Search results for: behavioural user profiling
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2673

Search results for: behavioural user profiling

2583 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 368
2582 Proposal of a Damage Inspection Tool After Earthquakes: Case of Algerian Buildings

Authors: Akkouche Karim, Nekmouche Aghiles, Bouzid Leyla

Abstract:

This study focuses on the development of a multifunctional Expert System (ES) called post-seismic damage inspection tool (PSDIT), a powerful tool which allows the evaluation, the processing and the archiving of the collected data stock after earthquakes. PSDIT can be operated by two user types; an ordinary user (engineer, expert or architect) for the damage visual inspection and an administrative user for updating the knowledge and / or for adding or removing the ordinary user. The knowledge acquisition is driven by a hierarchical knowledge model, the Information from investigation reports and those acquired through feedback from expert / engineer questionnaires are part.

Keywords: buildings, earthquake, seismic damage, damage assessment, expert system

Procedia PDF Downloads 45
2581 Portable Hands-Free Process Assistant for Gas Turbine Maintenance

Authors: Elisabeth Brandenburg, Robert Woll, Rainer Stark

Abstract:

This paper presents how smart glasses and voice commands can be used for improving the maintenance process of industrial gas turbines. It presents the process of inspecting a gas turbine’s combustion chamber and how it is currently performed using a set of paper-based documents. In order to improve this process, a portable hands-free process assistance system has been conceived. In the following, it will be presented how the approach of user-centered design and the method of paper prototyping have been successfully applied in order to design a user interface and a corresponding workflow model that describes the possible interaction patterns between the user and the interface. The presented evaluation of these results suggests that the assistance system could help the user by rendering multiple manual activities obsolete, thus allowing him to work hands-free and to save time for generating protocols.

Keywords: paper prototyping, smart glasses, turbine maintenance, user centered design

Procedia PDF Downloads 288
2580 HPTLC Metabolite Fingerprinting of Artocarpus champeden Stembark from Several Different Locations in Indonesia and Correlation with Antimalarial Activity

Authors: Imam Taufik, Hilkatul Ilmi, Puryani, Mochammad Yuwono, Aty Widyawaruyanti

Abstract:

Artocarpus champeden Spreng stembark (Moraceae) in Indonesia well known as ‘cempedak’ had been traditionally used for malarial remedies. The difference of growth locations could cause the difference of metabolite profiling. As a consequence, there were difference antimalarial activities in spite of the same plants. The aim of this research was to obtain the profile of metabolites that contained in A. champeden stembark from different locations in Indonesia for authentication and quality control purpose of this extract. The profiling had been performed by HPTLC-Densitometry technique and antimalarial activity had been also determined by HRP2-ELISA technique. The correlation between metabolite fingerprinting and antimalarial activity had been analyzed by Principle Component Analysis, Hierarchical Clustering Analysis and Partial Least Square. As a result, there is correlation between the difference metabolite fingerprinting and antimalarial activity from several different growth locations.

Keywords: antimalarial, artocarpus champeden spreng, metabolite fingerprinting, multivariate analysis

Procedia PDF Downloads 279
2579 Gut Metabolite Profiling of the Ethnic Groups from Assam, India

Authors: Madhusmita Dehingia, Supriyo Sen, Bhuwan Bhaskar, Tulsi Joishy, Mojibur R. Khan

Abstract:

Human gut microbes and their metabolites are important for maintaining homeostasis in the gut and are responsible for many metabolic and immune mediated diseases. In the present study, we determined the profiles of the gut metabolites of five different ethnic groups (Bodo, Tai-Phake, Karbi, Tea tribe and Tai-Aiton) of Assam. Fecal metabolite profiling of the 39 individuals belonging to the ethnic groups was carried out using Gas chromatography – Mass spectrometry (GC-MS), and comparison was performed among the tribes for common and unique metabolites produced within their gut. Partial Least Squares Discriminant Analysis (PLS-DA) of the metabolites suggested that the individuals grouped according to their ethnicity. Among the 66 abundant metabolites, 12 metabolites were found to be common among the five ethnic groups. Additionally, ethnicity wise some unique metabolites were also detected. For example, the tea tribe of Assam contained the tea components, Aniline and Benzoate more in their gut in comparison to others. Metabolites of microbial origin were also correlated with the already published metagenomic data of the same ethnic group and functional analysis were carried out based on human metabolome database.

Keywords: ethnicity, gut microbiota, GC-MS, metabolites

Procedia PDF Downloads 393
2578 Comparison of User Experience in VR When Hand Gestures Are Used vs. Using Controller

Authors: Sanu Muhammed C., Nihal Vadakkan, Sahil Athrij, Sasi Gopalan

Abstract:

Currently, the content entertainment industry is dominated by mobile devices. As the trends slowly shift towards AR/VR applications, the user experience on these devices should be considered, and we are trying to improve user experience in VR. This paper proposes a survey-based solution to improve user experience in VR. By creating a VR environment where users can move a ball from one position to another using a remote controller and another VR environment where users can move a ball from one place to another using hand gestures/ By allowing a set of audience to use these two environments, we can get their feedback. There are two steps in this comparison, 1) Using Hand Gestures To Move Ball In VR Environment: Here, we create a VR environment where two baskets are there, and one ball will be there in a basket. Here users can transfer the ball to another basket using hand gestures. They will be able to move the ball using hand gestures. 2) Using Remote Control To Move Ball In VR Environment: Here, we create a VR environment where two baskets are there, and one ball will be there in a basket. Here users can transfer the ball to another basket using a remote control. They will be able to move the ball using a remote controller. The above two environments are given to users to experience, and their responses will be recorded to compare the user experience in the above two environments.

Keywords: virtual reality, user experience, hand gestures, remote control

Procedia PDF Downloads 108
2577 Parental Negative Emotional States, Parenting Style and Child Emotional and Behavioural Problems: Australia-Indonesia Cross-Cultural Study

Authors: Yulina E. Riany, Divna Haslam, Matthew Sanders

Abstract:

This cross-cultural study aims to compare the level of parental depression and stress, parenting style use, and child emotional and behavioural problems between parents in Australia as an example of a Western country and parents in Indonesia as an example of Asian culture. A series of hierarchical regressions were undertaken to determine two models examining the factors that predict child problems residing in Australia (Model 1) and in Indonesia (Model 2). The online survey was completed by 179 parents in Australia and 448 parents in Indonesia. Results indicated that Australian parents reported higher levels of depression, authoritative parenting and higher levels of child misbehaviours compared to Indonesian parents. In comparison, Indonesian parents reported higher authoritarian parenting. Analyses performed to examine Model 1 and 2 revealed that parental negative emotional states and parenting style predicted child emotional and behavioural problems in both countries.

Keywords: cross-cutural study, parental stress, parenting, child misbehaviour

Procedia PDF Downloads 93
2576 Maternal Adverse Childhood Experiences and Preschool Children’s Behavioural Problems: Mediation via Adult Attachment and Moderation by Maternal Mental Health, Social Support, and Child Sex

Authors: Stefan Kurbatfinski, Aliyah Dosani, Andrew F. Hayes, Deborah Dewey, Nicole Letourneau

Abstract:

Background: Maternal adverse childhood experiences (ACEs) have been associated with internalizing and externalizing behavioral problems in preschool children. However, little is known about the influence of maternal adult attachment patterns on this association. Further, potential moderation by maternal mental health, maternal social support, or child sex is poorly understood. Therefore, this study examined associations between 1) maternal ACEs and preschool children’s behavioural problems, with mediation through maternal attachment patterns and moderation by maternal mental health, maternal social support, and child sex; and 2) maternal attachment patterns and children’s behavioural problems, with mediation through maternal mental health and social support and moderation by child sex. Methods: This secondary analysis used data (n=625) from a high socioeconomic, longitudinally prospective cohort (Alberta Pregnancy Outcomes and Nutrition). Child behaviour (BASC-2) and maternal adult attachment (ECR-Q) were measured at five years of child age, maternal ACEs (ACEs Questionnaire) at around 12 months, and maternal mental health (CESD and SCL-90-R) and social support (SSQ) across various prenatal and postnatal time points. All moderation and mediation analyses occurred through RStudio using PROCESS, interpreting significant interactions through Johnson-Neyman plots. Findings: Maternal ACEs interacted with maternal anxiety symptoms to predict both behavioural problems (pexternalizing=0.007; pinternalizing=0.0159). An indirect pathway via dismissive attachment was moderated by maternal social support ([0.0058, 0.0596]). Attachment patterns predicted all behavioural problems (p<0.05) and interacted with maternal anxiety symptoms to predict internalizing behaviours among male children ([0.0321, 0.1307]; [0.0321, 0.1291]). Interpretation: Maternal attachment patterns may predict children’s behavioural problems more than ACEs. Social support interventions may not always be beneficial for highly dismissively attached mothers. Implications for policy and child health include mandatory sex and gender education for teachers; assessing attachment patterns prior to recommending social support as an intervention; and anxiety-focused interventions for mothers in higher socioeconomic populations.

Keywords: maternal adverse childhood experiences, internalizing behaviours, externalizing behaviours, mediators and moderators, attachment patterns, child health

Procedia PDF Downloads 41
2575 Investment Decision among Public Sector Retirees: A Behavioural Finance View

Authors: Bisi S. Olawoyin

Abstract:

This study attempts an exploration into behavioural finance in which the traditional assumptions of expected utility maximization with rational investors in efficient markets are dropped. It reviews prior research and evidence about how psychological biases affect investors behaviour and stock selection. This study examined the relationship between demographic variables and financial behaviour biases among public sector retirees who invested in the Nigerian Stock Exchange prior to their retirement. By using questionnaire survey method, a total of 214 valid convenient samples were collected in order to determine how specific demographic and psychological trait affect stock selection between dividend paying and non-dividend paying stocks. Descriptive statistics and OLS were used to analyse the results. Findings showed that most of the retirees prefer dividend paying stocks in few years preceding their retirement but still hold on to their non-dividend paying stock on retirement. A significant difference also exists between senior and junior retirees in preference for non-dividend paying stocks. These findings are consistent with the clientele theories of dividend.

Keywords: behavioural finance, clientele theories, dividend paying stocks, stock selection

Procedia PDF Downloads 111
2574 Approach to Honey Volatiles' Profiling by Gas Chromatography and Mass Spectrometry

Authors: Igor Jerkovic

Abstract:

Biodiversity of flora provides many different nectar sources for the bees. Unifloral honeys possess distinctive flavours, mainly derived from their nectar sources (characteristic volatile organic components (VOCs)). Specific or nonspecific VOCs (chemical markers) could be used for unifloral honey characterisation as addition to the melissopalynologycal analysis. The main honey volatiles belong, in general, to three principal categories: terpenes, norisoprenoids, and benzene derivatives. Some of these substances have been described as characteristics of the floral source, and other compounds, like several alcohols, branched aldehydes, and furan derivatives, may be related to the microbial purity of honey processing and storage conditions. Selection of the extraction method for the honey volatiles profiling should consider that heating of the honey produce different artefacts and therefore conventional methods of VOCs isolation (such as hydrodistillation) cannot be applied for the honey. Two-way approach for the isolation of the honey VOCs was applied using headspace solid-phase microextraction (HS-SPME) and ultrasonic solvent extraction (USE). The extracts were analysed by gas chromatography and mass spectrometry (GC-MS). HS-SPME (with the fibers of different polarity such as polydimethylsiloxane/ divinylbenzene (PDMS/DVB) or divinylbenzene/carboxene/ polydimethylsiloxane (DVB/CAR/PDMS)) enabled isolation of high volatile headspace VOCs of the honey samples. Among them, some characteristic or specific compounds can be found such as 3,4-dihydro-3-oxoedulan (in Centaurea cyanus L. honey) or 1H-indole, methyl anthranilate, and cis-jasmone (in Citrus unshiu Marc. honey). USE with different solvents (mainly dichloromethane or the mixture pentane : diethyl ether 1 : 2 v/v) enabled isolation of less volatile and semi-volatile VOCs of the honey samples. Characteristic compounds from C. unshiu honey extracts were caffeine, 1H-indole, 1,3-dihydro-2H-indol-2-one, methyl anthranilate, and phenylacetonitrile. Sometimes, the selection of solvent sequence was useful for more complete profiling such as sequence I: pentane → diethyl ether or sequence II: pentane → pentane/diethyl ether (1:2, v/v) → dichloromethane). The extracts with diethyl ether contained hydroquinone and 4-hydroxybenzoic acid as the major compounds, while (E)-4-(r-1’,t-2’,c-4’-trihydroxy-2’,6’,6’-trimethylcyclo-hexyl)but-3-en-2-one predominated in dichloromethane extracts of Allium ursinum L. honey. With this two-way approach, it was possible to obtain a more detailed insight into the honey volatile and semi-volatile compounds and to minimize the risks of compound discrimination due to their partial extraction that is of significant importance for the complete honey profiling and identification of the chemical biomarkers that can complement the pollen analysis.

Keywords: honey chemical biomarkers, honey volatile compounds profiling, headspace solid-phase microextraction (HS-SPME), ultrasonic solvent extraction (USE)

Procedia PDF Downloads 169
2573 Semantic Platform for Adaptive and Collaborative e-Learning

Authors: Massra M. Sabeima, Myriam lamolle, Mohamedade Farouk Nanne

Abstract:

Adapting the learning resources of an e-learning system to the characteristics of the learners is an important aspect to consider when designing an adaptive e-learning system. However, this adaptation is not a simple process; it requires the extraction, analysis, and modeling of user information. This implies a good representation of the user's profile, which is the backbone of the adaptation process. Moreover, during the e-learning process, collaboration with similar users (same geographic province or knowledge context) is important. Productive collaboration motivates users to continue or not abandon the course and increases the assimilation of learning objects. The contribution of this work is the following: we propose an adaptive e-learning semantic platform to recommend learning resources to learners, using ontology to model the user profile and the course content, furthermore an implementation of a multi-agent system able to progressively generate the learning graph (taking into account the user's progress, and the changes that occur) for each user during the learning process, and to synchronize the users who collaborate on a learning object.

Keywords: adaptative learning, collaboration, multi-agent, ontology

Procedia PDF Downloads 145
2572 Promoting Patients' Adherence to Home-Based Rehabilitation: A Randomised Controlled Trial of a Theory-Driven Mobile Application

Authors: Derwin K. C. Chan, Alfred S. Y. Lee

Abstract:

The integrated model of self-determination theory and the theory of planned behaviour has been successfully applied to explain individuals’ adherence to health behaviours, including behavioural adherence toward rehabilitation. This study was a randomised controlled trial that examined the effectiveness of an mHealth intervention (i.e., mobile application) developed based on this integrated model in promoting treatment adherence of patients of anterior cruciate ligament rupture during their post-surgery home-based rehabilitation period. Subjects were 67 outpatients (aged between 18 and 60) who undertook anterior cruciate ligament (ACL) reconstruction surgery for less than 2 months for this study. Participants were randomly assigned either into the treatment group (who received the smartphone application; N = 32) and control group (who receive standard treatment only; N = 35), and completed psychological measures relating to the theories (e.g., motivations, social cognitive factors, and behavioural adherence) and clinical outcome measures (e.g., subjective knee function (IKDC), laxity (KT-1000), muscle strength (Biodex)) relating to ACL recovery at baseline, 2-month, and 4-month. Generalise estimating equation showed the interaction between group and time was significant on intention was only significant for intention (Wald x² = 5.23, p = .02), that of perceived behavioural control (Wald x² = 3.19, p = .07), behavioural adherence (Wald x² = 3.08, p = .08, and subjective knee evaluation (Wald x² = 2.97, p = .09) were marginally significant. Post-hoc between-subject analysis showed that control group had significant drop of perceived behavioural control (p < .01), subjective norm (p < .01) and intention (p < .01), behavioural adherence (p < .01) from baseline to 4-month, but such pattern was not observed in the treatment group. The treatment group had a significant decrease of behavioural adherence (p < .05) in the 2-month, but such a decrease was not observed in 4-month (p > .05). Although the subjective knee evaluation in both group significantly improved at 2-month and 4-month from the baseline (p < .05), and the improvements in the control group (mean improvement at 4-month = 40.18) were slightly stronger than the treatment group (mean improvement at 4-month = 34.52). In conclusion, the findings showed that the theory driven mobile application ameliorated the decline of treatment intention of home-based rehabilitation. Patients in the treatment group also reported better muscle strength than control group at 4-month follow-up. Overall, the mobile application has shown promises on tackling the problem of orthopaedics outpatients’ non-adherence to medical treatment.

Keywords: self-determination theory, theory of planned behaviour, mobile health, orthopaedic patients

Procedia PDF Downloads 173
2571 Metabolic and Phylogenetic Profiling of Rhizobium leguminosarum Strains Isolated from NZ Soils of Varying pH

Authors: Anish Shah, Steve A. Wakelin, Derrick Moot, Aurélie Laugraud, Hayley J. Ridgway

Abstract:

A mixed pasture system of ryegrass-clover is used in New Zealand, where clovers are generally inoculated with commercially available strains of rhizobia. The community of rhizobia living in the soil and the way in which they interact with the plant are affected by different biotic and abiotic factors. In general, bacterial richness and diversity in soil varies by soil pH. pH also affects cell physiology and acts as a master variable that controls the wider soil physiochemical conditions such as P availability, Al release and micronutrient availability. As such, pH can have both primary and secondary effects on soil biology and processes. The aim of this work was to investigate the effect of soil pH on the genetic diversity and metabolic profile of Rhizobium leguminosarum strains nodulating clover. Soils were collected from 12 farms across New Zealand which had a pH(water) range of between 4.9 and 7.5, with four acidic (pH 4.9 – 5.5), four ‘neutral’ (5.8 – 6.1) and four alkaline (6.5 – 7.5) soils. Bacteria were recovered from nodules of Trifolium repens (white clover) and T. subterraneum (subterranean clover) grown in the soils. The strains were cultured and screened against a range of pH-amended media to demonstrate whether they were adapted to pH levels similar to their native soils. The strains which showed high relative growth at a given pH (~20% of those isolated) were selected for metabolic and taxonomic profiling. The Omnilog (Biolog Inc., Hayward, CA) phenotype array was used to perform assays on carbon (C) utilisation for selected strains. DNA was extracted from the strains which had differing C utilisation profiles and PCR products for both forward and reverse primers were sequenced for the following genes: 16S rRNA, recA, nodC, nodD and nifH (symbiotic).

Keywords: bacterial diversity, clover, metabolic and taxonomic profiling, pH adaptation, rhizobia

Procedia PDF Downloads 224
2570 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 308
2569 Investigating Homicide Offender Typologies Based on Their Clinical Histories and Crime Scene Behaviour Patterns

Authors: Valeria Abreu Minero, Edward Barker, Hannah Dickson, Francois Husson, Sandra Flynn, Jennifer Shaw

Abstract:

Purpose – The purpose of this paper is to identify offender typologies based on aspects of the offenders’ psychopathology and their associations with crime scene behaviours using data derived from the National Confidential Enquiry into Suicide and Safety in Mental Health concerning homicides in England and Wales committed by offenders in contact with mental health services in the year preceding the offence (n=759). Design/methodology/approach – The authors used multiple correspondence analysis to investigate the interrelationships between the variables and hierarchical agglomerative clustering to identify offender typologies. Variables describing: the offender’s mental health history; the offenders’ mental state at the time of offence; characteristics useful for police investigations; and patterns of crime scene behaviours were included. Findings – Results showed differences in the offender’s histories in relation to their crime scene behaviours. Further, analyses revealed three homicide typologies: externalising, psychosis and depression. Analyses revealed three homicide typologies: externalising, psychotic and depressive. Practical implications – These typologies may assist the police during homicide investigations by: furthering their understanding of the crime or likely suspect; offering insights into crime patterns; provide advice as to what an offender’s offence behaviour might signify about his/her mental health background; findings suggest information concerning offender psychopathology may be useful for offender profiling purposes in cases of homicide offenders with schizophrenia, depression and comorbid diagnosis of personality disorder and alcohol/drug dependence. Originality/value – Empirical studies with an emphasis on offender profiling have almost exclusively focussed on the inference of offender demographic characteristics. This study provides a first step in the exploration of offender psychopathology and its integration to the multivariate analysis of offence information for the purposes of investigative profiling of homicide by identifying the dominant patterns of mental illness within homicidal behaviour.

Keywords: offender profiling, mental illness, psychopathology, multivariate analysis, homicide, crime scene analysis, crime scene behviours, investigative advice

Procedia PDF Downloads 95
2568 Software User Experience Enhancement through Collaborative Design

Authors: Shan Wang, Fahad Alhathal, Daniel Hobson

Abstract:

User-centered design skills play an important role in crafting a positive and intuitive user experience for software applications. Embracing a user-centric design approach involves understanding the needs, preferences, and behaviors of the end-users throughout the design process. This mindset not only enhances the usability of the software but also fosters a deeper connection between the digital product and its users. This paper encompasses a 6-month knowledge exchange collaboration project between an academic institution and an external industry in 2023, aims to improve the user experience of a digital platform utilized for a knowledge management tool, to understand users' preferences for features, identify sources of frustration, and pinpoint areas for enhancement. This research conducted one of the most effective methods to implement user-centered design through co-design workshops for testing user onboarding experiences that involve the active participation of users in the design process. More specifically, in January 2023, we organized eight workshops with a diverse group of 11 individuals. Throughout these sessions, we accumulated a total of 11 hours of qualitative data in both video and audio formats. Subsequently, we conducted an analysis of user journeys, identifying common issues and potential areas for improvement. This analysis was pivotal in guiding the knowledge management software in prioritizing feature enhancements and design improvements. Employing a user-centered design thinking process, we developed a series of graphic design solutions in collaboration with the software management tool company. These solutions were targeted at refining onboarding user experiences, workplace interfaces, and interactive design. Some of these design solutions were translated into tangible interfaces for the knowledge management tool. By actively involving users in the design process and valuing their input, developers can create products that are not only functional but also resonate with the end-users, ultimately leading to greater success in the competitive software landscape. In conclusion, this paper not only contributes insights into designing onboarding user experiences for software within a co-design approach but also presents key theories on leveraging the user-centered design process in software design to enhance overall user experiences.

Keywords: user experiences, co-design, design process, knowledge management tool, user-centered design

Procedia PDF Downloads 24
2567 Effect of Laser Input Energy on the Laser Joining of Polyethylene Terephthalate to Titanium

Authors: Y. J. Chen, T. M. Yue, Z. N. Guo

Abstract:

This paper reports the effects of laser energy on the characteristics of bubbles generated in the weld zone and the formation of new chemical bonds at the Polyethylene Terephthalate (PET)/Ti joint interface in laser joining of PET to Ti. The samples were produced by using different laser energies ranging from 1.5 J – 6 J in steps of 1.5 J, while all other joining parameters remained unchanged. The types of chemical bonding at the joint interface were analysed by the x-ray photoelectron spectroscopy (XPS) depth-profiling method. The results show that the characteristics of the bubbles and the thickness of the chemically bonded interface, which contains the laser generated bonds of Ti–C and Ti–O, increase markedly with increasing laser energy input. The tensile failure load of the joint depends on the combined effect of the amount and distribution of the bubbles formed and the chemical bonding intensity of the joint interface.

Keywords: laser direct joining, Ti/PET interface, laser energy, XPS depth profiling, chemical bond, tensile failure load

Procedia PDF Downloads 182
2566 Automated User Story Driven Approach for Web-Based Functional Testing

Authors: Mahawish Masud, Muhammad Iqbal, M. U. Khan, Farooque Azam

Abstract:

Manual writing of test cases from functional requirements is a time-consuming task. Such test cases are not only difficult to write but are also challenging to maintain. Test cases can be drawn from the functional requirements that are expressed in natural language. However, manual test case generation is inefficient and subject to errors.  In this paper, we have presented a systematic procedure that could automatically derive test cases from user stories. The user stories are specified in a restricted natural language using a well-defined template.  We have also presented a detailed methodology for writing our test ready user stories. Our tool “Test-o-Matic” automatically generates the test cases by processing the restricted user stories. The generated test cases are executed by using open source Selenium IDE.  We evaluate our approach on a case study, which is an open source web based application. Effectiveness of our approach is evaluated by seeding faults in the open source case study using known mutation operators.  Results show that the test case generation from restricted user stories is a viable approach for automated testing of web applications.

Keywords: automated testing, natural language, restricted user story modeling, software engineering, software testing, test case specification, transformation and automation, user story, web application testing

Procedia PDF Downloads 362
2565 Trend Detection Using Community Rank and Hawkes Process

Authors: Shashank Bhatnagar, W. Wilfred Godfrey

Abstract:

We develop in this paper, an approach to find the trendy topic, which not only considers the user-topic interaction but also considers the community, in which user belongs. This method modifies the previous approach of user-topic interaction to user-community-topic interaction with better speed-up in the range of [1.1-3]. We assume that trend detection in a social network is dependent on two things. The one is, broadcast of messages in social network governed by self-exciting point process, namely called Hawkes process and the second is, Community Rank. The influencer node links to others in the community and decides the community rank based on its PageRank and the number of users links to that community. The community rank decides the influence of one community over the other. Hence, the Hawkes process with the kernel of user-community-topic decides the trendy topic disseminated into the social network.

Keywords: community detection, community rank, Hawkes process, influencer node, pagerank, trend detection

Procedia PDF Downloads 351
2564 Prevalence of Suicidal Behavioral Experiences in the Tertiary Institution: Implication for Childhood Development

Authors: Moses Onyemaechi Ede, Chinedu Ifedi Okeke

Abstract:

This study examined the prevalence of suicidal behavioural experience in a tertiary institution and its implication for childhood development. In pursuance of the objectives, two specific purposes, two research questions, and two null hypotheses guided this study. This is a descriptive design that utilized university student populations (N= 36,000 students) in the University of Nigeria Nsukka. The sample of the study was made up of 100 students. An accidental sampling technique was used to arrive at the sample. A self-developed questionnaire titled Suicidal Behaviour Questionnaire (SBQ) was used for this study. The data collected was analyzed using mean and percentages. The result showed that university students do not experience suicidal behaviours. It also showed that suicidal experiences are not prevalent. There is no significant influence of gender on the responses of male and female tertiary institution students based on their suicidal behavioural experiences. There is no significant influence of gender on the mean responses of male and female tertiary institution students on the prevalence of suicidal experiences. Based on the findings, it is recommended that there should be the teaching of suicide education and prevention in schools as well as mounting of bulletins on suicidology by the Guidance Counsellors.

Keywords: suicide, behavioural experiences, tertiary institution, childhood development

Procedia PDF Downloads 99
2563 A Students' Ability Analysis Methods, Devices, Electronic Equipment and Storage Media Design

Authors: Dequn Teng, Tianshuo Yang, Mingrui Wang, Qiuyu Chen, Xiao Wang, Katie Atkinson

Abstract:

Currently, many students are kind of at a loss in the university due to the complex environment within the campus, where every information within the campus is isolated with fewer interactions with each other. However, if the on-campus resources are gathered and combined with the artificial intelligence modelling techniques, there will be a bridge for not only students in understanding themselves, and the teachers will understand students in providing a much efficient approach in education. The objective of this paper is to provide a competency level analysis method, apparatus, electronic equipment, and storage medium. It uses a user’s target competency level analysis model from a plurality of predefined candidate competency level analysis models by obtaining a user’s promotion target parameters, promotion target parameters including at least one of the following parameters: target profession, target industry, and the target company, according to the promotion target parameters. According to the parameters, the model analyzes the user’s ability level, determines the user’s ability level, realizes the quantitative and personalized analysis of the user’s ability level, and helps the user to objectively position his ability level.

Keywords: artificial intelligence, model, university, education, recommendation system, evaluation, job hunting

Procedia PDF Downloads 117
2562 Toward a Measure of Appropriateness of User Interfaces Adaptations Solutions

Authors: Abderrahim Siam, Ramdane Maamri, Zaidi Sahnoun

Abstract:

The development of adaptive user interfaces (UI) presents for a long time an important research area in which researcher attempt to call upon the full resources and skills of several disciplines. The adaptive UI community holds a thorough knowledge regarding the adaptation of UIs with users and with contexts of use. Several solutions, models, formalisms, techniques, and mechanisms were proposed to develop adaptive UI. In this paper, we propose an approach based on the fuzzy set theory for modeling the concept of the appropriateness of different solutions of UI adaptation with different situations for which interactive systems have to adapt their UIs.

Keywords: adaptive user interfaces, adaptation solution’s appropriateness, fuzzy sets

Procedia PDF Downloads 453
2561 Association of Vulnerability and Behavioural Outcomes of FSWs Linked with TI Prevention HIV Program: An Evidence from Cross-Sectional Behavioural Study in Thane District of Maharashtra

Authors: Jayanta Bora, Sukhvinder Kaur, Ashok Agarwal, Sangeeta Kaul

Abstract:

Background: It is important for targeted interventions to consider vulnerabilities of female sex workers (FSWs) such as poverty, work-related mobility and literacy for effective human immunodeficiency virus (HIV) prevention. This paper examines the association between vulnerability and behavioural outcomes among FSWs in Thane district, Maharashtra under USAID PHFI-PIPPSE project. Methods: Data were used from the Behavioural Tracking Survey, a cross-sectional behavioural study conducted in 2015 with 503 FSWs randomly selected from 12 TI-NGOs which were functioning and providing services to FSWs in Thane district prior to April 2014 in Thane district of Maharashtra. We have created the “vulnerability index”, a composite index of literacy, factors of dependence (alternative livelihood options, current debt), and aspects of sex work (mobility and duration in sex work) as a dependent variable. The key independent measures used were program exposure to intervention, service uptake, self-confidence, and self-identity. Bi-variate and multivariate logistic regressions were used to examine the study objectives. Results: A higher proportion of FSWs who were in the age-group 18–25 years from brothel/street /home/ lodge-based were categorized as highly vulnerable to HIV risk as compared to bar-based sex worker (74.1% versus 59.8%, P,0.002); regression analysis highlighted lower odds of vulnerability among FSWs who were aware of services and visited NGO clinic for medical check-up and counselling for STI [AOR= 0.092, 95% CI 0.018-0.460; P,0.004], However, lower odds of vulnerability on confident in supporting fellow sex worker in crisis [AOR= 0.601, 95% CI 0.476-0.758; P, 0.000] and were able to turn away clients when they refused to use a condom during sex [AOR= 0.524, 95% CI 0.342-0.802; P, 0.003]. Conclusion: The results highlight that FSWs associated with TIs and getting services are less vulnerable and highly empowered. As a result of behavioural change communication and other services provided by TIs, FSWs were able to successfully negotiate about condom use with their clients and manage solidarity in the crisis situation for fellow FSWs. Therefore, it is evident from study paper that TI prevention programs may transform the lives of masses considerably and may open a window of opportunity to infuse the information and awareness about HIV risk.

Keywords: female sex worker, HIV prevention, HIV service uptake, vulnerability

Procedia PDF Downloads 229
2560 Technological Exploitation and User Experience in Product Innovation: The Case Study of the High-Tech Mask

Authors: Venere Ferraro, Silvia Ferraris

Abstract:

We live in a world pervaded by new advanced technologies that have been changing the way we live and experience the surrounded. Besides, new technologies enable product innovation at different levels. Nevertheless, innovation does not lie just in the technological development and in its hard aspects but also in the meaningful use of it for the final user. In order to generate innovative products, a new perspective is needed: The shift from an instrument-oriented view of the technology towards a broader view that includes aspects like aesthetics, acceptance, comfort, and sociability. In many businesses, the user experience of the product is considered the key battlefield to achieve product innovation. (Holland 2011) The use of new technologies is indeed useless without paying attention to the user experience. This paper presents a workshop activity conducted at Design School of Politecnico di Milano in collaboration with Chiba University and aimed at generating innovative design concepts of high-tech mask. The students were asked to design the user experience of a new mask by exploiting emerging technologies such as wearable sensors and information communication technology (ICT) for a chosen field of application: safety or sport. When it comes to the user experience, the mask is a very challenging design product, because it covers aspects of product interaction and, most important, psychological and cultural aspects related to the impact on the facial expression. Furthermore, since the mask affects the face expression quite a lot, it could be a barrier to hide with, or it could be a mean to enhance user’s communication to others. The main request for the students was to take on a user-centered approach: To go beyond the instrumental aspects of product use and usability and focus on the user experience by shaping the technology in a desirable and meaningful way for the user reasoning on the metaphorical and cultural level of the product. During the one-week workshop students were asked to face the design process through (i) the research phase: an in-deep analysis of the user and field of application (safety or sport) to set design spaces (brief) and user scenario; (ii) the idea generation, (iii) the idea development. This text will shortly go through the meaning of the product innovation, the use and application of wearable technologies and will then focus on the user experience design in contrast with the technology-driven approach in the field of product innovation. Finally authors will describe the workshop activity and the concepts developed by the students stressing the important role of the user experience design in new product development.

Keywords: product innovation, user experience, technological exploitation, wearable technologies

Procedia PDF Downloads 320
2559 Effective Editable Emoticon Description Schema for Mobile Applications

Authors: Jiwon Lee, Si-hwan Jang, Sanghyun Joo

Abstract:

The popularity of emoticons are on the rise since the mobile messengers are generalized. At the same time, few problems of emoticons are also occurred due to innate characteristics of emoticons. Too many emoticons make difficult people to select one which is well-suited for user's intention. On the contrary to this, sometimes user cannot find the emoticon which expresses user's exact intention. Poor information delivery of emoticon is another problem due to a major part of current emoticons are focused on emotion delivery. In this situation, we propose a new concept of emoticons, editable emoticons, to solve above drawbacks of emoticons. User can edit the components inside the proposed editable emoticon and send it to express his exact intention. By doing so, the number of editable emoticons can be maintained reasonable, and it can express user's exact intention. Further, editable emoticons can be used as information deliverer according to user's intention and editing skills. In this paper, we propose the concept of editable emoticons and schema based editable emoticon description method. The proposed description method is 200 times superior to the compared screen capturing method in the view of transmission bandwidth. Further, the description method is designed to have compatibility since it follows MPEG-UD international standard. The proposed editable emoticons can be exploited not only mobile applications, but also various fields such as education and medical field.

Keywords: description schema, editable emoticon, emoticon transmission, mobile applications

Procedia PDF Downloads 269
2558 Tsada-MobiMinder: A Location Based Alarm Mobile Reminder

Authors: Marylene S. Eder

Abstract:

Existing location based alarm applications has inability to give information to user’s particular direction to a specified place of destination and does not display a particular scenic spot from its current location going to the destination. With this problem, a location based alarm mobile reminder was developed. The application is implemented on Android based smart phones to provide services like providing routing information, helping to find nearby hotels, restaurants and scenic spots and offer many advantages to the mobile users to retrieve the information about their current location and process that data to get more useful information near to their location. It reminds the user about the location when the user enters some predefined location. All the user needs to have is the mobile phone with android platform with version 4.0 and above, and then the user can select the destination and find the destination on the application. The main objective of the project is to develop a location based application that provides tourists with real time information for scenic spots and provides alarm to a specified place of destination. This mobile application service will act as assistance for the frequent travelers to visit new places around the City.

Keywords: location based alarm, mobile application, mobile reminder, tourist’s spots

Procedia PDF Downloads 353
2557 User-Based Cannibalization Mitigation in an Online Marketplace

Authors: Vivian Guo, Yan Qu

Abstract:

Online marketplaces are not only digital places where consumers buy and sell merchandise, and they are also destinations for brands to connect with real consumers at the moment when customers are in the shopping mindset. For many marketplaces, brands have been important partners through advertising. There can be, however, a risk of advertising impacting a consumer’s shopping journey if it hurts the use experience or takes the user away from the site. Both could lead to the loss of transaction revenue for the marketplace. In this paper, we present user-based methods for cannibalization control by selectively turning off ads to users who are likely to be cannibalized by ads subject to business objectives. We present ways of measuring cannibalization of advertising in the context of an online marketplace and propose novel ways of measuring cannibalization through purchase propensity and uplift modeling. A/B testing has shown that our methods can significantly improve user purchase and engagement metrics while operating within business objectives. To our knowledge, this is the first paper that addresses cannibalization mitigation at the user-level in the context of advertising.

Keywords: cannibalization, machine learning, online marketplace, revenue optimization, yield optimization

Procedia PDF Downloads 135
2556 Improved Performance of Cooperative Scheme in the Cellular and Broadcasting System

Authors: Hyun-Jee Yang, Bit-Na Kwon, Yong-Jun Kim, Hyoung-Kyu Song

Abstract:

In the cooperative transmission scheme, both the cellular system and broadcasting system are composed. Two cellular base stations (CBSs) communicating with a user in the cell edge use cooperative transmission scheme in the conventional scheme. In the case that the distance between two CBSs and the user is distant, the conventional scheme does not guarantee the quality of the communication because the channel condition is bad. Therefore, if the distance between CBSs and a user is distant, the performance of the conventional scheme is decreased. Also, the bad channel condition has bad effects on the performance. The proposed scheme uses two relays to communicate well with CBSs when the channel condition between CBSs and the user is poor. Using the relay in the high attenuation environment can obtain both advantages of the high bit error rate (BER) and throughput performance.

Keywords: cooperative communications, diversity gain, OFDM, interworking system

Procedia PDF Downloads 544
2555 Privacy Label: An Alternative Approach to Present Privacy Policies from Online Services to the User

Authors: Diego Roberto Goncalves De Pontes, Sergio Donizetti Zorzo

Abstract:

Studies show that most users do not read privacy policies from the online services they use. Some authors claim that one of the main causes of this is that policies are long and usually hard to understand, which make users lose interest in reading them. In this scenario, users may agree with terms without knowing what kind of data is being collected and why. Given that, we aimed to develop a model that would present the privacy policies contents in an easy and graphical way for the user to understand. We call it the Privacy Label. Using information recovery techniques, we propose an architecture that is able to extract information about what kind of data is being collected and to what end in the policies and show it to the user in an automated way. To assess our model, we calculated the precision, recall and f-measure metrics on the information extracted by our technique. The results for each metric were 68.53%, 85.61% e 76,13%, respectively, making it possible for the final user to understand which data was being collected without reading the whole policy. Also, our proposal can facilitate the notice-and-choice by presenting privacy policy information in an alternative way for online users.

Keywords: privacy, policies, user behavior, computer human interaction

Procedia PDF Downloads 280
2554 Evaluating Service Trustworthiness for Service Selection in Cloud Environment

Authors: Maryam Amiri, Leyli Mohammad-Khanli

Abstract:

Cloud computing is becoming increasingly popular and more business applications are moving to cloud. In this regard, services that provide similar functional properties are increasing. So, the ability to select a service with the best non-functional properties, corresponding to the user preference, is necessary for the user. This paper presents an Evaluation Framework of Service Trustworthiness (EFST) that evaluates the trustworthiness of equivalent services without need to additional invocations of them. EFST extracts user preference automatically. Then, it assesses trustworthiness of services in two dimensions of qualitative and quantitative metrics based on the experiences of past usage of services. Finally, EFST determines the overall trustworthiness of services using Fuzzy Inference System (FIS). The results of experiments and simulations show that EFST is able to predict the missing values of Quality of Service (QoS) better than other competing approaches. Also, it propels users to select the most appropriate services.

Keywords: user preference, cloud service, trustworthiness, QoS metrics, prediction

Procedia PDF Downloads 254