Search results for: user access review
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9036

Search results for: user access review

8796 A Review of the Fundamental Aspects and Dimensions of Alternative Dispute Resolution (ADR) as Important Components in the Promotion of Social Justice in Nigeria

Authors: Odoh Ben Uruchi

Abstract:

Access to Justice implies access to social and distributive Justice. Access to social justice in Nigeria remains an illusion where cases last in courts for unduly long period of time, as is currently the situation in the country. As the popular saying goes– justice delayed is justice denied. It is, however, important to underscore the point that these perspectives are not necessarily disconnected since the extent to which one can have distributive justice in any system is largely determined by the level and effectiveness of social justice in the country. Generally, Alternative Dispute Resolution (ADR) Processes are increasingly being accepted in Nigeria as appropriate mechanisms for resolving disputes. While some jurisdictions have institutionalized ADR through the concept of a Multidoor Courthouse, many other are at different stages of doing same. With these developments, it is obvious that stakeholders in the administration of justice in Nigeria, can no longer be indifferent about understanding and fully mainstreaming ADR into their various activities and professional practice. Any framework for promoting social justice in Nigeria should therefore of necessity include provision of avenues for use of ADR in the protection and enforcement of citizen’s rights. The constitutional and other legal provisions that guarantee various rights of citizens cannot of itself ensure the enjoyment of the rights in the absence of an effective framework for dispute resolution. Excessive reliance on litigation and other adversarial approaches will also fail to ensure a sound regime of social justice. There should be structured mainstreaming of alternative dispute resolution mechanisms in justice delivery if the society must provide and guarantee social justice to the citizens. This paper seeks to address some of the fundamental issues affecting the perception, knowledge and skills of ADR in the provision of social justice. In doing this, the paper proposes to unlock the full enormous potentials of Alternative Dispute Resolution (ADR) in promoting access to justice in Nigeria.

Keywords: aspects, dimensions, alternative dispute resolution, social justice

Procedia PDF Downloads 405
8795 Analyzing the Technology Affecting on the Social Integration of Students at University

Authors: Sujit K. Basak, Simon Collin

Abstract:

The aim of this paper is to examine the technology access and use on the affecting social integration of local students at university. This aim is achieved by designing a structural equation modeling (SEM) in terms of integration with peers, integration with faculty, faculty support and on the other hand, examining the socio demographic impact on the technology access and use. The collected data were analyzed using the WarpPLS 5.0 software. This study was survey based and it was conducted at a public university in Canada. The results of the study indicated that technology has a strong impact on integration with faculty, faculty support, but technology does not have an impact on integration with peers. However, the social demographic has also an impact on the technology access and use.

Keywords: faculty, integration, peer, technology access and use

Procedia PDF Downloads 481
8794 Access to Health Data in Medical Records in Indonesia in Terms of Personal Data Protection Principles: The Limitation and Its Implication

Authors: Anny Retnowati, Elisabeth Sundari

Abstract:

This research aims to elaborate the meaning of personal data protection principles on patient access to health data in medical records in Indonesia and its implications. The method uses normative legal research by examining health law in Indonesia regarding the patient's right to access their health data in medical records. The data will be analysed qualitatively using the interpretation method to elaborate on the limitation of the meaning of personal data protection principles on patients' access to their data in medical records. The results show that patients only have the right to obtain copies of their health data in medical records. There is no right to inspect directly at any time. Indonesian health law limits the principle of patients' right to broad access to their health data in medical records. This restriction has implications for the reduction of personal data protection as part of human rights. This research contribute to show that a limitaion of personal data protection may abuse the human rights.

Keywords: access, health data, medical records, personal data, protection

Procedia PDF Downloads 57
8793 Human Centred Design Approach for Public Transportation

Authors: Jo Kuys, Kirsten Day

Abstract:

Improving urban transportation systems requires an emphasis on users’ end-to-end journey experience, from the moment the user steps out of their home to when they arrive at their destination. In considering such end-to-end experiences, human centred design (HCD) must be integrated from the very beginning to generate viable outcomes for the public. An HCD approach will encourage innovative outcomes while acknowledging all factors that need to be understood along the journey. We provide evidence to show that when designing for public transportation, it is not just about the physical manifestation of a particular outcome; moreover, it’s about the context and human behaviours that need to be considered throughout the design process. Humans and their behavioural factors are vitally important to successful implementation of sustainable public transport systems. Through an in-depth literature review of HCD approaches for urban transportation systems, we provide a base to exploit the benefits and highlight the importance of including HCD in public transportation projects for greater patronage, resulting in more sustainable cities. An HCD approach is critical to all public transportation projects to understand different levels of transportation design, from the setting of transport policy to implementation to infrastructure, vehicle, and interface design.

Keywords: human centred design, public transportation, urban planning, user experience

Procedia PDF Downloads 157
8792 The Application of Fuzzy Set Theory to Mobile Internet Advertisement Fraud Detection

Authors: Jinming Ma, Tianbing Xia, Janusz Getta

Abstract:

This paper presents the application of fuzzy set theory to implement of mobile advertisement anti-fraud systems. Mobile anti-fraud is a method aiming to identify mobile advertisement fraudsters. One of the main problems of mobile anti-fraud is the lack of evidence to prove a user to be a fraudster. In this paper, we implement an application by using fuzzy set theory to demonstrate how to detect cheaters. The advantage of our method is that the hardship in detecting fraudsters in small data samples has been avoided. We achieved this by giving each user a suspicious degree showing how likely the user is cheating and decide whether a group of users (like all users of a certain APP) together to be fraudsters according to the average suspicious degree. This makes the process more accurate as the data of a single user is too small to be predictable.

Keywords: mobile internet, advertisement, anti-fraud, fuzzy set theory

Procedia PDF Downloads 148
8791 A Worldwide Assessment of Geothermal Energy Policy: Systematic, Qualitative and Critical Literature Review

Authors: Diego Moya, Juan Paredes, Clay Aldas, Ramiro Tite, Prasad Kaparaju

Abstract:

Globally, energy policy for geothermal development is addressed in different forms, depending on the economy, resources, country-development, environment aspects and technology access. Although some countries have established strong regulations and standards for geothermal exploration, exploitation and sustainable use at the policy level (government departments and institutions), others have discussed geothermal laws at legal levels (congress – a national legislative body of a country). Appropriate regulations are needed not only to meet local and international funding requirements but also to avoid speculation in the use of the geothermal resource. In this regards, this paper presents the results of a systematic, qualitative and critical literature review of geothermal energy policy worldwide addressing two scenarios: policy and legal levels. At first, literature is collected and classified from scientific and government sources regarding geothermal energy policy of the most advanced geothermal producing countries, including Iceland, New Zealand, Mexico, the USA, Central America, Italy, Japan, Philippines, Indonesia, Kenia, and Australia. This is followed by a systematic review of the literature aiming to know the best geothermal practices and what remains uncertain regarding geothermal policy implementation. This analysis is made considering the stages of geothermal production. Furthermore, a qualitative analysis is conducted comparing the findings across geothermal policies in the countries mentioned above. Then, a critical review aims to identify significant items in the field to be applied in countries with geothermal potential but with no or weak geothermal policies. Finally, patterns and relationships are detected, and conclusions are drawn.

Keywords: assessment, geothermal, energy policy, worldwide

Procedia PDF Downloads 353
8790 The Role of Indigenous Informal Local Institutions and Social Capital for Adoption of Agricultural Innovation: A Special Emphasis in Ethiopia

Authors: Molla Tadesse Lakew

Abstract:

Researchers tried to find out the socio-economic and supply-side constraint factors to adoption. However, they overlooked the role of social networks and relationships among the community. Therefore, the aims of this review were to review the roles and negative effects of social capital. Based on its contents, relevancy, and time duration, only 121 (journals, books, and paper reports) were selected. It concludes that social capital has an indispensable role in facilitating cooperation and connection between members of the farmers' community, informal and experiential knowledge sharing, and access to research-based knowledge and contributes to reducing the transaction cost of adoption. On the contrary, inside the black box of social capital, the negative effects include the exclusion of outsider’s knowledge and experiences, excessive claims on group members, and restrictions on individual freedom.

Keywords: social capital, local institutions, adoption, Ethiopia

Procedia PDF Downloads 46
8789 Diabetes Care in Detention Settings: A Systematic Review

Authors: A. Papachristou, A. Ntikoudi, L. Makris, V. Saridakis

Abstract:

Introduction: More than 10 million people are imprisoned or detained worldwide. Figures from 2011-12 show that prison inmates are more likely than the general population to suffer from chronic or infectious diseases, while most inmates are overweight or obese, and more than a quarter have high blood pressure. In 2011/12, the proportion of prisoners reporting diabetes or hyperglycemia was 899 per 10,000 prisoners, almost double the 2004 figure (483 per 10,000). It is important to ensure that this population has access to the same standard of care as people outside prisons, as access to services should be need-based. Diabetes is a public health problem associated with increased morbidity and mortality worldwide. According to the International Diabetes Federation (IDF) in 2017, approximately 425 million people worldwide had diabetes. This number is expected to increase to 629 million by 2045. Poor management of diabetes in prisons can lead to poor blood sugar control and increase the risk of complications. Aim: The aim of this review was to systematically evaluate all the available literature on diabetes care in custodial settings. Methods: An extensive literature search was conducted through electronic databases (PubMed, Scopus and CINAHL) with the terms ‘custody’, ‘diabetes Mellitus, ‘detention centers and ‘chronic disease’. Articles published in English until September 2022, were included; no other criteria on publication dates were set. Results: Most of the studies mentioned a diabetes prevalence of approximately 10%, among other common chronic. Hypertension, obesity, smoking, sedentary lifestyle were the most common comorbidities associated with diabetes. Conclusion: Good glycemic control is fundamental to managing diabetes, and while many prisoners enter prison poorly, access to regular medication and meals, as well as exercise, offers the potential for improvement. Not being able to get help as quickly as in the past can be extremely stressful, and some prisoners may deliberately raise their blood sugar levels to avoid the risk of developing hypoglycemia, especially if they know they have had previous episodes of nocturnal hypoglycemia. Thus, appropriate training and resources are critical to providing quality care to incarcerated people with diabetes.

Keywords: custody, diabetes mellitus, detention centers, chronic disease

Procedia PDF Downloads 70
8788 Immersive and Interactive Storytelling: Exploring Narratives and Online Multisensory Experience for Cultural Memory and Collective Awareness through Graphic Novel

Authors: Cristina Greco

Abstract:

The spread of the digital and we-based technologies has led to a transformation process, which has coincided with an increase in the number of cases who are beyond the mainstream storytelling and its codes on the interaction with the user. On the base of a previous research on i-docs and virtual museums, this study analyses interactive and immersive online Graphic Novel – one-page, animated, illustrated, and hybrid – to reflect on the transformational implications of this expressive form on the user perception, remembrance, and awareness. The way in which the user experiences a certain level of interaction with the story and immersion in the semantic and figurative universe would bring user’s attention, activating introspection and self-reflection processes, perception, imagination, and creativity. This would have to do with the involvement of different senses – visual, proprioceptive, tactile, auditory, and vestibular – and the activation of a phenomenon of synaesthesia (involuntary cross-modal sensory association) – where, for example, the aural reconnect the user to another sense, providing a multisensory experience. The case studies show specific forms of interactive and immersive graphic novel and reflect on application that has sought to engage innovative ways to communicate different messages and stimulate cultural memory and collective awareness. The visual semiotic and narrative analysis of the distinctive traits of such a complex textuality, along with a study of the user’s experience through observation in naturalistic settings and interviews, allows us to question the functioning of these configurations, with regard to the relationships between the figurative dimension, the perceptive activity, and their impact on the user’s engagement.

Keywords: collective awareness, cultural memory, graphic novel, interactive and immersive storytelling

Procedia PDF Downloads 121
8787 Smart Product-Service System Innovation with User Experience: A Case Study of Chunmi

Authors: Ying Yu, Wen-Chi Kuo, Tung-Jung Sung

Abstract:

The Product-Service System (PSS) has received widespread attention due to the increasing global competition in manufacturing and service markets. Today’s smart products and services are driven by Internet of things (IoT) technologies which will promote the transformation from traditional PSS to smart PSS. Although the smart PSS has some of technological achievements in businesses, it often ignores the real demands of target users when using products and services. Therefore, designers should know and learn the User Experience (UX) of smart products, services and systems. However, both of academia and industry still lack relevant development experience of smart PSS since it is an emerging field. In doing so, this is a case study of Xiaomi’s Chunmi, the largest IoT platform in the world, and addresses the two major issues: (1) why Chunmi should develop smart PSS strategies with UX; and (2) how Chunmi could successfully implement the strategic objectives of smart PSS through the design. The case study results indicated that: (1) the smart PSS can distinguish competitors by their unique UX which is difficult to duplicate; (2) early user engagement is crucial for the success of smart PSS; and (3) interaction, expectation, and enjoyment can be treated as a three-dimensional evaluation of UX design for smart PSS innovation. In conclusion, the smart PSS can gain competitive advantages through good UX design in the market.

Keywords: design, smart PSS, user experience, user engagement

Procedia PDF Downloads 109
8786 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 255
8785 A Systematic Review of the Predictors, Mediators and Moderators of the Uncanny Valley Effect in Human-Embodied Conversational Agent Interaction

Authors: Stefanache Stefania, Ioana R. Podina

Abstract:

Background: Embodied Conversational Agents (ECAs) are revolutionizing education and healthcare by offering cost-effective, adaptable, and portable solutions. Research on the Uncanny Valley effect (UVE) involves various embodied agents, including ECAs. Achieving the optimal level of anthropomorphism, no consensus on how to overcome the uncanniness problem. Objectives: This systematic review aims to identify the user characteristics, agent features, and context factors that influence the UVE. Additionally, this review provides recommendations for creating effective ECAs and conducting proper experimental studies. Methods: We conducted a systematic review following the PRISMA 2020 guidelines. We included quantitative, peer-reviewed studies that examined human-ECA interaction. We identified 17,122 relevant records from ACM Digital Library, IEE Explore, Scopus, ProQuest, and Web of Science. The quality of the predictors, mediators, and moderators adheres to the guidelines set by prior systematic reviews. Results: Based on the included studies, it can be concluded that females and younger people perceive the ECA as more attractive. However, inconsistent findings exist in the literature. ECAs characterized by extraversion, emotional stability, and agreeableness are considered more attractive. Facial expressions also play a role in the UVE, with some studies indicating that ECAs with more facial expressions are considered more attractive, although this effect is not consistent across all studies. Few studies have explored contextual factors, but they are nonetheless crucial. The interaction scenario and exposure time are important circumstances in human-ECA interaction. Conclusions: The findings highlight a growing interest in ECAs, which have seen significant developments in recent years. Given this evolving landscape, investigating the risk of the UVE can be a promising line of research.

Keywords: human-computer interaction, uncanny valley effect, embodied conversational agent, systematic review

Procedia PDF Downloads 43
8784 Practice Patterns of Physiotherapists for Learners with Disabilities at Special Schools: A Scoping Review

Authors: Lubisi L. V., Madumo M. B., Mudau N. P., Makhuvele L., Sibuyi M. M.

Abstract:

Background and Aims: Learners with disabilities can be integrated into mainstream schools, whereas there are those learners that are accommodated in special schools based on the support needs they require. These needs, among others, pertain to access to high-intensity therapeutic support by physiotherapists, occupational therapists, and speech therapists. However, access to physiotherapists in low- and middle-income countries is limited, and this creates a knowledge gap in identifying, to the best of our knowledge, best practice patterns aligned with physiotherapy at special schools. This gap compromises the quality of support to be rendered towards strengthening rehabilitation and optimising the participation of learners with disabilities in special schools. The aim of the scoping review was to map the evidence on practice patterns employed by physiotherapists at special schools for learners with disabilities. Methods: The Preferred Reporting Items for Systematic Review and Meta-Analysis (PRISMA) guidelines were followed. Key terms regarding physiotherapy practice patterns for learners with disabilities at special schools were used to search the literature on the databases. Literature was sourced from Google Scholar, EBSCO, PEDro, PubMed, and Research Gate from 2013 to 2023. A total of 28 articles were initially retrieved and after a process of screening and exclusion, nine articles were included. All the researchers reviewed the articles for eligibility. Articles were initially screened based on the titles, followed by full text. Articles written in English or translated into English mentioned physical / physiotherapy interventions in special schools, both published and unpublished, were included. A qualitative data extraction template was developed and an inductive approach to thematic data analysis was used for included articles to see which themes emerged. Results: Three themes emerged after inductive thematic data analysis. 1. Collaboration with educators, parents, and therapists 2. Family Centred Approach 3. Telehealth. Conclusion: Collaboration is key in delivering therapeutic support to learners with disabilities at special schools. Physiotherapists need to be collaborators at the level of interprofessional and transprofessional. In addition, they need to explore technology to work remotely, especially when learners become absent physically from school.

Keywords: learners with disabilities, special school, physiotherapists, therapeutic support

Procedia PDF Downloads 28
8783 A Hybrid Recommendation System Based on Association Rules

Authors: Ahmed Mohammed Alsalama

Abstract:

Recommendation systems are widely used in e-commerce applications. The engine of a current recommendation system recommends items to a particular user based on user preferences and previous high ratings. Various recommendation schemes such as collaborative filtering and content-based approaches are used to build a recommendation system. Most of the current recommendation systems were developed to fit a certain domain such as books, articles, and movies. We propose a hybrid framework recommendation system to be applied on two-dimensional spaces (User x Item) with a large number of Users and a small number of Items. Moreover, our proposed framework makes use of both favorite and non-favorite items of a particular user. The proposed framework is built upon the integration of association rules mining and the content-based approach. The results of experiments show that our proposed framework can provide accurate recommendations to users.

Keywords: data mining, association rules, recommendation systems, hybrid systems

Procedia PDF Downloads 431
8782 Ultra-Reliable Low Latency V2X Communication for Express Way Using Multiuser Scheduling Algorithm

Authors: Vaishali D. Khairnar

Abstract:

The main aim is to provide lower-latency and highly reliable communication facilities for vehicles in the automobile industry; vehicle-to-everything (V2X) communication basically intends to increase expressway road security and its effectiveness. The Ultra-Reliable Low-Latency Communications (URLLC) algorithm and cellular networks are applied in combination with Mobile Broadband (MBB). This is particularly used in express way safety-based driving applications. Expressway vehicle drivers (humans) will communicate in V2X systems using the sixth-generation (6G) communication systems which have very high-speed mobility features. As a result, we need to determine how to ensure reliable and consistent wireless communication links and improve the quality to increase channel gain, which is becoming a challenge that needs to be addressed. To overcome this challenge, we proposed a unique multi-user scheduling algorithm for ultra-massive multiple-input multiple-output (MIMO) systems using 6G. In wideband wireless network access in case of high traffic and also in medium traffic conditions, moreover offering quality-of-service (QoS) to distinct service groups with synchronized contemporaneous traffic on the highway like the Mumbai-Pune expressway becomes a critical problem. Opportunist MAC (OMAC) is a way of proposing communication across a wireless communication link that can change in space and time and might overcome the above-mentioned challenge. Therefore, a multi-user scheduling algorithm is proposed for MIMO systems using a cross-layered MAC protocol to achieve URLLC and high reliability in V2X communication.

Keywords: ultra-reliable low latency communications, vehicle-to-everything communication, multiple-input multiple-output systems, multi-user scheduling algorithm

Procedia PDF Downloads 53
8781 Building User Behavioral Models by Processing Web Logs and Clustering Mechanisms

Authors: Madhuka G. P. D. Udantha, Gihan V. Dias, Surangika Ranathunga

Abstract:

Today Websites contain very interesting applications. But there are only few methodologies to analyze User navigations through the Websites and formulating if the Website is put to correct use. The web logs are only used if some major attack or malfunctioning occurs. Web Logs contain lot interesting dealings on users in the system. Analyzing web logs has become a challenge due to the huge log volume. Finding interesting patterns is not as easy as it is due to size, distribution and importance of minor details of each log. Web logs contain very important data of user and site which are not been put to good use. Retrieving interesting information from logs gives an idea of what the users need, group users according to their various needs and improve site to build an effective and efficient site. The model we built is able to detect attacks or malfunctioning of the system and anomaly detection. Logs will be more complex as volume of traffic and the size and complexity of web site grows. Unsupervised techniques are used in this solution which is fully automated. Expert knowledge is only used in validation. In our approach first clean and purify the logs to bring them to a common platform with a standard format and structure. After cleaning module web session builder is executed. It outputs two files, Web Sessions file and Indexed URLs file. The Indexed URLs file contains the list of URLs accessed and their indices. Web Sessions file lists down the indices of each web session. Then DBSCAN and EM Algorithms are used iteratively and recursively to get the best clustering results of the web sessions. Using homogeneity, completeness, V-measure, intra and inter cluster distance and silhouette coefficient as parameters these algorithms self-evaluate themselves to input better parametric values to run the algorithms. If a cluster is found to be too large then micro-clustering is used. Using Cluster Signature Module the clusters are annotated with a unique signature called finger-print. In this module each cluster is fed to Associative Rule Learning Module. If it outputs confidence and support as value 1 for an access sequence it would be a potential signature for the cluster. Then the access sequence occurrences are checked in other clusters. If it is found to be unique for the cluster considered then the cluster is annotated with the signature. These signatures are used in anomaly detection, prevent cyber attacks, real-time dashboards that visualize users, accessing web pages, predict actions of users and various other applications in Finance, University Websites, News and Media Websites etc.

Keywords: anomaly detection, clustering, pattern recognition, web sessions

Procedia PDF Downloads 258
8780 Emotion Classification Using Recurrent Neural Network and Scalable Pattern Mining

Authors: Jaishree Ranganathan, MuthuPriya Shanmugakani Velsamy, Shamika Kulkarni, Angelina Tzacheva

Abstract:

Emotions play an important role in everyday life. An-alyzing these emotions or feelings from social media platforms like Twitter, Facebook, blogs, and forums based on user comments and reviews plays an important role in various factors. Some of them include brand monitoring, marketing strategies, reputation, and competitor analysis. The opinions or sentiments mined from such data helps understand the current state of the user. It does not directly provide intuitive insights on what actions to be taken to benefit the end user or business. Actionable Pattern Mining method provides suggestions or actionable recommendations on what changes or actions need to be taken in order to benefit the end user. In this paper, we propose automatic classification of emotions in Twitter data using Recurrent Neural Network - Gated Recurrent Unit. We achieve training accuracy of 87.58% and validation accuracy of 86.16%. Also, we extract action rules with respect to the user emotion that helps to provide actionable suggestion.

Keywords: emotion mining, twitter, recurrent neural network, gated recurrent unit, actionable pattern mining

Procedia PDF Downloads 136
8779 Scheduling Method for Electric Heater in HEMS considering User’s Comfort

Authors: Yong-Sung Kim, Je-Seok Shin, Ho-Jun Jo, Jin-O Kim

Abstract:

Home Energy Management System (HEMS) which makes the residential consumers contribute to the demand response is attracting attention in recent years. An aim of HEMS is to minimize their electricity cost by controlling the use of their appliances according to electricity price. The use of appliances in HEMS may be affected by some conditions such as external temperature and electricity price. Therefore, the user’s usage pattern of appliances should be modeled according to the external conditions, and the resultant usage pattern is related to the user’s comfortability on use of each appliances. This paper proposes a methodology to model the usage pattern based on the historical data with the copula function. Through copula function, the usage range of each appliance can be obtained and is able to satisfy the appropriate user’s comfort according to the external conditions for next day. Within the usage range, an optimal scheduling for appliances would be conducted so as to minimize an electricity cost with considering user’s comfort. Among the home appliance, electric heater (EH) is a representative appliance which is affected by the external temperature. In this paper, an optimal scheduling algorithm for an electric heater (EH) is addressed based on the method of branch and bound. As a result, scenarios for the EH usage are obtained according to user’s comfort levels and then the residential consumer would select the best scenario. The case study shows the effects of the proposed algorithm compared with the traditional operation of the EH, and it also represents impacts of the comfort level on the scheduling result.

Keywords: load scheduling, usage pattern, user’s comfort, copula function, branch and bound, electric heater

Procedia PDF Downloads 555
8778 A Survey of Recognizing of Daily Living Activities in Multi-User Smart Home Environments

Authors: Kulsoom S. Bughio, Naeem K. Janjua, Gordana Dermody, Leslie F. Sikos, Shamsul Islam

Abstract:

The advancement in information and communication technologies (ICT) and wireless sensor networks have played a pivotal role in the design and development of real-time healthcare solutions, mainly targeting the elderly living in health-assistive smart homes. Such smart homes are equipped with sensor technologies to detect and record activities of daily living (ADL). This survey reviews and evaluates existing approaches and techniques based on real-time sensor-based modeling and reasoning in single-user and multi-user environments. It classifies the approaches into three main categories: learning-based, knowledge-based, and hybrid, and evaluates how they handle temporal relations, granularity, and uncertainty. The survey also highlights open challenges across various disciplines (including computer and information sciences and health sciences) to encourage interdisciplinary research for the detection and recognition of ADLs and discusses future directions.

Keywords: daily living activities, smart homes, single-user environment, multi-user environment

Procedia PDF Downloads 110
8777 Proposed Framework based on Classification of Vertical Handover Decision Strategies in Heterogeneous Wireless Networks

Authors: Shidrokh Goudarzi, Wan Haslina Hassan

Abstract:

Heterogeneous wireless networks are converging towards an all-IP network as part of the so-called next-generation network. In this paradigm, different access technologies need to be interconnected; thus, vertical handovers or vertical handoffs are necessary for seamless mobility. In this paper, we conduct a review of existing vertical handover decision-making mechanisms that aim to provide ubiquitous connectivity to mobile users. To offer a systematic comparison, we categorize these vertical handover measurement and decision structures based on their respective methodology and parameters. Subsequently, we analyze several vertical handover approaches in the literature and compare them according to their advantages and weaknesses. The paper compares the algorithms based on the network selection methods, complexity of the technologies used and efficiency in order to introduce our vertical handover decision framework. We find that vertical handovers on heterogeneous wireless networks suffer from the lack of a standard and efficient method to satisfy both user and network quality of service requirements at different levels including architectural, decision-making and protocols. Also, the consolidation of network terminal, cross-layer information, multi packet casting and intelligent network selection algorithm appears to be an optimum solution for achieving seamless service continuity in order to facilitate seamless connectivity.

Keywords: heterogeneous wireless networks, vertical handovers, vertical handover metric, decision-making algorithms

Procedia PDF Downloads 367
8776 Usability Guidelines for Arab E-Government Websites

Authors: Omyma Alosaimi, Asma Alsumait

Abstract:

The website developer and designer should follow usability guidelines to provide a user-friendly interface. Many guidelines and heuristics have been developed by previous studies to help both the developer and designer in this task, but E-government websites are special cases that require specialized guidelines. This paper introduces a set of eighteen guidelines for evaluating the usability of e-government websites in general and Arabic e-government websites specifically, along with a check list of how to apply them. The validity and effectiveness of these guidelines were evaluated against a variety of user characteristics. The results indicated that the proposed set of guidelines can be used to identify qualitative similarities and differences with user testing and that the new set is best suited for evaluating general and e-governmental usability.

Keywords: e-government, human computer interaction, usability evaluation, usability guidelines

Procedia PDF Downloads 365
8775 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 369
8774 A Multicriteria Analysis of Energy Poverty Index: A Case Study of Non-interconnected Zones in Colombia

Authors: Angelica Gonzalez O, Leonardo Rivera Cadavid, Diego Fernando Manotas

Abstract:

Energy poverty considers a population that does not have access to modern energy service. In particular, an area of a country that is not connected to the national electricity grid is known as a Non-Interconnected Zone (NIZ). Access to electricity has a significant impact on the welfare and development opportunities of the population. Different studies have shown that most health problems have an empirical cause and effect relationship with multidimensional energy poverty. Likewise, research has been carried out to review the consequences of not having access to electricity, and its results have concluded a statistically significant relationship between energy poverty and sources of drinking water, access to clean water, risks of mosquito bites, obesity, sterilization, marital status, occupation, and residence. Therefore, extensive research has been conducted in the construction of an energy poverty measure based on an index. Some of these studies introduce a Multidimensional Energy Poverty Index (MEPI), Compose Energy Poverty Index (CEPI), Low Income High Costs indicator (LIHC), among others. For this purpose, this study analyzes the energy poverty index using a multicriteria analysis determining the set of feasible alternatives - for which Colombia's ZNI will be used as a case study - to be considered in the problem and the set of relevant criteria in the characterization of the ZNI, from which the prioritization is obtained to determine the level of adjustment of each alternative with respect to the performance in each criterion. Additionally, this study considers the installation of Micro-Grids (MG). This is considered a straightforward solution to this problem because an MG is a local electrical grid, able to operate in grid-connected and island mode. Drawing on those insights, this study compares an energy poverty index considering an MG installation and calculates the impacts of different criterias in an energy poverty index in NIZ.

Keywords: multicirteria, energy poverty, rural, microgrids, non-interconnect zones

Procedia PDF Downloads 86
8773 Design Evaluation Tool for Small Wind Turbine Systems Based on the Simple Load Model

Authors: Jihane Bouabid

Abstract:

The urgency to transition towards sustainable energy sources has revealed itself imperative. Today, in the 21st Century, the intellectual society have imposed technological advancements and improvements, and anticipates expeditious outcomes as an integral component of its relentless pursuit of an elevated standard of living. As a part of empowering human development, driving economic growth and meeting social needs, the access to energy services has become a necessity. As a part of these improvements, we are introducing the project "Mywindturbine" - an interactive web user interface for design and analysis in the field of wind energy, with a particular adherence to the IEC (International Electrotechnical Commission) standard 61400-2 "Wind turbines – Part 2: Design requirements for small wind turbines". Wind turbines play a pivotal role in Morocco's renewable energy strategy, leveraging the nation's abundant wind resources. The IEC 61400-2 standard ensures the safety and design integrity of small wind turbines deployed in Morocco, providing guidelines for performance and safety protocols. The conformity with this standard ensures turbine reliability, facilitates standards alignment, and accelerates the integration of wind energy into Morocco's energy landscape. The aim of the GUI (Graphical User Interface) for engineers and professionals from the field of wind energy systems who would like to design a small wind turbine system following the safety requirements of the international standards IEC 61400-2. The interface provides an easy way to analyze the structure of the turbine machine under normal and extreme load conditions based on the specific inputs provided by the user. The platform introduces an overview to sustainability and renewable energy, with a focus on wind turbines. It features a cross-examination of the input parameters provided from the user for the SLM (Simple Load Model) of small wind turbines, and results in an analysis according to the IEC 61400-2 standard. The analysis of the simple load model encompasses calculations for fatigue loads on blades and rotor shaft, yaw error load on blades, etc. for the small wind turbine performance. Through its structured framework and adherence to the IEC standard, "Mywindturbine" aims to empower professionals, engineers, and intellectuals with the knowledge and tools necessary to contribute towards a sustainable energy future.

Keywords: small wind turbine, IEC 61400-2 standard, user interface., simple load model

Procedia PDF Downloads 23
8772 Mountain Photo Sphere: An Android Application of Mountain Hiking Street View

Authors: Yanto Budisusanto, Aulia Rachmawati

Abstract:

Land navigation technology that is being developed is Google Street View to provide 360° street views, enabling the user to know the road conditions physically with the photo display. For climbers, especially beginners, detail information of climbing terrain is needed so climbers can prepare supplies and strategies before climbing. Therefore, we built a mountaineer guide application named Mountain Photo Sphere. This application displays a 360̊ panoramic view of mountain hiking trail and important points along the hiking path and its surrounding conditions. By combining panoramic photos 360̊ and tracking paths from coordinate data, a virtual tour will be formed. It is built using Java language and Android Studio. The hiking trail map composed by Google Maps API (Gaining access to google maps), Google GEO API (Gaining access to google maps), and OpenStreetMap API (Getting map files to be accessed offline on the Application). This application can be accessed offline so that climbers can use the application during climbing activities.

Keywords: google street view, panoramic photo 360°, mountain hiking, mountain photo sphere

Procedia PDF Downloads 133
8771 Low Students' Access to University Education in Nigeria: Causes and Remedy

Authors: Robert Ogbanje Okwori

Abstract:

The paper explained the causes low students’ access to university education in Nigeria and how it can be remedied. It is discovered that low students’ access to university education in Nigeria is evident despite these number of universities in the country. In 2006/2007 academic session, 806,089 sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 123,626 (15.3%) were admitted while 2011/2012 academic session, a total of 1,493,604 candidates sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 65,073 (43.57%) were admitted. This necessitates for the research. Therefore, the study posed the following research questions. What are causes of low students’ access to university education in Nigeria? What are the challenges of students’ access to university education in Nigeria? How can students’ access to university education in Nigeria be improved? Sample survey research design was adopted for the study. A structured questionnaire was used to gather data for the study. Six hundred and eighty (680) respondents which comprised of 100 level university students; JAMB Officers and University administrators (Vice Chancellors, Registrars and Admission Officers) were used for the study. Stratified random sampling was applied for adequate representation of respondents from universities in the six geopolitical zones of Nigeria. Mean was used to answer research questions while Kuder-Richardson formula 20 was used to check the internal consistency of the instrument. The correlation coefficient of the instrument was 0.87. The major findings include the carrying capacity of each university contributes to low students’ access to university education and academic staff were inadequate. From the analysis of the study, it is concluded that the rate of access to university education is low, therefore, every university should establish distance learning programme to reduce university admission crisis. The training infrastructure in the universities should be improved upon by the owners to increase the carrying capacity of each university.

Keywords: access, causes, low, university

Procedia PDF Downloads 438
8770 Mineral Deposits in Spatial Planning Systems – Review of European Practices

Authors: Alicja Kot-Niewiadomska

Abstract:

Securing sustainable access to raw materials is vital for the growth of the European economy and for the goals laid down in Strategy Europe 2020. One of the most important sources of mineral raw materials are primary deposits. The efficient management of them, including extraction, will ensure competitiveness of the European economy. A critical element of this approach is mineral deposits safeguarding and the most important tool - spatial planning. The safeguarding of deposits should be understood as safeguarding of land access, and safeguarding of area against development, which may (potential) prevent the use of the deposit and the necessary mining activities. Many European Union countries successfully integrated their mineral policy and spatial policy, which has ensured the proper place of mineral deposits in their spatial planning systems. These, in turn, are widely recognized as the most important mineral deposit safeguarding tool, the essence of which is to ensure long-term access to its resources. The examples of Austria, Portugal, Slovakia, Czech Republic, Sweden, and the United Kingdom, discussed in the paper, are often mentioned as examples of good practices in this area. Although none of these countries managed to avoid cases of social and environmental conflicts related to mining activities, the solutions they implement certainly deserve special attention. And for many countries, including Poland, they can be a potential source of solutions aimed at improving the protection of mineral deposits.

Keywords: mineral deposits, land use planning, mineral deposit safeguarding, European practices

Procedia PDF Downloads 142
8769 Training AI to Be Empathetic and Determining the Psychotype of a Person During a Conversation with a Chatbot

Authors: Aliya Grig, Konstantin Sokolov, Igor Shatalin

Abstract:

The report describes the methodology for collecting data and building an ML model for determining the personality psychotype using profiling and personality traits methods based on several short messages of a user communicating on an arbitrary topic with a chitchat bot. In the course of the experiments, the minimum amount of text was revealed to confidently determine aspects of personality. Model accuracy - 85%. Users' language of communication is English. AI for a personalized communication with a user based on his mood, personality, and current emotional state. Features investigated during the research: personalized communication; providing empathy; adaptation to a user; predictive analytics. In the report, we describe the processes that captures both structured and unstructured data pertaining to a user in large quantities and diverse forms. This data is then effectively processed through ML tools to construct a knowledge graph and draw inferences regarding users of text messages in a comprehensive manner. Specifically, the system analyzes users' behavioral patterns and predicts future scenarios based on this analysis. As a result of the experiments, we provide for further research on training AI models to be empathetic, creating personalized communication for a user

Keywords: AI, empathetic, chatbot, AI models

Procedia PDF Downloads 63
8768 Analysis of Performance of 3T1D Dynamic Random-Access Memory Cell

Authors: Nawang Chhunid, Gagnesh Kumar

Abstract:

On-chip memories consume a significant portion of the overall die space and power in modern microprocessors. On-chip caches depend on Static Random-Access Memory (SRAM) cells and scaling of technology occurring as per Moore’s law. Unfortunately, the scaling is affecting stability, performance, and leakage power which will become major problems for future SRAMs in aggressive nanoscale technologies due to increasing device mismatch and variations. 3T1D Dynamic Random-Access Memory (DRAM) cell is a non-destructive read DRAM cell with three transistors and a gated diode. In 3T1D DRAM cell gated diode (D1) acts as a storage device and also as an amplifier, which leads to fast read access. Due to its high tolerance to process variation, high density, and low cost of memory as compared to 6T SRAM cell, it is universally used by the advanced microprocessor for on chip data and program memory. In the present paper, it has been shown that 3T1D DRAM cell can perform better in terms of fast read access as compared to 6T, 4T, 3T SRAM cells, respectively.

Keywords: DRAM Cell, Read Access Time, Retention Time, Average Power dissipation

Procedia PDF Downloads 283
8767 Network User Rules in Universities

Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson

Abstract:

This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.

Keywords: computer security, IT policy, security awareness, network user rules

Procedia PDF Downloads 531