Search results for: fleet provider
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 405

Search results for: fleet provider

255 A Power Management System for Indoor Micro-Drones in GPS-Denied Environments

Authors: Yendo Hu, Xu-Yu Wu, Dylan Oh

Abstract:

GPS-Denied drones open the possibility of indoor applications, including dynamic arial surveillance, inspection, safety enforcement, and discovery. Indoor swarming further enhances these applications in accuracy, robustness, operational time, and coverage. For micro-drones, power management becomes a critical issue, given the battery payload restriction. This paper proposes an application enabling battery replacement solution that extends the micro-drone active phase without human intervention. First, a framework to quantify the effectiveness of a power management solution for a drone fleet is proposed. The operation-to-non-operation ratio, ONR, gives one a quantitative benchmark to measure the effectiveness of a power management solution. Second, a survey was carried out to evaluate the ONR performance for the various solutions. Third, through analysis, this paper proposes a solution tailored to the indoor micro-drone, suitable for swarming applications. The proposed automated battery replacement solution, along with a modified micro-drone architecture, was implemented along with the associated micro-drone. Fourth, the system was tested and compared with the various solutions within the industry. Results show that the proposed solution achieves an ONR value of 31, which is a 1-fold improvement of the best alternative option. The cost analysis shows a manufacturing cost of $25, which makes this approach viable for cost-sensitive markets (e.g., consumer). Further challenges remain in the area of drone design for automated battery replacement, landing pad/drone production, high-precision landing control, and ONR improvements.

Keywords: micro-drone, battery swap, battery replacement, battery recharge, landing pad, power management

Procedia PDF Downloads 71
254 One-Pot Synthesis and Characterization of Magnesium Oxide Nanoparticles Prepared by Calliandra Calothyrsus Leaf Extract

Authors: Indah Kurniawaty, Yoki Yulizar, Haryo Satriya Oktaviano, Adam Kusuma Rianto

Abstract:

Magnesium oxide nanoparticles (MgO NP) were successfully synthesized in this study using a one-pot green synthesis mediated by Calliandra Calothyrsus leaf extract (CLE). CLE was prepared by maceration of the leaf using methanol with a ratio of 1:5 for 7 days. Secondary metabolites in CLE, such as alkaloids and flavonoids, served as a weak base provider and capping agent in the formation of MgO NP. CLE Fourier Transform Infra-Red (FTIR) spectra peak at 3255, 1600, 1384, 1205, 1041, and 667 cm-1 showing the presence of vibrations O-H stretching, N-H bending, C-C stretching, C-N stretching and N-H wagging. During the experiment, different CLE volumes and calcined temperatures were used, resulting in a variety of structures. Energy Dispersive X-ray Spectrometer (EDS) and FTIR were used to characterize metal oxide particles. MgO diffraction pattern at 2θ of 36.9°; 42.9°; 62.2°; 74.6°; and 78.5° which can be assigned to crystal planes (111), (200), (220), (311), and (222), respectively. Scanning Electron Microscopy (SEM) was used to characterize the surface morphology. The morphology ranged from sphere to flower-like resulting in crystallite sizes of 28, 23, 12, and 9 nm.

Keywords: MgO, nanoparticle, calliandra calothyrsus, green-synthesis

Procedia PDF Downloads 52
253 The Determinants of Behavioral Intention to Use toward T-Cash Services Provider in Jakarta and Surburban Area

Authors: Stephen Coandadiputra, Chrestella Carissa

Abstract:

Technology is created to simplify human’s life. One of current technology which being called as the second wave internet generation is the internet of things. Internet of things lets thousands of devices connected each other. In today's marketing world, IOT has brought customer into the next level which helping the customer to shorten every transaction they are conducting from traditional approach to sophisticated approach. However, the implementation of technology has always obstacles. The objective of this paper is to explore the determinants of customer to accepts such technology like the internet of things within their transaction. According to TAM (Technology Acceptance Model), researcher constructs the acceptance of internet of things based on perceived usefulness, perceived ease of use and trust and social factor and the two customer characteristics: perceived enjoyment and perceived behavioral control. This research uses exploratory research design which being facilitated by spreading questionnaire to 145 T-cash users in Jakarta and in its suburban region. At least, 190 samples were observed and questioned accordingly. All the collected data will be analyzed using Lisrel.

Keywords: behavioral intention to use, internet of things, near field communication, technology acceptance model

Procedia PDF Downloads 300
252 Analyzing Behaviour of the Utilization of the Online News Clipping Database: Experience in Suan Sunandha Rajabhat University

Authors: Siriporn Poolsuwan, Kanyarat Bussaban

Abstract:

This research aims to investigate and analyze user’s behaviour towards the utilization of the online news clipping database at Suan Sunandha Rajabhat University, Thailand. Data is gathered from 214 lecturers and 380 undergraduate students by using questionnaires. Findings show that most users knew the online news clipping service from their friends, library’s website and their teachers. The users learned how to use it by themselves and others learned by training of SSRU library. Most users used the online news clipping database one time per month at home and always used the service for general knowledge, up-to-date academic knowledge and assignment reference. Moreover, the results of using the online news clipping service problems include the users themselves, service management, service device- computer and tools – and the network, service provider, and publicity. This research would be benefit for librarians and teachers for planning and designing library services in their works and organization.

Keywords: online database, user behavior, news clipping, library services

Procedia PDF Downloads 284
251 Refining Employee's Customer Service Performance through an Inter-Organizational Climate Study: A Way Forward

Authors: Zainal Abu Zatim, Hafizah Omar Zaki

Abstract:

Substantial research had been done on refining employee’s customer service performance. Thus, there were very limited empirical studies that are engage in an inter-organizational climate study in assessing employee’s customer service performance. With the current economic situation as well as emerging needs and requirements, all businesses either from public or private sector serving customers put greater attention on fulfilling those needs and requirements. In this state of affairs, the act of polishing its employees’ skills, knowledge, teamwork and passion is very important in ensuring better performance deliverance. A study conducted in one of the telecommunication service provider company in Malaysia had been done to test its inter-organizational climate study. The Internal Climate Study was done to benchmark opinions and perceptions of its employees. The study had provided baseline information about perceptions that exist in the internal environment and ways forward to improve customer service performance. The approach used is through the use of focus group and qualitative interview.

Keywords: employees, Customer Service Performance, inter-organizational climate study, public and private sector

Procedia PDF Downloads 374
250 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 278
249 Investigating Teaching and Learning to Meet the Needs of Deaf Children in Physical Education

Authors: Matthew Fleet, Savannah Elliott

Abstract:

Background: This study investigates the use of teaching and learning to meet the needs of deaf children in the UK PE curriculum. Research has illustrated that deaf students in mainstream schools do not receive sufficient support from teachers in lessons. This research examines the impact of different types of hearing loss and its implications within Physical Education (PE) in secondary schools. Purpose: The purpose of this study is to highlight challenges PE teachers face and make recommendations for more inclusive learning environments for deaf students. The aims and objectives of this research are: to critically analyse the current situation for deaf students accessing the PE curriculum, by identifying barriers deaf students face; to identify the challenges for PE teachers in providing appropriate support for deaf students; to provide recommendations for deaf awareness training, to enhance PE teachers’ understanding and knowledge. Method: Semi-structured interviews collected data from both PE teachers and deaf students, to examine: the support available and coping mechanisms deaf students use when they do not receive support; strategies PE teachers use to provide support for deaf students; areas for improvement and potential strategies PE teachers can apply to their practice. Results & Conclusion: The findings from the study concluded that PE teachers were inconsistent in providing appropriate support for deaf students in PE lessons. Evidence illustrated that PE teachers had limited exposure to deaf awareness training. This impacted on their ability to support deaf students effectively. Communication was a frequent barrier for deaf students, affecting their ability to retain and learn information. Also, the use of assistive technology was found to be compromised in practical PE lessons.

Keywords: physical education, deaf, inclusion, education

Procedia PDF Downloads 122
248 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 74
247 A Method of Manufacturing Low Cost Utility Robots and Vehicles

Authors: Gregory E. Ofili

Abstract:

Introduction and Objective: Climate change and a global economy mean farmers must adapt and gain access to affordable and reliable automation technologies. Key barriers include a lack of transportation, electricity, and internet service, coupled with costly enabling technologies and limited local subject matter expertise. Methodology/Approach: Resourcefulness is essential to mechanization on a farm. This runs contrary to the tech industry practice of planned obsolescence and disposal. One solution is plug-and-play hardware that allows farmer to assemble, repair, program, and service their own fleet of industrial machines. To that end, we developed a method of manufacturing low-cost utility robots, transport vehicles, and solar/wind energy harvesting systems, all running on an open-source Robot Operating System (ROS). We demonstrate this technology by fabricating a utility robot and an all-terrain (4X4) utility vehicle. Constructed of aluminum trusses and weighing just 40 pounds, yet capable of transporting 200 pounds of cargo, on sale for less than $2,000. Conclusions & Policy Implications: Electricity, internet, and automation are essential for productivity and competitiveness. With planned obsolescence, the priorities of technology suppliers are not aligned with the farmer’s realities. This patent-pending method of manufacturing low-cost industrial robots and electric vehicles has met its objective. To create low-cost machines, the farmer can assemble, program, and repair with basic hand tools.

Keywords: automation, robotics, utility robot, small-hold farm, robot operating system

Procedia PDF Downloads 42
246 Pallet Tracking and Cost Optimization of the Flow of Goods in Logistics Operations by Serial Shipping Container Code

Authors: Dominika Crnjac Milic, Martina Martinovic, Vladimir Simovic

Abstract:

The case study method in this paper shows the implementation of Information Technology (IT) and the Serial Shipping Container Code (SSCC) in a Croatian company that deals with logistics operations and provides logistics services in the cold chain segment. This company is aware of the sensitivity of the goods entrusted to them by the user of the service, as well as of the importance of speed and accuracy in providing logistics services. To that end, it has implemented and used the latest IT to ensure the highest standard of high-quality logistics services to its customers. Looking for efficiency and optimization of supply chain management, while maintaining a high level of quality of the products that are sold, today's users of outsourced logistics services are open to the implementation of new IT products that ultimately deliver savings. By analysing the positive results and the difficulties that arise when using this technology, we aim to provide an insight into the potential of this approach of the logistics service provider.

Keywords: logistics operations, serial shipping container code, information technology, cost optimization

Procedia PDF Downloads 338
245 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment

Authors: Manas Tripathi, Arunabha Mukhopadhyay

Abstract:

In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.

Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security

Procedia PDF Downloads 257
244 [Keynote Talk]: From Clinical Practice to Academic Setup, 'Quality Circles' for Quality Outputs in Both

Authors: Vandita Mishra

Abstract:

From the management of patients, reception, record, and assistants in a clinical practice; to the management of ongoing research, clinical cases and department profile in an academic setup, the healthcare provider has to deal with all of it. The victory lies in smooth running of the show in both the above situations with an apt solution of problems encountered and smooth management of crisis faced. Thus this paper amalgamates dental science with health administration by means of introduction of a concept for practice management and problem-solving called 'Quality Circles'. This concept uses various tools for problem solving given by experts from different fields. QC tools can be applied in both clinical and academic settings in dentistry for better productivity and for scientifically approaching the process of continuous improvement in both the categories. When approached through QC, our organization showed better patient outcomes and more patient satisfaction. Introduced in 1962 by Kaoru Ishikawa, this tool has been extensively applied in certain fields outside dentistry and healthcare. By exemplification of some clinical cases and virtual scenarios, the tools of Quality circles will be elaborated and discussed upon.

Keywords: academics, dentistry, healthcare, quality

Procedia PDF Downloads 73
243 The Evaluation of a Mobile Proximity Payment Application through Its Legitimacy and Social Acceptability

Authors: Intissar Abbes, Yousra Hallem, Jean-michel Sahut

Abstract:

The purpose of this research is to explore the legitimacy of a proximity mobile payment (PMP) system by taking into account the social aspects related to its use (social acceptability). We have chosen to focus on the acceptability process of a PMP application (‘Flashplay’) from the first testing to the adoption in a service context. This PMP solution is a pilot program developed as part of a global strategy of disintermediation in various sectors (retail, catering, and entertainment). This case is particularly interesting for two reasons: the context and environment are suitable to the adoption of innovation in payment like other African countries and the possibility to study different stages of the social acceptability process of that PMP system. The neo-institutional theory is mobilized to identify the three pillars of legitimacy: cognitive, normative and regulatory. A longitudinal qualitative study was conducted with 27 customers using the PMP service. Results highlighted the importance of the consumption system and the service provider as institutions. Recommendations are thus proposed to PMP service providers in order to rethink the design and implementation strategies of their PMP system to ensure their adoption and promote the institutionalization of this type of consumption practice.

Keywords: legitimacy, payment, acceptability, mobility

Procedia PDF Downloads 151
242 Defining the Limits of No Load Test Parameters at Over Excitation to Ensure No Over-Fluxing of Core Based on a Case Study: A Perspective From Utilities

Authors: Pranjal Johri, Misbah Ul-Islam

Abstract:

Power Transformers are one of the most critical and failure prone entities in an electrical power system. It is an established practice that each design of a power transformer has to undergo numerous type tests for design validation and routine tests are performed on each and every power transformer before dispatch from manufacturer’s works. Different countries follow different standards for testing the transformers. Most common and widely followed standard for Power Transformers is IEC 60076 series. Though these standards put up a strict testing requirements for power transformers, however, few aspects of transformer characteristics and guaranteed parameters can be ensured by some additional tests. Based on certain observations during routine test of a transformer and analyzing the data of a large fleet of transformers, three propositions have been discussed and put forward to be included in test schedules and standards. The observations in the routine test raised questions on design flux density of transformer. In order to ensure that flux density in any part of the core & yoke does not exceed 1.9 tesla at 1.1 pu as well, following propositions need to be followed during testing:  From the data studied, it was evident that generally NLC at 1.1 pu is apporx. 3 times of No Load Current at 1 pu voltage.  During testing the power factor at 1.1 pu excitation, it must be comparable to calculated values from the Cold Rolled Grain Oriented steel material curves, including building factor.  A limit of 3 % to be extended for higher than rated voltages on difference in Vavg and Vrms, during no load testing.  Extended over excitation test to be done in case above propositions are observed to be violated during testing.

Keywords: power transfoemrs, no load current, DGA, power factor

Procedia PDF Downloads 64
241 A New Distributed Computing Environment Based On Mobile Agents for Massively Parallel Applications

Authors: Fatéma Zahra Benchara, Mohamed Youssfi, Omar Bouattane, Hassan Ouajji, Mohamed Ouadi Bensalah

Abstract:

In this paper, we propose a new distributed environment for High Performance Computing (HPC) based on mobile agents. It allows us to perform parallel programs execution as distributed one over a flexible grid constituted by a cooperative mobile agent team works. The distributed program to be performed is encapsulated on team leader agent which deploys its team workers as Agent Virtual Processing Unit (AVPU). Each AVPU is asked to perform its assigned tasks and provides the computational results which make the data and team works tasks management difficult for the team leader agent and that influence the performance computing. In this work we focused on the implementation of the Mobile Provider Agent (MPA) in order to manage the distribution of data and instructions and to ensure a load balancing model. It grants also some interesting mechanisms to manage the others computing challenges thanks to the mobile agents several skills.

Keywords: image processing, distributed environment, mobile agents, parallel and distributed computing

Procedia PDF Downloads 375
240 The Dark History of American Psychiatry: Racism and Ethical Provider Responsibility

Authors: Mary Katherine Hoth

Abstract:

Despite racial and ethnic disparities in American psychiatry being well-documented, there remains an apathetic attitude among nurses and providers within the field to engage in active antiracism and provide equitable, recovery-oriented care. It is insufficient to be a “colorblind” nurse or provider and state that call care provided is identical for every patient. Maintaining an attitude of “colorblindness” perpetuates the racism prevalent throughout healthcare and leads to negative patient outcomes. The purpose of this literature review is to highlight the how the historical beginnings of psychiatry have evolved into the disparities seen in today’s practice, as well as to provide some insight on methods that providers and nurses can employ to actively participate in challenging these racial disparities. Background The application of psychiatric medicine to White people versus Black, Indigenous, and other People of Color has been distinctly different as a direct result of chattel slavery and the development of pseudoscience “diagnoses” in the 19th century. This weaponization of the mental health of Black people continues to this day. Population The populations discussed are Black, Indigenous, and other People of Color, with a primary focus on Black people’s experiences with their mental health and the field of psychiatry. Methods A literature review was conducted using CINAHL, EBSCO, MEDLINE, and PubMed databases with the following terms: psychiatry, mental health, racism, substance use, suicide, trauma-informed care, disparities and recovery-oriented care. Articles were further filtered based on meeting the criteria of peer-reviewed, full-text availability, written in English, and published between 2018 and 2023. Findings Black patients are more likely to be diagnosed with psychotic disorders and prescribed antipsychotic medications compared to White patients who were more often diagnosed with mood disorders and prescribed antidepressants. This same disparity is also seen in children and adolescents, where Black children are more likely to be diagnosed with behavior problems such as Oppositional Defiant Disorder (ODD) and White children with the same presentation are more likely to be diagnosed with Attention Hyperactivity Disorder. Medications advertisements for antipsychotics like Haldol as recent as 1974 portrayed a Black man, labeled as “agitated” and “aggressive”, a trope we still see today in police violence cases. The majority of nursing and medical school programs do not provide education on racism and how to actively combat it in practice, leaving many healthcare professionals acutely uneducated and unaware of their own biases and racism, as well as structural and institutional racism. Conclusions Racism will continue to grow wherever it is given time, space, and energy. Providers and nurses have an ethical obligation to educate themselves, actively deconstruct their personal racism and bias, and continuously engage in active antiracism by dismantling racism wherever it is encountered, be it structural, institutional, or scientific racism. Agents of change at the patient care level not only improve the outcomes of Black patients, but it will also lead the way in ensuring Black, Indigenous, and other People of Color are included in research of methods and medications in psychiatry in the future.

Keywords: disparities, psychiatry, racism, recovery-oriented care, trauma-informed care

Procedia PDF Downloads 91
239 On Board Measurement of Real Exhaust Emission of Light-Duty Vehicles in Algeria

Authors: R. Kerbachi, S. Chikhi, M. Boughedaoui

Abstract:

The study presents an analysis of the Algerian vehicle fleet and resultant emissions. The emission measurement of air pollutants emitted by road transportation (CO, THC, NOX and CO2) was conducted on 17 light duty vehicles in real traffic. This sample is representative of the Algerian light vehicles in terms of fuel quality (gasoline, diesel and liquefied petroleum gas) and the technology quality (injection system and emission control). The experimental measurement methodology of unit emission of vehicles in real traffic situation is based on the use of the mini-Constant Volume Sampler for gas sampling and a set of gas analyzers for CO2, CO, NOx and THC, with an instrumentation to measure kinematics, gas temperature and pressure. The apparatus is also equipped with data logging instrument and data transfer. The results were compared with the database of the European light vehicles (Artemis). It was shown that the technological injection liquefied petroleum gas (LPG) has significant impact on air pollutants emission. Therefore, with the exception of nitrogen oxide compounds, uncatalyzed LPG vehicles are more effective in reducing emissions unit of air pollutants compared to uncatalyzed gasoline vehicles. LPG performance seems to be lower under real driving conditions than expected on chassis dynamometer. On the other hand, the results show that uncatalyzed gasoline vehicles emit high levels of carbon monoxide, and nitrogen oxides. Overall, and in the absence of standards in Algeria, unit emissions are much higher than Euro 3. The enforcement of pollutant emission standard in developing countries is an important step towards introducing cleaner technology and reducing vehicular emissions.

Keywords: on-board measurements of unit emissions of CO, HC, NOx and CO2, light vehicles, mini-CVS, LPG-fuel, artemis, Algeria

Procedia PDF Downloads 253
238 A Survey on Requirements and Challenges of Internet Protocol Television Service over Software Defined Networking

Authors: Esmeralda Hysenbelliu

Abstract:

Over the last years, the demand for high bandwidth services, such as live (IPTV Service) and on-demand video streaming, steadily and rapidly increased. It has been predicted that video traffic (IPTV, VoD, and WEB TV) will account more than 90% of global Internet Protocol traffic that will cross the globe in 2016. Consequently, the importance and consideration on requirements and challenges of service providers faced today in supporting user’s requests for entertainment video across the various IPTV services through virtualization over Software Defined Networks (SDN), is tremendous in the highest stage of attention. What is necessarily required, is to deliver optimized live and on-demand services like Internet Protocol Service (IPTV Service) with low cost and good quality by strictly fulfill the essential requirements of Clients and ISP’s (Internet Service Provider’s) in the same time. The aim of this study is to present an overview of the important requirements and challenges of IPTV service with two network trends on solving challenges through virtualization (SDN and Network Function Virtualization). This paper provides an overview of researches published in the last five years.

Keywords: challenges, IPTV service, requirements, software defined networking (SDN)

Procedia PDF Downloads 240
237 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 246
236 Supporting Homeless People in Red Deer, Canada

Authors: Cornelius Ehlers, Lisa Harmatiuk, Sharon Rowland, Michelle Shafers

Abstract:

The objective of the Street Connect program is to provide client-centered care for the homeless population within the City of Red Deer. The program aims to provide an extended continuum of care (addiction, mental health, and physical health) for high acuity homeless individuals who are not connected to a service provider and/or community service agency. Street Connect includes both primary and secondary streams of service: Overall, Street Connect has demonstrated its ability to support vulnerable populations within the City of Red Deer, specifically those who are homeless and seeking addiction, mental health, and medical assistance. The results from the data extract and chart audit reflect the complexity and vulnerability of the clients enrolled in the Street Connect program. The clients were predominantly male, with an average age of 41 years. The majority did not have a permanent address, and 65% did not have employment. Substance abuse/addiction issues were common, combined with a history of psychiatric diagnoses and previous mental health hospitalizations. The most utilized drugs were street drugs such as methamphetamine, fentanyl, and other opioids.

Keywords: client-centred care, homelessness, mental health, rural

Procedia PDF Downloads 65
235 The Integration of Patient Health Record Generated from Wearable and Internet of Things Devices into Health Information Exchanges

Authors: Dalvin D. Hill, Hector M. Castro Garcia

Abstract:

A growing number of individuals utilize wearable devices on a daily basis. The usage and functionality of these wearable devices vary from user to user. One popular usage of said devices is to track health-related activities that are typically stored on a device’s memory or uploaded to an account in the cloud; based on the current trend, the data accumulated from the wearable device are stored in a standalone location. In many of these cases, this health related datum is not a factor when considering the holistic view of a user’s health lifestyle or record. This health-related data generated from wearable and Internet of Things (IoT) devices can serve as empirical information to a medical provider, as the standalone data can add value to the holistic health record of a patient. This paper proposes a solution to incorporate the data gathered from these wearable and IoT devices, with that a patient’s Personal Health Record (PHR) stored within the confines of a Health Information Exchange (HIE).

Keywords: electronic health record, health information exchanges, internet of things, personal health records, wearable devices, wearables

Procedia PDF Downloads 96
234 Study on the OTP Authentication Method and Security for User Mobility in the Cloud

Authors: Jong-Won Lee

Abstract:

Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.

Keywords: cloud, OTP, mobility, security, authentication

Procedia PDF Downloads 329
233 A Brave New World of Privacy: Empirical Insights into the Metaverse’s Personalization Dynamics

Authors: Cheng Xu

Abstract:

As the metaverse emerges as a dynamic virtual simulacrum of reality, its implications on user privacy have become a focal point of interest. While previous discussions have ventured into metaverse privacy dynamics, a glaring empirical gap persists, especially concerning the effects of personalization in the context of news recommendation services. This study stands at the forefront of addressing this void, meticulously examining how users' privacy concerns shift within the metaverse's personalization context. Through a pre-registered randomized controlled experiment, participants engaged in a personalization task across both the metaverse and traditional online platforms. Upon completion of this task, a comprehensive news recommendation service provider offers personalized news recommendations to the users. Our empirical findings reveal that the metaverse inherently amplifies privacy concerns compared to traditional settings. However, these concerns are notably mitigated when users have a say in shaping the algorithms that drive these recommendations. This pioneering research not only fills a significant knowledge gap but also offers crucial insights for metaverse developers and policymakers, emphasizing the nuanced role of user input in shaping algorithm-driven privacy perceptions.

Keywords: metaverse, privacy concerns, personalization, digital interaction, algorithmic recommendations

Procedia PDF Downloads 87
232 JENOSYS: Application of a Web-Based Online Energy Performance Reporting Tool for Government Buildings in Malaysia

Authors: Norhayati Mat Wajid, Abdul Murad Zainal Abidin, Faiz Fadzil, Mohd Yusof Aizad Mukhtar

Abstract:

One of the areas that present an opportunity to reduce the national carbon emission is the energy management of public buildings. To our present knowledge, there is no easy-to-use and centralized mechanism that enables the government to monitor the overall energy performance, as well as the carbon footprint, of Malaysia’s public buildings. Therefore, the Public Works Department Malaysia, or PWD, has developed a web-based energy performance reporting tool called JENOSYS (JKR Energy Online System), which incorporates a database of utility account numbers acquired from the utility service provider for analysis and reporting. For test case purposes, 23 buildings under PWD were selected and monitored for their monthly energy performance (in kWh), carbon emission reduction (in tCO₂eq) and utility cost (in MYR), against the baseline. This paper demonstrates the simplicity with which buildings without energy metering can be monitored centrally and the benefits that can be accrued by the government in terms of building energy disclosure and concludes with the recommendation of expanding the system to all the public buildings in Malaysia.

Keywords: energy-efficient buildings, energy management systems, government buildings, JENOSYS

Procedia PDF Downloads 145
231 Developing a Shadow Port: A Case Study of Bangkok Port and Laem Chabang Port, Thailand

Authors: C. Bamrungbutr, J. Sillitoe

Abstract:

Maritime transportation has been a crucial part of world economics. Recently, researchers have put effort into studying the mechanisms of how a regional port, in the shadow of a nearby predominant port, can compete and grow. However, limited research has focused on the competition issues for a shadow port which is a capital city port. This study will thus focus on this question of the growth of a capital city port which is under the shadow of the adjacent capital city port by using the two capital city ports of Thailand; Bangkok port (the former main port) and Laem Chabang port (the current main port). For this work, a framework of opportunity capture will be used, and five groups of port development experts (government, council, logistics provider, academia and industry) will be interviewed. The responses will be analysed using the noticing, collecting and thinking model. The resulting analysis will be appropriate for use in developing guidelines for the future management of a range of shadow ports established in a capital city, enabling them to operate in a competitive environment more effectively. The resultant growth of these ports will be a significant factor in increasing the competitiveness of a nation’s maritime transport industry and eventually lead to a boost in the national economy.

Keywords: shadow port, Bangkok Port, Laem Chabang Port, port competition

Procedia PDF Downloads 147
230 Changing Pattern and Trend of Head of Household in India: Evidence from Various Rounds of National Family Health Survey

Authors: Moslem Hossain, Mukesh Kumar, K. C. Das

Abstract:

Background: Household headship is the crucial decision-maker as well as the economic provider of the household. In Indian society, household heads occupied by men from the pre-colonial period. This study attempt to examine the changes in household headship in India. Methods: The study used univariate and multivariate analysis to examine the trends and patterns of different characteristics of the household head using the various rounds of national family health survey data. Results: The female household head is gradually increasing; on the other hand, the male-dominant is decreasing over the four national family and health surveys. The mean age of the household head is higher in rural areas than urban India. Only ten percentage of Households are higher educated, and 83 percent of the male household head has a low standard of living. The mean family size of the household has a decreasing trend in both the urban and rural areas during the study period. Conclusions: The result indicates that women's autonomy is increasing and leading to inclusive growth, which introduced in the eleven five year plan, especially focuses on the woman and young people in the country.

Keywords: household head, national family health survey, mean age, mean family size

Procedia PDF Downloads 99
229 Disparate Use of Chemical and Physical Restraints in the Emergency Department by Race/Ethnicity

Authors: Etta Conteh, Tracy Macintosh

Abstract:

Introduction: Restraints are often used in the Emergency Department when it is necessary for a patient to be restrained in order to decrease their agitation and better treat them. Chemical and physical restraints may be used on these patients at the discretion of the medical provider. Racism and injustice are rampant within our country, and medicine and healthcare are not spared. While racism and racial bias in medicine and healthcare have been studied, information on the differences in the use of restraints by race are scarce. Objective: The objective of this study is to determine if African Americans and Hispanic-American patients are restrained at higher rates compared to their White counterparts. Methods: This study will be carried out through a retrospective analysis utilizing the Hospital Corporation of America (HCA) national Emergency Department (ED) and inpatient database with patient visits from 2016-2019. All patient visits, with patients aged 18 years or older, will be reviewed, looking specifically for the race and the use and type of restraints. Other factors, such a pre-existing psychiatric condition, will be used for sub-analysis. Rationale: The outcome of this project will demonstrate the absence or presence of a racial disparity in the use of restraints in the Emergency Department. These results can be used as a foundation for improving racial equity in healthcare treatment.

Keywords: emergency medicine, public health, racism, restraint use

Procedia PDF Downloads 236
228 A Modelling Study of the Photochemical and Particulate Pollution Characteristics above a Typical Southeast Mediterranean Urban Area

Authors: Fameli Kyriaki-Maria, Assimakopoulos D. Vasiliki, Kotroni Vassiliki

Abstract:

The Greater Athens Area (GAA) faces photochemical and particulate pollution episodes as a result of the combined effects of local pollutant emissions, regional pollution transport, synoptic circulation and topographic characteristics. The area has undergone significant changes since the Athens 2004 Olympic Games because of large scale infrastructure works that lead to the shift of population to areas previously characterized as rural, the increase of the traffic fleet and the operation of highways. However, no recent modelling studies have been performed due to the lack of an accurate, updated emission inventory. The photochemical modelling system MM5/CAMx was applied in order to study the photochemical and particulate pollution characteristics above the GAA for two distinct ten-day periods in the summer of 2006 and 2010, where air pollution episodes occurred. A new updated emission inventory was used based on official data. Comparison of modeled results with measurements revealed the importance and accuracy of the new Athens emission inventory as compared to previous modeling studies. The model managed to reproduce the local meteorological conditions, the daily ozone and particulates fluctuations at different locations across the GAA. Higher ozone levels were found at suburban and rural areas as well as over the sea at the south of the basin. Concerning PM10, high concentrations were computed at the city centre and the southeastern suburbs in agreement with measured data. Source apportionment analysis showed that different sources contribute to the ozone levels, the local sources (traffic, port activities) affecting its formation.

Keywords: photochemical modelling, urban pollution, greater Athens area, MM5/CAMx

Procedia PDF Downloads 252
227 Possibilities of Output Technology the Project ADAPTIV for Use in Infrared Camouflage

Authors: Jiří Barta, Teodor Baláž, Tomáš Ludík, Jiří. F. Urbánek

Abstract:

This article deals with the outputs of project acronym ADAPTIV of Czech Defence Research Project. This Project solved tends to adaptive camouflage. The camouflage is concealment by means of disguise. Perceptive interface between recipient and camouflaged object is visualized by means of textile modular screens. Screens special light semi-permeability enables front/ back projection with nearly identical light parameters. Information permeability, towards illusion creation, must be controlled by the camouflage provider by means sophisticated and mastered illusion with perfect scenarios. The project ADAPTIV was primarily funded with the maximum possible use of COTS (Commercial-Off-The-Shelf) principle asks special definition of feasibility conditions, especially recipient space position. This paper deals with uses the ADAPTIV output with name DATAsam with modification for infrared camouflage. It is focused on active camouflage in infrared spectrum of emissivity at <8;14> μm for laboratory conditions. The main chapter provides basic experiments and testing physical properties needed for camouflage in infrared environment. The evaluation experiments revealed the possibility of use case in various types of camouflage.

Keywords: camouflage, ADAPTIV, infrared camouflage, computer-aided, COTS

Procedia PDF Downloads 390
226 Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea

Authors: Min Jin Kwon, Seung Won Kim, Eui Yeon Kim, Haeyoung Lee

Abstract:

Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist.

Keywords: deep packet inspection, internet filtering, juvenile protection, technical blocking

Procedia PDF Downloads 321