Search results for: social networks sites (SNSs)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13198

Search results for: social networks sites (SNSs)

12898 Use of Smartphones in 6th and 7th Grade (Elementary Schools) in Istria: Pilot Study

Authors: Maja Ruzic-Baf, Vedrana Keteles, Andrea Debeljuh

Abstract:

Younger and younger children are now using a smartphone, a device which has become ‘a must have’ and the life of children would be almost ‘unthinkable’ without one. Devices are becoming lighter and lighter but offering an array of options and applications as well as the unavoidable access to the Internet, without which it would be almost unusable. Numerous features such as taking of photographs, listening to music, information search on the Internet, access to social networks, usage of some of the chatting and messaging services, are only some of the numerous features offered by ‘smart’ devices. They have replaced the alarm clock, home phone, camera, tablet and other devices. Their use and possession have become a part of the everyday image of young people. Apart from the positive aspects, the use of smartphones has also some downsides. For instance, free time was usually spent in nature, playing, doing sports or other activities enabling children an adequate psychophysiological growth and development. The greater usage of smartphones during classes to check statuses on social networks, message your friends, play online games, are just some of the possible negative aspects of their application. Considering that the age of the population using smartphones is decreasing and that smartphones are no longer ‘foreign’ to children of pre-school age (smartphones are used at home or in coffee shops or shopping centers while waiting for their parents, playing video games often inappropriate to their age), particular attention must be paid to a very sensitive group, the teenagers who almost never separate from their ‘pets’. This paper is divided into two sections, theoretical and empirical ones. The theoretical section gives an overview of the pros and cons of the usage of smartphones, while the empirical section presents the results of a research conducted in three elementary schools regarding the usage of smartphones and, specifically, their usage during classes, during breaks and to search information on the Internet, check status updates and 'likes’ on the Facebook social network.

Keywords: education, smartphone, social networks, teenagers

Procedia PDF Downloads 442
12897 Sweepline Algorithm for Voronoi Diagram of Polygonal Sites

Authors: Dmitry A. Koptelov, Leonid M. Mestetskiy

Abstract:

Voronoi Diagram (VD) of finite set of disjoint simple polygons, called sites, is a partition of plane into loci (for each site at the locus) – regions, consisting of points that are closer to a given site than to all other. Set of polygons is a universal model for many applications in engineering, geoinformatics, design, computer vision, and graphics. VD of polygons construction usually done with a reduction to task of constructing VD of segments, for which there are effective O(n log n) algorithms for n segments. Preprocessing – constructing segments from polygons’ sides, and postprocessing – polygon’s loci construction by merging the loci of the sides of each polygon are also included in reduction. This approach doesn’t take into account two specific properties of the resulting segment sites. Firstly, all this segments are connected in pairs in the vertices of the polygons. Secondly, on the one side of each segment lies the interior of the polygon. The polygon is obviously included in its locus. Using this properties in the algorithm for VD construction is a resource to reduce computations. The article proposes an algorithm for the direct construction of VD of polygonal sites. Algorithm is based on sweepline paradigm, allowing to effectively take into account these properties. The solution is performed based on reduction. Preprocessing is the constructing of set of sites from vertices and edges of polygons. Each site has an orientation such that the interior of the polygon lies to the left of it. Proposed algorithm constructs VD for set of oriented sites with sweepline paradigm. Postprocessing is a selecting of edges of this VD formed by the centers of empty circles touching different polygons. Improving the efficiency of the proposed sweepline algorithm in comparison with the general Fortune algorithm is achieved due to the following fundamental solutions: 1. Algorithm constructs only such VD edges, which are on the outside of polygons. Concept of oriented sites allowed to avoid construction of VD edges located inside the polygons. 2. The list of events in sweepline algorithm has a special property: the majority of events are connected with “medium” polygon vertices, where one incident polygon side lies behind the sweepline and the other in front of it. The proposed algorithm processes such events in constant time and not in logarithmic time, as in the general Fortune algorithm. The proposed algorithm is fully implemented and tested on a large number of examples. The high reliability and efficiency of the algorithm is also confirmed by computational experiments with complex sets of several thousand polygons. It should be noted that, despite the considerable time that has passed since the publication of Fortune's algorithm in 1986, a full-scale implementation of this algorithm for an arbitrary set of segment sites has not been made. The proposed algorithm fills this gap for an important special case - a set of sites formed by polygons.

Keywords: voronoi diagram, sweepline, polygon sites, fortunes' algorithm, segment sites

Procedia PDF Downloads 167
12896 Testing the Impact of the Nature of Services Offered on Travel Sites and Links on Traffic Generated: A Longitudinal Survey

Authors: Rania S. Hussein

Abstract:

Background: This study aims to determine the evolution of service provision by Egyptian travel sites and how these services change in terms of their level of sophistication over the period of the study which is ten years. To the author’s best knowledge, this is the first longitudinal study that focuses on an extended time frame of ten years. Additionally, the study attempts to determine the popularity of these websites through the number of links to these sites. Links maybe viewed as the equivalent of a referral or word of mouth but in an online context. Both popularity and the nature of the services provided by these websites are used to determine the traffic on these sites. In examining the nature of services provided, the website itself is viewed as an overall service offering that is composed of different travel products and services. Method: This study uses content analysis in the form of a small scale survey done on 30 Egyptian travel agents’ websites to examine whether Egyptian travel websites are static or dynamic in terms of the services that they provide and whether they provide simple or sophisticated travel services. To determine the level of sophistication of these travel sites, the nature and composition of products and services offered by these sites were first examined. A framework adapted from Kotler (1997) 'Five levels of a product' was used. The target group for this study consists of companies that do inbound tourism. Four rounds of data collection were conducted over a period of 10 years. Two rounds of data collection were made in 2004 and two rounds were made in 2014. Data from the travel agents’ sites were collected over a two weeks period in each of the four rounds. Besides collecting data on features of websites, data was also collected on the popularity of these websites through a software program called Alexa that showed the traffic rank and number of links of each site. Regression analysis was used to test the effect of links and services on websites as independent variables on traffic as the dependent variable of this study. Findings: Results indicate that as companies moved from having simple websites with basic travel information to being more interactive, the number of visitors illustrated by traffic and the popularity of those sites increase as shown by the number of links. Results also show that travel companies use the web much more for promotion rather than for distribution since most travel agents are using it basically for information provision. The results of this content analysis study taps on an unexplored area and provide useful insights for marketers on how they can generate more traffic to their websites by focusing on developing a distinctive content on these sites and also by focusing on the visibility of their sites thus enhancing the popularity or links to their sites.

Keywords: levels of a product, popularity, travel, website evolution

Procedia PDF Downloads 312
12895 Value Proposition and Value Creation in Network Environments: An Experimental Study of Academic Productivity via the Application of Bibliometrics

Authors: R. Oleko, A. Saraceni

Abstract:

The aim of this research is to provide a rigorous evaluation of the existing academic productivity in relation to value proposition and creation in networked environments. Bibliometrics is a vigorous approach used to structure existing literature in an objective and reliable manner. To that aim, a thorough bibliometric analysis was performed in order to assess the large volume of the information encountered in a structured and reliable manner. A clear distinction between networks and service networks was considered indispensable in order to capture the effects of each network’s type properties on value creation processes. Via the use of bibliometric parameters, this review was able to capture the state-of-the-art in both value proposition and value creation consecutively. The results provide a rigorous assessment of the annual scientific production, the most influential journals, and the leading corresponding author countries. By means of citation analysis, the most frequently cited manuscripts and countries for each network type were identified. Moreover, by means of co-citation analysis, existing collaborative patterns were detected through the creation of reference co-citation networks and country collaboration networks. Co-word analysis was also performed in order to provide an overview of the conceptual structure in both networks and service networks. The acquired results provide a rigorous and systematic assessment of the existing scientific output in networked settings. As such, they positively contribute to a better understanding of the distinct impact of service networks on value proposition and value creation when compared to regular networks. The implications derived can serve as a guide for informed decision-making by practitioners during network formation and provide a structured evaluation that can stand as a basis for future research in the field.

Keywords: bibliometrics, co-citation analysis, networks, service networks, value creation, value proposition

Procedia PDF Downloads 191
12894 The Development of Communication and Mobile Phones in Iran: The Role of Internet in Smart Mobile Phones in Social and Human Development and Social Mobility of Different Classes of Iranian Women

Authors: Zahra Tork

Abstract:

Before the spread of the Internet and the use of mobile phones, women were generally far from society and many restrictions were applied to them, but after the spread of the Internet and the cultural and social changes brought about by it, women in society got a new one and many restrictions regarding them disappeared; As we can see today, many women, like men, have a high social base, they earn for themselves, they can travel alone, stay out late at night, take personal and family photos or videos on virtual pages. Publish themselves (while before this, showing or publishing photos of women was considered dishonorable or indecent). In this article, an attempt is made to examine the effect of the internet on mobile phones and virtual social networks in changing beliefs, norms and social values and their relationship with the social mobility of women and the effect of these factors on social and human development be paid. For this reason, social and human development is discussed first, and then the role of the media in development is explained, and finally, the social mobility of women is discussed. Since the purpose of this study is to better understand the social mobility of Iranian women through the development of the Internet in mobile phones, a qualitative study using focus groups has been adopted. The results of this research indicated that the Internet has caused changes in the value and cultural system of the Iranian people, and women have also redefined their roles and identity. In this new definition, many of the past restrictions have disappeared and women have gained the same freedoms as men. Finally, these factors (change in values and norms and redefinition of the role of women) joined hands and caused the social mobility of women in Iran.

Keywords: development of communication in Iran, development of mobile phones, development of the Internet, women's social group, social mobility

Procedia PDF Downloads 61
12893 Review on Application of DVR in Compensation of Voltage Harmonics in Power Systems

Authors: S. Sudhharani

Abstract:

Energy distribution networks are the main link between the energy industry and consumers and are subject to the most scrutiny and testing of any category. As a result, it is important to monitor energy levels during the distribution phase. Power distribution networks, on the other hand, remain subject to common problems, including voltage breakdown, power outages, harmonics, and capacitor switching, all of which disrupt sinusoidal waveforms and reduce the quality and power of the network. Using power appliances in the form of custom power appliances is one way to deal with energy quality issues. Dynamic Voltage Restorer (DVR), integrated with network and distribution networks, is one of these devices. At the same time, by injecting voltage into the system, it can adjust the voltage amplitude and phase in the network. In the form of injections and three-phase syncing, it is used to compensate for the difficulty of energy quality. This article examines the recent use of DVR for power compensation and provides data on the control of each DVR in distribution networks.

Keywords: dynamic voltage restorer (DVR), power quality, distribution networks, control systems(PWM)

Procedia PDF Downloads 125
12892 Suitable Models and Methods for the Steady-State Analysis of Multi-Energy Networks

Authors: Juan José Mesas, Luis Sainz

Abstract:

The motivation for the development of this paper lies in the need for energy networks to reduce losses, improve performance, optimize their operation and try to benefit from the interconnection capacity with other networks enabled for other energy carriers. These interconnections generate interdependencies between some energy networks and others, which requires suitable models and methods for their analysis. Traditionally, the modeling and study of energy networks have been carried out independently for each energy carrier. Thus, there are well-established models and methods for the steady-state analysis of electrical networks, gas networks, and thermal networks separately. What is intended is to extend and combine them adequately to be able to face in an integrated way the steady-state analysis of networks with multiple energy carriers. Firstly, the added value of multi-energy networks, their operation, and the basic principles that characterize them are explained. In addition, two current aspects of great relevance are exposed: the storage technologies and the coupling elements used to interconnect one energy network with another. Secondly, the characteristic equations of the different energy networks necessary to carry out the steady-state analysis are detailed. The electrical network, the natural gas network, and the thermal network of heat and cold are considered in this paper. After the presentation of the equations, a particular case of the steady-state analysis of a specific multi-energy network is studied. This network is represented graphically, the interconnections between the different energy carriers are described, their technical data are exposed and the equations that have previously been presented theoretically are formulated and developed. Finally, the two iterative numerical resolution methods considered in this paper are presented, as well as the resolution procedure and the results obtained. The pros and cons of the application of both methods are explained. It is verified that the results obtained for the electrical network (voltages in modulus and angle), the natural gas network (pressures), and the thermal network (mass flows and temperatures) are correct since they comply with the distribution, operation, consumption and technical characteristics of the multi-energy network under study.

Keywords: coupling elements, energy carriers, multi-energy networks, steady-state analysis

Procedia PDF Downloads 65
12891 An Energy Efficient Clustering Approach for Underwater ‎Wireless Sensor Networks

Authors: Mohammad Reza Taherkhani‎

Abstract:

Wireless sensor networks that are used to monitor a special environment, are formed from a large number of sensor nodes. The role of these sensors is to sense special parameters from ambient and to make a connection. In these networks, the most important challenge is the management of energy usage. Clustering is one of the methods that are broadly used to face this challenge. In this paper, a distributed clustering protocol based on learning automata is proposed for underwater wireless sensor networks. The proposed algorithm that is called LA-Clustering forms clusters in the same energy level, based on the energy level of nodes and the connection radius regardless of size and the structure of sensor network. The proposed approach is simulated and is compared with some other protocols with considering some metrics such as network lifetime, number of alive nodes, and number of transmitted data. The simulation results demonstrate the efficiency of the proposed approach.

Keywords: underwater sensor networks, clustering, learning automata, energy consumption

Procedia PDF Downloads 348
12890 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 67
12889 Flow Conservation Framework for Monitoring Software Defined Networks

Authors: Jesús Antonio Puente Fernández, Luis Javier Garcia Villalba

Abstract:

New trends on streaming videos such as series or films require a high demand of network resources. This fact results in a huge problem within traditional IP networks due to the rigidity of its architecture. In this way, Software Defined Networks (SDN) is a new concept of network architecture that intends to be more flexible and it simplifies the management in networks with respect to the existing ones. These aspects are possible due to the separation of control plane (controller) and data plane (switches). Taking the advantage of this separated control, it is easy to deploy a monitoring tool independent of device vendors since the existing ones are dependent on the installation of specialized and expensive hardware. In this paper, we propose a framework that optimizes the traffic monitoring in SDN networks that decreases the number of monitoring queries to improve the network traffic and also reduces the overload. The performed experiments (with and without the optimization) using a video streaming delivery between two hosts demonstrate the feasibility of our monitoring proposal.

Keywords: optimization, monitoring, software defined networking, statistics, query

Procedia PDF Downloads 316
12888 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 440
12887 Research Networks and Knowledge Sharing: An Exploratory Study of Aquaculture in Europe

Authors: Zeta Dooly, Aidan Duane

Abstract:

The collaborative European funded research and development landscape provides prime environmental conditions for multi-disciplinary teams to learn and enhance their knowledge beyond the capability of training and learning within their own organisation cocoons. Whilst the emergence of the academic entrepreneur has changed the focus of educational institutions to that of quasi-businesses, the training and professional development of lecturers and academic staff are often not formalised to the same level as industry. This research focuses on industry and academic collaborative research funded by the European Commission. The impact of research is scalable if an optimum research network is created and managed effectively. This paper investigates network embeddedness, the nature of relationships, links, and nodes within a research network, and the enhancement of the network’s knowledge. The contribution of this paper extends our understanding of establishing and maintaining effective collaborative research networks. The effects of network embeddedness are recognized in the literature as pertinent to innovation and the economy. Network theory literature claims that networks are essential to innovative clusters such as Silicon valley and innovation in high tech industries. This research provides evidence to support the impact collaborative research has on the disparate individuals toward their innovative contributions to their organisations and their own professional development. This study adopts a qualitative approach and uncovers some of the challenges of multi-disciplinary research through case study insights. The contribution of this paper recommends the establishment of scaffolding to accommodate cooperation in research networks, role appointment, and addressing contextual complexities early to avoid problem cultivation. Furthermore, it suggests recommendations in relation to network formation, intra-network challenges in relation to open data, competition, friendships, and competency enhancement. The network capability is enhanced by the adoption of the relevant theories; network theory, open innovation, and social exchange, with the understanding that the network structure has an impact on innovation and social exchange in research networks. The research concludes that there is an opportunity to deepen our understanding of the impact of network reuse and network hoping that provides scaffolding for the network members to enhance and build upon their knowledge using a progressive approach.

Keywords: research networks, competency building, network theory, case study

Procedia PDF Downloads 116
12886 Dimensioning of Circuit Switched Networks by Using Simulation Code Based On Erlang (B) Formula

Authors: Ali Mustafa Elshawesh, Mohamed Abdulali

Abstract:

The paper presents an approach to dimension circuit switched networks and find the relationship between the parameters of the circuit switched networks on the condition of specific probability of call blocking. Our work is creating a Simulation code based on Erlang (B) formula to draw graphs which show two curves for each graph; one of simulation and the other of calculated. These curves represent the relationships between average number of calls and average call duration with the probability of call blocking. This simulation code facilitates to select the appropriate parameters for circuit switched networks.

Keywords: Erlang B formula, call blocking, telephone system dimension, Markov model, link capacity

Procedia PDF Downloads 593
12885 Geographical Information System-Based Approach for Vertical Takeoff and Landing Takeoff and Landing Site Selection

Authors: Chamnan Kumsap, Somsarit Sinnung, Suriyawate Boonthalarath, Teeranai Srithamarong

Abstract:

This research paper addresses the GIS analysis approach to the investigation of suitable sites for a vertical takeoff and landing drone. The study manipulated GIS and terrain layers into a proper input before the spatial analysis that included slope, reclassify, classify, and buffer was applied to the individual layers. The output layers were weighted, and multi-criteria analyzed before those patches failing to comply with filtering out criteria were discarded. Field survey for each suitable candidate site was conducted to cross-check the proposed approach with the real world. Conclusion was extracted for the VTOL takeoff and landing sites, and discussion was provided with further study being suggested on the mission simulation of selected takeoff and landing sites.

Keywords: GIS approach, site selection, VTOL, takeoff and landing

Procedia PDF Downloads 89
12884 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI

Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu

Abstract:

Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.

Keywords: contex-sensitive, CFI, binary analysis, code reuse attack

Procedia PDF Downloads 308
12883 Freedom of Speech and Involvement in Hatred Speech on Social Media Networks

Authors: Sara Chinnasamy, Michelle Gun, M. Adnan Hashim

Abstract:

Federal Constitution guarantees Malaysians the right to free speech and expression; yet hatred speech can be commonly found on social media platforms such as Facebook, Twitter, and Instagram. In Malaysia social media sphere, most hatred speech involves religion, race and politics. Recent cases of racial attacks on social media have created social tensions among Malaysians. Many Malaysians always argue on their rights to freedom of speech. However, there are laws that limit their expression to the public and protecting social media users from being a victim of hate speech. This paper aims to explore the attitude and involvement of Malaysian netizens towards freedom of speech and hatred speech on social media. It also examines the relationship between involvement in hatred speech among Malaysian netizens and attitude towards freedom of speech. For most Malaysians, practicing total freedom of speech in the open is unthinkable. As a result, the best channel to articulate their feelings and opinions liberally is the internet. With the advent of the internet medium, more and more Malaysians are conveying their viewpoints using the various internet channels although sensitivity of the audience is seldom taken into account. Consequently, this situation has led to pockets of social disharmony among the citizens. Although this unhealthy activity is denounced by the authority, netizens are generally of the view that they have the right to write anything they want. Using the quantitative method, survey was conducted among Malaysians aged between 18 and 50 years who are active social media users. Results from the survey reveal that despite a weak relationship level between hatred speech involvement on social media and attitude towards freedom of speech, the association is still considerably significant. As such, it can be safely presumed that hatred speech on social media occurs due to the freedom of speech that exists by way of social media channels.

Keywords: freedom of speech, hatred speech, social media, Malaysia, netizens

Procedia PDF Downloads 438
12882 Usefulness of Web Sites in Starting Up Wineries: A Comparative study of Canadian, Moroccan and American Small Firms

Authors: Jocelyn D. Perreault

Abstract:

An exploratory study has been launched in 2013-2014 in the province of Quebec, the state of Vermont (USA) and the region of Zaer in Morocco. We have realized three first case studies in order to better understand the marketing strategies of starting up vineries, which are defined as having a maximum of five years of operations. The methodology used consisted of visiting the vineyards; conducting semi-directed interviews with owner-managers; visiting points-of-sale of the wines and analysing the web sites using an assessment grid. The results indicate many differences between the three firms in their use of their web sites. More precisely, we have noticed that: -The Quebec vineyard uses its web site in collaboration with the touristic actors of its region and the association of the wine makers of the province of Quebec.Positioning is as a touristic attraction. -In comparison,the Moroccan firm limits the content of the web site to itself and its activities and somehow to the wine industry.Positioning is as a wine specialist. -The american firm associated its web site more to farm markets actors and activities of the region.Positioning is as an agricultural actor. -The positionings of the three vineyards are very different from each others and will be discussed more thoroughly during the presentation to better understand the use of web sites, thus contributing to the «brand image». -Improvements to the three web sites have been identified and suggested by more than a hundred of persons using the same grid and comprising students of bachelor and MBA degrees from our university. In general, the web sites have been considered satisfying but requiring several improvements at different levels. Changes or updates have been observed for the Quebec winery web site but practically no changes have been made to the others in the last months. The assessment grid will be presented in more details as well as the global and the partial scores given by the respondents. In conclusion, we have noticed that only one winery is considered as a «heavy and strategic user» of its web site and of Facebook and Twitter.

Keywords: web site, wineries, marketing, positioning, starting up strategies

Procedia PDF Downloads 293
12881 The Impact of Facebook Brand Pages Engagement on Consumers Purchase Behaviour

Authors: Sudarsan Jayasingh, R. Venkatesh

Abstract:

Increasing number of customers gets connected to social networking sites, such as Facebook and Twitter to details about the brand communications. This survey, based on a convenience sample, aimed to find the reason for the participants to like Facebook fan pages, how often they visit and interact with the pages that they like, and how is it related with their purchase behaviour. 104 respondents completed the online survey. Overall, the study aimed at determining whether or not creating and maintaining a Facebook fan page is a beneficial tool for brands to communicate with their consumer base.

Keywords: facebook brand pages, social media, consumer engagement, digital engagement, purchase behaviour

Procedia PDF Downloads 302
12880 Smart City Solutions for Enhancing the Cultural and Historic Value of Urban Heritage Sites

Authors: Farnoosh Faal

Abstract:

The trend among smart cities is to incorporate technological advancements to better manage and protect their cultural heritage sites. This study investigates how smart city solutions can improve the cultural and historical significance of urban heritage sites and assesses present practices and potential for the future. The paper delves into the literature to examine how smart city technologies can be utilized to increase knowledge and respect for cultural heritage, as well as promote sustainable tourism and economic growth. The article reviews various instances of smart city initiatives across different regions of the world, pinpointing innovative tactics and best practices in improving the cultural and historical worth of urban heritage sites. Additionally, it analyzes the difficulties and limitations associated with implementing these solutions, including community involvement, privacy concerns, and data management issues. The conclusions drawn from this paper propose that smart city solutions offer a substantial opportunity to augment the cultural and historical value of urban heritage sites. By effectively integrating technology into heritage management, there can be greater comprehension and admiration for cultural heritage, enhanced visitor experience, and support for sustainable tourism. However, to fully exploit the potential of smart city solutions in this context, it is crucial to prioritize community engagement and participation, as well as ensure that data management practices are transparent, responsible, and respectful of privacy. In summary, this paper offers guidance and advice to policymakers, urban planners, and heritage management professionals who want to increase the cultural and historical significance of urban heritage sites through the application of smart city solutions. It emphasizes the significance of creating comprehensive and cooperative strategies, as well as ensuring that efforts to preserve heritage are sustainable, fair, and efficient.

Keywords: smart city, Urban heritage, sustainable tourism, heritage preservation

Procedia PDF Downloads 78
12879 Citizens’ Expectations, Motivations, and Evaluation of Participatory Use of Social Media Tools for Civic Engagement in Oman

Authors: Ali S. Al-Aufi, Ibrahim S. Al-Harthi, Yousuf S. AlHinai, Ali H.S. Al-Badi, Zahran S. Al-Salti

Abstract:

Social media tools have currently been leading a major change in the flow and use of information for different life aspects within people and between people and their governments. They represent powerful channels for direct exchanges of information, ideas, and suggestions for purposes of civic participation. The current study aims at investigating Omani citizens’ perceptions, expectations, and motivations of their uses of social media tools to interact with the government for civic participation. A quantitative methodology was used to collect data through self-administered questionnaires from a random sample of university students and staff drawn from Sultan Qaboos University, considering them as well-informed and typically active users of social media. The literature was comprehensively reviewed to retrieve relevant empirical studies that particularly investigated the use of social media for civic engagement which provided a basis for the construct of the questionnaire; taken into consideration the delineated dimensions of perceptions, expectations, and motivations. The findings of the study offer practical and useful recommendations for governmental units in Oman and similar contexts in the region to inform better and efficient use of social media tools to interact with citizens in issues related to civic engagement; particularly to make best use of these tools for improving services and developing existing and newer initiatives, and hence, encouraging and strengthening citizens’ involvement for civic engagement.

Keywords: social media, social networking sites, web 2.0, civic engagement, civic participation, oman

Procedia PDF Downloads 479
12878 Using Fly Ash Based Synthetic Zeolite Permeable Reactive Barrier to Remove Arsenic, Cadmium, and their Mixture from Aqueous Solution

Authors: Mozhgan Bahadory, Gholam-Hossein Rostami

Abstract:

Over the next quarter of a century, the US government and the private sector will spend billions of dollars annually to clean the contaminated sites from pollution such as petroleum products, heavy metals, and solvents organic compounds. During the past three decades, almost 750,000 sites that require remediation have been reported to the United States federal and state agencies. Out of these contamination sites, approximately 300,000 are still in need of remediation. In these sites, the most widespread forms of contamination are petroleum products and heavy metals. At least half of US Department of Defense, US Department of Energy, Superfund sites, and Resource Conservation and Recovery Act (RCRA) sites have been reported to contain heavy metals. Heavy metals most often found in the contaminated water are lead, mercury, chromium, cadmium, arsenic, and zinc. This investigation emphasizes the elimination of arsenic and cadmium from aqueous solution. During the past several years, we developed a novel material called Alkali-Activated fly ash Material Permeable Reactive Barrier (AAM-PRB), which includes fly ash, fine aggregates, coarse aggregates, activating chemicals, and water. AAM can be produced with high permeability, 10-1 cm/s, then crushed into pelletized form. Laboratory experiments showed that water containing 10 ppm, 100 ppm, and 1000 ppm of arsenic and cadmium ion passing through AAM-PRB reduced to less than 0.1 ppm. However, water containing 10,000 ppm arsenic ion passing through AAM- PRB shows that the breakthrough was achieved. The removal of the mixture of arsenic and cadmium from aqueous solutions was also tested by using AAM-PRB. The results indicate that the efficiency of AAM-PRB for simultaneous removal of arsenic and cadmium from 10 ppm, 100 ppm, and 1,000 ppm were marginally below that of arsenic alone. Still, it was significantly lower for cadmium from the aqueous solution. The basic science behind removing heavy metal and microstructural investigation AAM-PRB will be the focus of our future work.

Keywords: arsenic, cadmium, contaminated water, fly ash, permeability, reactive barrier

Procedia PDF Downloads 55
12877 Algorithm and Software Based on Multilayer Perceptron Neural Networks for Estimating Channel Use in the Spectral Decision Stage in Cognitive Radio Networks

Authors: Danilo López, Johana Hernández, Edwin Rivas

Abstract:

The use of the Multilayer Perceptron Neural Networks (MLPNN) technique is presented to estimate the future state of use of a licensed channel by primary users (PUs); this will be useful at the spectral decision stage in cognitive radio networks (CRN) to determine approximately in which time instants of future may secondary users (SUs) opportunistically use the spectral bandwidth to send data through the primary wireless network. To validate the results, sequences of occupancy data of channel were generated by simulation. The results show that the prediction percentage is greater than 60% in some of the tests carried out.

Keywords: cognitive radio, neural network, prediction, primary user

Procedia PDF Downloads 355
12876 Managerial Advice-Seeking and Supply Chain Resilience: A Social Capital Perspective

Authors: Ethan Nikookar, Yalda Boroushaki, Larissa Statsenko, Jorge Ochoa Paniagua

Abstract:

Given the serious impact that supply chain disruptions can have on a firm's bottom-line performance, both industry and academia are interested in supply chain resilience, a capability of the supply chain that enables it to cope with disruptions. To date, much of the research has focused on the antecedents of supply chain resilience. This line of research has suggested various firm-level capabilities that are associated with greater supply chain resilience. A consensus has emerged among researchers that supply chain flexibility holds the greatest potential to create resilience. Supply chain flexibility achieves resilience by creating readiness to respond to disruptions with little cost and time by means of reconfiguring supply chain resources to mitigate the impacts of the disruption. Decisions related to supply chain disruptions are made by supply chain managers; however, the role played by supply chain managers' reference networks has been overlooked in the supply chain resilience literature. This study aims to understand the impact of supply chain managers on their firms' supply chain resilience. Drawing on social capital theory and social network theory, this paper proposes a conceptual model to explore the role of supply chain managers in developing the resilience of supply chains. Our model posits that higher level of supply chain managers' embeddedness in their reference network is associated with increased resilience of their firms' supply chain. A reference network includes individuals from whom supply chain managers seek advice on supply chain related matters. The relationships between supply chain managers' embeddedness in reference network and supply chain resilience are mediated by supply chain flexibility.

Keywords: supply chain resilience, embeddedness, reference networks, social capitals

Procedia PDF Downloads 213
12875 Dehydration of Glycerol to Acrolein with Solid Acid Catalysts

Authors: Lin Huang, Bo Wang, Armando Borgna

Abstract:

Dehydration of glycerol to acrolein was conducted with solid acid catalysts in liquid phase in a batch reactor and in gas phase in a fix-bed reactor, respectively. In the liquid-phase reaction, ZSM-5, H3PO4-modified ZSM-5 and heteropolyacids including H3PW12O40•xH2O (HPW) and Cs2.5H0.5PW12O40 (CsPW) were studied as catalysts. High temperatures and high boiling point solvents such as sulfolane improved the selectivity to acrolein through suppressing the formation of polyglycerols and coke. Catalytic results and temperature-programmed desorption of ammonia showed that the yield of acrolein increased with increasing catalyst acidity within the range of weak acid strength. Weak acid sites favored the selectivity to acrolein whereas strong acid sites promoted the formation of coke. ZSM-5 possessing only acid sites led to a high acrolein yield, while heteropolyacid catalysts with strong acid sites produced a low acrolein yield. In the gas-phase reaction, HPW and CsPW supported on metal oxides such as SiO2, γ-Al2O3, SiO2-Al2O3, ZrO2 and silicate TUD-1 were studied as catalysts. HPW/TUD-1 was most active for the production of acrolein, followed by HPW/SiO2. An acrolein yield of 61 % was obtained over HPW/TUD-1. X-ray diffraction study suggested that HPW and CsPW were stable and more dispersed on SiO2, silicate TUD-1 and SiO2-Al2O3. It was found that the structures of HPW and CsPW were destroyed by interaction with γ-Al2O3 and ZrO2. Compared to CsPW/TUD-1, the higher acrolein yield with HPW/TUD-1 may be attributed to more Brønsted acid sites on HPW/TUD-1, based on preliminary pyridine adsorption IR study.

Keywords: dehydration, glycerol, acrolein, solid acid catalysts, gas-phase, liquid-phase

Procedia PDF Downloads 254
12874 Decision Support System for the Management and Maintenance of Sewer Networks

Authors: A. Bouamrane, M. T. Bouziane, K. Boutebba, Y. Djebbar

Abstract:

This paper aims to develop a decision support tool to provide solutions to the problems of sewer networks management/maintenance in order to assist the manager to sort sections upon priority of intervention by taking account of the technical, economic, social and environmental standards as well as the managers’ strategy. This solution uses the Analytic Network Process (ANP) developed by Thomas Saaty, coupled with a set of tools for modelling and collecting integrated data from a geographic information system (GIS). It provides to the decision maker a tool adapted to the reality on the ground and effective in usage compared to the means and objectives of the manager.

Keywords: multi-criteria decision support, maintenance, Geographic Information System, modelling

Procedia PDF Downloads 610
12873 Experimental Networks Synchronization of Chua’s Circuit in Different Topologies

Authors: Manuel Meranza-Castillon, Rolando Diaz-Castillo, Adrian Arellano-Delgado, Cesar Cruz-Hernandez, Rosa Martha Lopez-Gutierrez

Abstract:

In this work, we deal with experimental network synchronization of chaotic nodes with different topologies. Our approach is based on complex system theory, and we use a master-slave configuration to couple the nodes in the networks. In particular, we design and implement electronically complex dynamical networks composed by nine coupled chaotic Chua’s circuits with topologies: in nearest-neighbor, small-world, open ring, star, and global. Also, network synchronization is evaluated according to a particular coupling strength for each topology. This study is important by the possible applications to private transmission of information in a chaotic communication network of multiple users.

Keywords: complex networks, Chua's circuit, experimental synchronization, multiple users

Procedia PDF Downloads 331
12872 A Case Study of Bee Algorithm for Ready Mixed Concrete Problem

Authors: Wuthichai Wongthatsanekorn, Nuntana Matheekrieangkrai

Abstract:

This research proposes Bee Algorithm (BA) to optimize Ready Mixed Concrete (RMC) truck scheduling problem from single batch plant to multiple construction sites. This problem is considered as an NP-hard constrained combinatorial optimization problem. This paper provides the details of the RMC dispatching process and its related constraints. BA was then developed to minimize total waiting time of RMC trucks while satisfying all constraints. The performance of BA is then evaluated on two benchmark problems (3 and 5construction sites) according to previous researchers. The simulation results of BA are compared in term of efficiency and accuracy with Genetic Algorithm (GA) and all problems show that BA approach outperforms GA in term of efficiency and accuracy to obtain optimal solution. Hence, BA approach could be practically implemented to obtain the best schedule.

Keywords: bee colony optimization, ready mixed concrete problem, ruck scheduling, multiple construction sites

Procedia PDF Downloads 376
12871 An Experimental Study of Online Peer-to-Peer Language Learning

Authors: Abrar Al-Hasan

Abstract:

Web 2.0 has significantly increased the amount of information available to users not only about firms and their offerings, but also about the activities of other individuals in their networks and markets. It is widely acknowledged that this increased availability of ‘social’ information, particularly about other individuals, is likely to influence a user’s behavior and choices. However, there are very few systematic studies of how such increased information transparency on the behavior of other users in a focal users’ network influences a focal users’ behavior in the emerging marketplace of online language learning. This study seeks to examine the value and impact of ‘social activities’ – wherein, a user sees and interacts with the learning activities of her peers – on her language learning efficiency. An online experiment in a peer-to-peer language marketplace was conducted to compare the learning efficiency of users with ‘social’ information versus users with no ‘social’ information. The results of this study highlight the impact and importance of ‘social’ information within the language learning context. The study concludes by exploring how these insights may inspire new developments in online education.

Keywords: e-Learning, language learning marketplace, peer-to-peer, social network

Procedia PDF Downloads 371
12870 Multiple Query Optimization in Wireless Sensor Networks Using Data Correlation

Authors: Elaheh Vaezpour

Abstract:

Data sensing in wireless sensor networks is done by query deceleration the network by the users. In many applications of the wireless sensor networks, many users send queries to the network simultaneously. If the queries are processed separately, the network’s energy consumption will increase significantly. Therefore, it is very important to aggregate the queries before sending them to the network. In this paper, we propose a multiple query optimization framework based on sensors physical and temporal correlation. In the proposed method, queries are merged and sent to network by considering correlation among the sensors in order to reduce the communication cost between the sensors and the base station.

Keywords: wireless sensor networks, multiple query optimization, data correlation, reducing energy consumption

Procedia PDF Downloads 323
12869 Impact of Gases Derived from Sargassum Algae Biodegradation on Copper Atmospheric Corrosion

Authors: M. Said Ahmed, M. Lebrini, J. Pellé, S. Rioual, B. Lescop, C. Roos

Abstract:

The corrosion behavior of copper exposed in a marine atmosphere polluted and unpolluted by gases, mainly hydrogen sulphide (H2S), from the decomposition of Sargassum algae was studied using the mass loss method and electrochemical measurements. MEB/EDX and XRD were also used for the observation of morphology and surface analysis. To study the impact of this on copper corrosion, four sites more or less impacted by Sargassum algae strandings were selected. The samples were exposed for up to six months. The mass loss results showed that the average corrosion rate of copper was 528 µm/year for the site most affected by Sargassum algae and 9.4 µm/year for the least impacted site after three months of exposure, implying that the presence of Sargassum algae caused an important copper degradation. The morphological structures and properties of the corrosion products obtained at the impacted and non-impacted sites differed significantly. In the absence of Sargassum algae, we obtained mainly Cu2O and Cu2Cl(OH)3. Whereas in the atmosphere with Sargassum algae, CuS product is the main corrosion product obtained. Electrochemical analyses showed that the protection offered by the corrosion product layer was more important and improved with time for the non-impacted sites, whereas on the impacted sites, this protection deteriorated.

Keywords: atmospheric-corrosion, sargassum algae, copper, electrochemical techniques, SEM/EDX and XRD

Procedia PDF Downloads 107