Search results for: android permission
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 216

Search results for: android permission

96 Intelligent Rainwater Reuse System for Irrigation

Authors: Maria M. S. Pires, Andre F. X. Gloria, Pedro J. A. Sebastiao

Abstract:

The technological advances in the area of Internet of Things have been creating more and more solutions in the area of agriculture. These solutions are quite important for life, as they lead to the saving of the most precious resource, water, being this need to save water a concern worldwide. The paper proposes the creation of an Internet of Things system based on a network of sensors and interconnected actuators that automatically monitors the quality of the rainwater that is stored inside a tank in order to be used for irrigation. The main objective is to promote sustainability by reusing rainwater for irrigation systems instead of water that is usually available for other functions, such as other productions or even domestic tasks. A mobile application was developed for Android so that the user can control and monitor his system in real time. In the application, it is possible to visualize the data that translate the quality of the water inserted in the tank, as well as perform some actions on the implemented actuators, such as start/stop the irrigation system and pour the water in case of poor water quality. The implemented system translates a simple solution with a high level of efficiency and tests and results obtained within the possible environment.

Keywords: internet of things, irrigation system, wireless sensor and actuator network, ESP32, sustainability, water reuse, water efficiency

Procedia PDF Downloads 117
95 Lean Mass and Fat Mass Distribution in Ukrainian Postmenopausal Women with Abdominal Овesity and Metabolic Syndrome

Authors: V. V. Povoroznyuk, Lar. P. Martynyuk, N. I. Dzerovych, Lil. P. Martyntyuk

Abstract:

Objective: Menopause-related changes in female body are associated with the greater risk of metabolic syndrome (MS), which includes obesity, dyslipidemia, impaired glucose tolerance, hypertension. The aim of our study was to reveal peculiarities of fat and lean mass distribution between postmenopausal women with abdominal obesity and with MS. Materials and Methods: The sample consisted of 43 postmenopausal 60 – 69 years old women (age: mean = 64,8; S.D. = 0,4); duration of menopause: mean = 14,5; S.D.= 0,9). The diagnosis of MS was considered according to IDF (2005 yr) criteria. Lean and fat mass distrubution were measured by dual-energy X-ray absortiometry, and were compared for the cohorts with and without MS. Data were analyzed using Statistical Package 6.0 (Statsoft). Results: Findings revealed that 24 (55,8 %) of postmenopausal women had MS. In patients with and without MS compared, fat mass was higher in the former group (41248,25±2263,89 and 29817,68±2397,78 respectively; F=11,9; p=0,001) and at different body regions also: gynoid fat (6563,72±348,19 and 5115,21±392,43 respectively; F=7,6; p=0,008), android fat (3815,45±200,8128 and 2798,15±282,79 respectively; F=9,06; p=0,004. Lean mass comparing didn’t show significant differences in female with and without MS (42548,0±1239,18 and 40667,53±1223,78 respectively; F=1,1; p=0,29) and at different body regions also. Conclusion: These findings suggest that in postmenopausal women with MS there is prevalence of fat mass without increasing of lean mass quantity in compare to female with abdominal obesity without MS.

Keywords: lean mass, fat mass, овesity, metabolic syndrome, women, postmenopausal period

Procedia PDF Downloads 430
94 Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea

Authors: Min Jin Kwon, Seung Won Kim, Eui Yeon Kim, Haeyoung Lee

Abstract:

Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist.

Keywords: deep packet inspection, internet filtering, juvenile protection, technical blocking

Procedia PDF Downloads 316
93 Towards the Use of Software Product Metrics as an Indicator for Measuring Mobile Applications Power Consumption

Authors: Ching Kin Keong, Koh Tieng Wei, Abdul Azim Abd. Ghani, Khaironi Yatim Sharif

Abstract:

Maintaining factory default battery endurance rate over time in supporting huge amount of running applications on energy-restricted mobile devices has created a new challenge for mobile applications developer. While delivering customers’ unlimited expectations, developers are barely aware of efficient use of energy from the application itself. Thus developers need a set of valid energy consumption indicators in assisting them to develop energy saving applications. In this paper, we present a few software product metrics that can be used as an indicator to measure energy consumption of Android-based mobile applications in the early of design stage. In particular, Trepn Profiler (Power profiling tool for Qualcomm processor) has used to collect the data of mobile application power consumption, and then analyzed for the 23 software metrics in this preliminary study. The results show that McCabe cyclomatic complexity, number of parameters, nested block depth, number of methods, weighted methods per class, number of classes, total lines of code and method lines have direct relationship with power consumption of mobile application.

Keywords: battery endurance, software metrics, mobile application, power consumption

Procedia PDF Downloads 365
92 Human Computer Interaction Using Computer Vision and Speech Processing

Authors: Shreyansh Jain Jeetmal, Shobith P. Chadaga, Shreyas H. Srinivas

Abstract:

Internet of Things (IoT) is seen as the next major step in the ongoing revolution in the Information Age. It is predicted that in the near future billions of embedded devices will be communicating with each other to perform a plethora of tasks with or without human intervention. One of the major ongoing hotbed of research activity in IoT is Human Computer Interaction (HCI). HCI is used to facilitate communication between an intelligent system and a user. An intelligent system typically comprises of a system consisting of various sensors, actuators and embedded controllers which communicate with each other to monitor data collected from the environment. Communication by the user to the system is typically done using voice. One of the major ongoing applications of HCI is in home automation as a personal assistant. The prime objective of our project is to implement a use case of HCI for home automation. Our system is designed to detect and recognize the users and personalize the appliances in the house according to their individual preferences. Our HCI system is also capable of speaking with the user when certain commands are spoken such as searching on the web for information and controlling appliances. Our system can also monitor the environment in the house such as air quality and gas leakages for added safety.

Keywords: human computer interaction, internet of things, computer vision, sensor networks, speech to text, text to speech, android

Procedia PDF Downloads 327
91 ‘BEST BARK’ Dog Care and Owner Consultation System

Authors: Shalitha Jayasekara, Saluk Bawantha, Dinithi Anupama, Isuru Gunarathne, Pradeepa Bandara, Hansi De Silva

Abstract:

Dogs have been known as "man's best friend" for generations, providing friendship and loyalty to their human counterparts. However, due to people's busy lives, they are unaware of the ailments that can affect their pets. However, in recent years, mobile technologies have had a significant impact on our lives, and with technological improvements, a rule-based expert system allows the end-user to enable new types of healthcare systems. The advent of Android OS-based smartphones with more user-friendly interfaces and lower pricing opens new possibilities for continuous monitoring of pets' health conditions, such as healthy dogs, dangerous ingestions, and swallowed objects. The proposed ‘Best Bark’ Dog care and owner consultation system is a mobile application for dog owners. Four main components for dog owners were implemented after a questionnaire was distributed to the target group of audience and the findings were evaluated. The proposed applications are widely used to provide health and clinical support to dog owners, including suggesting exercise and diet plans and answering queries about their dogs. Additionally, after the owner uploads a photo of the dog, the application provides immediate feedback and a description of the dog's skin disease.

Keywords: Convolution Neural Networks, Artificial Neural Networks, Knowledgebase, Sentimental Analysis.

Procedia PDF Downloads 126
90 Modeling Bessel Beams and Their Discrete Superpositions from the Generalized Lorenz-Mie Theory to Calculate Optical Forces over Spherical Dielectric Particles

Authors: Leonardo A. Ambrosio, Carlos. H. Silva Santos, Ivan E. L. Rodrigues, Ayumi K. de Campos, Leandro A. Machado

Abstract:

In this work, we propose an algorithm developed under Python language for the modeling of ordinary scalar Bessel beams and their discrete superpositions and subsequent calculation of optical forces exerted over dielectric spherical particles. The mathematical formalism, based on the generalized Lorenz-Mie theory, is implemented in Python for its large number of free mathematical (as SciPy and NumPy), data visualization (Matplotlib and PyJamas) and multiprocessing libraries. We also propose an approach, provided by a synchronized Software as Service (SaaS) in cloud computing, to develop a user interface embedded on a mobile application, thus providing users with the necessary means to easily introduce desired unknowns and parameters and see the graphical outcomes of the simulations right at their mobile devices. Initially proposed as a free Android-based application, such an App enables data post-processing in cloud-based architectures and visualization of results, figures and numerical tables.

Keywords: Bessel Beams and Frozen Waves, Generalized Lorenz-Mie Theory, Numerical Methods, optical forces

Procedia PDF Downloads 348
89 Dirty Martini vs Martini: The Contrasting Duality Between Big Bang and BTS Public Image and Their Latest MVs Analysis

Authors: Patricia Portugal Marques de Carvalho Lourenco

Abstract:

Big Bang is like a dirty martini embroiled in a stew of personal individual scandals that have rocked the group’s image and perception, from G-Dragon’s and T.O.P. marijuana episodes in 2011 and 2016, respectively, to Daesung’s building illicit entertainment activities in 2018to the Burning Sun shebang that led to the Titanic sink of Big Bang’s youngest member Seungri in 2019 and the positive sentiment migration to the antithetical side. BTS, on the other hand, are like a martini, clear, clean, attracting as many crowds to their performances and online content as the Pope attracts believers to Sunday Mass in the Vatican, as exemplified by their latest MVs. Big Bang’s 2022 Still Life achieved 16.4 million views on Youtube in 24hours, whilst BTS Permission to Dance achieved 68.5 million in the same period of time. The difference is significant when added Big Bang’s and BTS overall award wins, a total of 117 in contrast to 460. Both groups are uniquely talented and exceptional performers that have been contributing greatly to the dissemination of Korean Pop Music on a global scale in their own inimitable ways. Both are exceptional in their own right and while the artists cannot, ought not, should not be compared for the grave injustice made in comparing one individual planet with one solar system, a contrast is merited and hence done. The reality, nonetheless, is about disengagement from a group that lives life humanly, learning and evolving with each challenge and mistake without a clean, perfect tag attached to it, demonstrating not only an inability to disassociate the person from the artist and the music but also an inability to understand the difference between a private and public life.

Keywords: K-Pop, big bang, BTS, music, public image, entertainment, korean entertainment

Procedia PDF Downloads 67
88 An Empirical Evaluation of Performance of Machine Learning Techniques on Imbalanced Software Quality Data

Authors: Ruchika Malhotra, Megha Khanna

Abstract:

The development of change prediction models can help the software practitioners in planning testing and inspection resources at early phases of software development. However, a major challenge faced during the training process of any classification model is the imbalanced nature of the software quality data. A data with very few minority outcome categories leads to inefficient learning process and a classification model developed from the imbalanced data generally does not predict these minority categories correctly. Thus, for a given dataset, a minority of classes may be change prone whereas a majority of classes may be non-change prone. This study explores various alternatives for adeptly handling the imbalanced software quality data using different sampling methods and effective MetaCost learners. The study also analyzes and justifies the use of different performance metrics while dealing with the imbalanced data. In order to empirically validate different alternatives, the study uses change data from three application packages of open-source Android data set and evaluates the performance of six different machine learning techniques. The results of the study indicate extensive improvement in the performance of the classification models when using resampling method and robust performance measures.

Keywords: change proneness, empirical validation, imbalanced learning, machine learning techniques, object-oriented metrics

Procedia PDF Downloads 389
87 A Cross-Sectional Study on Smartphone Addiction, Sleep Hygiene, and Perceived Stress

Authors: Kriti Singh, Saurabh Tripathi, Pankaj Chaudhary, Abid Ali Ansari, Seema Nigam

Abstract:

Introduction: The introduction of android and iOS has changed our lives dramatically over the past few years. The new generation is more dependent on their mobile phones for carrying out their daily pursuits. Smartphones have revolutionized our lives. The cutdown in rates of mobile network services has been affecting us drastically. A new type of dependence is seen among the people for Smartphones. A cross-sectional study was conducted to determine the state of addiction among the group of medical students, along with its association with sleep hygiene and anxiety. Material and Method: Study included 50 individuals in the age group of 18-35 years. Smartphone Addiction Scale Short Version, Sleep Hygiene Index, and Perceived Stress Scales were used conducting the study. Results: Mean age of 22 years (12%). The majority of subjects were 20-year olds (15 out of 50), the majority were males with few females. Mean Smartphone addiction score 39 (very severe), Mean Sleep Hygiene Index score 26.76 (moderate maladaptive hygiene and Mean Perceived Stress score of 19.92 (moderate stress). Conclusion: In majority students were found to have a very severe Smartphone Addiction with moderate sleep hygiene and a moderate level of perceived stress. The Smartphone was being used was for surfing social media applications.

Keywords: addiction perceived stress, sleep hygiene index, smartphone

Procedia PDF Downloads 104
86 Analysis of Network Connectivity for Ship-To-Ship Maritime Communication Using IEEE 802.11 on Maritime Environment of Tanjung Perak, Indonesia

Authors: Ahmad Fauzi Makarim, Okkie Puspitorini, Hani'ah Mahmudah, Nur Adi Siswandari, Ari Wijayanti

Abstract:

As a maritime country, Indonesia needs a solution in maritime connectivity which can assist the maritime communication system which including communication from harbor to the ship or ship to ship. The needs of many application services for maritime communication, whether for safety reasons until voyage service to help the process of voyage activity needs connection with a high bandwith. To support the government efforts in handling that kind of problem, a research is conducted in maritime communication issue by applying the new developed technology in Indonesia, namely IEEE 802.11. In this research, 3 outdoor WiFi devices are used in which have a frequency of 5.8 GHz. Maritime of Tanjung Perak harbor in Surabaya until Karang Jamuang Island are used as the location of the research with defining permission of ship node spreading by Navigation District Class 1. That maritime area formed by state 1 and state 2 areas which are the narrow area with average wave height of 0.7 meter based on the data from BMKG S urabaya. After that, wave height used as one of the parameters which are used in analyzing characteristic of signal propagation at sea surface, so it can be determined on the coverage area of transmitter system. In this research has been used three samples of outdoor wifi, there is the coverage of device A can be determined about 2256 meter, device B 4000 meter, and device C 1174 meter. Then to analyze of network connectivity for the ship to ship is used AODV routing algorithm system based on the value of the power transmit was smallest of all nodes within the transmitter coverage.

Keywords: maritime of Indonesia, maritime communications, outdoor wifi, coverage, AODV

Procedia PDF Downloads 318
85 Player Experience: A Research on Cross-Platform Supported Games

Authors: Salih Akkemik

Abstract:

User Experience has a characterized perspective based on two fundamentals: the usage process and the product. Digital games can be considered as a special interactive system. This system has a very specific purpose and this is to make the player feel good while playing. At this point, Player Experience (PX) and User Experience (UX) are similar. UX focuses on the user feels good, PX focuses on the player feels good. The most important difference between the two is the action taken. These are actions of using and playing. In this study, the player experience will be examined primarily. PX may differ on different platforms. Nowadays, companies are releasing the successful and high-income games that they have developed with cross-platform support. Cross-platform is the most common expression that an application can run on different operating systems, in other words, be developed to support different operating systems. In terms of digital games, cross-platform support means that a game can be played on a computer, console or mobile device environment, more specifically, the game developed is designed and programmed to be played in the same way on at least two different platforms, such as Windows, MacOS, Linux, iOS, Android, Orbis OS or Xbox OS. Different platforms also accommodate different player groups, profiles and preferences. This study aims to examine these different player profiles in terms of player experience and to determine the effects of cross-platform support on player experience.

Keywords: cross-platform, digital games, player experience, user experience

Procedia PDF Downloads 180
84 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries

Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan

Abstract:

In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.

Keywords: checklist, Google spreadsheet, APP, self-inspection

Procedia PDF Downloads 88
83 Using IoT on Single Input Multiple Outputs (SIMO) DC–DC Converter to Control Smart-home

Authors: Auwal Mustapha Imam

Abstract:

The aim of the energy management system is to monitor and control utilization, access, optimize and manage energy availability. This can be realized through real-time analyses and energy sources and loads data control in a predictive way. Smart-home monitoring and control provide convenience and cost savings by controlling appliances, lights, thermostats and other loads. There may be different categories of loads in the various homes, and the homeowner may wish to control access to solar-generated energy to protect the storage from draining completely. Controlling the power system operation by managing the converter output power and controlling how it feeds the appliances will satisfy the residential load demand. The Internet of Things (IoT) provides an attractive technological platform to connect the two and make home automation and domestic energy utilization easier and more attractive. This paper presents the use of IoT-based control topology to monitor and control power distribution and consumption by DC loads connected to single-input multiple outputs (SIMO) DC-DC converter, thereby reducing leakages, enhancing performance and reducing human efforts. A SIMO converter was first developed and integrated with the IoT/Raspberry Pi control topology, which enables the user to monitor and control power scheduling and load forecasting via an Android app.

Keywords: flyback, converter, DC-DC, photovoltaic, SIMO

Procedia PDF Downloads 4
82 True Single SKU Script: Applying the Automated Test to Set Software Properties in a Global Software Development Environment

Authors: Antonio Brigido, Maria Meireles, Francisco Barros, Gaspar Mota, Fernanda Terra, Lidia Melo, Marcelo Reis, Camilo Souza

Abstract:

As the globalization of the software process advances, companies are increasingly committed to improving software development technologies across multiple locations. On the other hand, working with teams distributed in different locations also raises new challenges. In this sense, automated processes can help to improve the quality of process execution. Therefore, this work presents the development of a tool called TSS Script that automates the sample preparation process for carrier requirements validation tests. The objective of the work is to obtain significant gains in execution time and reducing errors in scenario preparation. To estimate the gains over time, the executions performed in an automated and manual way were timed. In addition, a questionnaire-based survey was developed to discover new requirements and improvements to include in this automated support. The results show an average gain of 46.67% of the total hours worked, referring to sample preparation. The use of the tool avoids human errors, and for this reason, it adds greater quality and speed to the process. Another relevant factor is the fact that the tester can perform other activities in parallel with sample preparation.

Keywords: Android, GSD, automated testing tool, mobile products

Procedia PDF Downloads 265
81 Modeling and Simulation of Honeycomb Steel Sandwich Panels under Blast Loading

Authors: Sayed M. Soleimani, Nader H. Ghareeb, Nourhan H. Shaker, Muhammad B. Siddiqui

Abstract:

Honeycomb sandwich panels have been widely used as protective structural elements against blast loading. The main advantages of these panels include their light weight due to the presence of voids, as well as their energy absorption capability. Terrorist activities have imposed new challenges to structural engineers to design protective measures for vital structures. Since blast loading is not usually considered in the load combinations during the design process of a structure, researchers around the world have been motivated to study the behavior of potential elements capable of resisting sudden loads imposed by the detonation of explosive materials. One of the best candidates for this objective is the honeycomb sandwich panel. Studying the effects of explosive materials on the panels requires costly and time-consuming experiments. Moreover, these type of experiments need permission from defense organizations which can become a hurdle. As a result, modeling and simulation using an appropriate tool can be considered as a good alternative. In this research work, the finite element package ABAQUS® is used to study the behavior of hexagonal and squared honeycomb steel sandwich panels under the explosive effects of different amounts of trinitrotoluene (TNT). The results of finite element modeling of a specific honeycomb configuration are initially validated by comparing them with the experimental results from literature. Afterwards, several configurations including different geometrical properties of the honeycomb wall are investigated and the results are compared with the original model. Finally, the effectiveness of the core shape and wall thickness are discussed, and conclusions are made.

Keywords: Abaqus, blast loading, finite element modeling, steel honeycomb sandwich panel

Procedia PDF Downloads 318
80 Effect of On-Road Vehicular Traffic on Noise Pollution in Bhubaneswar City, Eastern India

Authors: Dudam Bharath Kumar, Harsh Kumar, Naveed Ahmed

Abstract:

Vehicular traffic on the road-side plays a significant role in affecting the noise pollution in most of the cities over the world. To assess the correlation of the road-traffic on noise pollution in the city environment, continuous measurements were carried out in an entire daytime starting from 8:00 AM IST to 6:00 PM IST at a single point for each 5 minutes (8:00-8:05, 9:00-9:05, 10:00-10:05 AM, ...) near the KIIT University campus road. Noise levels were observed using a mobile operated app of android cell phone and a handheld noise meter. Calibration analysis shows high correlation about 0.89 for the study location for the day time period. Results show diurnal variability of atmospheric noise pollution levels go hand-in and with the vehicular number which pass through a point of observation. The range of noise pollution levels in the daytime period is observed as 55 to 75 dB(A). As a day starts, sudden upsurge of noise levels is observed from 65 to 71 dB(A) in the early morning, 64 dB(A) in late morning, regains the same quantity 68-71 dB(A) in the afternoon, and rises 70 dB(A) in the early evening. Vehicular number of the corresponding noise levels exhibits 115-120, 150-160, and 140-160, respectively. However, this preliminary study suggests the importance of vehicular traffic on noise pollution levels in the urban environment and further to study population exposed to noise levels. Innovative approaches help curb the noise pollution through modelling the traffic noise pollution spatially and temporally over the city environments.

Keywords: noise pollution, vehicular traffic, urban environment, noise meter

Procedia PDF Downloads 259
79 A Study Problem and Needs Compare the Held of the Garment Industries in Nonthaburi and Bangkok Area

Authors: Thepnarintra Praphanphat

Abstract:

The purposes of this study were to investigate garment industry’s condition, problems, and need for assistance. The population of the study was 504 managers or managing directors of garment establishments finished apparel industrial manager and permission of the Department of Industrial Works 28, Ministry of Industry until January 1, 2012. In determining the sample size with the opening of the Taro Yamane finished at 95% confidence level is ± 5% deviation was 224 managers. Questionnaires were used to collect the data. Percentage, frequency, arithmetic mean, standard deviation, t-test, ANOVA, and LSD were used to analyze the data. It was found that most establishments were of a large size, operated in a form of limited company for more than 15 years most of which produced garments for working women. All investment was made by Thai people. The products were made to order and distributed domestically and internationally. The total sale of the year 2010, 2011, and 2012 was almost the same. With respect to the problems of operating the business, the study indicated, as a whole, by- aspects, and by-items, that they were at a high level. The comparison of the level of problems of operating garment business as classified by general condition showed that problems occurring in business of different sizes were, as a whole, not different. In taking aspects into consideration, it was found that the level of problem in relation to production was different; medium establishments had more problems in production than those of small and large sizes. According to the by-items analysis, five problems were found different; namely, problems concerning employees, machine maintenance, number of designers, and price competition. Such problems in the medium establishments were at a higher level than those in the small and large establishments. Regarding business age, the examination yielded no differences as a whole, by-aspects, and by-items. The statistical significance level of this study was set at .05.

Keywords: garment industry, garment, fashion, competitive enhancement project

Procedia PDF Downloads 164
78 Women in Higher Education in Nigeria: A Panacea for Developmental Growth

Authors: Lucy Adesomon Okukpon, Margaret Omolara Akerele

Abstract:

Higher Education in Nigeria is sought after by women, they believe that the economic power and growth lies in the attainment and pursuit of higher Education. No nation in the world can boast of developmental growth when the women are not fully empowered educationally. The attainment of higher education spurs women to contribute meaningfully towards the growth and development of the Nigerian workforce. Recent innovations and trends reveal that over fifty per cent of Nigerian women have attained higher education within and outside the country. Women in Nigeria have expressed their growing concern of what becomes of the remaining 50 per cent who are unable to attain basic education. This concern has brought about the issue of funding which is a practical challenge towards the attainment of education for these vulnerable women. Another challenging factor is that most women often seek the permission of their husbands, brothers, fathers and uncles to enable them attain educational pursuit, especially when the institution is miles away from their place of abode. The solution to this problems from research findings reveal that the umbrella body which co-ordinates education for women in Nigeria (The National Council of Women Societies, NCWS) have taken it upon itself to provide educational learning centres in all the states of the Federation including Abuja the Nations capital city. This is to stem the ugly trend and enable women gain access to educational facilities provided for their growth and development. This positive stride has brought succour to women who hitherto have no hope of attaining any form of education. Moreover, awareness creation concerning higher education is translated into different Nigerian languages so that the women at the grassroots can benefit immensely and contribute towards the growth and development of the Nation. Their educational progress attest to the fact that Nigerian Women are happy for the educational opportunities provided and have vowed to attain greater heights particularly where higher education is concerned.

Keywords: developmental growth, educational attainment, higher education, women in higher education, Nigeria

Procedia PDF Downloads 471
77 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 114
76 Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment

Authors: Xiaoqing Wang, Jianjian Zong, Li Li, Yanxing Zheng, Jinrong Tong, Mao Zhan

Abstract:

With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment.

Keywords: data sharing, cross-domain, data exchange, publish-subscribe

Procedia PDF Downloads 95
75 Application of Learning Media Based Augmented Reality on Molecular Geometry Concept

Authors: F. S. Irwansyah, I. Farida, Y. Maulana

Abstract:

Studying chemistry requires the ability to understand three levels of understanding in the form of macroscopic, submicroscopic and symbolic, but the lack of emphasis on the submicroscopic level leads to the understanding of chemical concepts becoming incomplete, due to the limitations of the tools capable of providing visualization of submicroscopic concepts. The purpose of this study describes the stages of making augmented reality learning media on the concept of molecular geometry and analyze the feasibility test result of augmented reality learning media on the concept of molecular geometry. This research uses Research and Development (R & D) method which produces a product of AR learning media on molecular geometry concept and test the effectiveness of the product. Research stages include concept analysis and learning indicators, design development, validation, feasibility, and limited testing. The stages of validation and limited trial are aimed to get feedback in the form of assessment, suggestion and improvement on learning aspect, material substance aspect, visual communication aspect and software engineering aspects and media feasibility in terms of media creation purpose to be used in learning. The results of the overall feasibility test obtained r-calculation 0,7-0,9 with the interpretation of high feasibility value, whereas the result of limited trial got the percentage of eligibility with the average value equal to 70,83-92,5%. This percentage indicates that AR's learning media product on the concept of molecular geometry, deserves to be used as a learning resource.

Keywords: android, augmented reality, chemical learning, geometry

Procedia PDF Downloads 176
74 Electronic Transparency in Georgia as a Basis for Development of Electronic Governance

Authors: Lasha Mskhaladze, Guram Burchuladze, Khvicha Datunashvili

Abstract:

Technological changes have an impact not only on economic but also on social elements of society which in turn has created new challenges for states’ political systems and their regimes. As a result of unprecedented growth of information technologies and communications digital democracy and electronic governance have emerged. Nowadays effective state functioning cannot be imagined without electronic governance. In Georgia, special attention is paid to the development of such new systems and establishment of electronic governance. Therefore, in parallel to intensive development of information technologies an important priority for public sector in Georgia is the development of electronic governance. In spite of the fact that today Georgia with its economic indicators satisfies the standards of western informational society, and major part of its gross domestic product comes from the service sector (59.6%), it still remains a backward country on the world map in terms of information technologies and electronic governance. E-transparency in Georgia should be based on such parameters as government accountability when the government provides citizens information about their activities; e-participation which involves government’s consideration of external expert assessments; cooperation between officials and citizens in order to solve national problems. In order to improve electronic systems the government should actively do the following: Fully develop electronic programs concerning HR and exchange of data between public organizations; develop all possible electronic services; improve existing electronic programs; make electronic services available on different mobile platforms (iPhone, Android, etc.).

Keywords: electronic transparency, electronic services, information technology, information society, electronic systems

Procedia PDF Downloads 243
73 Social Norms around Adolescent Girls’ Marriage Practices in Ethiopia: A Qualitative Exploration

Authors: Dagmawit Tewahido

Abstract:

Purpose: This qualitative study was conducted to explore social norms around adolescent girls’ marriage practices in West Hararghe, Ethiopia, where early marriage is prohibited by law. Methods: Twenty Focus Group Discussions were conducted with Married and Unmarried adolescent girls, adolescent boys and parents of girls using locally developed vignettes. A total of 32 in-depth interviews were conducted with married and unmarried adolescent girls, husbands of adolescent girls and mothers-in-law. Key informant interviews were conducted with 36 district officials. Data analysis was assisted by Open Code computer software. The Social Norms Analysis Plot (SNAP) framework developed by CARE guided the development and analysis of vignettes. A thematic data analysis approach was utilized to summarize the data. Results: Early marriage is seen as a positive phenomenon in our study context, and girls who are not married by the perceived ideal age of 15 are socially sanctioned. They are particularly influenced by their peers to marry. Marrying early is considered a chance given by God and a symbol of good luck. The two common types of marriage are decided: 1) by adolescent girl and boy themselves without seeking parental permission (’Jalaa-deemaa’- meaning ‘to go along’), and 2) by just informing girl’s parents (‘Cabsaa’- meaning ‘to break the culture’). Relatives and marriage brokers also arrange early marriages. Girls usually accept the first marriage proposal regardless of their age. Parents generally tend not to oppose marriage arrangements chosen by their daughters. Conclusions: In the study context social norms encourage early marriage despite the existence of a law prohibiting marriage before the age of eighteen years. Early marriage commonly happens through consensual arrangements between adolescent girls and boys. Interventions to reduce early marriage need to consider the influence of Reference Groups on the decision makers for marriages, especially girls’ own peers.

Keywords: adolescent girls, social norms, early marriage, Ethiopia

Procedia PDF Downloads 108
72 Transferring Data from Glucometer to Mobile Device via Bluetooth with Arduino Technology

Authors: Tolga Hayit, Ucman Ergun, Ugur Fidan

Abstract:

Being healthy is undoubtedly an indispensable necessity for human life. With technological improvements, in the literature, various health monitoring and imaging systems have been developed to satisfy your health needs. In this context, the work of monitoring and recording the data of individual health monitoring data via wireless technology is also being part of these studies. Nowadays, mobile devices which are located in almost every house and which become indispensable of our life and have wireless technology infrastructure have an important place of making follow-up health everywhere and every time because these devices were using in the health monitoring systems. In this study, Arduino an open-source microcontroller card was used in which a sample sugar measuring device was connected in series. In this way, the glucose data (glucose ratio, time) obtained with the glucometer is transferred to the mobile device based on the Android operating system with the Bluetooth technology channel. A mobile application was developed using the Apache Cordova framework for listing data, presenting graphically and reading data over Arduino. Apache Cordova, HTML, Javascript and CSS are used in coding section. The data received from the glucometer is stored in the local database of the mobile device. It is intended that people can transfer their measurements to their mobile device by using wireless technology and access the graphical representations of their data. In this context, the aim of the study is to be able to perform health monitoring by using different wireless technologies in mobile devices that can respond to different wireless technologies at present. Thus, that will contribute the other works done in this area.

Keywords: Arduino, Bluetooth, glucose measurement, mobile health monitoring

Procedia PDF Downloads 287
71 Social Media as a Tool for Medication Adherence and Personal Health Management

Authors: Huang Wei-Chi, Li Wei, Yu Tien-Chieh

Abstract:

Medication adherence is crucial for treatment success. Adherence problem is common in patients with polypharmacy, especially in the geriatric population who are vulnerable to multiple chronic conditions but averagely less knowledgeable about diseases and medications. In order to help patients take medications appropriately and enhance the understanding of diseases or medications, a Line official account named e-Pharmacist was designed. The line is a popular freeware app with the highest penetration rate (95.7%) in Taiwan. The interface of e-Pharmacist is user-friendly for easy-to-read and convenient operating. Differ from other medication adherence apps, users just added e-Pharmacist as a LINE friend without installing any more apps and the drug lists were automatically downloaded from the personal electronic medical records with security permission. Over and above medication reminder, several additional capabilities were set up and engaged in the platform of e-Pharmacist including prescription refill reservation, laboratory examination consultation, medical appointment registration, and “Daily Health Log” where patients can record and track data of blood pressure/blood sugar and daily meals for self-health management as well as can share the important information to clinical professionals when seeking medical help. Additionally, a Line chatbot was utilized to provide tailored medicine information for the individual user. From July 2020 to March 2022, around 3000 patients added e-pharmacist as Line friends. Every day more than 1500 patients receive messages from e-pharmacist to notify them to take medicine. Thanks to the e-pharmacist alert system and Chatbot, the low-compliance patients (defined by Program on Adherence to Medication, PAM) significantly dropped from 36% to 6%, whereas the high-compliance patients dramatically increased from 13% to 77%. The user satisfaction is 98%. In brief, an e-pharmacist is not only a medication reminder but also a tailored personal assistant with value-added service for health management.

Keywords: e-pharmacist, self-health management, medication reminder, value-added service

Procedia PDF Downloads 120
70 Regulating Transnational Corporations and Protecting Human Rights: Analyzing the Efficiency of International Legal Framework

Authors: Stellina Jolly

Abstract:

July 18th to August 19th 2013 has gone down in the history of India for undertaking the country’s first environment referendum. The Supreme Court had ruled that the Vedanta Group's bauxite mining project in the Niyamgiri Hills of Orissa will have to get clearance from the gram sabha, which will consider the cultural and religious rights of the tribals and forest dwellers living in Rayagada and Kalahandi districts. In the Niyamgiri hills, people of small tribal hamlets were asked to voice their opinion on bauxite mining in their habitat. The ministry has reiterated its stand that mining cannot be allowed on the Niyamgiri hills because it will affect the rights of the Dongria Kondhs. The tribal person who occupies the Niyamgiri Hills in Eastern India accomplished their first success in 2010 in their struggle to protect and preserve their existence, culture and land against Vedanta a London-based mining giant. In August, 2010 Government of India revoked permission for Vedanta Resources to mine bauxite from hills in Orissa State where the Dongria Kondh live as forest dwellers. This came after various protests and reports including amnesty report wherein it highlighted that an alumina refinery in eastern India operated by a subsidiary of mining company. Vedanta was accused of causing air and water pollution that threatens the health of local people and their access to water. The abuse of human rights by corporate is not a new issue it has occurred in Africa, Asia and other parts of the world. Paper focuses on the instances and extent of human right especially in terms of environment violations by corporations. Further Paper details on corporations and sustainable development. Paper finally comes up with certain recommendation including call for a declaration by United Nations on Corporate environment Human Rights Liability.

Keywords: environment, corporate, human rights, sustainable development

Procedia PDF Downloads 446
69 Jurisdictional Issues between Competition Law and Data Protection Law in Protection of Privacy of Online Consumers

Authors: Pankhudi Khandelwal

Abstract:

The revenue models of digital giants such as Facebook and Google, use targeted advertising for revenues. Such a model requires huge amounts of consumer data. While the data protection law deals with the protection of personal data, however, this data is acquired by the companies on the basis of consent, performance of a contract, or legitimate interests. This paper analyses the role that competition law can play in evading these loopholes for the protection of data and privacy of online consumers. Digital markets have certain distinctive features such as network effects and feedback loop, which gives incumbents of these markets a first-mover advantage. This creates a situation where the winner takes it all, thus creating entry barriers and concentration in the market. It has been also seen that this dominant position is then used by the undertakings for leveraging in other markets. This can be harmful to the consumers in form of less privacy, less choice, and stifling innovation, as seen in the cases of Facebook Cambridge Analytica, Google Shopping, and Google Android. Therefore, the article aims to provide a legal framework wherein the data protection law and competition law can come together to provide a balance in regulating digital markets. The issue has become more relevant in light of the Facebook decision by German competition authority, where it was held that Facebook had abused its dominant position by not complying with data protection rules, which constituted an exploitative practice. The paper looks into the jurisdictional boundaries that the data protection and competition authorities can work from and suggests ex ante regulation through data protection law and ex post regulation through competition law. It further suggests a change in the consumer welfare standard where harm to privacy should be considered as an indicator of low quality.

Keywords: data protection, dominance, ex ante regulation, ex post regulation

Procedia PDF Downloads 130
68 Optimal MRO Process Scheduling with Rotable Inventory to Minimize Total Earliness

Authors: Murat Erkoc, Kadir Ertogral

Abstract:

Maintenance, repair and overhauling (MRO) of high cost equipment used in many industries such as transportation, military and construction are typically subject to regulations set by local governments or international agencies. Aircrafts are prime examples for this kind of equipment. Such equipment must be overhauled at certain intervals for continuing permission of use. As such, the overhaul must be completed by strict deadlines, which often times cannot be exceeded. Due to the fact that the overhaul is typically a long process, MRO companies carry so called rotable inventory for exchange of expensive modules in the overhaul process of the equipment so that the equipment continue its services with minimal interruption. The extracted module is overhauled and returned back to the inventory for future exchange, hence the name rotable inventory. However, since the rotable inventory and overhaul capacity are limited, it may be necessary to carry out some of the exchanges earlier than their deadlines in order to produce a feasible overhaul schedule. An early exchange results with a decrease in the equipment’s cycle time in between overhauls and as such, is not desired by the equipment operators. This study introduces an integer programming model for the optimal overhaul and exchange scheduling. We assume that there is certain number of rotables at hand at the beginning of the planning horizon for a single type module and there are multiple demands with known deadlines for the exchange of the modules. We consider an MRO system with identical parallel processing lines. The model minimizes total earliness by generating optimal overhaul start times for rotables on parallel processing lines and exchange timetables for orders. We develop a fast exact solution algorithm for the model. The algorithm employs full-delay scheduling approach with backward allocation and can easily be used for overhaul scheduling problems in various MRO settings with modular rotable items. The proposed procedure is demonstrated by a case study from the aerospace industry.

Keywords: rotable inventory, full-delay scheduling, maintenance, overhaul, total earliness

Procedia PDF Downloads 512
67 Descriptive Analysis of Alcohol Abuse and Sexual Behaviour of Adolescent Males in Eastern Cape

Authors: Jabulani Gilford Kheswa, Sinovuyo Takatshana

Abstract:

Literature documented that the combination of permissive attitudes, sexual experimentation and lack of accurate information from parents to educate male adolescents, poses a threat to the sexual health of adolescent males and exposes them to risky sexual behaviours. Grounded in problem behaviour theory as a theoretical framework for this study in understanding health-related behaviours of adolescent males, the weaker one’s perceived self-efficacy, the more social and affective factors increase the likelihood of risky sexual behaviour, such as alcohol abuse and intimate partner violence. The purpose of this study was to determine the correlation between alcohol use and sexual behaviour among 176 purposively selected Xhosa- speaking adolescent males, from one school in the Nkonkobe Municipality, Eastern Cape Province, South Africa. These learners were in grade ten, eleven and twelve with an age range from a low of 14 to a high of 25 years. The mean age was 18.06 years while the standard deviation was .144. To be ethically bound, the researchers sought permission from the school principal to distribute self-administered questionnaires and assured the participants of confidentiality and anonymity. A survey was conducted by means of self-administered questionnaires. A cross-sectional study was carried out within the quantitative paradigm using the SPSS version 18 and the Chronbach’s alpha of 0.79 were found for alcohol and sexual behaviour of adolescent males. Findings showed that 59.6% (N=105) of the learners indicated that their caregivers talk about safe sex practice as compared to only 40.4% (N=71) who indicated that their caregivers do not talk to them about safe sex practice. A statistically significant association between alcohol and negotiation of safe sex at p-value of 0.05 (chi-square of 34.529, degree of freedom of 16) was reported. In conclusion, as young people in South Africa become sexually active at an early age, schools should initiate psycho-educational programmes to equip adolescents against risk- behaviours (such as HIV/AIDS, substance abuse, crime).

Keywords: adolescent males, alcohol, parents, sex

Procedia PDF Downloads 226