Search results for: never users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2507

Search results for: never users

2237 Energy Detection Based Sensing and Primary User Traffic Classification for Cognitive Radio

Authors: Urvee B. Trivedi, U. D. Dalal

Abstract:

As wireless communication services grow quickly; the seriousness of spectrum utilization has been on the rise gradually. An emerging technology, cognitive radio has come out to solve today’s spectrum scarcity problem. To support the spectrum reuse functionality, secondary users are required to sense the radio frequency environment, and once the primary users are found to be active, the secondary users are required to vacate the channel within a certain amount of time. Therefore, spectrum sensing is of significant importance. Once sensing is done, different prediction rules apply to classify the traffic pattern of primary user. Primary user follows two types of traffic patterns: periodic and stochastic ON-OFF patterns. A cognitive radio can learn the patterns in different channels over time. Two types of classification methods are discussed in this paper, by considering edge detection and by using autocorrelation function. Edge detection method has a high accuracy but it cannot tolerate sensing errors. Autocorrelation-based classification is applicable in the real environment as it can tolerate some amount of sensing errors.

Keywords: cognitive radio (CR), probability of detection (PD), probability of false alarm (PF), primary user (PU), secondary user (SU), fast Fourier transform (FFT), signal to noise ratio (SNR)

Procedia PDF Downloads 345
2236 Modeling User Departure Time Choice for Work Trips in High Traffic Suburban Roads

Authors: Saeed Sayyad Hagh Shomar

Abstract:

Modeling users’ decisions on departure time choice is the main motivation for this research. In particular, it examines the impact of social-demographic features, household, job characteristics and trip qualities on individuals’ departure time choice. Departure time alternatives are presented as adjacent discrete time periods. The choice between these alternatives is done using a discrete choice model. Since a great deal of early morning trips and traffic congestion at that time of the day comprise work trips, the focus of this study is on the work trip over the entire day. Therefore, this study by using the users’ stated preference in questionnaire models users’ departure time choice affected by congestion pricing schemes in high traffic suburban entrance roads of Tehran. The results demonstrate efficient social-demographic impact on work trips’ departure time. These findings have substantial outcomes for the analysis of transportation planning. Particularly, the analysis shows that ignoring the effects of these variables could result in erroneous information and consequently decisions in the field of transportation planning and air quality would fail and cause financial resources loss.

Keywords: congestion pricing, departure time, modeling, travel timing, time of the day, transportation planning

Procedia PDF Downloads 298
2235 Detect QOS Attacks Using Machine Learning Algorithm

Authors: Christodoulou Christos, Politis Anastasios

Abstract:

A large majority of users favoured to wireless LAN connection since it was so simple to use. A wireless network can be the target of numerous attacks. Class hijacking is a well-known attack that is fairly simple to execute and has significant repercussions on users. The statistical flow analysis based on machine learning (ML) techniques is a promising categorization methodology. In a given dataset, which in the context of this paper is a collection of components representing frames belonging to various flows, machine learning (ML) can offer a technique for identifying and characterizing structural patterns. It is possible to classify individual packets using these patterns. It is possible to identify fraudulent conduct, such as class hijacking, and take necessary action as a result. In this study, we explore a way to use machine learning approaches to thwart this attack.

Keywords: wireless lan, quality of service, machine learning, class hijacking, EDCA remapping

Procedia PDF Downloads 61
2234 From Over-Tourism to Over-Mobility: Understanting the Mobility of Incoming City Users in Barcelona

Authors: José Antonio Donaire Benito, Konstantina Zerva

Abstract:

Historically, cities have been places where people from many nations and cultures have met and settled together, while population flows and density have had a significant impact on urban dynamics. Cities' high density of social, cultural, business offerings, everyday services, and other amenities not intended for tourists draw not only tourists but a wide range of city users as well. With the coordination of city rhythms and the porosity of the community, city users order and frame their urban experience. From one side, recent literature focuses on the shift in urban tourist experience from 'having' a holiday through 'doing' activities to 'becoming' a local by experiencing a part of daily life. On the other hand, there is a debate on the 'touristification of everyday life', where middle and upper class urban dwellers display attitudes and behaviors that are virtually undistinguishable from those of visitors. With the advent of globalization and technological advances, modern society has undergone a radical transformation that has altered mobility patterns within it, blurring the boundaries between tourism and everyday life, work and leisure, and "hosts" and "guests". Additionally, the presence of other 'temporary city' users, such as commuters, digital nomads, second home owners, and migrants, contributes to a more complex transformation of tourist cities. Moving away from this traditional clear distinction between 'hosts' and 'guests', which represents a more static view of tourism, and moving towards a more liquid narrative of mobility, academics on tourism development are embracing the New Mobilities Paradigm. The latter moves beyond the static structures of the modern world and focuses on the ways in which social entities are made up of people, machines, information, and images in a moving system. In light of this fluid interdependence between tourists and guests, a question arises as to whether overtourism, which is considered as the underlying cause of citizens' perception of a lower urban quality of life, is a fair representation of perceived mobility excessiveness, place consumption disruptiveness, and residents displacement. As a representative example of an overtourism narrative, Barcelona was chosen as a study area for this purpose, focusing on the incoming city users to reflect in depth the variety of people who contribute to mobility flows beyond those residents already have. Several statistical data have been analyzed to determine the number of national and international visitors to Barcelona at some point during the day in 2019. Specifically, tracking data gathered from mobile phone users within the city are combined with tourist surveys, urban mobility data, zenithal data capture, and information about the city's attractions. The paper shows that tourists are only a small part of the different incoming city users that daily enter Barcelona; excursionists, commuters, and metropolitans also contribute to a high mobility flow. Based on the diversity of incoming city users and their place consumption, it seems that the city's urban experience is more likely to be impacted by over-mobility tan over-tourism.

Keywords: city users, density, new mobilities paradigm, over-tourism.

Procedia PDF Downloads 80
2233 Unlocking the Future of Grocery Shopping: Graph Neural Network-Based Cold Start Item Recommendations with Reverse Next Item Period Recommendation (RNPR)

Authors: Tesfaye Fenta Boka, Niu Zhendong

Abstract:

Recommender systems play a crucial role in connecting individuals with the items they require, as is particularly evident in the rapid growth of online grocery shopping platforms. These systems predominantly rely on user-centered recommendations, where items are suggested based on individual preferences, garnering considerable attention and adoption. However, our focus lies on the item-centered recommendation task within the grocery shopping context. In the reverse next item period recommendation (RNPR) task, we are presented with a specific item and challenged to identify potential users who are likely to consume it in the upcoming period. Despite the ever-expanding inventory of products on online grocery platforms, the cold start item problem persists, posing a substantial hurdle in delivering personalized and accurate recommendations for new or niche grocery items. To address this challenge, we propose a Graph Neural Network (GNN)-based approach. By capitalizing on the inherent relationships among grocery items and leveraging users' historical interactions, our model aims to provide reliable and context-aware recommendations for cold-start items. This integration of GNN technology holds the promise of enhancing recommendation accuracy and catering to users' individual preferences. This research contributes to the advancement of personalized recommendations in the online grocery shopping domain. By harnessing the potential of GNNs and exploring item-centered recommendation strategies, we aim to improve the overall shopping experience and satisfaction of users on these platforms.

Keywords: recommender systems, cold start item recommendations, online grocery shopping platforms, graph neural networks

Procedia PDF Downloads 92
2232 Review for Identifying Online Opinion Leaders

Authors: Yu Wang

Abstract:

Nowadays, Internet enables its users to share the information online and to interact with others. Facing with numerous information, these Internet users are confused and begin to rely on the opinion leaders’ recommendations. The online opinion leaders are the individuals who have professional knowledge, who utilize the online channels to spread word-of-mouth information and who can affect the attitudes or even the behavior of their followers to some degree. Because utilizing the online opinion leaders is seen as an important approach to affect the potential consumers, how to identify them has become one of the hottest topics in the related field. Hence, in this article, the concepts and characteristics are introduced, and the researches related to identifying opinion leaders are collected and divided into three categories. Finally, the implications for future studies are provided.

Keywords: online opinion leaders, user attributes analysis, text mining analysis, network structure analysis

Procedia PDF Downloads 223
2231 The Complexities of Designing a Learning Programme in Higher Education with the End-User in Mind

Authors: Andre Bechuke

Abstract:

The quality of every learning programme in Higher Education (HE) is dependent on the planning, design, and development of the curriculum decisions. These curriculum development decisions are highly influenced by the knowledge of the end-user, who are not always just the students. When curriculum experts plan, design and develop learning programmes, they always have the end-users in mind throughout the process. Without proper knowledge of the end-user(s), the design and development of a learning programme might be flawed. Curriculum experts often struggle to determine who the real end-user is. As such, it is even more challenging to establish what needs to be known about the end user that should inform the plan, design, and development of a learning programme. This research sought suggest approaches to guide curriculum experts to identify the end-user(s), taking into consideration the pressure and influence other agencies and structures or stakeholders (industry, students, government, universities context, lecturers, international communities, professional regulatory bodies) have on the design of a learning programme and the graduates of the programmes. Considering the influence of these stakeholders, which is also very important, the task of deciding who the real end-user of the learning programme becomes very challenging. This study makes use of criteria 1 and 18 of the Council on Higher Education criteria for programme accreditation to guide the process of identifying the end-users when developing a learning programme. Criterion 1 suggests that designers must ensure that the programme is consonant with the institution’s mission, forms part of institutional planning and resource allocation, meets national requirements and the needs of students and other stakeholders, and is intellectually credible. According to criterion 18, in designing a learning programme, steps must be taken to enhance the employability of students and alleviate shortages of expertise in relevant fields. In conclusion, there is hardly ever one group of end-users to be considered for developing a learning programme, and the notion that students are the end-users is not true, especially when the graduates are unable to use the qualification for employment.

Keywords: council on higher education, curriculum design and development, higher education, learning programme

Procedia PDF Downloads 83
2230 A Preliminary Investigation on Factors That Influence Road Users' Speeding Behaviour on Selected Roads in Peninsular Malaysia

Authors: Farah Fazlinda Binti Mohamad, Ahmad Saifizul Abdullah, Mohamed Rehan Karim , Jamilah Mohamad, Siti Hikmah Musthar

Abstract:

Road safety is an important issue in Malaysia. It become important as it is discussed widely throughout printed and electronic media. Most of the news portrays on road accident and fatalities have increased the concern of everyone. This issue affects everyone's life as everyone shares the roads. The most vulnerable victims are the road user who uses the roads every day. It is appalling when World Health Organization (WHO) reported that in every 100,000 of population in Malaysia, 23 fatalities recorded due to road accident alone. This figure is quite alarming and requires serious attention. Furthermore, research by Malaysian Institute of Road Safety Research concluded that that speeding has contributed to 60% of all road accident in the country. Therefore, this study aims to elucidate the factors that influence road users’ speeding behaviour on selected roads in Peninsular Malaysia. To achieve this, set of questionnaires has distributed to 500 respondents on selected roads in Peninsular Malaysia. The respondents came from various demographic backgrounds in order to have a fair opinion on the issue. Using descriptive analysis, the results have indicated that psychological factors such as emotion and attitude of road user are the prominent factors that influence the road user’s speeding behaviour. Furthermore, the results have shown that male road users were dominant in speeding compared to female, which led to increased vulnerability to road injuries and fatalities. These findings are very useful in order for us to understand road users’ driving behaviour. Relevant authorities should also revise the existing countermeasures and find ways to reduce road accident. Engineers and road experts could cooperate in designing new road specifications for the road user. Nevertheless, it is important to comprehend this speeding issue and factors associated with it. Each road user should take this matter seriously and responsibly as road safety is a responsibility of all.

Keywords: countermeasures, psychological, road safety, speeding

Procedia PDF Downloads 530
2229 Integrating Knowledge into Health Care Systems: A Case Study Investigation on UAE Health Care

Authors: Alya Al Ghufli, Kelaithim Al Tunaiji, Sara Al Ali, Khalid Samara

Abstract:

It is well known that health care systems encompass a variety of key knowledge sources that need to be integrated and shared amongst all types of users to attain higher-levels of motivation and productivity. The development of Health Integrated Systems (HIS) is often seen as a crucial step in strengthening the integration of knowledge to help serve the information needs of health care users. As an emergent economy, the United Arab Emirates (UAE) is regarded as a new arrival in the area of health information systems. As a new nation, there may be several challenges in terms of organisational climate and the sufficient skills and knowledge activities for effective use of HIS. In this regard, the lack of coordination, attitudes and practice of health-related systems can eventually result in unnecessary data and generally poor use of the system. This paper includes results from a qualitative preliminary study carried out from a case study investigation in a single large primary health care organisation in the United Arab Emirates (UAE) comprising various health care users. The study explored health care user’s perceptions about health integration and the impact it has on their practice. The main sources of information were semi-structured interviews and non-obtrusive observations. The authors conclude by presenting various recommendations for the development of HIS and knowledge activities and areas for further study.

Keywords: health integrated systems, knowledge sharing, knowledge activities, health information systems

Procedia PDF Downloads 437
2228 Fairly Irrigation Water Distribution between Upstream and Downstream Water Users in Water Shortage Periods

Authors: S. M. Hashemy Shahdany

Abstract:

Equitable water delivery becomes one of the main concerns for water authorities in arid regions. Due to water scarcity, providing reliable amount of water is not possible for most of the irrigation districts in arid regions. In this paper, water level difference control is applied to keep the water level errors equal in adjacent reaches. Distant downstream decentralized configurations of the control method are designed and tested under a realistic scenario shows canal operation under water shortage. The simulation results show that the difference controllers share the water level error among all of the users in a fair way. Therefore, water deficit has a similar influence on downstream as well as upstream and water offtakes.

Keywords: equitable water distribution, precise agriculture, sustainable agriculture, water shortage

Procedia PDF Downloads 466
2227 The Connection Between the International Law and the Legal Consultation on the Social Media

Authors: Amir Farouk Ahmed Ali Hussin

Abstract:

Social media, such as Facebook, LinkedIn and Ex-Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They give fantastic means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. Moreover, these practices have outcome in concerns with respect to privacy and security from different stakeholders. Guiding these privacy and security concerns in social networks is a must for these networks to be sustainable. Real security and privacy tools may not be enough to address existing concerns. Some points should be followed to protect users from the existing risks. In this research, we have checked the various privacy and security issues and concerns pertaining to social media. However, we have classified these privacy and security issues and presented a thorough discussion of the effects of these issues and concerns on the future of the social networks. In addition, we have presented a set of points as precaution measures that users can consider to address these issues.

Keywords: international legal, consultation mix, legal research, small and medium-sized enterprises, strategic International law, strategy alignment, house of laws, deployment, production strategy, legal strategy, business strategy

Procedia PDF Downloads 65
2226 Advanced Machine Learning Algorithm for Credit Card Fraud Detection

Authors: Manpreet Kaur

Abstract:

When legitimate credit card users are mistakenly labelled as fraudulent in numerous financial delated applications, there are numerous ethical problems. The innovative machine learning approach we have suggested in this research outperforms the current models and shows how to model a data set for credit card fraud detection while minimizing false positives. As a result, we advise using random forests as the best machine learning method for predicting and identifying credit card transaction fraud. The majority of victims of these fraudulent transactions were discovered to be credit card users over the age of 60, with a higher percentage of fraudulent transactions taking place between the specific hours.

Keywords: automated fraud detection, isolation forest method, local outlier factor, ML algorithm, credit card

Procedia PDF Downloads 115
2225 Conceptual Design of a Wi-Fi and GPS Based Robotic Library Using an Intelligent System

Authors: M. S. Sreejith, Steffy Joy, Abhishesh Pal, Beom-Sahng Ryuh, V. R. Sanal Kumar

Abstract:

In this paper an attempt has been made for the design of a robotic library using an intelligent system. The robot works on the ARM microprocessor, motor driver circuit with 5 degrees of freedom with Wi-Fi and GPS based communication protocol. The authenticity of the library books is controlled by RFID. The proposed robotic library system is facilitated with embedded system and ARM. In this library issuance system the previous potential readers’ authentic review reports have been taken into consideration for recommending suitable books to the deserving new users and the issuance of books or periodicals is based on the users’ decision. We have conjectured that the Wi-Fi based robotic library management system would allow fast transaction of books issuance and it also produces quality readers.

Keywords: GPS bsed based Robotic library, library management system, robotic library, Wi-Fi library

Procedia PDF Downloads 307
2224 The Correlation between Users’ Star Rating and Usability on Mobile Applications

Authors: Abdulmohsen A. AlBesher, Richard T. Stone

Abstract:

Star rating for mobile applications is a very useful way to differentiate between the best and worst rated applications. However, the question is whether the rating reflects the level of usability or not. The aim of this paper is to find out if the user’ star ratings on mobile apps correlate with the usability of those apps. Thus, we tested three mobile apps, which have different star ratings: low, medium, and high. Participating in the study, 15 mobile phone users were asked to do one single task for each of the three tested apps. After each task, the participant evaluated the app by answering a survey based on the System Usability Scale (SUS). The results found that there is no major correlation between the star rating and the usability. However, it was found that the task completion time and the numbers of errors that may happen while completing the task were significantly correlated to the usability.

Keywords: mobile applications, SUS, star rating, usability

Procedia PDF Downloads 322
2223 Object Negotiation Mechanism for an Intelligent Environment Using Event Agents

Authors: Chiung-Hui Chen

Abstract:

With advancements in science and technology, the concept of the Internet of Things (IoT) has gradually developed. The development of the intelligent environment adds intelligence to objects in the living space by using the IoT. In the smart environment, when multiple users share the living space, if different service requirements from different users arise, then the context-aware system will have conflicting situations for making decisions about providing services. Therefore, the purpose of establishing a communication and negotiation mechanism among objects in the intelligent environment is to resolve those service conflicts among users. This study proposes developing a decision-making methodology that uses “Event Agents” as its core. When the sensor system receives information, it evaluates a user’s current events and conditions; analyses object, location, time, and environmental information; calculates the priority of the object; and provides the user services based on the event. Moreover, when the event is not single but overlaps with another, conflicts arise. This study adopts the “Multiple Events Correlation Matrix” in order to calculate the degree values of incidents and support values for each object. The matrix uses these values as the basis for making inferences for system service, and to further determine appropriate services when there is a conflict.

Keywords: internet of things, intelligent object, event agents, negotiation mechanism, degree of similarity

Procedia PDF Downloads 291
2222 Investigating the Usability of a University Website from the Users’ Perspective: An Empirical Study of Benue State University Website

Authors: Abraham Undu, Stephen Akuma

Abstract:

Websites are becoming a major component of an organization’s success in our ever globalizing competitive world. The website symbolizes an organization, interacting or projecting an organization’s principles, culture, values, vision, and perspectives. It is an interface connecting organizations and their clients. The university, as an academic institution, makes use of a website to communicate and offer computing services to its stakeholders (students, staff, host community, university management etc). Unfortunately, website designers often give more consideration to the technology, organizational structure and business objectives of the university than to the usability of the site. Website designers end up designing university websites which do not meet the needs of the primary users. This empirical study investigated the Benue State University website from the point view of students. This research was realized by using a standardized website usability questionnaire based on the five factors of usability defined by WAMMI (Website Analysis and Measurement Inventory): attractiveness, controllability, efficiency, learnability and helpfulness. The result of the investigation showed that the university website (https://portal.bsum.edu.ng/) has neutral usability level because of the usability issues associated with the website. The research recommended feasible solutions to improve the usability of the website from the users’ perspective and also provided a modified usability model that will be used for better evaluation of the Benue State University website.

Keywords: Benue State University, modified usability model, usability, usability factors

Procedia PDF Downloads 152
2221 The Analysis of the Blockchain Technology and Challenges Hampering Its Adoption

Authors: Sthembile Mthethwa

Abstract:

With the rise in the usage of internet in the past decades, this presented an opportunity for users to transact with each other over the use of internet. Cryptocurrencies have been introduced, which allows users to transact with each other without the involvement of a third party i.e. the bank. These systems are widely known as cryptocurrencies or digital currencies and the first system to be introduced was Bitcoin which has been receiving a lot of attention. Bitcoin introduced a new technology known as the blockchain technology. In the past years, blockchain has been getting attention; whereby new applications are introduced that utilize blockchain. Yet, most people are still hesitant about the adoption of blockchain and the adoption of cryptocurrencies at large. Some people still do not understand the technology. Thus, it leads to the slow adoption of this technology. In this paper, a review of the blockchain is provided, whereby the different types of blockchain are discussed in details. Details of the things that contribute to the hindrance of the process of adoption are discussed.

Keywords: bitcoin, blockchain, cryptocurrency, payment system

Procedia PDF Downloads 291
2220 Classifying Blog Texts Based on the Psycholinguistic Features of the Texts

Authors: Hyung Jun Ahn

Abstract:

With the growing importance of social media, it is imperative to analyze it to understand the users. Users share useful information and their experience through social media, where much of what is shared is in the form of texts. This study focused on blogs and aimed to test whether the psycho-linguistic characteristics of blog texts vary with the subject or the type of experience of the texts. For this goal, blog texts about four different types of experience, Go, skiing, reading, and musical were collected through the search API of the Tistory blog service. The analysis of the texts showed that various psycholinguistic characteristics of the texts are different across the four categories of the texts. Moreover, the machine learning experiment using the characteristics for automatic text classification showed significant performance. Specifically, the ensemble method, based on functional tree and bagging appeared to be most effective in classification.

Keywords: blog, social media, text analysis, psycholinguistics

Procedia PDF Downloads 279
2219 Decision Support System for Tourism in Northern Part of Thailand

Authors: Katejarinporn Chaiya, Thawit Janbanklong

Abstract:

The purposes of this study were to design and find users’ satisfaction after using the decision support system for tourism in the Northern part of Thailand, which can provide tourists with touristic information and plan their personal voyage. Such information can be retrieved systematically based on personal budget and provinces. The samples of this study were five experts and users: 30 "white collars" in Bangkok. This decision support system was designed via ASP.NET. Its database was developed by using MySQL, for administrators to effectively manage the database. The application outcome revealed that the innovation works properly as sought in objectives. Specialists and white collars in Bangkok have evaluated the decision support system; the result was satisfactorily positive.

Keywords: decision Support System, ASP.NET, MySQL, white collars

Procedia PDF Downloads 359
2218 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 365
2217 Three Tier Indoor Localization System for Digital Forensics

Authors: Dennis L. Owuor, Okuthe P. Kogeda, Johnson I. Agbinya

Abstract:

Mobile localization has attracted a great deal of attention recently due to the introduction of wireless networks. Although several localization algorithms and systems have been implemented and discussed in the literature, very few researchers have exploited the gap that exists between indoor localization, tracking, external storage of location information and outdoor localization for the purpose of digital forensics during and after a disaster. The contribution of this paper lies in the implementation of a robust system that is capable of locating, tracking mobile device users and store location information for both indoor and partially outdoor the cloud. The system can be used during disaster to track and locate mobile phone users. The developed system is a mobile application built based on Android, Hypertext Preprocessor (PHP), Cascading Style Sheets (CSS), JavaScript and MATLAB for the Android mobile users. Using Waterfall model of software development, we have implemented a three level system that is able to track, locate and store mobile device information in secure database (cloud) on almost a real time basis. The outcome of the study showed that the developed system is efficient with regard to the tracking and locating mobile devices. The system is also flexible, i.e. can be used in any building with fewer adjustments. Finally, the system is accurate for both indoor and outdoor in terms of locating and tracking mobile devices.

Keywords: indoor localization, digital forensics, fingerprinting, tracking and cloud

Procedia PDF Downloads 339
2216 Algorithm and Software Based on Multilayer Perceptron Neural Networks for Estimating Channel Use in the Spectral Decision Stage in Cognitive Radio Networks

Authors: Danilo López, Johana Hernández, Edwin Rivas

Abstract:

The use of the Multilayer Perceptron Neural Networks (MLPNN) technique is presented to estimate the future state of use of a licensed channel by primary users (PUs); this will be useful at the spectral decision stage in cognitive radio networks (CRN) to determine approximately in which time instants of future may secondary users (SUs) opportunistically use the spectral bandwidth to send data through the primary wireless network. To validate the results, sequences of occupancy data of channel were generated by simulation. The results show that the prediction percentage is greater than 60% in some of the tests carried out.

Keywords: cognitive radio, neural network, prediction, primary user

Procedia PDF Downloads 372
2215 Experimental Networks Synchronization of Chua’s Circuit in Different Topologies

Authors: Manuel Meranza-Castillon, Rolando Diaz-Castillo, Adrian Arellano-Delgado, Cesar Cruz-Hernandez, Rosa Martha Lopez-Gutierrez

Abstract:

In this work, we deal with experimental network synchronization of chaotic nodes with different topologies. Our approach is based on complex system theory, and we use a master-slave configuration to couple the nodes in the networks. In particular, we design and implement electronically complex dynamical networks composed by nine coupled chaotic Chua’s circuits with topologies: in nearest-neighbor, small-world, open ring, star, and global. Also, network synchronization is evaluated according to a particular coupling strength for each topology. This study is important by the possible applications to private transmission of information in a chaotic communication network of multiple users.

Keywords: complex networks, Chua's circuit, experimental synchronization, multiple users

Procedia PDF Downloads 350
2214 User Expectations and Opinions Related to Campus Wayfinding and Signage Design: A Case Study of Kastamonu University

Authors: Güllü Yakar, Adnan Tepecik

Abstract:

A university campus resembles an independent city that is spread over a wide area. Campuses that incorporate thousands of new domestic and international users at the beginning of every academic period also host scientific, cultural and sportive events, in addition to embodying regular users such as students and staff. Wayfinding and signage systems are necessary for the regulation of vehicular traffic, and they enable users’ to navigate without losing time or feeling anxiety. While designing the system or testing the functionality of it, opinions of existing users or likely behaviors of typical user profiles (personas) provide designers with insight. The purpose of this study is to identify the wayfinding attitudes and expectations of Kastamonu University Kuzeykent Campus users. This study applies a mixed method in which a questionnaire, developed by the researcher, constitute the quantitative phase of the study. The survey was carried out with 850 participants who filled a questionnaire form which was tested in terms of construct validity by using Exploratory Factor Analysis. While interpreting the data obtained, Chi-Square, T- Test and ANOVA analyses were applied as well as descriptive analyses such as frequency (f) and percentage (%) values. The results of this survey, which was conducted during the absence of systematic wayfinding signs in the campus, reveals the participants expectations for insertion of floor plans and wayfinding signs to indoors, maps to outdoors, symbols and color codes to the existing signs and for the adequate arrangement of those for the use of visually impaired people. The fact that there is a direct proportional relation between the length of institution membership and wayfinding competency within campus, leads to the conclusion that especially the new comers are in need of wayfinding signs. In order to determine the effectiveness of campus-wide wayfinding system implemented after the survey and in order to identify the further expectations of users in this respect, a semi-structured interview form developed by the researcher and assessments of 20 participants are compiled. Subjected to content analysis, this data constitute the qualitative dimension of the study. Research results indicate that despite the presence of the signs, the participants experienced either inability or stress while finding their way, showed tendency to receive help from others and needed outdoor maps and signs, in addition to bigger-sized texts.

Keywords: environmental graphic design, environmental perception, wayfinding and signage design, wayfinding system

Procedia PDF Downloads 239
2213 Multiple Query Optimization in Wireless Sensor Networks Using Data Correlation

Authors: Elaheh Vaezpour

Abstract:

Data sensing in wireless sensor networks is done by query deceleration the network by the users. In many applications of the wireless sensor networks, many users send queries to the network simultaneously. If the queries are processed separately, the network’s energy consumption will increase significantly. Therefore, it is very important to aggregate the queries before sending them to the network. In this paper, we propose a multiple query optimization framework based on sensors physical and temporal correlation. In the proposed method, queries are merged and sent to network by considering correlation among the sensors in order to reduce the communication cost between the sensors and the base station.

Keywords: wireless sensor networks, multiple query optimization, data correlation, reducing energy consumption

Procedia PDF Downloads 336
2212 A Comparative Analysis of the Application and Use of Information and Communication Technologies (ICTS) in Selected Manufacturing Industries for Development in Nigeria

Authors: Kolawole Taiwo Olabode

Abstract:

This is a comparative study of ICTs adoption and use in selected manufacturing industries in for development. This study was carried out 2004 and was repeated 2013 (nine years after) using the same selected manufacturing industries to assess the level, improvement and extent ICT facilities used in these companies. The theory of modernization was explored to explain some developmental issues in this study. The same semi-structured questionnaire and IDI were used to elicit data on the subject matter. About 24.9% of the total workers (1,247) were sampled for this study using quota sampling technique. SPSS was used to analysis the quantitative data. The qualitative data was used to buttress the quantitative data. Findings indicated that Seven-Up Bottling Company and Frigoglass Glass Industry still remained Intensive ICT Users while only Niger Match Nigeria Limited still remained Non-Intensive ICT User while unfortunately, Askar Paint Nigeria Limited has gone liquidated. It is also important to discover that only the Intensive ICT users improved on relevant ICT facilities. The existing problems of ICT adoption and used in these companies remained the same in Niger Match Limited. The study concluded that for a society to be developed, management and government at all levels must do all things necessary to ensure that all existing organisations must be ICT compliance for workers and organisational performance and to enhance nation’s development in order to compete with other companies for global standard or recognition.

Keywords: ICT, intensive ICT-users, entrepreneurial, manufacturing industries, industries and development

Procedia PDF Downloads 304
2211 Analysis of the Physical Behavior of Library Users in Reading Rooms through GIS: A Case Study of the Central Library of Tehran University

Authors: Roya Pournaghi

Abstract:

Measuring the extent of daily use of the libraries study space is of utmost significance in order to develop, re-organize and maintain the efficiency of the study space. The current study aimed to employ GIS in analyzing the study halls space of the document center and central library of Tehran University and determine the extent of use of the study chairs and desks by the students-intended users. This combination of survey methods - descriptive design system. In order to collect the required data and a description of the method, To implement and entering data into ArcGIS software. It also analyzes the data and displays the results on the library floor map design method were used. And spatial database design and plan has been done at the Central Library of Tehran University through the amount of space used by members of the Library and Information halls plans. Results showed that Biruni's hall is allocated the highest occupancy rate to tables and chairs compared to other halls. In the Hall of Science and Technology, with an average occupancy rate of 0.39 in the tables represents the lowest users and Rashid al-Dins hall, and Science and Technology’s hall with an average occupancy rate (0.40) represents the lowest users of seats. In this study, the comparison of the space is occupied at different period as a study’s hall in the morning, evenings, afternoons, and several months was performed through GIS. This system analyzed the space relationship effectively and efficiently. The output of this study can be used by administrators and librarians to determine the exact amount of using the Equipment of study halls and librarians can use the output map to design more efficient space at the library.

Keywords: geospatial information system, spatial analysis, reading room, academic libraries, library’s user, central library of Tehran university

Procedia PDF Downloads 236
2210 A Recommender System Fusing Collaborative Filtering and User’s Review Mining

Authors: Seulbi Choi, Hyunchul Ahn

Abstract:

Collaborative filtering (CF) algorithm has been popularly used for recommender systems in both academic and practical applications. It basically generates recommendation results using users’ numeric ratings. However, the additional use of the information other than user ratings may lead to better accuracy of CF. Considering that a lot of people are likely to share their honest opinion on the items they purchased recently due to the advent of the Web 2.0, user's review can be regarded as the new informative source for identifying user's preference with accuracy. Under this background, this study presents a hybrid recommender system that fuses CF and user's review mining. Our system adopts conventional memory-based CF, but it is designed to use both user’s numeric ratings and his/her text reviews on the items when calculating similarities between users.

Keywords: Recommender system, Collaborative filtering, Text mining, Review mining

Procedia PDF Downloads 361
2209 Facebook Spam and Spam Filter Using Artificial Neural Networks

Authors: A. Fahim, Mutahira N. Naseem

Abstract:

SPAM is any unwanted electronic message or material in any form posted to many people. As the world is growing as global world, social networking sites play an important role in making world global providing people from different parts of the world a platform to meet and express their views. Among different social networking sites facebook become the leading one. With increase in usage different users start abusive use of facebook by posting or creating ways to post spam. This paper highlights the potential spam types nowadays facebook users faces. This paper also provide the reason how user become victim to spam attack. A methodology is proposed in the end discusses how to handle different types of spam.

Keywords: artificial neural networks, facebook spam, social networking sites, spam filter

Procedia PDF Downloads 373
2208 Hybrid Multipath Congestion Control

Authors: Akshit Singhal, Xuan Wang, Zhijun Wang, Hao Che, Hong Jiang

Abstract:

Multiple Path Transmission Control Protocols (MPTCPs) allow flows to explore path diversity to improve the throughput, reliability and network resource utilization. However, the existing solutions may discourage users to adopt the solutions in the face of multipath scenario where different paths are charged based on different pricing structures, e.g., WiFi vs cellular connections, widely available for mobile phones. In this paper, we propose a Hybrid MPTCP (H-MPTCP) with a built-in mechanism to incentivize users to use multiple paths with different pricing structures. In the meantime, H-MPTCP preserves the nice properties enjoyed by the state-of-the-art MPTCP solutions. Extensive real Linux implementation results verify that H-MPTCP can indeed achieve the design objectives.

Keywords: network, TCP, WiFi, cellular, congestion control

Procedia PDF Downloads 720