Search results for: used personal computer
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4367

Search results for: used personal computer

4157 Patient-Friendly Hand Gesture Recognition Using AI

Authors: K. Prabhu, K. Dinesh, M. Ranjani, M. Suhitha

Abstract:

During the tough times of covid, those people who were hospitalized found it difficult to always convey what they wanted to or needed to the attendee. Sometimes the attendees might also not be there. In that case, the patients can use simple hand gestures to control electrical appliances (like its set it for a zero watts bulb)and three other gestures for voice note intimation. In this AI-based hand recognition project, NodeMCU is used for the control action of the relay, and it is connected to the firebase for storing the value in the cloud and is interfaced with the python code via raspberry pi. For three hand gestures, a voice clip is added for intimation to the attendee. This is done with the help of Google’s text to speech and the inbuilt audio file option in the raspberry pi 4. All the five gestures will be detected when shown with their hands via the webcam, which is placed for gesture detection. The personal computer is used for displaying the gestures and for running the code in the raspberry pi imager.

Keywords: nodeMCU, AI technology, gesture, patient

Procedia PDF Downloads 130
4156 Ergonomics Aspects of Work with Computers

Authors: Leena Korpinen, Rauno Pääkkönen, Fabriziomaria Gobba

Abstract:

This paper is based on a large questionnaire study. The paper presents how all participants and subgroups (upper- and lower-level white-collar workers) answered the question, “Have you had an ache, pain, or numbness, which you associate with desktop computer use, in the different body parts during the last 12 months?’ 14.6% of participants (19.4% of women and 8.2% of men) reported that they had often or very often physical symptoms in the neck. Even if our results cannot prove a causal relation of symptoms with computer use, show that workers believe that computer use can influence their wellbeing: This is important when devising treatment modalities to decrease these physical symptoms.

Keywords: ergonomics, work, computer, symptoms

Procedia PDF Downloads 367
4155 Use of Telephone Counselling in Employee Assistance Program

Authors: Andy S.K. Cheng, Samuel Leung, Cindy Kwok, Hector Tsang

Abstract:

Background: Telephone counselling is one of the essential interventions that can be found in most of the Employee Assistance Programs (EAP). The purposes of this study were to (1) explore the trend of the telephone counselling from 2003-2016 in Hong Kong; (2) explore which EAP issue requires more follow-up; and 3) examine the relationship between the EAP issues and demographic data such as gender and job ranking. Method: Date of EAP services usage was collected from EAP providers in Hong Kong during 2003-2016. EAP issues were categorized into two domains, namely workplace issues and personal issues. Each domain has 12 sub-categories. Two hypotheses were formulated in this study (1) there was a gender difference in EAP issues and the follow-up hours; and (2) there was a significant difference between job ranking, EAP issues and follow-up hours. Results: A total of eight hundred and ninety-three valid cases were identified for analysis. Of them, three hundred and forty-three cases sought for follow-up. The duration of follow-up by hours was calculated for each of the follow-up cases. The results of the study shows that the top three workplace issues that required the longest duration of follow-up were (1) workload, (2) supervisor-subordinate relationship; and (3) team member’s relationship. On the other hand, the top three personal issues that required the longest duration of follow-up were (1) parenting/parent-child relationship, (2) family care, and (3) marital relationship. Two-way ANOVA was performed to compare the total follow-up hours (excluding first intake) between gender and EAP issues. There was no statistical significance for gender (p =.891), but a statistically significant main effect for EAP issues (p <.001) was found. Post-hoc analysis (Tukey’s test) showed that total follow-up hour in personal issues was statistically significant higher than that in handling workplace issues (p <.001). However, there was no statistically significant interaction effect between gender and EAP issues (p=.879) and between job ranking and EAP issues (p=.843). Conclusion: Telephone counselling is a very common intervention in addressing EAP issues arising from workplace and personal level in Hong Kong. It was frequently used to handle interpersonal relationships and the service usage was independent of gender and job ranking.

Keywords: employee assistance program, follow-up time, interpersonal relationships, telephone counselling

Procedia PDF Downloads 182
4154 An intelligent Troubleshooting System and Performance Evaluator for Computer Network

Authors: Iliya Musa Adamu

Abstract:

This paper seeks to develop an expert system that would troubleshoot computer network and evaluate the network system performance so as to reduce the workload on technicians and increase the efficiency and effectiveness of solutions proffered to computer network problems. The platform of the system was developed using ASP.NET, whereas the codes are implemented in Visual Basic and integrated with SQL Server 2005. The knowledge base was represented using production rule, whereas the searching method that was used in developing the network troubleshooting expert system is the forward-chaining-rule-based-system. This software tool offers the advantage of providing an immediate solution to most computer network problems encountered by computer users.

Keywords: expert system, forward chaining rule based system, network, troubleshooting

Procedia PDF Downloads 610
4153 An Exploration of Nursing Assistants' Continuing Professional Development (CPD) Engagement in a Acute Healthcare Setting: A Qualitative Case Study Pilot in England

Authors: Ana Fouto

Abstract:

Background: Continuing Personal Development (CPD) enables professionals to keep up to date with the professional requirements, broadening their knowledge and expertise. However, much of the research explores the registered professionals’ experiences and the factors that influence their choice of engaging, despite the unregistered staff providing the majority of the direct patient care. Aim: To explore the Nursing/Midwifery Assistants’ (NAs) perception of the concept of CPD, as well as explore the factors that influence the NAs to engage (or not) with CPD experiences. Methodology: This pilot study used a qualitative approach through a case study, where a semi-structured interview was applied to three NAs to explore the factors that influence the decision-making of process of CPD engagement. Thematic analysis was used to analyse their answers and interpret patterns and associations. Findings: All the participants agreed that CPD is important and relevant to their practice and personal lives. Five main categories were identified: NAs’ scope of practice, the impact of CPD; decision-making process; challenges; changes required. Although similar findings to the registered nurses were identified, the lack of CPD regulation for NAs and the rapid evolution of their role make the CPD engagement more problematic. Conclusion: Engagement with CPD is influenced by a wide range of professional (organisational and national) and personal factors. NAs perceive lack of management support at different stages of the CPD activities as a main influence. Organisations should be more flexible in the recruitment, offer of CPD choices, content, delivery, and contractual arrangements of NAs, which may increase engagement.

Keywords: nursing assistants, engagement, factors, pilot, continuing professional development (CPD)

Procedia PDF Downloads 116
4152 Artificially Intelligent Context Aware Personal Computer Assistant (ACPCA)

Authors: Abdul Mannan Akhtar

Abstract:

In this paper a novel concept of a self learning smart personalized computer assistant (ACPCA) is established which is a context aware system. Based on user habits, moods, and other routines/situational reactions the system will manage various services and suggestions at appropriate times including what schedule to follow, what to watch, what software to be used, what should be deleted etc. This system will utilize a hybrid fuzzyNeural model to predict what the user will do next and support his actions. This will be done by establishing fuzzy sets of user activities, choices, preferences etc. and utilizing their combinations to predict his moods and immediate preferences. Various application of context aware systems exist separately e.g. on certain websites for music or multimedia suggestions but a personalized autonomous system that could adapt to user’s personality does not exist at present. Due to the novelty and massiveness of this concept, this paper will primarily focus on the problem establishment, product features and its functionality; however a small mini case is also implemented on MATLAB to demonstrate some of the aspects of ACPCA. The mini case involves prediction of user moods, activity, routine and food preference using a hybrid fuzzy-Neural soft computing technique.

Keywords: context aware systems, APCPCA, soft computing techniques, artificial intelligence, fuzzy logic, neural network, mood detection, face detection, activity detection

Procedia PDF Downloads 431
4151 Design and Development of Automatic Onion Harvester

Authors: P. Revathi, T. Mrunalini, K. Padma Priya, P. Ramya, R. Saranya

Abstract:

During the tough times of covid, those people who were hospitalized found it difficult to always convey what they wanted to or needed to the attendee. Sometimes the attendees might also not be there. In that case, the patients can use simple hand gestures to control electrical appliances (like its set it for a zero watts bulb)and three other gestures for voice note intimation. In this AI-based hand recognition project, NodeMCU is used for the control action of the relay, and it is connected to the firebase for storing the value in the cloud and is interfaced with the python code via raspberry pi. For three hand gestures, a voice clip is added for intimation to the attendee. This is done with the help of Google’s text to speech and the inbuilt audio file option in the raspberry pi 4. All the 5 gestures will be detected when shown with their hands via a webcam which is placed for gesture detection. A personal computer is used for displaying the gestures and for running the code in the raspberry pi imager.

Keywords: onion harvesting, automatic pluging, camera, raspberry pi

Procedia PDF Downloads 164
4150 The Interrelationship between Aggression and Frustration Brought about by Computer Games with Incentives among LPU Male Students

Authors: Dior Grita F. De Torres, Edielyn Gonzalvo, Jovielyn Manibo

Abstract:

The experimental study aims to measure the level of aggression and frustration brought about by computer games with incentives and the interrelationship of the said variables. With 50 participants for each four groups, a total of 200 males who are avid of playing computer games participated in the study. The results and analyses presented in the study concluded that incentives differentially affect the level of aggression and frustration of the players with tobt = 7.18 and 6.521 > tcrit = 2.021 using t-test for dependent groups and Fobt = 4.527 and 8.340 > Fcrit = 3.89 using ANOVA with alpha level of 0.05, two tailed. At the same time, computer game’s level of difficulty also affects the level of aggression and frustration of the players with tobt = 7.53 and 4.783 > tcrit = 2.021 respectively and Fobt = 6.524 and 10.167 > Fcrit = 3.89. Moreover, there is also an interaction between incentive and the level of difficulty of computer game with tobt = 9.68 for aggression and tobt = 7.356 > 2.021 for frustration. Computer games and /with incentives has a large effect on the among male students of LPU.

Keywords: aggression, frustration, computer game, incentive

Procedia PDF Downloads 510
4149 Advancement of Computer Science Research in Nigeria: A Bibliometric Analysis of the Past Three Decades

Authors: Temidayo O. Omotehinwa, David O. Oyewola, Friday J. Agbo

Abstract:

This study aims to gather a proper perspective of the development landscape of Computer Science research in Nigeria. Therefore, a bibliometric analysis of 4,333 bibliographic records of Computer Science research in Nigeria in the last 31 years (1991-2021) was carried out. The bibliographic data were extracted from the Scopus database and analyzed using VOSviewer and the bibliometrix R package through the biblioshiny web interface. The findings of this study revealed that Computer Science research in Nigeria has a growth rate of 24.19%. The most developed and well-studied research areas in the Computer Science field in Nigeria are machine learning, data mining, and deep learning. The social structure analysis result revealed that there is a need for improved international collaborations. Sparsely established collaborations are largely influenced by geographic proximity. The funding analysis result showed that Computer Science research in Nigeria is under-funded. The findings of this study will be useful for researchers conducting Computer Science related research. Experts can gain insights into how to develop a strategic framework that will advance the field in a more impactful manner. Government agencies and policymakers can also utilize the outcome of this research to develop strategies for improved funding for Computer Science research.

Keywords: bibliometric analysis, biblioshiny, computer science, Nigeria, science mapping

Procedia PDF Downloads 73
4148 Assessing a Potential Conceive Design Implement Operate Curricular Change in an Engineering Degree

Authors: L. Miranda

Abstract:

The requirements of the engineering education are nowadays very broad and demand a set of skills which demands not only technical knowledge but also the ability to lead and innovate and personal and interpersonal skills. A framework for the assessment of a potential curricular change is necessary to guide the analysis of the program with respect to the stakeholders and the legislation of the country, in order to develop appropriate learning outcomes. A Conceive-Design-Implement-Operate (CDIO) approach was chosen for an evaluation conducted in a mechanical engineering degree in Brazil. The work consisted in the application of a survey with students and professors and a literature review of the legislation and studies that raised the required competences and skills for the modern engineer. The results show a great potential for a CDIO set of skills in engineering degrees in Brazil and reveal the frequent demands of stakeholders before a curricular change.

Keywords: curriculum change, conceive design implement operate, accreditation, personal and interpersonal skills

Procedia PDF Downloads 334
4147 Information Tree: Establishment of Lifestyle-Based IT Visual Model

Authors: Chiung-Hui Chen

Abstract:

Traditional service channel is losing its edge due to emerging service technology. To establish interaction with the clients, the service industry is using effective mechanism to give clients direct access to services with emerging technologies. Thus, as service science receives attention, special and unique consumption pattern evolves; henceforth, leading to new market mechanism and influencing attitudes toward life and consumption patterns. The market demand for customized services is thus valued due to the emphasis of personal value, and is gradually changing the demand and supply relationship in the traditional industry. In respect of interior design service, in the process of traditional interior design, a designer converts to a concrete form the concept generated from the ideas and needs dictated by a user (client), by using his/her professional knowledge and drawing tool. The final product is generated through iterations of communication and modification, which is a very time-consuming process. Although this process has been accelerated with the help of computer graphics software today, repeated discussions and confirmations with users are still required to complete the task. In consideration of what is addressed above a space user’s life model is analyzed with visualization technique to create an interaction system modeled after interior design knowledge. The space user document intuitively personal life experience in a model requirement chart, allowing a researcher to analyze interrelation between analysis documents, identify the logic and the substance of data conversion. The repeated data which is documented are then transformed into design information for reuse and sharing. A professional interior designer may sort out the correlation among user’s preference, life pattern and design specification, thus deciding the critical design elements in the process of service design.

Keywords: information design, life model-based, aesthetic computing, communication

Procedia PDF Downloads 270
4146 E4D-MP: Time-Lapse Multiphysics Simulation and Joint Inversion Toolset for Large-Scale Subsurface Imaging

Authors: Zhuanfang Fred Zhang, Tim C. Johnson, Yilin Fang, Chris E. Strickland

Abstract:

A variety of geophysical techniques are available to image the opaque subsurface with little or no contact with the soil. It is common to conduct time-lapse surveys of different types for a given site for improved results of subsurface imaging. Regardless of the chosen survey methods, it is often a challenge to process the massive amount of survey data. The currently available software applications are generally based on the one-dimensional assumption for a desktop personal computer. Hence, they are usually incapable of imaging the three-dimensional (3D) processes/variables in the subsurface of reasonable spatial scales; the maximum amount of data that can be inverted simultaneously is often very small due to the capability limitation of personal computers. Presently, high-performance or integrating software that enables real-time integration of multi-process geophysical methods is needed. E4D-MP enables the integration and inversion of time-lapsed large-scale data surveys from geophysical methods. Using the supercomputing capability and parallel computation algorithm, E4D-MP is capable of processing data across vast spatiotemporal scales and in near real time. The main code and the modules of E4D-MP for inverting individual or combined data sets of time-lapse 3D electrical resistivity, spectral induced polarization, and gravity surveys have been developed and demonstrated for sub-surface imaging. E4D-MP provides capability of imaging the processes (e.g., liquid or gas flow, solute transport, cavity development) and subsurface properties (e.g., rock/soil density, conductivity) critical for successful control of environmental engineering related efforts such as environmental remediation, carbon sequestration, geothermal exploration, and mine land reclamation, among others.

Keywords: gravity survey, high-performance computing, sub-surface monitoring, electrical resistivity tomography

Procedia PDF Downloads 121
4145 Intuitional Insight in Islamic Mysticism

Authors: Maryam Bakhtyar, Pegah Akrami

Abstract:

Intuitional insight or mystical cognition is a different insight from common, concrete and intellectual insights. This kind of insight is not achieved by visionary contemplation but by the recitation of God, self-purification, and mystical life. In this insight, there is no distance or medium between the subject of cognition and its object, and they have a sort of unification, unison, and incorporation. As a result, knowledgeable consider this insight as direct, immediate, and personal. The goal of this insight is God, cosmos’ creatures, and the general inner and hidden aspect of the world that is nothing except God’s manifestations in the view of mystics. AS our common cognitions have diversity and stages, intuitional insight also has diversity and levels. As our senses are divided into concrete and rational, mystical discovery is divided into superficial discovery and spiritual one. Based on Islamic mystics, the preferable way to know God and believe in him is intuitional insight. There are two important criteria for evaluating mystical intuition, especially for beginner mystics of intellect and revelation. Indeed, the conclusion and a brief evaluation of Islamic mystics’ viewpoint is the main subject of this paper.

Keywords: intuition, discovery, mystical insight, personal knowledge, superficial discovery, spiritual discovery

Procedia PDF Downloads 62
4144 A Pattern Practise for Awareness Educations on Information Security: Information Security Project

Authors: Fati̇h Apaydin

Abstract:

Education technology is an area which constantly changes and creates innovations. As an inevitable part of the changing circumstances, the societies who have a tendency to the improvements keep up with these innovations by using the methods and strategies which have been designed for education technology. At this point, education technology has taken the responsibility to help the individuals improve themselves and teach the effective teaching methods by filling the airs in theoretical information, information security and the practice. The technology which comes to the core of our lives by raising the importance of it day by day and it enforced its position in computer- based environments. As a result, ‘being ready for technological innovations, improvement on computer-based talent, information, ability and attitude’ doctrines have to be given. However, it is today quite hard to deal with the security and reinforcement of this information. The information which is got illegally gives harm to society from every aspect, especially education. This study includes how and to what extent to use these innovative appliances such as computers and the factor of information security of these appliances in computer-based education. As the use of computer is constantly becoming prevalent in our country, both education and computer will never become out of date, so how computer-based education affects our lives and the study of information security for this type of education are important topics.

Keywords: computer, information security, education, technology, development

Procedia PDF Downloads 556
4143 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 117
4142 Interface between Personal Values and Social Entrepreneurship in Social Projects That Develop Sports Practice

Authors: Leticia Lengler, Jefferson Oliveira, Vania Estivalete, Jordana Marques Kneipp

Abstract:

The context of social, economic and environmental transformations has driven innumerable changes in the organizational environment, influencing the social interactions that occur in this scenario. In this sense, social entrepreneurship emerges as a unique opportunity to challenge, question, rethink certain concepts and traditional theories widely discussed in relation to entrepreneurship. Therefore, the interest in studying personal values has been based on the idea that they might be predictors of the behavior of individuals. As an attempt to relate personal values with the characteristics of social entrepreneurs, this study aims to investigate the salient values and the social entrepreneurship perceptions that occur in two social projects responsible for developing sports skills among the students. For purposes of analysis, it is intended to consider: (i) a description of both Social Projects and their respective institutions, considering their history and relevance in the context; (ii) analysis of the personal values of the idealizers and teachers responsible for the projects, (iii) identification of the characteristics of social entrepreneurship manifested in the two projects, and (iv) discussion of similarities and disparities of the categories identified among the participants of the projects. Therefore, this study will carry a qualitative analysis from the interviews with 10 participants of each social project (named Projeto Remar/ASENA and Projeto Mãos Dadas/JUDÔ SANTA MARIA): 2 projects coordinators, 2 students, 2 parents of students, 2 physical education internships and 2 businessmen who stablished a partnership with each project. The data collection will be done through semi-structured interviews that are going to last around 30 minutes each, being recorded, transcribed and later analyzed, through the categorical analysis. The option for categorical analysis is supported by the fact that it is the best alternative when one wants to study values, opinions, attitudes and beliefs, through qualitative ones. In the present research, the pre-analysis phase consisted of an organization of the material collected during the research with Remar and Mãos Dadas Project, and a dynamic reading of this material, seeking to identify the characteristics of social entrepreneurship and values addressed in the study. In the analytical description phase, a more in-depth analysis of the material collected in the research will be carried out. The third phase, referred to as referential interpretation or treatment of results obtained will allow to verify the homogeneity and the heterogeneity among the participants' perceptions of the projects. Some preliminary results coming from the first interviews revealed the projects are guided by values such as cooperation, respect, well-being and nature preservation. These values are linked to the social entrepreneurship perception of the projects managers, who established their activities in behalf of the local community.

Keywords: personal values, social entrepreneurship, social projects, sports participants

Procedia PDF Downloads 326
4141 Analysis of Expert Possibilities While Identifying Human Teeth

Authors: Saule Mussabekova

Abstract:

Forensic investigation of human teeth plays an important role in detection of crime, particularly in cases of personal identification of dead bodies changed by putrefactive processes or skeletonized bodies as well as when finding bodies of unknown persons. 152 teeth have been investigated; 85 of them belonged to men and 67 belonged to women taken from alive people of different age. Teeth have been investigated after extraction. Two types of teeth have been investigated: teeth without integrity violation of dental crown and teeth with different degrees of its violation. Additionally, 517 teeth have been investigated that were collected from dead bodies, 252 of which belonged to women and 265 belonged to men, whatever the cause of death with death limitation from 1 month to 20 years. Isohemagglutinating serums and Coliclons of different series have been used for the research of tooth-group specificity by serological methods according to the AB0 system. Standard protocols of different techniques have been used for DNA purification from teeth (by reagent Chelex 100 produced by Bio-Rad using reagent kit 'DNA IQTM System' produced by Promega company (USA) and using columns 'QIAamp DNA Investigator Kit' produced by Qiagen company). Results of comparative forensic investigation of human teeth using serological and molecular genetic methods have shown that use of serological methods for forensic identification is sensible only in cases of preselection prior to the next molecular genetic investigation as well as in cases of impossibility of corresponding genetic investigation for different objective reasons. A number of advantages of methods of molecular genetics in the dental investigation have been marked, particularly in putrefactive changes, in personal identification. Key moments of modern condition of personal identification have been reflected according to dental state. Prospective directions of advance preparation of material have been emphasized for identification of teeth in forensic practice.

Keywords: dental state, forensic identification, molecular genetic analysis, teeth

Procedia PDF Downloads 116
4140 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 327
4139 A Pervasive System Architecture for Smart Environments in Internet of Things Context

Authors: Patrick Santos, João Casal, João Santos Luis Varandas, Tiago Alves, Carlos Romeiro, Sérgio Lourenço

Abstract:

Nowadays, technology makes it possible to, in one hand, communicate with various objects of the daily life through the Internet, and in the other, put these objects interacting with each other through this channel. Simultaneously, with the raise of smartphones as the most ubiquitous technology on persons lives, emerge new agents for these devices - Intelligent Personal Assistants. These agents have the goal of helping the user manage and organize his information as well as supporting the user in his/her day-to-day tasks. Moreover, other emergent concept is the Cloud Computing, which allows computation and storage to get out of the users devices, bringing benefits in terms of performance, security, interoperability and others. Connecting these three paradigms, in this work we propose an architecture for an intelligent system which provides an interface that assists the user on smart environments, informing, suggesting actions and allowing to manage the objects of his/her daily life.

Keywords: internet of things, cloud, intelligent personal assistant, architecture

Procedia PDF Downloads 477
4138 Competencies of a Commercial Grain Farmer: A Classic Grounded Theory Approach

Authors: Thapelo Jacob Moloi

Abstract:

This paper purports to present the findings in relation to the competencies of commercial grain farmers using a classic grounded theory method. A total of about eighteen semi-structured interviews with farmers, former farmers, farm workers, and agriculture experts were conducted. Findings explored competencies in the form of skills, knowledge and personal attributes that commercial grain farmers possess. Skills range from production skills, financial management skill, time management skill, human resource management skill, planning skill to mechanical skill. Knowledge ranges from soil preparation, locality, and technology to weather knowledge. The personal attributes that contribute to shaping a commercial grain farmer are so many, but for this study, seven stood out as a passion, work dedication, self-efficacy, humbleness, intelligence, emotional stability, and patience.

Keywords: grain farming, farming competencies, classic grounded theory, competency model

Procedia PDF Downloads 44
4137 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy

Authors: Abdullah Al Mamun, Talal Alkharobi

Abstract:

As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.

Keywords: big data, cloud computing, cryptography, hadoop, public key

Procedia PDF Downloads 289
4136 A Study on Occupational Injuries among Building Construction Workers in Bhubaneswar City Odisha

Authors: Rahul Pal

Abstract:

In India, construction industry plays a vital role in the development of infrastructures. It is one of the most hazardous industries. Construction workers are a group that is particularly vulnerable to health risks because they have few legal protection. India has the world’s highest accident rate among construction workers. This study aimed to investigate the prevalence of occupation injury among construction workers and to find out the factors responsible for such injuries. Methodology: A cross-sectional study using a semi-structured questionnaire among 305 construction workers in Bhubaneswar city. In this study, it was found that the overall prevalence of injury was 43.28% in the previous one year period. Majority of the construction workers were less experience in the construction work. Factors responsible for injuries are fall of the object followed by striking, and majority of the workers reported their injuries to have occurred in the summer season. And most of the construction workers are not using personal protective equipment (PPE). Conclusion: Given the occupational injuries, the majority of the construction workers are injured in this study; there is a need to address this issue to ensure necessary step for the safety and well-being of construction workers.

Keywords: construction, construction workers, occupational injuries, personal protective equipment

Procedia PDF Downloads 168
4135 Mitigating the Negative Health Effects from Stress - A Social Network Analysis

Authors: Jennifer A. Kowalkowski

Abstract:

Production agriculture (farming) is a physically, emotionally, and cognitively stressful occupation, where workers have little control over the stressors that impact both their work and their lives. In an occupation already rife with hazards, these occupational-related stressors have been shown to increase farm workers’ risks for illness, injury, disability, and death associated with their work. Despite efforts to mitigate the negative health effects from occupational-related stress (ORS) and to promote health and well-being (HWB) among farmers in the US, marked improvements have not been attained. Social support accessed through social networks has been shown to buffer against the negative health effects from stress, yet no studies have directly examined these relationships among farmers. The purpose of this study was to use social network analysis to explore the social networks of farm owner-operators and the social supports available to them for mitigating the negative health effects of ORS. A convenience sample of 71 farm owner-operators from a Midwestern County in the US completed and returned a mailed survey (55.5% response rate) that solicited information about their social networks related to ORS. Farmers reported an average of 2.4 individuals in their personal networks and higher levels of comfort discussing ORS with female network members. Farmers also identified few connections (3.4% density) and indicated low comfort with members of affiliation networks specific to ORS. Findings from this study highlighted that farmers accessed different social networks and resources for their personal HWB than for issues related to occupational(farm-related) health and safety. In addition, farmers’ social networks for personal HWB were smaller, with different relational characteristics than reported in studies of farmers’ social networks related to occupational health and safety. Collectively, these findings suggest that farmers conceptualize personal HWB differently than farm health and safety. Therefore, the same research approaches and targets that guide occupational health and safety research may not be appropriate for personal HWB for farmers. Interventions and programming targeting ORS and HWB have largely been offered through the same platforms or mechanisms as occupational health and safety programs. This may be attributed to the significant overlap between the farm as a family business and place of residence, or that ORS stems from farm-related issues. However, these assumptions translated to health research of farmers and farm families from the occupational health and safety literature have not been directly studied or challenged. Thismay explain why past interventions have not been effective at improving health outcomes for farmers and farm families. A close examination of findings from this study raises important questions for researchers who study agricultural health. Findings from this study have significant implications for future research agendas focused on addressing ORS, HWB, and health disparities for farmersand farm families.

Keywords: agricultural health, occupational-related stress, social networks, well-being

Procedia PDF Downloads 70
4134 Transforming Personal Healthcare through Patient Engagement: An In-Depth Analysis of Tools and Methods for the Digital Age

Authors: Emily Hickmann, Peggy Richter, Maren Kaehlig, Hannes Schlieter

Abstract:

Patient engagement is a cornerstone of high-quality care and essential for patients with chronic diseases to achieve improved health outcomes. Through digital transformation, possibilities to engage patients in their personal healthcare have multiplied. However, the exploitation of this potential is still lagging. To support the transmission of patient engagement theory into practice, this paper’s objective is to give a state-of-the-art overview of patient engagement tools and methods. A systematic literature review was conducted. Overall, 56 tools and methods were extracted and synthesized according to the four attributes of patient engagement, i.e., personalization, access, commitment, and therapeutic alliance. The results are discussed in terms of their potential to be implemented in digital health solutions under consideration of the “computers are social actors” (CASA) paradigm. It is concluded that digital health can catalyze patient engagement in practice, and a broad future research agenda is formulated.

Keywords: chronic diseases, digitalization, patient-centeredness, patient empowerment, patient engagement

Procedia PDF Downloads 59
4133 Learning Based on Computer Science Unplugged in Computer Science Education: Design, Development, and Assessment

Authors: Eiko Takaoka, Yoshiyuki Fukushima, Koichiro Hirose, Tadashi Hasegawa

Abstract:

Although all high school students in Japan are required to learn informatics, many of them do not learn this topic sufficiently. In response to this situation, we propose a support package for high school informatics classes. To examine what students learned and if they sufficiently understood the context of the lessons, a questionnaire survey was distributed to 186 students. We analyzed the results of the questionnaire and determined the weakest units, which were “basic computer configuration” and “memory and secondary storage”. We then developed a package for teaching these units. We propose that our package be applied in high school classrooms.

Keywords: computer science unplugged, computer science outreach, high school curriculum, experimental evaluation

Procedia PDF Downloads 353
4132 Intellectual Women: The Continuing Struggle between Marriage and Personal Dreams in Margaret Drabble's a Summer Bird-Cage and The Millstone

Authors: Ashwag Abdul-Hakeem Al-Thubaiti

Abstract:

This study aims at analysing women's hesitant attitudes towards marriage in Margaret Drabble's novels, A Summer-Bird-Cage (1964) and The Millstone (1965), to prove that these ambivalent feelings are due to their search for autonomy. The heroines' radical outlook on independence is only meant to hide their conflict regarding sex-experience and fear of intimacy, a fear that has been enhanced by their rejection of the expression of faith that considers marriage a sacred bond and instead focus on their own identity and dissolve any bond that may affect their independence. To achieve their autonomy, they have to depend on themselves financially and focus on their aspirational goals. This sharp division between the two worlds, the family life and the personal success attributes negatively to their lives and leads to a self-identity crisis. Drabble tends to solve this struggle by awakening their maternal instinct. Once they respect their physical needs and appreciate their role as it is assigned to them by nature and society, they reach a balanced identity.

Keywords: autonomy, marriage, maternity, women

Procedia PDF Downloads 534
4131 A Double Differential Chaos Shift Keying Scheme for Ultra-Wideband Chaotic Communication Technology Applied in Low-Rate Wireless Personal Area Network

Authors: Ghobad Gorji, Hasan Golabi

Abstract:

The goal of this paper is to describe the design of an ultra-wideband (UWB) system that is optimized for the low-rate wireless personal area network application. To this aim, we propose a system based on direct chaotic communication (DCC) technology. Based on this system, a 2-GHz wide chaotic signal is directly generated into the lower band of the UWB spectrum, i.e., 3.1–5.1 GHz. For this system, two simple modulation schemes, namely chaotic on-off keying (COOK) and differential chaos shift keying (DCSK), were studied before, and their performance was evaluated. We propose a modulation scheme, namely Double DCSK, to improve the performance of UWB DCC. Different characteristics of these systems, with Monte Carlo simulations based on the Additive White Gaussian Noise (AWGN) and the IEEE 802.15.4a standard channel models, are compared.

Keywords: UWB, DCC, IEEE 802.15.4a, COOK, DCSK

Procedia PDF Downloads 48
4130 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 345
4129 Inspection of Railway Track Fastening Elements Using Artificial Vision

Authors: Abdelkrim Belhaoua, Jean-Pierre Radoux

Abstract:

In France, the railway network is one of the main transport infrastructures and is the second largest European network. Therefore, railway inspection is an important task in railway maintenance to ensure safety for passengers using significant means in personal and technical facilities. Artificial vision has recently been applied to several railway applications due to its potential to improve the efficiency and accuracy when analyzing large databases of acquired images. In this paper, we present a vision system able to detect fastening elements based on artificial vision approach. This system acquires railway images using a CCD camera installed under a control carriage. These images are stitched together before having processed. Experimental results are presented to show that the proposed method is robust for detection fasteners in a complex environment.

Keywords: computer vision, image processing, railway inspection, image stitching, fastener recognition, neural network

Procedia PDF Downloads 416
4128 Encounters with the Other Sisters of the Past: the Role of Colonial History and Memory in the Adjustment of the Postcolonial Female Identity

Authors: Fatiha Kaïd Berrahal, Nassima Kaïd, Djihad Affaf Selt

Abstract:

The present paper is a comparative analysis of the Algerian writer Assia Djebar’s women of Algiers in Their Apartment (1982) and the Anglo-Egyptian Ahdaf Soueif’s The Map of Love (1999) foregrounded on the female protagonists’ painfully common colonial and patriarchal experiences, though in different geographical regions of North Africa. This study raises questions pertaining, first, to the emerging contemporary genre “Historiographic meta-fiction” in which the novels examined could be inscribed, then, the interplay of colonial history and personal memory that impinges on the development of the identity of the post-colonial female subject. As the novels alternate between the historical and the autobiographical, we currently seek to understand how it is pertinent and pressing for women to excavate the lost and occluded stories of the past for the adjustment of their present personal identities, which are undoubtedly an important part of the identity of a nation.

Keywords: postcolonial feminism, islamic feminism, memory, histoirographic metafiction

Procedia PDF Downloads 610