMC, switched mode power supply

Procedia PDF Downloads 629
3057 Multiple Approaches for Ultrasonic Cavitation Monitoring of Oxygen-Loaded Nanodroplets

Authors: Simone Galati, Adriano Troia

Abstract:

Ultrasound (US) is widely used in medical field for a variety diagnostic techniques but, in recent years, it has also been creating great interest for therapeutic aims. Regarding drug delivery, the use of US as an activation source provides better spatial delivery confinement and limits the undesired side effects. However, at present there is no complete characterization at a fundamental level of the different signals produced by sono-activated nanocarriers. Therefore, the aim of this study is to obtain a metrological characterization of the cavitation phenomena induced by US through three parallel investigation approaches. US was focused into a channel of a customized phantom in which a solution with oxygen-loaded nanodroplets (OLNDs) was led to flow and the cavitation activity was monitored. Both quantitative and qualitative real-time analysis were performed giving information about the dynamics of bubble formation, oscillation and final implosion with respect to the working acoustic pressure and the type of nanodroplets, compared with pure water. From this analysis a possible interpretation of the observed results is proposed.

Keywords: cavitation, drug delivery, nanodroplets, ultra-sound

Procedia PDF Downloads 110
3056 A Review of Encryption Algorithms Used in Cloud Computing

Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele

Abstract:

Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.

Keywords: cloud computing, data integrity, confidentiality, privacy, availability

Procedia PDF Downloads 133
3055 Translation in Greek and Psychometric Properties of the 9-Item Internet Gaming Disorder Scale-Short Form (IGDS9-Sf)

Authors: Aspasia Simpsi

Abstract:

The aim of this study was to translate into Greek and then validate the psychometric properties of the Internet Gaming Disorder Scale–Short-Form (IGDS9-SF) (Pontes & Griffiths, 2015). This is the first short standardized psychometric tool to assess Internet Gaming Disorder (IGD) according to the DSM-V nine clinical criteria and among the most frequently examined. The translation of the test was done through the process of back-translation. To gain a better insight into the psychometric properties of this test, the questionnaire included demographic questions and the Greek version of the Internet Addiction Test (Young, 1998). The participants of the study were 241 adolescents aged between 12 to 18. They were nationally recruited in Greece through an online survey that was hosted on the platform of Qualtrics. Analysis revealed excellent reliability with Cronbach’s alpha coefficients α = .939 for IGDS9-SF and α = .940 for IAT. The use of Pearson product-moment correlation revealed a significant positive relationship between IGDS9-SF and IAT r (241) =.45, p < .001. Due to inconsistencies in terminology and tests in the field of IGD, what is recommended for future research is a consensus regarding IGD testing and research.

Keywords: internet gaming disorder, IGDS9-SF, psychometric properties, internet addiction

Procedia PDF Downloads 56
3054 Colada Sweet Like Mercy: Gender Stereotyping in Twitter Conversations by Big Brother Naija 2019 Viewers

Authors: Mary-Magdalene N. Chumbow

Abstract:

This study explores how a reality TV show which aired in Nigeria in 2019 (Big Brother Naija - BBN), played a role in enhancing gender-biased conversations among its viewers and social media followers. Thematic analysis is employed here to study Twitter conversations among BBN 2019 followers, which ensued after the show had stopped airing. The study reveals that the show influenced the way viewers and fans engaged with each other, as well as with the show’s participants, on Twitter, and argues that, despite having aired for a short period of time, BBN 2019 was able to draw people together and provide a community where viewers could engage with each other online. Though the show aired on TV, the viewers found a digital space where they could air their views, react to what was happening on the show, as well as simply catch up on action that they probably missed. Within these digital communities, viewers expressed their attractions, disgust and identities, most of these having a form of reference to sexuality and gender identities and roles, as were also portrayed by the show’s producers both on TV and on social media.

Keywords: commodification of bodies, gender stereotypes, Big Brother Naija, social media

Procedia PDF Downloads 133
3053 Digital Literacy Skills for Geologist in Public Sector

Authors: Angsumalin Puntho

Abstract:

Disruptive technology has had a great influence on our everyday lives and the existence of an organization. Geologists in the public sector need to keep up with digital technology and be able to work and collaborate in a more effective manner. The result from SWOT and 7S McKinsey analyses suggest that there are inadequate IT personnel, no individual digital literacy development plan, and a misunderstanding of management policies. The Office of Civil Service Commission develops digital literacy skills that civil servants and government officers should possess in order to work effectively; it consists of nine dimensions, including computer skills, internet skills, cyber security awareness, word processing, spreadsheets, presentation programs, online collaboration, graphics editors and cyber security practices; and six steps of digital literacy development including self-assessment, individual development plan, self-learning, certified test, learning reflection, and practices. Geologists can use digital literacy as a learning tool to develop themselves for better career opportunities.

Keywords: disruptive technology, digital technology, digital literacy, computer skills

Procedia PDF Downloads 116
3052 Characterization Techniques for Studying Properties of Nanomaterials

Authors: Nandini Sharma

Abstract:

Monitoring the characteristics of a nanostructured material comprises measurements of structural, morphological, mechanical, optical and electronic properties of the synthesized nanopowder and different layers and coatings of nanomaterials coated on transparent conducting oxides (TCOs) substrates like fluorine doped tin oxide (FTO) or Indium doped tin oxide (ITO). This article focuses on structural and optical characterization with emphasis on measurements of the photocatalytic efficiency as a photocatalyst and their interpretation to extract relevant information about various TCOs and materials, their emitter regions, and surface passivation. It also covers a brief description of techniques based on photoluminescence that can portray high resolution pictorial graphs for application as solar energy devices. With the advancement in the scientific techniques, detailed information about the structural, morphological, and optical properties can be investigated, which is further useful for engineering and designing of an efficient device. The common principles involved in the prevalent characterization techniques aid to illustrate the range of options that can be broadened in near future for acurate device characterization and diagnosis.

Keywords: characterization, structural, optical, nanomaterial

Procedia PDF Downloads 146
3051 Study on Ecological Water Demand Evaluation of Typical Mountainous Rivers in Zhejiang Province: Taking Kaihua River as an Example

Authors: Kaiping Xu, Aiju You, Lei Hua

Abstract:

In view of the ecological environmental problems and protection needs of mountainous rivers in Zhejiang province, a suitable ecological water demand evaluation system was established based on investigation and monitoring. Taking the Kaihua river as an example, the research on ecological water demand and the current situation evaluation were carried out. The main types of ecological water demand in Majin River are basic ecological flow and lake wetland outside the river, and instream flow and water demands for water quality in Zhongcun river. In the wet season, each ecological water demand is 18.05m3/s and 2.56m3 / s, and in the dry season is 3.00m3/s and 0.61m3/s. Three indexes of flow, duration and occurrence time are used to evaluate the ecological water demand. The degree of ecological water demand in the past three years is low level of satisfaction. Meanwhile, the existing problems are analyzed, and put forward reasonable and operable safeguards and suggestions.

Keywords: Zhejiang province, mountainous river, ecological water demand, Kaihua river, evaluation

Procedia PDF Downloads 241
3050 Requirements for a Shared Management of State-Owned Building in the Archaeological Park of Pompeii

Authors: Maria Giovanna Pacifico

Abstract:

Maintenance, in Italy, is not yet a consolidated practice despite the benefits that could come from. Among the main reasons, there are the lack of financial resources and personnel in the public administration and a general lack of knowledge about how to activate and to manage a prevented and programmed maintenance. The experimentation suggests that users and tourists could be involved in the maintenance process from the knowledge phase to the monitoring ones by using mobile devices. The goal is to increase the quality of Facility Management for cultural heritage, prioritizing usage needs, and limiting interference between the key stakeholders. The method simplifies the consolidated procedures for the Information Systems, avoiding a loss in terms of quality and amount of information by focusing on the users' requirements: management economy, user safety, accessibility, and by receiving feedback information to define a framework that will lead to predictive maintenance. This proposal was designed to be tested in the Archaeological Park of Pompeii on the state property asset.

Keywords: asset maintenance, key stakeholders, Pompeii, user requirement

Procedia PDF Downloads 125
3049 Engineering Practice in Nigerian University: A Microcosm of Engineering Development and Practice in Developing Countries

Authors: Sunday Olufemi Adesogan

Abstract:

There is a strong link between engineering and development. Engineering as a profession is a call to service by the society. Perhaps next to soldiers, engineers are the most patriotic professionals. However, unlike soldiers, they remain servants of society at all times and in all circumstances. Despite their role to the society, engineering profession seems not to be enjoying the respect due to it probably because of failures associated with some engineering projects. This paper focuses on the need to improve on engineering practices for developments in developing countries using Engineering practice in Nigerian Universities as a tool for argument. Purposeful Survey, interview and focus group discussion were carried out among one hundred and twenty (120) reputable firms in Nigeria. The topic was approached through a few projects that the firms have been involved in from the planning stage, some to completion and beyond into the stage of maintenance and monitoring. It is revealed that some factors which are not determined by the engineers themselves impeded progress and full success of engineering practice in developing countries. The key culprit is corruption whose eradication will put the nation on the solid path of effective engineering development and poverty alleviation.

Keywords: development, engineering, practices, sustainable

Procedia PDF Downloads 333
3048 Improving Coverage in Wireless Sensor Networks Using Particle Swarm Optimization Algorithm

Authors: Ehsan Abdolzadeh, Sanaz Nouri, Siamak Khalaj

Abstract:

Today WSNs have many applications in different fields like the environment, military operations, discoveries, monitoring operations, and so on. Coverage size and energy consumption are the important challenges that these networks need to face. This paper tries to solve the problem of coverage with a requirement of k-coverage and minimum energy consumption. In order to minimize energy consumption, visual sensor networks have been used that observe and process just those targets that are located in their view direction. As a result, sensor rotations have decreased, and subsequently, energy consumption has been minimized. To solve the problem of coverage particle swarm optimization, coverage optimization has been able to ensure coverage requirement together with minimizing sensor rotations while meeting the problem requirement of k≤14. So energy consumption has decreased, and this could extend the sensors’ lifetime subsequently.

Keywords: K coverage, particle union optimization algorithm, wireless sensor networks, visual sensor networks

Procedia PDF Downloads 115
3047 Inventory of Aromatic and Medicinal Plants Used in Natural Cosmetics in Western Algeria

Authors: Faiza Chaib, Yasmina-Nadia Bendahmane, Fatima Zohra Ghanemi

Abstract:

In order to know the traditional use of aromatic and medicinal plants in natural cosmetics, we carried out an ethnobotanical study using an online quiz among the Algerian population residing mainly in western Algeria (Oran, Tlemcen, and Mostaganem). Our study identified 37 plant species used as cosmetic plants, divided into 9 botanical families. The families mainly used and the richest in species are the lamiaceae, the apiecea, and the rutaceae. Our study states that the 5 species with the highest frequency of use and highest citation value are lemon, chamomile, turmeric, garlic, and lavender. Lemon takes first place in the order of frequency. The plants listed have been listed in tables grouping the identification of plants by their scientific and vernacular names, frequency of use, parts used, parts of the body concerned, desired action, as well as the main traditional recipes. This study allowed us to highlight the importance of aromatic plants and to appreciate their traditional practices in natural cosmetics.

Keywords: aromatic plants, ethnobotanical survey, traditional use, natural cosmetics, questionnaire, western Algeria

Procedia PDF Downloads 118
3046 Is There Relationship between Cyberchondria and Emotional Intelligence among Omani University Students? A Descriptive Correlational Study

Authors: Mohammed Qutishat, Khaldoun Aldiabat, Khaled Bader, Mohammad Al Qadire

Abstract:

Cyberchondria refers to the irrational increase of distress about the condition of one's health as a consequence of the World Wide Web quest for medical details. The aim of this study was to examine the relationship between emotional intelligence and cyberchondria among Omani university students. A descriptive correlational design was used to collect data from eligible 370 participants using the Emotional Intelligence Questionnaire, and the short-form version of the Cyberchondria Severity Scale (CSS-12) between January and May 2020 at XX University-Oman. The participants’ age ranged between 18 and 37 years (M = 20.28). The majority of the participants were female, 59.7% (n = 221), single 99.5% (368), in their second academic year, 29.2% (n =108). The mean score of cyberchondria experiences was 32.51, and the mean score of emotional intelligence was 34.91. Linear regression indicated a strong association between cyberchondria and emotional intelligence [F (34.639) = 5.885, P=.000], with a .086 R². In conclusion, the exchange of expertise and peer networking for health-related details utilizing the Internet can benefit students with and without having health problems. Further research and methods should be developed to help students track the online medical tools effectively for the right purposes.

Keywords: emotional intelligence, cyberchondria, smartphone addiction, social media

Procedia PDF Downloads 252
3045 A Study of Learning to Enhance Ability Career Skills Consistent With Disruptive Innovation in Creative Strategies for Advertising Course

Authors: Kornchanok Chidchaisuwan

Abstract:

This project is a study of learning activities through experience to enhance career skills and technical abilities on the creative strategies for advertising course of undergraduate students. This instructional model consisted of study learning approaches: 1) Simulation-based learning: used to create virtual learning activities plans for work like working at advertising companies. 2) Project-based learning: Actual work based on the processed creating and focus on producing creative works to present on new media channels. The results of learning management found that there were effects on the students in various areas, including 1) The learners have experienced in the step by step of advertising work process. 2) The learner has the skills to work from the actual work (Learning by Doing), allowing the ability to create, present, and produce the campaign accomplished achievements and published on online media at a better level.

Keywords: technical, advertising, presentation, career skills, experience, simulation based learning

Procedia PDF Downloads 91
3044 Analyzing the Quality of Cloud-Based E-Learning Systems on the Perception of the Learners and the Teachers

Authors: R. W. C. Devindi, S. M. Buddika Harshanath

Abstract:

E-learning is a widely used technology for learning in the modern world. With the pandemic situation the popularity of using e-learning has been increased in a larger capacity. The e-learning educational systems require software resources as well as hardware usually but it is hard for most of the education institutions to afford those resources. Also with the massive user load e-learning has to broaden the server side resources as well. Therefore, in the present cloud computing was implemented in order to make the e – learning systems more efficient. The researcher has analyzed the quality of the e-learning systems on the perception of the learners and the teachers with the aid of hypothesis and has given the analyzed results and the discussion in this report. Therefore, the future research will be able to get some steps to increase the quality of the online learning systems furthermore. In the case of e-learning, quality assurance and cost effectiveness are essential. A complex quality assurance system is used in the stated project. There are no well-defined standard evaluation measures in this field. As a result, accurately assessing the e-learning system's overall quality is challenging. The researcher has done the analysis with the aid of standard methods and software.

Keywords: LMS–learning management system, SPSS–statistical package for social sciences (software), eigen value, hypothesis

Procedia PDF Downloads 107
3043 Estimation of the Temperatures in an Asynchronous Machine Using Extended Kalman Filter

Authors: Yi Huang, Clemens Guehmann

Abstract:

In order to monitor the thermal behavior of an asynchronous machine with squirrel cage rotor, a 9th-order extended Kalman filter (EKF) algorithm is implemented to estimate the temperatures of the stator windings, the rotor cage and the stator core. The state-space equations of EKF are established based on the electrical, mechanical and the simplified thermal models of an asynchronous machine. The asynchronous machine with simplified thermal model in Dymola is compiled as DymolaBlock, a physical model in MATLAB/Simulink. The coolant air temperature, three-phase voltages and currents are exported from the physical model and are processed by EKF estimator as inputs. Compared to the temperatures exported from the physical model of the machine, three parts of temperatures can be estimated quite accurately by the EKF estimator. The online EKF estimator is independent from the machine control algorithm and can work under any speed and load condition if the stator current is nonzero current system.

Keywords: asynchronous machine, extended Kalman filter, resistance, simulation, temperature estimation, thermal model

Procedia PDF Downloads 285
3042 Design an Architectural Model for Deploying Wireless Sensor Network to Prevent Forest Fire

Authors: Saurabh Shukla, G. N. Pandey

Abstract:

The fires have become the most serious disasters to forest resources and the human environment. In recent years, due to climate change, human activities and other factors the frequency of forest fires has increased considerably. The monitoring and prevention of forest fires have now become a global concern for forest fire prevention organizations. Currently, the methods for forest fire prevention largely consist of patrols, observation from watch towers. Thus, software like deployment of the wireless sensor network to prevent forest fire is being developed to get a better estimate of the temperature and humidity prospects. Now days, wireless sensor networks are beginning to be deployed at an accelerated pace. It is not unrealistic to expect that in coming years the world will be covered with wireless sensor networks. This new technology has lots of unlimited potentials and can be used for numerous application areas including environmental, medical, military, transportation, entertainment, crisis management, homeland defense, and smart spaces.

Keywords: deployment, sensors, wireless sensor networks, forest fires

Procedia PDF Downloads 436
3041 Cyber-Victimization among Higher Education Students as Related to Academic and Personal Factors

Authors: T. Heiman, D. Olenik-Shemesh

Abstract:

Over the past decade, with the rapid growth of electronic communication, the internet and, in particular, social networking has become an inseparable part of people's daily lives. Along with its benefits, a new type of online aggression has emerged, defined as cyber bullying, a form of interpersonal aggressive behavior that takes place through electronic means. Cyber-bullying is characterized by repetitive behavior over time of maladaptive authority and power usage using computers and cell phones via sending insulting messages and hurtful pictures. Preliminary findings suggest that the prevalence of involvement in cyber-bullying among higher education students varies between 10 and 35%. As to date, universities are facing an uphill effort in trying to restrain online misbehavior. As no studies examined the relationships between cyber-bullying involvement with personal aspects, and its impacts on academic achievement and work functioning, this present study examined the nature of cyber-bullying involvement among 1,052 undergraduate students (mean age = 27.25, S.D = 4.81; 66.2% female), coping with, as well as the effects of social support, perceived self-efficacy, well-being, and body-perception, in relation to cyber-victimization. We assume that students in higher education are a vulnerable population and at high risk of being cyber-victims. We hypothesize that social support might serve as a protective factor and will moderate the relationships between the socio-emotional variables and the occurrence of cyber- victimization. The findings of this study will present the relationships between cyber-victimization and the social-emotional aspects, which constitute risk and protective factors. After receiving approval from the Ethics Committee of the University, a Google Drive questionnaire was sent to a random sample of students, studying in the various University study centers. Students' participation was voluntary, and they completed the five questionnaires anonymously: Cyber-bullying, perceived self-efficacy, subjective well-being, social support and body perception. Results revealed that 11.6% of the students reported being cyber-victims during last year. Examining the emotional and behavioral reactions to cyber-victimization revealed that female emotional and behavioral reactions were significantly greater than the male reactions (p < .001). Moreover, females reported on a significant higher social support compared to men; male reported significantly on a lower social capability than female; and men's body perception was significantly more positive than women's scores. No gender differences were observed for subjective well-being scale. Significant positive correlations were found between cyber-victimization and fewer friends, lower grades, and work ineffectiveness (r = 0.37- .40, p < 0 .001). The results of the Hierarchical regression indicated significantly that cyber-victimization can be predicted by lower social support, lower body perception, and gender (female), that explained 5.6% of the variance (R2 = 0.056, F(5,1047) = 12.47, p < 0.001). The findings deepen our understanding of the students' involvement in cyber-bullying, and present the relationships of the social-emotional and academic aspects on cyber-victim students. In view of our findings, higher education policy could help facilitate coping with cyber-bullying incidents, and student support units could develop intervention programs aimed at reducing cyber-bullying and its impacts.

Keywords: academic and personal factors, cyber-victimization, social support, higher education

Procedia PDF Downloads 289
3040 Delivering User Context-Sensitive Service in M-Commerce: An Empirical Assessment of the Impact of Urgency on Mobile Service Design for Transactional Apps

Authors: Daniela Stephanie Kuenstle

Abstract:

Complex industries such as banking or insurance experience slow growth in mobile sales. While today’s mobile applications are sophisticated and enable location based and personalized services, consumers prefer online or even face-to-face services to complete complex transactions. A possible reason for this reluctance is that the provided service within transactional mobile applications (apps) does not adequately correspond to users’ needs. Therefore, this paper examines the impact of the user context on mobile service (m-service) in m-commerce. Motivated by the potential which context-sensitive m-services hold for the future, the impact of temporal variations as a dimension of user context, on m-service design is examined. In particular, the research question asks: Does consumer urgency function as a determinant of m-service composition in transactional apps by moderating the relation between m-service type and m-service success? Thus, the aim is to explore the moderating influence of urgency on m-service types, which includes Technology Mediated Service and Technology Generated Service. While mobile applications generally comprise features of both service types, this thesis discusses whether unexpected urgency changes customer preferences for m-service types and how this consequently impacts the overall m-service success, represented by purchase intention, loyalty intention and service quality. An online experiment with a random sample of N=1311 participants was conducted. Participants were divided into four treatment groups varying in m-service types and urgency level. They were exposed to two different urgency scenarios (high/ low) and two different app versions conveying either technology mediated or technology generated service. Subsequently, participants completed a questionnaire to measure the effectiveness of the manipulation as well as the dependent variables. The research model was tested for direct and moderating effects of m-service type and urgency on m-service success. Three two-way analyses of variance confirmed the significance of main effects, but demonstrated no significant moderation of urgency on m-service types. The analysis of the gathered data did not confirm a moderating effect of urgency between m-service type and service success. Yet, the findings propose an additive effects model with the highest purchase and loyalty intention for Technology Generated Service and high urgency, while Technology Mediated Service and low urgency demonstrate the strongest effect for service quality. The results also indicate an antagonistic relation between service quality and purchase intention depending on the level of urgency. Although a confirmation of the significance of this finding is required, it suggests that only service convenience, as one dimension of mobile service quality, delivers conditional value under high urgency. This suggests a curvilinear pattern of service quality in e-commerce. Overall, the paper illustrates the complex interplay of technology, user variables, and service design. With this, it contributes to a finer-grained understanding of the relation between m-service design and situation dependency. Moreover, the importance of delivering situational value with apps depending on user context is emphasized. Finally, the present study raises the demand to continue researching the impact of situational variables on m-service design in order to develop more sophisticated m-services.

Keywords: mobile consumer behavior, mobile service design, mobile service success, self-service technology, situation dependency, user-context sensitivity

Procedia PDF Downloads 268