CINXE.COM

Search results for: application permission

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: application permission</title> <meta name="description" content="Search results for: application permission"> <meta name="keywords" content="application permission"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="application permission" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="application permission"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 8307</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: application permission</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8307</span> Research on Malware Application Patterns of Using Permission Monitoring System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Seung-Hwan%20Ju">Seung-Hwan Ju</a>, <a href="https://publications.waset.org/abstracts/search?q=Yo-Han%20Choi"> Yo-Han Choi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hee-Suk%20Seo"> Hee-Suk Seo</a>, <a href="https://publications.waset.org/abstracts/search?q=Tae-Kyung%20Kim"> Tae-Kyung Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. In this study, we develop a system to monitor that mobile application permission at application update. This study is a service-based malware analysis. It will be based on the mobile security study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=malware%20patterns" title="malware patterns">malware patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=application%20permission" title=" application permission"> application permission</a>, <a href="https://publications.waset.org/abstracts/search?q=application%20analysis" title=" application analysis"> application analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/19632/research-on-malware-application-patterns-of-using-permission-monitoring-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19632.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">523</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8306</span> Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bambang%20Novianto">Bambang Novianto</a>, <a href="https://publications.waset.org/abstracts/search?q=Rizal%20Aditya%20Herdianto"> Rizal Aditya Herdianto</a>, <a href="https://publications.waset.org/abstracts/search?q=Raphael%20Bianco%20Huwae"> Raphael Bianco Huwae</a>, <a href="https://publications.waset.org/abstracts/search?q=Afifah"> Afifah</a>, <a href="https://publications.waset.org/abstracts/search?q=Alfonso%20Brolin%20%20Sihite"> Alfonso Brolin Sihite</a>, <a href="https://publications.waset.org/abstracts/search?q=Rudi%20Lumanto"> Rudi Lumanto </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20banking%20application" title="mobile banking application">mobile banking application</a>, <a href="https://publications.waset.org/abstracts/search?q=OWASP%20mobile%20top%2010%202016" title=" OWASP mobile top 10 2016"> OWASP mobile top 10 2016</a>, <a href="https://publications.waset.org/abstracts/search?q=android%20permission" title=" android permission"> android permission</a>, <a href="https://publications.waset.org/abstracts/search?q=sensitive%20information" title=" sensitive information"> sensitive information</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20loss" title=" financial loss"> financial loss</a> </p> <a href="https://publications.waset.org/abstracts/118937/security-report-profiling-for-mobile-banking-applications-in-indonesia-based-on-owasp-mobile-top-10-2016" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/118937.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">141</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8305</span> Mobile Number Portability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Geetha">R. Geetha</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Arunkumar"> J. Arunkumar</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Gopal"> P. Gopal</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Loganathan"> D. Loganathan</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Pavithra"> K. Pavithra</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Vikashini"> C. Vikashini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile Number Portability is an attempt to switch over from one network to another network facility for mobile based on applications. This facility is currently not available for mobile handsets. This application is intended to assist the mobile network and its service customers in understanding the criteria; this will serve as a universal set of requirements which must be met by the customers. This application helps the user's network portability. Accessing permission from the network provider to enable services to the user and utilizing the available network signals. It is enabling the user to make a temporary switch over to other network. The main aim of this research work is to adapt multiple networks at the time of no network coverage. It can be accessed at rural and geographical areas. This can be achieved by this mobile application. The application is capable of temporary switch over between various networks. With this application both the service provider and the network user are benefited. The service provider is benefited by charging a minimum cost for utilizing other network. It provides security in terms of password that is unique to avoid unauthorized users and to prevent loss of balance. The goal intended to be attained is a complete utilization of available network at significant situations and to provide feature that satisfy the customer needs. The temporary switch over is done to manage emergency calls when user is in rural or geographical area, where there will be a very low network coverage. Since people find it trend in using Android mobile, this application is designed as an Android applications, which can be freely downloaded and installed from Play store. In the current scenario, the service provider enables the user to change their network without shifting their mobile network. This application affords a clarification for users while they are jammed in a critical situation. This application is designed by using Android 4.2 and SQLite Version3. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20number" title="mobile number">mobile number</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20number" title=" random number"> random number</a>, <a href="https://publications.waset.org/abstracts/search?q=alarm" title=" alarm"> alarm</a>, <a href="https://publications.waset.org/abstracts/search?q=imei%20number" title=" imei number"> imei number</a>, <a href="https://publications.waset.org/abstracts/search?q=call" title=" call"> call</a> </p> <a href="https://publications.waset.org/abstracts/1709/mobile-number-portability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1709.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">361</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8304</span> A Study of Permission-Based Malware Detection Using Machine Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ratun%20Rahman">Ratun Rahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Rafid%20Islam"> Rafid Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=Akin%20Ahmed"> Akin Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Kamrul%20Hasan"> Kamrul Hasan</a>, <a href="https://publications.waset.org/abstracts/search?q=Hasan%20Mahmud"> Hasan Mahmud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Malware is becoming more prevalent, and several threat categories have risen dramatically in recent years. This paper provides a bird's-eye view of the world of malware analysis. The efficiency of five different machine learning methods (Naive Bayes, K-Nearest Neighbor, Decision Tree, Random Forest, and TensorFlow Decision Forest) combined with features picked from the retrieval of Android permissions to categorize applications as harmful or benign is investigated in this study. The test set consists of 1,168 samples (among these android applications, 602 are malware and 566 are benign applications), each consisting of 948 features (permissions). Using the permission-based dataset, the machine learning algorithms then produce accuracy rates above 80%, except the Naive Bayes Algorithm with 65% accuracy. Of the considered algorithms TensorFlow Decision Forest performed the best with an accuracy of 90%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android%20malware%20detection" title="android malware detection">android malware detection</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=malware" title=" malware"> malware</a>, <a href="https://publications.waset.org/abstracts/search?q=malware%20analysis" title=" malware analysis"> malware analysis</a> </p> <a href="https://publications.waset.org/abstracts/150026/a-study-of-permission-based-malware-detection-using-machine-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150026.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">167</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8303</span> Design and Application of NFC-Based Identity and Access Management in Cloud Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shin-Jer%20Yang">Shin-Jer Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Kai-Tai%20Yang"> Kai-Tai Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20service" title="cloud service">cloud service</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-tenancy" title=" multi-tenancy"> multi-tenancy</a>, <a href="https://publications.waset.org/abstracts/search?q=NFC" title=" NFC"> NFC</a>, <a href="https://publications.waset.org/abstracts/search?q=IAM" title=" IAM"> IAM</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20device" title=" mobile device"> mobile device</a> </p> <a href="https://publications.waset.org/abstracts/58826/design-and-application-of-nfc-based-identity-and-access-management-in-cloud-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58826.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">435</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8302</span> Machine Learning Data Architecture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Neerav%20Kumar">Neerav Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Naumaan%20Nayyar"> Naumaan Nayyar</a>, <a href="https://publications.waset.org/abstracts/search?q=Sharath%20Kashyap"> Sharath Kashyap</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Most companies see an increase in the adoption of machine learning (ML) applications across internal and external-facing use cases. ML applications vend output either in batch or real-time patterns. A complete batch ML pipeline architecture comprises data sourcing, feature engineering, model training, model deployment, model output vending into a data store for downstream application. Due to unclear role expectations, we have observed that scientists specializing in building and optimizing models are investing significant efforts into building the other components of the architecture, which we do not believe is the best use of scientists’ bandwidth. We propose a system architecture created using AWS services that bring industry best practices to managing the workflow and simplifies the process of model deployment and end-to-end data integration for an ML application. This narrows down the scope of scientists’ work to model building and refinement while specialized data engineers take over the deployment, pipeline orchestration, data quality, data permission system, etc. The pipeline infrastructure is built and deployed as code (using terraform, cdk, cloudformation, etc.) which makes it easy to replicate and/or extend the architecture to other models that are used in an organization. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20pipeline" title="data pipeline">data pipeline</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=AWS" title=" AWS"> AWS</a>, <a href="https://publications.waset.org/abstracts/search?q=architecture" title=" architecture"> architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=batch%20machine%20learning" title=" batch machine learning"> batch machine learning</a> </p> <a href="https://publications.waset.org/abstracts/146913/machine-learning-data-architecture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146913.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">63</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8301</span> The Marriage of a Sui Juris Girl: Permission of Wali (Guardian) or Consent of Ward in the Context of Personal Law in Pakistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Farooq">Muhammad Farooq</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present article explores the woman's consent as a paramount element in contracting a Muslim marriage. Also, whether permission of the wali (guardian) is a condition per se for a valid nikah (marriage deed) in the eye of law and Sharia. The researcher attempts to treat it through the related issues, inter alia; the marriage guardian, the women's legal capacity to give consent whether she is a virgin or nonvirgin and how that consent is to be given or may be understood. Does her laugh, tears or salience needs a legal interpretation as well as other female manifestations of emotion explained by the Muslim jurists? The silence of Muslim Family Law Ordinance 1961 (hereafter; MFLO 1961) in this regard and the likely reasons behind such silence is also inquired in brief. Germane to the theme, the various cases in which the true notion of woman's consent is interpreted by courts in Pakistan are also examined. In order to address the issue in hand, it is proposed to provide a brief overview of a few contemporary writers' opinions in which the real place of woman's consent in Muslim marriage is highlighted. Key to the idea of young Muslim woman's marriage, the doctrine of kafa'a (equality or suitability) between the man and woman is argued here to be grounded in the patriarchal and social norms. It is, therefore, concluded that such concept was the result of analogical reasoning and has less importance in the present time. As such it is not a valid factor in current scenarios to validate or invalidate marital bonds. A standard qualitative convention is used for this research. Among primary and secondary sources; for examples, Qur'an, Sunnah, Books, Scholarly articles, texts of law and case law is used to point out the researcher's view. In summation, the article is concluded with a bold statement that a young woman being a party to the contract, is absolutely entitled to 'full and free' consent for the Muslim marriage contract. It is the woman, an indispensable partaker and her consent (not the guardian' permission) that does validate or invalidate the said agreement in the eye of contemporary personal law and in Sharia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=consent%20of%20woman" title="consent of woman">consent of woman</a>, <a href="https://publications.waset.org/abstracts/search?q=ejab%20%28declaration%29" title=" ejab (declaration)"> ejab (declaration)</a>, <a href="https://publications.waset.org/abstracts/search?q=Nikah%20%28marriage%20agreement%29" title=" Nikah (marriage agreement)"> Nikah (marriage agreement)</a>, <a href="https://publications.waset.org/abstracts/search?q=qabol%20%28acceptance%29" title=" qabol (acceptance)"> qabol (acceptance)</a>, <a href="https://publications.waset.org/abstracts/search?q=sui%20juris%20%28of%20age%3B%20independent%29" title=" sui juris (of age; independent)"> sui juris (of age; independent)</a>, <a href="https://publications.waset.org/abstracts/search?q=wali%20%28guardian%29" title=" wali (guardian)"> wali (guardian)</a>, <a href="https://publications.waset.org/abstracts/search?q=wilayah%20%28guardianship%29" title=" wilayah (guardianship)"> wilayah (guardianship)</a> </p> <a href="https://publications.waset.org/abstracts/95354/the-marriage-of-a-sui-juris-girl-permission-of-wali-guardian-or-consent-of-ward-in-the-context-of-personal-law-in-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95354.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8300</span> Remote Monitoring and Control System of Potentiostat Based on the Internet of Things</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Liang%20Zhao">Liang Zhao</a>, <a href="https://publications.waset.org/abstracts/search?q=Guangwen%20Wang"> Guangwen Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Guichang%20Liu"> Guichang Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Constant potometer is an important component of pipeline anti-corrosion systems in the chemical industry. Based on Internet of Things (IoT) technology, Programmable Logic Controller (PLC) technology and database technology, this paper developed a set of a constant potometer remote monitoring management system. The remote monitoring and remote adjustment of the working status of the constant potometer are realized. The system has real-time data display, historical data query, alarm push management, user permission management, and supporting Web access and mobile client application (APP) access. The actual engineering project test results show the stability of the system, which can be widely used in cathodic protection systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=pipe%20corrosion%20protection" title=" pipe corrosion protection"> pipe corrosion protection</a>, <a href="https://publications.waset.org/abstracts/search?q=potentiostat" title=" potentiostat"> potentiostat</a>, <a href="https://publications.waset.org/abstracts/search?q=remote%20monitoring" title=" remote monitoring"> remote monitoring</a> </p> <a href="https://publications.waset.org/abstracts/110860/remote-monitoring-and-control-system-of-potentiostat-based-on-the-internet-of-things" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/110860.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">147</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8299</span> Common Used Non-Medical Practice and Perceived Benefits in Couples with Fertility Problems in Turkey</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Fata">S. Fata</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Tokat"> M. A. Tokat</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Bagardi"> N. Bagardi</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Yilmaz"> B. Yilmaz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, various traditional practices are used throughout the world with aim to improve fertility. Various traditional remedies, acupuncture, religious practices such as sacrifice are frequently used. Studies often evaluate the traditional practices used by the women. But the use of this non-medical practice by couples and specific application reasons of this methods has been less investigated. The aim of this study was to evaluate the common used non-medical practices and determine perceived benefits by couples with fertility problems in Turkey. This is a descriptive study. Research data were collected between May-July 2016, in Izmir Ege Birth Education and Research Hospital Assisted Reproduction Clinic, from 151 couples with fertility problem. Personal Information Form and Non-Medical Practices Used for Fertility Evaluation Form was used. Number 'GOA 2649' permission letter from Dokuz Eylul University Non-Invasive Research Ethics Board, permission letter from the institution and the written consent from participants has been received to carry out the study. In the evaluation of the data, frequencies and proportions analysis were used. The average age of women participating in the study was 32.87, the 35.8% were high school graduates, 60.3% were housewife and the 58.9% lived in city. The 30.5% of husbands were high school graduates, the 96.7% were employed and the 60.9% lived in city. The 78.1% of couples lived as a nuclear family, the average marriage year was 7.58, in 33.8% the fertility problem stems from women, 42.4% of them received a diagnosis for 1-2 years, 35.1% were being treated for 1-2 years. The 35.8% of women reported use of non-medical applications. The 24.4% of women used figs, onion cure, hacemat, locust, bee-pollen milk, the 18.2% used herbs, the 13.1% vowed, the 12.1% went to the tomb, the 10.1% did not bath a few days after the embryo transfer, the 9.1% used thermal water baths, the 5.0% manually corrected the womb, the 5.0% printed amulets by Hodja, the 3.0% went to the Hodja/pilgrims. Among the perceived benefits of using non-medical practices; facilitate pregnancy and implantation, improve oocyte quality were the most recently expressed. Women said that they often used herbs to develop follicles, did not bath after embryo transfer with aim to provide implantation, and used thermal waters to get rid of the infection. Compared to women, only the 25.8% of men used the non-medical practice. The 52.1% reported that they used peanuts, hacemat, locust, bee-pollen milk, the 14.9% used herbs, the 12.8% vowed, the 10.1% went to the tomb, the 10.1% used thermal water baths. Improve sperm number, motility and quality were the most expected benefits. Men said that they often used herbs to improve sperm number, used peanuts, hacemat, locust, bee-pollen milk to improve sperm motility and quality. Couples in Turkey often use non-medical practices to deal with fertility problems. Some of the practices considered as useful can adversely affect health. Healthcare providers should evaluate the use of non-medical practices and should inform if the application is known adverse effects on health. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fertility" title="fertility">fertility</a>, <a href="https://publications.waset.org/abstracts/search?q=couples" title=" couples"> couples</a>, <a href="https://publications.waset.org/abstracts/search?q=non-medical%20practice" title=" non-medical practice"> non-medical practice</a>, <a href="https://publications.waset.org/abstracts/search?q=perceived%20benefit" title=" perceived benefit"> perceived benefit</a> </p> <a href="https://publications.waset.org/abstracts/62271/common-used-non-medical-practice-and-perceived-benefits-in-couples-with-fertility-problems-in-turkey" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62271.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">342</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8298</span> A Pilot Study on Integration of Simulation in the Nursing Educational Program: Hybrid Simulation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vesile%20Unver">Vesile Unver</a>, <a href="https://publications.waset.org/abstracts/search?q=Tulay%20Basak"> Tulay Basak</a>, <a href="https://publications.waset.org/abstracts/search?q=Hatice%20Ayhan"> Hatice Ayhan</a>, <a href="https://publications.waset.org/abstracts/search?q=Ilknur%20Cinar"> Ilknur Cinar</a>, <a href="https://publications.waset.org/abstracts/search?q=Emine%20Iyigun"> Emine Iyigun</a>, <a href="https://publications.waset.org/abstracts/search?q=Nuran%20Tosun"> Nuran Tosun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this study is to analyze the effects of the hybrid simulation. In this simulation, types standardized patients and task trainers are employed simultaneously. For instance, in order to teach the IV activities standardized patients and IV arm models are used. The study was designed as a quasi-experimental research. Before the implementation an ethical permission was taken from the local ethical commission and administrative permission was granted from the nursing school. The universe of the study included second-grade nursing students (n=77). The participants were selected through simple random sample technique and total of 39 nursing students were included. The views of the participants were collected through a feedback form with 12 items. The form was developed by the authors and “Patient intervention self-confidence/competence scale”. Participants reported advantages of the hybrid simulation practice. Such advantages include the following: developing connections between the simulated scenario and real life situations in clinical conditions; recognition of the need for learning more about clinical practice. They all stated that the implementation was very useful for them. They also added three major gains; improvement of critical thinking skills (94.7%) and the skill of making decisions (97.3%); and feeling as if a nurse (92.1%). In regard to the mean scores of the participants in the patient intervention self-confidence/competence scale, it was found that the total mean score for the scale was 75.23±7.76. The findings obtained in the study suggest that the hybrid simulation has positive effects on the integration of theoretical and practical activities before clinical activities for the nursing students. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hybrid%20simulation" title="hybrid simulation">hybrid simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=clinical%20practice" title=" clinical practice"> clinical practice</a>, <a href="https://publications.waset.org/abstracts/search?q=nursing%20education" title=" nursing education"> nursing education</a>, <a href="https://publications.waset.org/abstracts/search?q=nursing%20students" title=" nursing students"> nursing students</a> </p> <a href="https://publications.waset.org/abstracts/41639/a-pilot-study-on-integration-of-simulation-in-the-nursing-educational-program-hybrid-simulation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41639.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">291</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8297</span> Predictors of Ante-Natal Care and Health Facility Delivery Services Utilization in a Rural Area in Plateau State</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lilian%20A.%20Okeke">Lilian A. Okeke</a>, <a href="https://publications.waset.org/abstracts/search?q=I.%20Okeke"> I. Okeke</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Waziri"> N. Waziri</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Balogun"> S. Balogun</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Nguku"> P. Nguku</a>, <a href="https://publications.waset.org/abstracts/search?q=O.%20Fawole"> O. Fawole</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Access to ante-natal care services promotes safe motherhood and delivery with improved maternal and neonatal outcome. We conducted this study to identify factors influencing the utilization of antenatal care (ANC) and health delivery services. Methods: We conducted a cross sectional study. Households were numbered and a one in three sample was selected using a systematic sampling method. One hundred and ninety eight women who were either pregnant or had previous deliveries were interviewed using pretested structured questionnaires to obtain information on their socio-demographic characteristics, and reasons for non-utilization of ANC and health delivery services. We performed univariate and bivariate analysis using Epi info version 3.5.3. Results: The age of respondents ranged from (17-55 years) with a median age of 29 years. One hundred and ninety two (97%) utilized antenatal care services. Ninety three (47.9%) attended ANC at second trimester. More than half (58.6%) had ≥ 4 visits to ANC. One hundred and thirty one (66.2%) had their last delivery at home by a traditional birth attendant. Factors associated with ANC and health facility delivery services utilization were: age group 45-55 (OR 0.01; 95% CI: 0.00-0.16) and > 55 years (OR 0.03; 95% CI: 0.00-0.60), wife’s educational status (OR 3.17; 95% CI: 1.66-8.30), husband’s permission (OR 11.8; 95% CI 2.19-63.62), and distance ≥ 5km (OR 0.33; 95% CI: 0.16-0.60). Conclusion: ANC services were well utilized. Most women did not book early and had their last delivery at home. Predictors of ANC use and health facility delivery were age, wife’s educational status, husband's permission and long distance from health facility. A one-day health sensitization of the benefits of ANC utilization and the dangers of delivering at home was implemented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ante%20natal%20care" title="ante natal care">ante natal care</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20facility" title=" health facility"> health facility</a>, <a href="https://publications.waset.org/abstracts/search?q=delivery%20services" title=" delivery services"> delivery services</a>, <a href="https://publications.waset.org/abstracts/search?q=rural%20area" title=" rural area"> rural area</a>, <a href="https://publications.waset.org/abstracts/search?q=Plateau%20state" title=" Plateau state"> Plateau state</a> </p> <a href="https://publications.waset.org/abstracts/10229/predictors-of-ante-natal-care-and-health-facility-delivery-services-utilization-in-a-rural-area-in-plateau-state" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10229.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">375</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8296</span> Women Education in Islam, Christianity, and Judaism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nuzhat%20Fatima">Nuzhat Fatima</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This is very misleading conception that Islam is the religion of terrorists or terrorism. It is also another misconception that women are not given due important in Islamic. And women are forced to use veil. But if we closely look at the other two religions they also have the same commandments about the veil. Then comes education, women are given the equal right of education in Islam. But there are certain people creating the bad image of Islam and not giving permission to their females to get education. This paper will present the brief description of education and status of women in all three religions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islam" title="Islam">Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=women" title=" women"> women</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=christianity" title=" christianity"> christianity</a>, <a href="https://publications.waset.org/abstracts/search?q=Judaism" title=" Judaism"> Judaism</a> </p> <a href="https://publications.waset.org/abstracts/22285/women-education-in-islam-christianity-and-judaism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22285.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">575</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8295</span> System Response of a Variable-Rate Aerial Application System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daniel%20E.%20Martin">Daniel E. Martin</a>, <a href="https://publications.waset.org/abstracts/search?q=Chenghai%20Yang"> Chenghai Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Variable-rate aerial application systems are becoming more readily available; however, aerial applicators typically only use the systems for constant-rate application of materials, allowing the systems to compensate for upwind and downwind ground speed variations. Much of the resistance to variable-rate aerial application system adoption in the U.S. pertains to applicator’s trust in the systems to turn on and off automatically as desired. The objectives of this study were to evaluate a commercially available variable-rate aerial application system under field conditions to demonstrate both the response and accuracy of the system to desired application rate inputs. This study involved planting oats in a 35-acre fallow field during the winter months to establish a uniform green backdrop in early spring. A binary (on/off) prescription application map was generated and a variable-rate aerial application of glyphosate was made to the field. Airborne multispectral imagery taken before and two weeks after the application documented actual field deposition and efficacy of the glyphosate. When compared to the prescription application map, these data provided application system response and accuracy information. The results of this study will be useful for quantifying and documenting the response and accuracy of a commercially available variable-rate aerial application system so that aerial applicators can be more confident in their capabilities and the use of these systems can increase, taking advantage of all that aerial variable-rate technologies have to offer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=variable-rate" title="variable-rate">variable-rate</a>, <a href="https://publications.waset.org/abstracts/search?q=aerial%20application" title=" aerial application"> aerial application</a>, <a href="https://publications.waset.org/abstracts/search?q=remote%20sensing" title=" remote sensing"> remote sensing</a>, <a href="https://publications.waset.org/abstracts/search?q=precision%20application" title=" precision application"> precision application</a> </p> <a href="https://publications.waset.org/abstracts/24198/system-response-of-a-variable-rate-aerial-application-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24198.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">474</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8294</span> Pharmacy-Station Mobile Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Taissir%20Fekih%20Romdhane">Taissir Fekih Romdhane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes a mobile web application named Pharmacy-Station that sells medicines and permits user to search for medications based on their symptoms, making it is easy to locate a specific drug online without the need to visit a pharmacy where it may be out of stock. This application is developed using the jQuery Mobile framework, which uses many web technologies and languages such as HTML5, PHP, JavaScript and CSS3. To test the proposed application, we used data from popular pharmacies in Saudi Arabia that included important information such as location, contact, and medicines in stock, etc. This document describes the different steps followed to create the Pharmacy-Station application along with screenshots. Finally, based on the results, the paper concludes with recommendations and further works planned to improve the Pharmacy-Station mobile application. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pharmacy" title="pharmacy">pharmacy</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20application" title=" mobile application"> mobile application</a>, <a href="https://publications.waset.org/abstracts/search?q=jquery%20mobile%20framework" title=" jquery mobile framework"> jquery mobile framework</a>, <a href="https://publications.waset.org/abstracts/search?q=search" title=" search"> search</a>, <a href="https://publications.waset.org/abstracts/search?q=medicine" title=" medicine"> medicine</a> </p> <a href="https://publications.waset.org/abstracts/148063/pharmacy-station-mobile-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148063.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">159</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8293</span> Technological Advancement of Socratic Supported by Artificial Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amad%20Nasseef">Amad Nasseef</a>, <a href="https://publications.waset.org/abstracts/search?q=Layan%20Zugail"> Layan Zugail</a>, <a href="https://publications.waset.org/abstracts/search?q=Joud%20Musalli"> Joud Musalli</a>, <a href="https://publications.waset.org/abstracts/search?q=Layan%20Shaikan"> Layan Shaikan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Technology has become an essential part of our lives. We have also witnessed the significant emergence of artificial intelligence in so many areas. Throughout this research paper, the following will be discussed: an introduction on AI and Socratic application, we also did an overview on the application’s background and other similar applications, as for the methodology, we conducted a survey to collect results on users experience in using the Socratic application. The results of the survey strongly supported the usefulness and interest of users in the Socratic application. Finally, we concluded that Socratic is a meaningful tool for learning purposes due to it being supported by artificial intelligence, which made the application easy to use and familiar to users to deal with through a click of a button. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Socratic" title="Socratic">Socratic</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=application" title=" application"> application</a>, <a href="https://publications.waset.org/abstracts/search?q=features" title=" features"> features</a> </p> <a href="https://publications.waset.org/abstracts/139818/technological-advancement-of-socratic-supported-by-artificial-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139818.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">217</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8292</span> Review of the World Migration Report 2020, with a Focus on Migration Due to Climate Change</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sincy%20Wilson">Sincy Wilson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article focuses on the data scattered throughout the 2020 Report on migration for a variety of reasons. Despite the fact that climate migrants are no longer recognized on an international or national level, their situation remains unchanged, and many countries have already encountered the problem of people entering their country without permission. With the information presented in the paper, researchers are focusing on climate-induced displacement rather than conflict-related migration. The author finishes by stating that there is no time to waste in recognizing climate migrants. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=climate%20refugees" title="climate refugees">climate refugees</a>, <a href="https://publications.waset.org/abstracts/search?q=climatological%20factors" title=" climatological factors"> climatological factors</a>, <a href="https://publications.waset.org/abstracts/search?q=migration" title=" migration"> migration</a>, <a href="https://publications.waset.org/abstracts/search?q=slow-onset%20migration" title=" slow-onset migration"> slow-onset migration</a> </p> <a href="https://publications.waset.org/abstracts/139956/review-of-the-world-migration-report-2020-with-a-focus-on-migration-due-to-climate-change" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139956.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">213</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8291</span> Trash Dash: An Educational Android Game Application for Proper Waste Segregation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marylene%20S.%20Eder">Marylene S. Eder</a>, <a href="https://publications.waset.org/abstracts/search?q=Dorothy%20M.%20Jao"> Dorothy M. Jao</a>, <a href="https://publications.waset.org/abstracts/search?q=Paolo%20Marc%20Nicolas%20S.%20Laspi%C3%B1as"> Paolo Marc Nicolas S. Laspiñas</a>, <a href="https://publications.waset.org/abstracts/search?q=Pukilan%20A.%20Malim"> Pukilan A. Malim</a>, <a href="https://publications.waset.org/abstracts/search?q=Sarah%20Jean%20D.%20Raterta"> Sarah Jean D. Raterta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Trash Dash is an android game application developed to serve as an alternative tool to practice proper waste segregation for children ages 3 years old and above. The researchers designed the application using Unity 3D and developed the text file that served as the database of the game application. An observation of a pre-school teacher shows that children know how to throw their garbage but they do not know yet how to segregate wastes. After launching the mobile application to K-2 pupils 4 – 5 years of age, the researchers have noticed that children within this age are active and motivated to learn the difference between biodegradable and non-biodegradable. Based on the result of usability test conducted, it was concluded that the game is easy to use and children will most likely use this application frequently. Furthermore, the children may need assistance from their parents and teachers when playing the game. An actual testing of the application has been conducted to different devices as well as functionality test by Thwack Application and it can be concluded that the mobile application can be launched and installed on a device with a minimum API requirement of Gingerbread (2.3.1). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=waste%20segregation" title="waste segregation">waste segregation</a>, <a href="https://publications.waset.org/abstracts/search?q=android%20application" title=" android application"> android application</a>, <a href="https://publications.waset.org/abstracts/search?q=biodegradable" title=" biodegradable"> biodegradable</a>, <a href="https://publications.waset.org/abstracts/search?q=non-biodegradable" title=" non-biodegradable"> non-biodegradable</a> </p> <a href="https://publications.waset.org/abstracts/37949/trash-dash-an-educational-android-game-application-for-proper-waste-segregation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37949.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">445</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8290</span> Development of a Hamster Knowledge System Based on Android Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Satien%20Janpla">Satien Janpla</a>, <a href="https://publications.waset.org/abstracts/search?q=Thanawan%20Boonpuck"> Thanawan Boonpuck</a>, <a href="https://publications.waset.org/abstracts/search?q=Pattarapan%20Roonrakwit"> Pattarapan Roonrakwit</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a hamster knowledge system based on android application. The objective of this system is to advice user to upkeep and feed hamsters based on mobile application. We describe the design approaches and functional components of this system. The system was developed based on knowledge based of hamster experts. The results were divided by the research purposes into 2 parts: developing the mobile application for advice users and testing and evaluating the system. Black box technique was used to evaluate application performances and questionnaires were applied to measure user satisfaction with system usability by specialists and users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hamster%20knowledge" title="hamster knowledge">hamster knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=Android%20application" title=" Android application"> Android application</a>, <a href="https://publications.waset.org/abstracts/search?q=black%20box" title=" black box"> black box</a>, <a href="https://publications.waset.org/abstracts/search?q=questionnaires" title=" questionnaires"> questionnaires</a> </p> <a href="https://publications.waset.org/abstracts/7570/development-of-a-hamster-knowledge-system-based-on-android-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7570.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">341</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8289</span> Application of Blockchain Technology in Geological Field</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mengdi%20Zhang">Mengdi Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhenji%20Gao"> Zhenji Gao</a>, <a href="https://publications.waset.org/abstracts/search?q=Ning%20Kang"> Ning Kang</a>, <a href="https://publications.waset.org/abstracts/search?q=Rongmei%20Liu"> Rongmei Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Management and application of geological big data is an important part of China's national big data strategy. With the implementation of a national big data strategy, geological big data management becomes more and more critical. At present, there are still a lot of technology barriers as well as cognition chaos in many aspects of geological big data management and application, such as data sharing, intellectual property protection, and application technology. Therefore, it’s a key task to make better use of new technologies for deeper delving and wider application of geological big data. In this paper, we briefly introduce the basic principle of blockchain technology at the beginning and then make an analysis of the application dilemma of geological data. Based on the current analysis, we bring forward some feasible patterns and scenarios for the blockchain application in geological big data and put forward serval suggestions for future work in geological big data management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20property%20protection" title=" intellectual property protection"> intellectual property protection</a>, <a href="https://publications.waset.org/abstracts/search?q=geological%20data" title=" geological data"> geological data</a>, <a href="https://publications.waset.org/abstracts/search?q=big%20data%20management" title=" big data management"> big data management</a> </p> <a href="https://publications.waset.org/abstracts/168400/application-of-blockchain-technology-in-geological-field" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168400.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">88</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8288</span> Decrease of Aerobic Capacity in Twenty Years in Lithuanian 11–18 Years-Old Youth</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arunas%20Emeljanovas">Arunas Emeljanovas</a>, <a href="https://publications.waset.org/abstracts/search?q=Brigita%20Mieziene"> Brigita Mieziene</a>, <a href="https://publications.waset.org/abstracts/search?q=Tomas%20Venckunas"> Tomas Venckunas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background statement: Level of aerobic capacity in school age children provides important information about the current and future cardiovascular, skeletal and mental health. It is widely recognised that risk factors for modern chronic diseases of the adults have their origins in childhood and adolescence. The aim of the study was to analyse the trends of aerobic capacity across decades within groups of gender and age. Methods. The research included data of participants from the three nationally representative cohort studies performed in Lithuania in the years 1992, 2002 and 2012 among 11 to 18-years-old school children. Total of 18,294 school children were recruited for testing. Only those who had their body weight and height measured and completed 20 m shuttle endurance test were included in the analysis. The total number of students included in the analyses was 15,213 (7608 boys and 7605 girls). The permission to conduct the study was obtained from the Lithuanian Bioethics Committee (permission number BE-2-45). Major findings: Results are performed across gender and age groups. The comparison of shuttle endurance test, controlling for body mass index, indicated that in general there is a constant decrease of aerobic capacity across decades in both genders and age groups. The deterioration in aerobic capacity in boys accounted for 17 to 43 percent across age groups within decades. The biggest decrease was in 14 years-old boys. The deterioration in girls accounted for 19 to 37 percent across age groups with the highest decrease in 11 years-old girls. Though, girls had lower levels of aerobic capacity through all age groups and across three decades. Body mass index, as a covariate, accounted for up to six percent in deterioration of aerobic capacity. Final statement: The detected relationships may reflect the level and pattern of engagement in physical activity and sports where increased activity associates with superior performance in the tests because of the upregulated physiological function and instigated competitive/motivational level. The significance of the decade indirectly supports the importance of the recently changed activity among schoolchildren for this relationship. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aerobic%20capacity" title="aerobic capacity">aerobic capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=cardiovascular%20health" title=" cardiovascular health"> cardiovascular health</a>, <a href="https://publications.waset.org/abstracts/search?q=endurance" title=" endurance"> endurance</a>, <a href="https://publications.waset.org/abstracts/search?q=school%20age%20children" title=" school age children"> school age children</a> </p> <a href="https://publications.waset.org/abstracts/101955/decrease-of-aerobic-capacity-in-twenty-years-in-lithuanian-11-18-years-old-youth" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/101955.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8287</span> Effects of the Purpose Expropriation of Land Consolidation to Landholding</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Turgut%20Ayten">Turgut Ayten</a>, <a href="https://publications.waset.org/abstracts/search?q=Tayfun%20%C3%87ay"> Tayfun Çay</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the current expropriation of Turkey, the state acquires necessary lands for its investment without permission of the owners and not searching for alternative solutions, so it is determined that neither processor nor processed is not happy. In this study, interactions of enterprises in Turkey are analysed in case the necessary land for public investments are acquired by expropriation purposed land consolidation. Legal basis, positive and negative sides, financial effects to enterprises of this method is evaluated according to Konya Kadınhanı, Kolukısa avenue which is on the Konya-Ankara High-Speed Train Route. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=expropriation" title="expropriation">expropriation</a>, <a href="https://publications.waset.org/abstracts/search?q=land%20consolidation" title=" land consolidation"> land consolidation</a>, <a href="https://publications.waset.org/abstracts/search?q=land%20consolidation%20for%20expropriation%20purpose" title=" land consolidation for expropriation purpose"> land consolidation for expropriation purpose</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20rural%20development" title=" sustainable rural development"> sustainable rural development</a> </p> <a href="https://publications.waset.org/abstracts/54656/effects-of-the-purpose-expropriation-of-land-consolidation-to-landholding" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54656.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">507</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8286</span> Android-Based Edugame Application for Earthquakes Disaster Mitigation Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Endina%20P.%20Purwandari">Endina P. Purwandari</a>, <a href="https://publications.waset.org/abstracts/search?q=Yolanda%20Hervianti"> Yolanda Hervianti</a>, <a href="https://publications.waset.org/abstracts/search?q=Feri%20Noperman"> Feri Noperman</a>, <a href="https://publications.waset.org/abstracts/search?q=Endang%20W.%20Winarni"> Endang W. Winarni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The earthquakes disaster is an event that can threaten at any moment and cause damage and loss of life. Game earthquake disaster mitigation is a useful educational game to enhance children insight, knowledge, and understanding in the response to the impact of the earthquake. This study aims to build an educational games application on the Android platform as a learning media for earthquake mitigation education and to determine the effect of the application toward children understanding of the earthquake disaster mitigation. The methods were research and development. The development was to develop edugame application for earthquakes mitigation education. The research involved elementary students as a research sample to test the developed application. The research results were valid android-based edugame application, and its the effect of application toward children understanding. The application contains an earthquake simulation video, an earthquake mitigation video, and a game consisting three stages, namely before the earthquake, when the earthquake occur, and after the earthquake. The results of the feasibility test application showed that this application was included in the category of 'Excellent' which the average percentage of the operation of applications by 76%, view application by 67% and contents of application by 74%. The test results of students' responses were 80% that showed that a positive their responses toward the application. The student understanding test results show that the average score of children understanding pretest was 71,33, and post-test was 97,00. T-test result showed that t value by 8,02 more than table t by 2,001. This indicated that the earthquakes disaster mitigation edugame application based on Android platform affects the children understanding about disaster earthquake mitigation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android" title="android">android</a>, <a href="https://publications.waset.org/abstracts/search?q=edugame" title=" edugame"> edugame</a>, <a href="https://publications.waset.org/abstracts/search?q=mitigation" title=" mitigation"> mitigation</a>, <a href="https://publications.waset.org/abstracts/search?q=earthquakes" title=" earthquakes"> earthquakes</a> </p> <a href="https://publications.waset.org/abstracts/72800/android-based-edugame-application-for-earthquakes-disaster-mitigation-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72800.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">364</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8285</span> Design and Implementation of Remote Control Application for Elderly People Who Live Alone</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cristina%20Nieves%20Perdomo%20Delgado">Cristina Nieves Perdomo Delgado</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study consists of the design and use of an application for cell phones called “Me Cuido” that consists of remote control of elderly people who live alone with their families. The objective of the study is to analyze the usability of the application by 40-year-olds using the Questionnaire for User Interaction Satisfaction (QUIS) method. The results highlight that the application has a design adapted to the elderly and that it is easy to use and understand. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=design" title="design">design</a>, <a href="https://publications.waset.org/abstracts/search?q=assistive%20technology" title=" assistive technology"> assistive technology</a>, <a href="https://publications.waset.org/abstracts/search?q=elderly%20people" title=" elderly people"> elderly people</a>, <a href="https://publications.waset.org/abstracts/search?q=independence" title=" independence"> independence</a> </p> <a href="https://publications.waset.org/abstracts/138538/design-and-implementation-of-remote-control-application-for-elderly-people-who-live-alone" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138538.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">250</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8284</span> Systems of Liquid Organic Fertilizer Application with Respect to Environmental Impact</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hidayatul%20Fitri">Hidayatul Fitri</a>, <a href="https://publications.waset.org/abstracts/search?q=Petr%20%C5%A0a%C5%99ec"> Petr Šařec</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The use of organic fertilizer is increasing nowadays, and the application must be conducted accurately to provide the right benefits for plants and maintain soil health. Improper application of fertilizers can cause problems for both plants and the environment. This study investigated the liquid organic fertilizer application, particularly digestate, varied into different application doses concerning mitigation of adverse environmental impacts, improving water infiltration ability, and crop yields. The experiment was established into eight variants with different digestate doses, conducted on emission monitoring and soil physical properties. As a result, the digestate application with shallow injection (5 cm in depth) was confirmed as an appropriate technique for applying liquid fertilizer into the soil. Gas emissions resulted in low concentration and declined gradually over time, obviously proved from the experiment conducted under two measurements immediately after application and the next day. Applied various doses of liquid digestate fertilizer affected the emission concentrations of NH3 volatilization, differing significantly and decreasing about 40% from the first to second measurement. In this study, winter wheat crop production significantly increases under digestate application with additional N fertilizer. This study suggested the long-term application of digestate to obtain more alteration of soil properties such as bulk density, penetration resistance, and hydraulic conductivity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=liquid%20organic%20fertilizer" title="liquid organic fertilizer">liquid organic fertilizer</a>, <a href="https://publications.waset.org/abstracts/search?q=digestate" title=" digestate"> digestate</a>, <a href="https://publications.waset.org/abstracts/search?q=application" title=" application"> application</a>, <a href="https://publications.waset.org/abstracts/search?q=ammonia" title=" ammonia"> ammonia</a>, <a href="https://publications.waset.org/abstracts/search?q=emission" title=" emission"> emission</a> </p> <a href="https://publications.waset.org/abstracts/157208/systems-of-liquid-organic-fertilizer-application-with-respect-to-environmental-impact" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157208.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">287</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8283</span> Utilize 5G Mobile Connection as a Node in the Proof of Authority Blockchain Used for Microtransaction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Frode%20van%20der%20Laak">Frode van der Laak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper contributes to the feasibility of using a 5G mobile connection as a node for a Proof of Authority (PoA) blockchain, which is used for microtransactions at the same time. It uses the phone number identity of the users that are linked to the crypto wallet address. It also proposed a consensus protocol based on Proof-of-Authority (PoA) blockchain; PoA is a permission blockchain where consensus is achieved through a set of designated authority rather than through mining, as is the case with a Proof of Work (PoW) blockchain. This report will first explain the concept of a PoA blockchain and how it works. It will then discuss the potential benefits and challenges of using a 5G mobile connection as a node in such a blockchain, and finally, the main open problem statement and proposed solutions with the requirements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=5G" title="5G">5G</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile" title=" mobile"> mobile</a>, <a href="https://publications.waset.org/abstracts/search?q=connection" title=" connection"> connection</a>, <a href="https://publications.waset.org/abstracts/search?q=node" title=" node"> node</a>, <a href="https://publications.waset.org/abstracts/search?q=PoA" title=" PoA"> PoA</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=microtransaction" title=" microtransaction"> microtransaction</a> </p> <a href="https://publications.waset.org/abstracts/158556/utilize-5g-mobile-connection-as-a-node-in-the-proof-of-authority-blockchain-used-for-microtransaction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158556.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8282</span> System and Method for Providing Web-Based Remote Application Service</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shuen-Tai%20Wang">Shuen-Tai Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu-Ching%20Lin"> Yu-Ching Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Hsi-Ya%20Chang"> Hsi-Ya Chang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the development of virtualization technologies, a new type of service named cloud computing service is produced. Cloud users usually encounter the problem of how to use the virtualized platform easily over the web without requiring the plug-in or installation of special software. The object of this paper is to develop a system and a method enabling process interfacing within an automation scenario for accessing remote application by using the web browser. To meet this challenge, we have devised a web-based interface that system has allowed to shift the GUI application from the traditional local environment to the cloud platform, which is stored on the remote virtual machine. We designed the sketch of web interface following the cloud virtualization concept that sought to enable communication and collaboration among users. We describe the design requirements of remote application technology and present implementation details of the web application and its associated components. We conclude that this effort has the potential to provide an elastic and resilience environment for several application services. Users no longer have to burden the system maintenances and reduce the overall cost of software licenses and hardware. Moreover, this remote application service represents the next step to the mobile workplace, and it lets user to use the remote application virtually from anywhere. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=virtualization%20technology" title="virtualization technology">virtualization technology</a>, <a href="https://publications.waset.org/abstracts/search?q=virtualized%20platform" title=" virtualized platform"> virtualized platform</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20interface" title=" web interface"> web interface</a>, <a href="https://publications.waset.org/abstracts/search?q=remote%20application" title=" remote application"> remote application</a> </p> <a href="https://publications.waset.org/abstracts/81035/system-and-method-for-providing-web-based-remote-application-service" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81035.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">288</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8281</span> The Application of Green Technology to Residential Architecture in Hangzhou</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Huiru%20Chen">Huiru Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Xuran%20Zhang"> Xuran Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> At present, the residential architecture in China are still causing high energy consumption and high pollution during their whole life cycle, which can be backward compared with the developed countries. The aim of this paper is to discuss the application of green technology to residential architecture in Hangzhou. This article will start with the development of green buildings, then analyzes the use status of green technology in Hangzhou from several specific measures. Analysis of the typical existing green residential buildings in Hangzhou is an attempt to form a preliminary Hangzhou’s green technology application strategy system. Through research, it has been found that the application of green technology in Hangzhou has changed from putting green to the facade, to the combination of the preservation of the traditional green concept and the modern green technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=application" title="application">application</a>, <a href="https://publications.waset.org/abstracts/search?q=green%20technology" title=" green technology"> green technology</a>, <a href="https://publications.waset.org/abstracts/search?q=Hangzhou" title=" Hangzhou"> Hangzhou</a>, <a href="https://publications.waset.org/abstracts/search?q=residential%20architecture" title=" residential architecture"> residential architecture</a> </p> <a href="https://publications.waset.org/abstracts/92930/the-application-of-green-technology-to-residential-architecture-in-hangzhou" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92930.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">206</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8280</span> Copyright Clearance for Artificial Intelligence Training Data: Challenges and Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Erva%20Akin">Erva Akin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> – The use of copyrighted material for machine learning purposes is a challenging issue in the field of artificial intelligence (AI). While machine learning algorithms require large amounts of data to train and improve their accuracy and creativity, the use of copyrighted material without permission from the authors may infringe on their intellectual property rights. In order to overcome copyright legal hurdle against the data sharing, access and re-use of data, the use of copyrighted material for machine learning purposes may be considered permissible under certain circumstances. For example, if the copyright holder has given permission to use the data through a licensing agreement, then the use for machine learning purposes may be lawful. It is also argued that copying for non-expressive purposes that do not involve conveying expressive elements to the public, such as automated data extraction, should not be seen as infringing. The focus of such ‘copy-reliant technologies’ is on understanding language rules, styles, and syntax and no creative ideas are being used. However, the non-expressive use defense is within the framework of the fair use doctrine, which allows the use of copyrighted material for research or educational purposes. The questions arise because the fair use doctrine is not available in EU law, instead, the InfoSoc Directive provides for a rigid system of exclusive rights with a list of exceptions and limitations. One could only argue that non-expressive uses of copyrighted material for machine learning purposes do not constitute a ‘reproduction’ in the first place. Nevertheless, the use of machine learning with copyrighted material is difficult because EU copyright law applies to the mere use of the works. Two solutions can be proposed to address the problem of copyright clearance for AI training data. The first is to introduce a broad exception for text and data mining, either mandatorily or for commercial and scientific purposes, or to permit the reproduction of works for non-expressive purposes. The second is that copyright laws should permit the reproduction of works for non-expressive purposes, which opens the door to discussions regarding the transposition of the fair use principle from the US into EU law. Both solutions aim to provide more space for AI developers to operate and encourage greater freedom, which could lead to more rapid innovation in the field. The Data Governance Act presents a significant opportunity to advance these debates. Finally, issues concerning the balance of general public interests and legitimate private interests in machine learning training data must be addressed. In my opinion, it is crucial that robot-creation output should fall into the public domain. Machines depend on human creativity, innovation, and expression. To encourage technological advancement and innovation, freedom of expression and business operation must be prioritised. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=copyright" title=" copyright"> copyright</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20governance" title=" data governance"> data governance</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/165336/copyright-clearance-for-artificial-intelligence-training-data-challenges-and-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165336.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">83</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8279</span> Developing a Recommendation Library System based on Android Application </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kunyanuth%20Kularbphettong">Kunyanuth Kularbphettong</a>, <a href="https://publications.waset.org/abstracts/search?q=Kunnika%20Tenprakhon"> Kunnika Tenprakhon</a>, <a href="https://publications.waset.org/abstracts/search?q=Pattarapan%20Roonrakwit"> Pattarapan Roonrakwit </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a recommendation library application on Android system. The objective of this system is to support and advice user to use library resources based on mobile application. We describe the design approaches and functional components of this system. The system was developed based on under association rules, Apriori algorithm. In this project, it was divided the result by the research purposes into 2 parts: developing the Mobile application for online library service and testing and evaluating the system. Questionnaires were used to measure user satisfaction with system usability by specialists and users. The results were satisfactory both specialists and users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=online%20library" title="online library">online library</a>, <a href="https://publications.waset.org/abstracts/search?q=Apriori%20algorithm" title=" Apriori algorithm"> Apriori algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=Android%20application" title=" Android application"> Android application</a>, <a href="https://publications.waset.org/abstracts/search?q=black%20box" title=" black box"> black box</a> </p> <a href="https://publications.waset.org/abstracts/7358/developing-a-recommendation-library-system-based-on-android-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7358.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">487</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8278</span> Analysis of Network Connectivity for Ship-To-Ship Maritime Communication Using IEEE 802.11 on Maritime Environment of Tanjung Perak, Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Fauzi%20Makarim">Ahmad Fauzi Makarim</a>, <a href="https://publications.waset.org/abstracts/search?q=Okkie%20Puspitorini"> Okkie Puspitorini</a>, <a href="https://publications.waset.org/abstracts/search?q=Hani%27ah%20Mahmudah"> Hani&#039;ah Mahmudah</a>, <a href="https://publications.waset.org/abstracts/search?q=Nur%20Adi%20Siswandari"> Nur Adi Siswandari</a>, <a href="https://publications.waset.org/abstracts/search?q=Ari%20Wijayanti"> Ari Wijayanti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As a maritime country, Indonesia needs a solution in maritime connectivity which can assist the maritime communication system which including communication from harbor to the ship or ship to ship. The needs of many application services for maritime communication, whether for safety reasons until voyage service to help the process of voyage activity needs connection with a high bandwith. To support the government efforts in handling that kind of problem, a research is conducted in maritime communication issue by applying the new developed technology in Indonesia, namely IEEE 802.11. In this research, 3 outdoor WiFi devices are used in which have a frequency of 5.8 GHz. Maritime of Tanjung Perak harbor in Surabaya until Karang Jamuang Island are used as the location of the research with defining permission of ship node spreading by Navigation District Class 1. That maritime area formed by state 1 and state 2 areas which are the narrow area with average wave height of 0.7 meter based on the data from BMKG S urabaya. After that, wave height used as one of the parameters which are used in analyzing characteristic of signal propagation at sea surface, so it can be determined on the coverage area of transmitter system. In this research has been used three samples of outdoor wifi, there is the coverage of device A can be determined about 2256 meter, device B 4000 meter, and device C 1174 meter. Then to analyze of network connectivity for the ship to ship is used AODV routing algorithm system based on the value of the power transmit was smallest of all nodes within the transmitter coverage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=maritime%20of%20Indonesia" title="maritime of Indonesia">maritime of Indonesia</a>, <a href="https://publications.waset.org/abstracts/search?q=maritime%20communications" title=" maritime communications"> maritime communications</a>, <a href="https://publications.waset.org/abstracts/search?q=outdoor%20wifi" title=" outdoor wifi"> outdoor wifi</a>, <a href="https://publications.waset.org/abstracts/search?q=coverage" title=" coverage"> coverage</a>, <a href="https://publications.waset.org/abstracts/search?q=AODV" title=" AODV"> AODV</a> </p> <a href="https://publications.waset.org/abstracts/55554/analysis-of-network-connectivity-for-ship-to-ship-maritime-communication-using-ieee-80211-on-maritime-environment-of-tanjung-perak-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55554.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">350</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=application%20permission&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=application%20permission&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=application%20permission&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=application%20permission&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=application%20permission&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=application%20permission&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=application%20permission&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=application%20permission&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=application%20permission&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=application%20permission&amp;page=276">276</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=application%20permission&amp;page=277">277</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=application%20permission&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10