Search results for: online trust
413 Privacy vs. National Security: Where Do We Draw the Line?
Authors: Nooraneda Mutalip Laidey
Abstract:
Privacy is sacred and would normally be expected and preserved by an individual. Online privacy is no longer about the right to be left alone, but also includes the right not to be monitored. However, with the revelations made by United States National Security Agency former employee Edward Snowden that the government is spying on internet communications, individuals’ privacy can no longer be expected. Therefore, this paper is intended to evaluate law related to privacy protection in the digital domain, who should govern it and whether invasion to a person’s privacy is a necessary justification to preserve national security.
Keywords: Cyberspace, data protection, national security, privacy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3235412 Social Media and Counseling: Opportunities, Risks and Ethical Considerations
Authors: Kyriaki G. Giota, George Kleftaras
Abstract:
The purpose of this article is to briefly review the opportunities that social media present to counselors and psychologists. Particular attention was given to understanding some of the more important common risks inherent in social media and the potential ethical dilemmas which may arise for counselors and psychologists who embrace them in their practice. Key considerations of issues pertinent to an online presence such as multiple relationships, visibility and privacy, maintaining ethical principles and professional boundaries are being discussed.
Keywords: Social Media, Counseling, Risks, Ethics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7979411 An Evaluation of Tourism Education in Nigeria’s Higher Institutions
Authors: Eldah Ephraim Buba
Abstract:
This paper evaluated the quality of tourism education in Nigeria higher education. The problem of poor quality of tourism education in Nigeria’s higher institutions prompted the study. Archival research was used with evaluation reports as secondary data, twenty evaluation reports for different polytechnics from the National board for technical education (NBTE) from 1995-2012 were assessed. The evidence from the documents shows that the quality of teaching and evaluation is fair. The programmes resources are fairly good, and most of the teachers do not have a postgraduate qualification in tourism related courses. It is therefore recommended that the institutions running tourism programmes in Nigeria need to introduce self -assessment of programmes and not rely on the NBTE accreditation which comes up in three years. Also there is need for a staff development policy that will encourage Tourism educators to further their education; The Tertiary Educational Trust Fund (TETFUND) should focus on developing staff of tourism education because it is an area of study in Nigeria that lacks qualified personnel. With the way higher institution in Nigeria are finding interest in tourism programmes, having good quality programmes will not only produce better professionals but it will help in offering better services in the industry and maximizing the impacts of the business.
Keywords: Education, evaluation tourism, quality.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 924410 Barriers and Drivers towards the Use of Childhood Vaccination Services by Undocumented Migrant Caregivers in Sabah, Malaysia: A Qualitative Analysis
Authors: Michal Christina Steven, Mohd. Yusof Hj Ibrahim, Haryati Abdul Karim, Prabakaran Dhanaraj, Kelly Alexius Mansin
Abstract:
After 27 years, Malaysia reported polio cases in 2019 involving the children of the undocumented migrants living in Sabah. These undocumented migrants present a significant challenge in achieving the elimination of vaccine-preventable diseases (VPD). Due to the recent polio outbreak among the undocumented migrant children in Sabah, an in-depth interview was conducted among the caregivers of undocumented migrant children to identify the barriers and drivers towards vaccinating their children. Financial barriers, legal citizenship status, language barrier, the COVID-19 pandemic, and physical barriers have been the barriers to access vaccination services by undocumented migrants. Five significant drivers for undocumented migrants to vaccinate their children are social influence, fear of disease, parental trust in healthcare providers, good support, and vaccine availability. Necessary action should be taken immediately to address the problems of vaccinating the children of undocumented migrants to prevent the re-emergence of VPD.
Keywords: Malaysia, polio, Sabah, undocumented migrants.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 587409 VANETs: Security Challenges and Future Directions
Authors: Jared Oluoch
Abstract:
Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2252408 e/b-Learning Activities and High School Pedagogy
Authors: Rui Antunes
Abstract:
This article presents the implementation of several different e/b-Learning collaborative activities, used to improve the students learning process in an high school Polytechnic Institution. A new learning model arises, based on a combination between face-toface and distance leaning. Learning is now becoming centered with the development of collaborative activities, and its actors (teachers and students) have to be re-socialized to a new e/b-Learning paradigm. Measuring approaches are proposed for this model and results are presented, showing prospective correlation between students learning success and the use of online collaborative activities.Keywords: e/b-Learning, Collaborative Learning, TeachingCommunities, Web-based Courseware
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1707407 E-learning for Professional Education of Personnel in a Hospital
Authors: G. Cossu, A. Esposito, G. Picco, C. Scrizzi, A. Tartaglia, E. Tresso
Abstract:
A collaboration among the Hospital S. Giovanni Battista of Turin, the Politecnico of Turin, and the MUST company is described. The content of the collaboration has been and is the use of ICT-s, e-learning, and blended learning for the internal professional education, training, and keeping up to date of the personnel of the hospital. A platform for the delivery of the teaching materials has been built, including an evaluation and self-evaluation tool. The first on line courses have been developed and delivered and many more are in preparation. The first results of the monitoring of the efficacy of the online education have been positive.Keywords: E-learning, blended learning, on line education, ICT.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1357406 A Survey on Life Science Database Citation Frequency in Scientific Literatures
Authors: Hendry Muljadi, Jiro Araki, Satoru Miyazaki, Asao Fujiyama
Abstract:
There are so many databases of various fields of life sciences available online. To find well-used databases, a survey to measure life science database citation frequency in scientific literatures is done. The survey is done by measuring how many scientific literatures which are available on PubMed Central archive cited a specific life science database. This paper presents and discusses the results of the survey.Keywords: Life science, database, metadatabase, PubMedCentral.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1426405 Product Features Extraction from Opinions According to Time
Authors: Kamal Amarouche, Houda Benbrahim, Ismail Kassou
Abstract:
Nowadays, e-commerce shopping websites have experienced noticeable growth. These websites have gained consumers’ trust. After purchasing a product, many consumers share comments where opinions are usually embedded about the given product. Research on the automatic management of opinions that gives suggestions to potential consumers and portrays an image of the product to manufactures has been growing recently. After launching the product in the market, the reviews generated around it do not usually contain helpful information or generic opinions about this product (e.g. telephone: great phone...); in the sense that the product is still in the launching phase in the market. Within time, the product becomes old. Therefore, consumers perceive the advantages/ disadvantages about each specific product feature. Therefore, they will generate comments that contain their sentiments about these features. In this paper, we present an unsupervised method to extract different product features hidden in the opinions which influence its purchase, and that combines Time Weighting (TW) which depends on the time opinions were expressed with Term Frequency-Inverse Document Frequency (TF-IDF). We conduct several experiments using two different datasets about cell phones and hotels. The results show the effectiveness of our automatic feature extraction, as well as its domain independent characteristic.
Keywords: Opinion mining, product feature extraction, sentiment analysis, SentiWordNet.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1301404 An E-Coaching Methodology for Higher Education in Saudi Arabia
Authors: Essam Almuhsin, Ben Soh, Alice Li, Azmat Ullah
Abstract:
It is widely accepted that university students must acquire new knowledge, skills, awareness, and understanding to increase opportunities for professional and personal growth. The study reveals a significant increase in users engaging in e-coaching activities and a growing need for it during the COVID-19 pandemic. The paper proposes an e-coaching methodology for higher education in Saudi Arabia to address the need for effective coaching in the current online learning environment.
Keywords: Role of e-coaching, e-coaching in higher education, Saudi higher education environment, e-coaching methodology, importance of e-coaching.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 353403 Adaptive MPC Using a Recursive Learning Technique
Authors: Ahmed Abbas Helmy, M. R. M. Rizk, Mohamed El-Sayed
Abstract:
A model predictive controller based on recursive learning is proposed. In this SISO adaptive controller, a model is automatically updated using simple recursive equations. The identified models are then stored in the memory to be re-used in the future. The decision for model update is taken based on a new control performance index. The new controller allows the use of simple linear model predictive controllers in the control of nonlinear time varying processes.
Keywords: Adaptive control, model predictive control, dynamic matrix control, online model identification
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1779402 Secure and Efficient Transmission of Aggregated Data for Mobile Wireless Sensor Networks
Authors: A. Krishna Veni, R.Geetha
Abstract:
Wireless Sensor Networks (WSNs) are suitable for many scenarios in the real world. The retrieval of data is made efficient by the data aggregation techniques. Many techniques for the data aggregation are offered and most of the existing schemes are not energy efficient and secure. However, the existing techniques use the traditional clustering approach where there is a delay during the packet transmission since there is no proper scheduling. The presented system uses the Velocity Energy-efficient and Link-aware Cluster-Tree (VELCT) scheme in which there is a Data Collection Tree (DCT) which improves the lifetime of the network. The VELCT scheme and the construction of DCT reduce the delay and traffic. The network lifetime can be increased by avoiding the frequent change in cluster topology. Secure and Efficient Transmission of Aggregated data (SETA) improves the security of the data transmission via the trust value of the nodes prior the aggregation of data. Since SETA considers the data only from the trustworthy nodes for aggregation, it is more secure in transmitting the data thereby improving the accuracy of aggregated data.
Keywords: Aggregation, lifetime, network security, wireless sensor network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1217401 Transgenerational Entrepreneurship in Chinese Family Businesses: Proposal for a Model of Work-Life Synergy
Authors: Jenny Oliveros Lao Phillips, Arturo E. Osorio, José Alves
Abstract:
Family business are the dominant form of business in the world, and Chinese family business (CFB) is a unique type of family business that relies on collective action to survive. This paper argues that in CFBs, entrepreneurial actions are transgenerational collective endeavors, and successors are groomed as stewards of the family legacy. Work-life relationship in CFBs is about synergy and not balance because the family identity is the business identity, and vice-versa. Using five in-depth case studies, this research introduces an alternative understanding of CFBs and proposes a model of work-life synergy in transgenerational entrepreneurship based on discussion of five theory-based propositions. This model explains that through emphasizing on the business family’s shared value and entrepreneurial legacy, elements of trust, shared identity and stewardship of family members are enhanced which leads to collective action and goal of the business family, resulting in transgenerational entrepreneurship. Limitations and future research are presented.Keywords: Chinese family business, family legacy, stewardship, transgenerational entrepreneurship, work-life synergy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 955400 A New Spectral-based Approach to Query-by-Humming for MP3 Songs Database
Authors: Leon Fu, Xiangyang Xue
Abstract:
In this paper, we propose a new approach to query-by-humming, focusing on MP3 songs database. Since MP3 songs are much more difficult in melody representation than symbolic performance data, we adopt to extract feature descriptors from the vocal sounds part of the songs. Our approach is based on signal filtering, sub-band spectral processing, MDCT coefficients analysis and peak energy detection by ignorance of the background music as much as possible. Finally, we apply dual dynamic programming algorithm for feature similarity matching. Experiments will show us its online performance in precision and efficiency. Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1781399 Opportunities of an Industrial City in the Leisure Tourism
Authors: E. Happ, A. Albert Tóth
Abstract:
The aim of the research is to investigate the forms of the demands of leisure tourism in a West-Hungarian industrial city, Győr. Today, Győr is still a traditional industrial city, its industry is mainly based on vehicle industry, but the role of tourism is increasing in the life of the city as well. Because of the industrial nature and the strong economy of the city, the ratio of business tourists is high. It can be stated that MICE tourism is dominating in Győr. Developments of the last decade can help the city with new tourism products to increase the leisure tourism. The new types of tourism – besides business tourism – can help the providers to increase the occupancy rates and the demand at the weekends. The research demonstrates the theoretical background of the topic, and it shows the present situation of the tourism in Győr with secondary data. The secondary research contains statistical data from the Hungarian Statistical Office and the city council, and it is based on the providers’ data. The next part of the paper shows the potential types of leisure tourism with the help of primary research. The primary research contains the results of an online questionnaire with a sample of 1000 potential customers. It is completed with 10 in-depth interviews with tourism experts, who explained their opinions about the opportunities of leisure tourism in Győr from the providers’ side. The online questionnaire was filled out in spring 2017 by customers, who have already stayed in Győr or plan to visit the city. At the same time in-depth interviews were made with hotel managers, head of touristic institutions and employees at the council. Based on the research it can be stated that the touristic supply of Győr allows the increase of the leisure tourism ratio in the city. Primarily, the cultural and health tourism show potential development, but the supply side of touristic services can be developed in order to increase the number of guest nights. The tourism marketing needs to be strengthened in the city, and a distinctive marketing activity - from other cities - is needed as well. To conclude, although Győr is an industrial city, it has a transforming industrial part, and tourism is also strongly present in its economy. Besides the leading role of business tourism, different types of leisure tourism have the opportunity to take place in the city.
Keywords: Business Tourism, Győr, industrial city, leisure tourism, touristic demand.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1035398 Sustainability: An Ethical Approach Towards Project Business Success
Authors: G. S. Dangayach
Abstract:
For any country the project management has been a vital part for its development. The highly competitive business world has created tremendous pressure on the project managers to achieve success. The pressure is derived from survival and profit building in business organizations which compels the project managers to pursue unethical practices. As a result unethical activities in business projects can be found easily where situations or issues arise due to dubious business practice, high corruption, or absolute violation of the law. The recent spur on Commonwealth games to be organized in New Delhi indicates towards the same. It has been seen that the project managers mainly focus on cost, time, and quality rather than social impact and long term effects of the project. Surprisingly the literature as well as the practitioner-s perspective also does not identify the role of ethics in project success. This paper identifies ethics as the fourth most important dimension in the project based organizations. The paper predicts that the approach of considering ethics will result in sustainability of the project. It will increase satisfaction and loyalty of the customers as well as create harmony, trust, brotherhood, values and morality among the team members. This paper is conceptual in nature as inadequate literature exists linking the project success with an ethical approach.Keywords: Ethics, Loyalty, Morality, Project success
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2771397 Online Web Service based Solution for Urban Traffic Management
Authors: A. Ionita, A. Zafiu, C. Ghita
Abstract:
In this article, we present a web server based solution for implementing a system for intelligent navigation. In this solution we use real time collected data and traffic history to establish the best route for navigation. This is a low cost solution that is easily to implement and extend. There is no need any infrastructure at road network level except only a device that collect data about traffic in key road crossing. The presented solution creates a strong base for traffic pursuit and offers an infrastructure for navigation applications.Keywords: navigation, real time, route, traffic pursuit, webservice.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1584396 Blended Learning through Google Classroom
Authors: Lee Bih Ni
Abstract:
This paper discusses that good learning involves all academic groups in the school. Blended learning is learning outside the classroom. Google Classroom is a free service learning app for schools, non-profit organizations and anyone with a personal Google account. Facilities accessed through computers and mobile phones are very useful for school teachers and students. Blended learning classrooms using both traditional and technology-based methods for teaching have become the norm for many educators. Using Google Classroom gives students access to online learning. Even if the teacher is not in the classroom, the teacher can provide learning. This is the supervision of the form of the teacher when the student is outside the school.
Keywords: Blended learning, learning app, Google classroom, schools.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2468395 The Masquerade of Life, Our Many Selves and Issues of Privacy
Authors: Karen Armstrong
Abstract:
This paper explores the importance of privacy in a contemporary online world. Crucial to the discussion is the idea of the Lacanian postmodern fragmented self and the problem of how to ensure that we have room to fully explore various aspects of our personalities in an environment which is–or at least feels--safe and free from observation by others. The paper begins with an exploration of the idea of the self with particular regard to the ways in which contemporary life and technology seems to have multiplied the various faces or masks which we present in different contexts. A brief history of privacy and surveillance follows. Finally, the paper ends with an affirmation of the importance of private space as an essential component of our spiritual and emotional well-being in today-s wired world.Keywords: Lacan, panopticon, postmodern, privacy, surveillance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1872394 Physics of Decision for Polling Place Management: A Case Study from the 2020 USA Presidential Election
Authors: Nafe Moradkhani, Frederick Benaben, Benoit Montreuil, Ali Vatankhah Barenji, Dima Nazzal
Abstract:
In the context of the global pandemic, the practical management of the 2020 presidential election in the USA was a strong concern. To anticipate and prepare for this election accurately, one of the main challenges was to confront: (i) forecasts of voter turnout, (ii) capacities of the facilities and, (iii) potential configuration options of resources. The approach chosen to conduct this anticipative study consists of collecting data about forecasts and using simulation models to work simultaneously on resource allocation and facility configuration of polling places in Fulton County, Georgia’s largest county. This article presents the results of the simulations of such places facing pre-identified potential risks. These results are oriented towards the efficiency of these places according to different criteria (health, trust, comfort). Then a dynamic framework is introduced to describe risks as physical forces perturbing the efficiency of the observed system. Finally, the main benefits and contributions resulting from this simulation campaign are presented.
Keywords: performance, decision support, simulation, artificial intelligence, risk management, election, pandemics, information system
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 645393 Indigenous Engagement: Towards a Culturally Sensitive Approach for Inclusive Economic Development
Authors: K. N. Penna, E. J. Hoffman, T. R. Carter
Abstract:
This paper suggests that cultural landscape management plans in an Indigenous context are more effective if designed by taking into consideration context-related social and cultural aspects, adopting people-centred and cultural-based approaches for instance. In relation to working in Indigenous and mining contexts, we draw upon and contribute to international policies on human rights that promote the development of management plans that are co-designed through genuine engagement processes. We suggest that the production of management plans that are built upon culturally relevant frameworks leads to more inclusive economic development, a greater sense of trust, and shared managerial responsibilities. In this paper, three issues related to Indigenous engagement and cultural landscape management plans will be addressed: (1) the need for effective communication channels between proponents and Traditional Owners (Australian original Aboriginal peoples who inhabited specific regions), (2) the use of a culturally sensitive approach to engage local representatives in the decision-making processes, and (3) how design of new management plans can help in establishing shared management.
Keywords: Culture-Centred Approach, Holons’ Hierarchy, Inclusive Economic Development, Indigenous Engagement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 481392 Knowledge Transfer in Industrial Clusters
Authors: Ana Paula Lisboa Sohn, Filipa Dionísio Vieria, Nelson Casarotto, Idaulo José Cunha
Abstract:
This paper aims at identifying and analyzing the knowledge transmission channels in textile and clothing clusters located in Brazil and in Europe. Primary data was obtained through interviews with key individuals. The collection of primary data was carried out based on a questionnaire with ten categories of indicators of knowledge transmission. Secondary data was also collected through a literature review and through international organizations sites. Similarities related to the use of the main transmission channels of knowledge are observed in all cases. The main similarities are: influence of suppliers of machinery, equipment and raw materials; imitation of products and best practices; training promoted by technical institutions and businesses; and cluster companies being open to acquire new knowledge. The main differences lie in the relationship between companies, where in Europe the intensity of this relationship is bigger when compared to Brazil. The differences also occur in importance and frequency of the relationship with the government, with the cultural environment, and with the activities of research and development. It is also found factors that reduce the importance of geographical proximity in transmission of knowledge, and in generating trust and the establishment of collaborative behavior.
Keywords: Industrial clusters, interorganizational learning, knowledge transmission channels, textile and clothing industry.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2086391 Antimicrobial Effect of Essential oil of Plant Trigonella focnum greacum on some Bacteria Pathogens
Abstract:
The plant world is the source of many medicines. Recently, researchers have estimated that there are approximately 400,000 plant species worldwide, of which about a quarter or a third have been used by societies for medicinal purposes. The human uses of plants for thousands of years to treat various ailments, in many developing countries, much of the population trust in traditional doctors and their collections of medicinal plants to treat them. Essential oils have many therapeutic properties. In herbal medicine, they are used for their antiseptic properties against infectious diseases of fungal origin, against dermatophytes, those of bacterial origin. The aim of our study is to determine the antimicrobial effect of essential oils of the plant Trigonella focnum greacum on some pathogenic bacteria, it is a medicinal plant used in traditional therapy. The test adopted is based on the diffusion method on solid medium (Antibiogram), this method determines the sensitivity or resistance of a microorganism vis-à-vis the extract studied. Our study reveals that the essential oil of the plant Trigonella focnum greacum has a different effect on the resistance of germs. For staphiloccocus Pseudomonnas aeroginosa and Krebsilla, are moderately sensitive strains, also Escherichia coli and Candida albicans represents a high sensitivity. By against Proteus is a strain that represents a weak sensitivity.Keywords: essential oil, microorganisme, antibiogram
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2696390 Development of Monitoring Blood Bank Center Based PIC Microcontroller Using CAN Communication
Authors: Kaiwan S. Ismael, Ergun Ercelebi, Majeed Nader
Abstract:
This paper describes the design and implementation of a hardware setup for online monitoring of 24 refrigerators inside blood bank center using the microcontroller and CAN bus for communications between each node. Due to the security of locations in the blood bank hall and difficulty of monitoring of each refrigerator separately, this work proposes a solution to monitor all the blood bank refrigerators in one location. CAN-bus system is used because it has many applications and advantages, especially for this system due to easy in use, low cost, providing a reduction in wiring, fast to repair and easily expanding the project without a problem.
Keywords: Control Area Network (CAN), monitoring blood bank center, PIC microcontroller, MPLAB IDE.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2485389 Retaining Structural System Active Vibration Control
Authors: Ming-Hui Lee, Shou-Jen Hsu
Abstract:
This study presents an active vibration control technique to reduce the earthquake responses of a retained structural system. The proposed technique is a synthesis of the adaptive input estimation method (AIEM) and linear quadratic Gaussian (LQG) controller. The AIEM can estimate an unknown system input online. The LQG controller offers optimal control forces to suppress wall-structural system vibration. The numerical results show robust performance in the active vibration control technique.Keywords: Active vibration control, AIEM, LQG, Optimal control
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1870388 Building Information Modeling-Based Approach for Automatic Quantity Take-off and Cost Estimation
Authors: Lo Kar Yin, Law Ka Mei
Abstract:
Architectural, engineering, construction and operations (AECO) industry practitioners have been well adapting to the dynamic construction market from the fundamental training of its disciplines. As further triggered by the pandemic since 2019, great steps are taken in virtual environment and the best collaboration is strived with project teams without boundaries. With adoption of Building Information Modeling-based approach and qualitative analysis, this paper is to review quantity take-off (QTO) and cost estimation process through modeling techniques in liaison with suppliers, fabricators, subcontractors, contractors, designers, consultants and services providers in the construction industry value chain for automatic project cost budgeting, project cost control and cost evaluation on design options of in-situ reinforced-concrete construction and Modular Integrated Construction (MiC) at design stage, variation of works and cash flow/spending analysis at construction stage as far as practicable, with a view to sharing the findings for enhancing mutual trust and co-operation among AECO industry practitioners. It is to foster development through a common prototype of design and build project delivery method in NEC4 Engineering and Construction Contract (ECC) Options A and C.
Keywords: Building Information Modeling, cost estimation, quantity take-off, modeling techniques.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 714387 Blockchain Technology Applications in Patient Tracking Systems Regarding Privacy-Preserving Concerns and COVID-19 Pandemic
Authors: Farbod Behnaminia, Saeed Samet
Abstract:
The COVID-19 pandemic has paralyzed many lives until a vaccine has been available, which caused the so-called "new normal". COVID-19 is an infectious disease. It can cause significant illness or death in anyone. Governments and health officials tried to impose rules and regulations to avoid and slow down transmission. Therefore, software engineers worldwide developed applications to trace and track patients’ movements and notify others, mainly using Bluetooth. In this way, everyone could be informed whether they came in close contact with someone who has COVID-19 and take proper safety precautions. Because most of the applications use technologies that can potentially reveal the user’s identity and location, researchers have debated privacy preservation and how to improve user privacy during such pandemics. We conducted a comprehensive evaluation of the literature by looking for papers in the relevant field and dividing them into pre- and post-pandemic systems. Additionally, we discussed the many uses of blockchain technology in pandemic control. We found that two major obstacles facing blockchain implementation across many healthcare systems are scalability and privacy. The Polkadot platform is presented, along with a review of its efficacy in tackling current concerns. A more scalable healthcare system is achievable in near future using Polkadot as well as a much more privacy-preserving environment.
Keywords: Blockchain, Electronic Record Management, EHR, Privacy-Preserving, patient tracking, COVID-19, trust and confidence, Polkadot.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 481386 Medical Knowledge Management in Healthcare Industry
Authors: B. Stroetmann, A. Aisenbrey
Abstract:
The Siemens Healthcare Sector is one of the world's largest suppliers to the healthcare industry and a trendsetter in medical imaging and therapy, laboratory diagnostics, medical information technology, and hearing aids. Siemens offers its customers products and solutions for the entire range of patient care from a single source – from prevention and early detection to diagnosis, and on to treatment and aftercare. By optimizing clinical workflows for the most common diseases, Siemens also makes healthcare faster, better, and more cost effective. The optimization of clinical workflows requires a multidisciplinary focus and a collaborative approach of e.g. medical advisors, researchers and scientists as well as healthcare economists. This new form of collaboration brings together experts with deep technical experience, physicians with specialized medical knowledge as well as people with comprehensive knowledge about health economics. As Charles Darwin is often quoted as saying, “It is neither the strongest of the species that survive, nor the most intelligent, but the one most responsive to change," We believe that those who can successfully manage this change will emerge as winners, with valuable competitive advantage. Current medical information and knowledge are some of the core assets in the healthcare industry. The main issue is to connect knowledge holders and knowledge recipients from various disciplines efficiently in order to spread and distribute knowledge.Keywords: Business Excellence, Clinical Knowledge, Knowledge Management, Knowledge Services, Learning Organizations, Trust.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3169385 Extracting Attributes for Twitter Hashtag Communities
Authors: Ashwaq Alsulami, Jianhua Shao
Abstract:
Various organisations often need to understand discussions on social media, such as what trending topics are and characteristics of the people engaged in the discussion. A number of approaches have been proposed to extract attributes that would characterise a discussion group. However, these approaches are largely based on supervised learning, and as such they require a large amount of labelled data. We propose an approach in this paper that does not require labelled data, but rely on lexical sources to detect meaningful attributes for online discussion groups. Our findings show an acceptable level of accuracy in detecting attributes for Twitter discussion groups.
Keywords: Attributed community, attribute detection, community, social network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 513384 SDVAR Algorithm for Detecting Fraud in Telecommunications
Authors: Fatimah Almah Saaid, Darfiana Nur, Robert King
Abstract:
This paper presents a procedure for estimating VAR using Sequential Discounting VAR (SDVAR) algorithm for online model learning to detect fraudulent acts using the telecommunications call detailed records (CDR). The volatility of the VAR is observed allowing for non-linearity, outliers and change points based on the works of [1]. This paper extends their procedure from univariate to multivariate time series. A simulation and a case study for detecting telecommunications fraud using CDR illustrate the use of the algorithm in the bivariate setting.Keywords: Telecommunications Fraud, SDVAR Algorithm, Multivariate time series, Vector Autoregressive, Change points.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2257