Search results for: web of things
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 851

Search results for: web of things

521 A NoSQL Based Approach for Real-Time Managing of Robotics's Data

Authors: Gueidi Afef, Gharsellaoui Hamza, Ben Ahmed Samir

Abstract:

This paper deals with the secret of the continual progression data that new data management solutions have been emerged: The NoSQL databases. They crossed several areas like personalization, profile management, big data in real-time, content management, catalog, view of customers, mobile applications, internet of things, digital communication and fraud detection. Nowadays, these database management systems are increasing. These systems store data very well and with the trend of big data, a new challenge’s store demands new structures and methods for managing enterprise data. The new intelligent machine in the e-learning sector, thrives on more data, so smart machines can learn more and faster. The robotics are our use case to focus on our test. The implementation of NoSQL for Robotics wrestle all the data they acquire into usable form because with the ordinary type of robotics; we are facing very big limits to manage and find the exact information in real-time. Our original proposed approach was demonstrated by experimental studies and running example used as a use case.

Keywords: NoSQL databases, database management systems, robotics, big data

Procedia PDF Downloads 356
520 Performance Analysis of Arithmetic Units for IoT Applications

Authors: Nithiya C., Komathi B. J., Praveena N. G., Samuda Prathima

Abstract:

At present, the ultimate aim in digital system designs, especially at the gate level and lower levels of design abstraction, is power optimization. Adders are a nearly universal component of today's integrated circuits. Most of the research was on the design of high-speed adders to execute addition based on various adder structures. This paper discusses the ideal path for selecting an arithmetic unit for IoT applications. Based on the analysis of eight types of 16-bit adders, we found out Carry Look-ahead (CLA) produces low power. Additionally, multiplier and accumulator (MAC) unit is implemented with the Booth multiplier by using the low power adders in the order of preference. The design is synthesized and verified using Synopsys Design Compiler and VCS. Then it is implemented by using Cadence Encounter. The total power consumed by the CLA based booth multiplier is 0.03527mW, the total area occupied is 11260 um², and the speed is 2034 ps.

Keywords: carry look-ahead, carry select adder, CSA, internet of things, ripple carry adder, design rule check, power delay product, multiplier and accumulator

Procedia PDF Downloads 118
519 Computation of ΔV Requirements for Space Debris Removal Using Orbital Transfer

Authors: Sadhvi Gupta, Charulatha S.

Abstract:

Since the dawn of the early 1950s humans have launched numerous vehicles in space. Be it from rockets to rovers humans have done tremendous growth in the technology sector. While there is mostly upside for it for humans the only major downside which cannot be ignored now is the amount of junk produced in space due to it i.e. space debris. All this space junk amounts from objects we launch from earth which so remains in orbit until it re-enters the atmosphere. Space debris can be of various sizes mainly the big ones are of the dead satellites floating in space and small ones can consist of various things like paint flecks, screwdrivers, bolts etc. Tracking of small space debris whose size is less than 10 cm is impossible and can have vast implications. As the amount of space debris increases in space the chances of it hitting a functional satellite also increases. And it is extremely costly to repair or recover the satellite once hit by a revolving space debris. So the proposed solution is, Actively removing space debris while keeping space sustainability in mind. For this solution a total of 8 modules will be launched in LEO and in GEO and these models will be placed in their desired orbits through Hohmann transfer and for that calculating ΔV values is crucial. After which the modules will be placed in their designated positions in STK software and thorough analysis is conducted.

Keywords: space debris, Hohmann transfer, STK, delta-V

Procedia PDF Downloads 86
518 Distributed Perceptually Important Point Identification for Time Series Data Mining

Authors: Tak-Chung Fu, Ying-Kit Hung, Fu-Lai Chung

Abstract:

In the field of time series data mining, the concept of the Perceptually Important Point (PIP) identification process is first introduced in 2001. This process originally works for financial time series pattern matching and it is then found suitable for time series dimensionality reduction and representation. Its strength is on preserving the overall shape of the time series by identifying the salient points in it. With the rise of Big Data, time series data contributes a major proportion, especially on the data which generates by sensors in the Internet of Things (IoT) environment. According to the nature of PIP identification and the successful cases, it is worth to further explore the opportunity to apply PIP in time series ‘Big Data’. However, the performance of PIP identification is always considered as the limitation when dealing with ‘Big’ time series data. In this paper, two distributed versions of PIP identification based on the Specialized Binary (SB) Tree are proposed. The proposed approaches solve the bottleneck when running the PIP identification process in a standalone computer. Improvement in term of speed is obtained by the distributed versions.

Keywords: distributed computing, performance analysis, Perceptually Important Point identification, time series data mining

Procedia PDF Downloads 435
517 An Investigation of Tourists’ Destination Loyalty: A Case Study of Bangkok, Thailand

Authors: Sukritta Larsen, Kevin Wongleedee

Abstract:

The purposes of this research were to study tourists’ destination loyalty from the perspective of international tourists in Bangkok and to study the level of interest to revisit Bangkok in the near future. A probability random sampling of 200 international tourists was utilized. Half of the sample group was male and the other half was female. A Likert-five-scale questionnaire was designed to collect the data and small in-depth interviews were also used to obtain their opinions. The findings revealed that the majority of respondents had a medium level of loyalty. When examined in detail, the destination loyalty indicators can be ranked according to the mean average from high to low as follows: to recommend the visit, to say positive things, to revisit in the next three years, to refer the information, and to plan to visit regularly. Finally, the findings from the in-depth interviews with small group of international tourists revealed that the major obstacles that prevented many international tourists who may interested in revisiting Thailand included traffic congestions, high crime rate, and political instability.

Keywords: destination loyalty, international tourists, revisit, Bangkok

Procedia PDF Downloads 338
516 Identify Users Behavior from Mobile Web Access Logs Using Automated Log Analyzer

Authors: Bharat P. Modi, Jayesh M. Patel

Abstract:

Mobile Internet is acting as a major source of data. As the number of web pages continues to grow the Mobile web provides the data miners with just the right ingredients for extracting information. In order to cater to this growing need, a special term called Mobile Web mining was coined. Mobile Web mining makes use of data mining techniques and deciphers potentially useful information from web data. Web Usage mining deals with understanding the behavior of users by making use of Mobile Web Access Logs that are generated on the server while the user is accessing the website. A Web access log comprises of various entries like the name of the user, his IP address, a number of bytes transferred time-stamp etc. A variety of Log Analyzer tools exists which help in analyzing various things like users navigational pattern, the part of the website the users are mostly interested in etc. The present paper makes use of such log analyzer tool called Mobile Web Log Expert for ascertaining the behavior of users who access an astrology website. It also provides a comparative study between a few log analyzer tools available.

Keywords: mobile web access logs, web usage mining, web server, log analyzer

Procedia PDF Downloads 363
515 Motives and Barriers of Using Airbnb: Findings from Mixed Method Approach

Authors: Ghada Mohammed, Mohamed Abdel Salam, Passent Tantawi

Abstract:

The study aimed to investigate the impact of motives and barriers for Egyptian users to use Airbnb as a platform of peer-to-peer accommodation instead of hotels on overall attitude towards Airbnb. A sequential mixed-methods approach was adopted to this study and it proposed a comprehensive research model adapted from both literature and results of qualitative phase and then tested via an online questionnaire. The findings revealed that, motives, price, home benefits, privacy, and online reviews significantly explained overall attitude towards Airbnb, while the main barriers were respectively: perceived risk and distrust in which they can predict the overall attitude. While from the subjective norms, only social influence can predict behavioral intention to use Airbnb. The study may serve as a practical reference for practitioners as well as researchers when developing programs and strategies to manage Airbnb consumers' needs and decision process. Some of the main conclusions drawn from this study are that variety was one of the major things that users like about Airbnb and the most important motives are the functional ones like price rather than the experiential ones like authenticity.

Keywords: airbnb, barriers, disruptive innovation, motives, sharing economy

Procedia PDF Downloads 147
514 Investigation into the Role of Leadership in the Management of Digital Transformation for Small and Medium Enterprises

Authors: Francesco Coraci, Abdul-Hadi G. Abulrub

Abstract:

Digital technology is transforming the landscape of the industrial sector at a precedential level by connecting people, processes, and machines in real-time. It represents the means for a new pathway to achieve innovative, dynamic competitive advantages, deliver unique customers’ values, and sustain critical relationships. Thus, success in a constantly changing environment is governed by the ability of an organization to revolutionize their business models, deliver innovative solutions, and capture values from big data analytics and insights. Businesses need to re-strategize operations and develop extra capabilities to cope with the necessity for additional flexibility and agility. The traditional “command and control” leadership style is structurally and operationally incompatible with the digital era. In this paper, the authors discuss how transformational leaders can act as a glue in the social, organizational context, which is crucial to enable the workforce and develop a psychological attachment to the digital vision.

Keywords: internet of things, strategy, change leadership, dynamic competitive advantage, digital transformation

Procedia PDF Downloads 129
513 Predictive Maintenance: Machine Condition Real-Time Monitoring and Failure Prediction

Authors: Yan Zhang

Abstract:

Predictive maintenance is a technique to predict when an in-service machine will fail so that maintenance can be planned in advance. Analytics-driven predictive maintenance is gaining increasing attention in many industries such as manufacturing, utilities, aerospace, etc., along with the emerging demand of Internet of Things (IoT) applications and the maturity of technologies that support Big Data storage and processing. This study aims to build an end-to-end analytics solution that includes both real-time machine condition monitoring and machine learning based predictive analytics capabilities. The goal is to showcase a general predictive maintenance solution architecture, which suggests how the data generated from field machines can be collected, transmitted, stored, and analyzed. We use a publicly available aircraft engine run-to-failure dataset to illustrate the streaming analytics component and the batch failure prediction component. We outline the contributions of this study from four aspects. First, we compare the predictive maintenance problems from the view of the traditional reliability centered maintenance field, and from the view of the IoT applications. When evolving to the IoT era, predictive maintenance has shifted its focus from ensuring reliable machine operations to improve production/maintenance efficiency via any maintenance related tasks. It covers a variety of topics, including but not limited to: failure prediction, fault forecasting, failure detection and diagnosis, and recommendation of maintenance actions after failure. Second, we review the state-of-art technologies that enable a machine/device to transmit data all the way through the Cloud for storage and advanced analytics. These technologies vary drastically mainly based on the power source and functionality of the devices. For example, a consumer machine such as an elevator uses completely different data transmission protocols comparing to the sensor units in an environmental sensor network. The former may transfer data into the Cloud via WiFi directly. The latter usually uses radio communication inherent the network, and the data is stored in a staging data node before it can be transmitted into the Cloud when necessary. Third, we illustrate show to formulate a machine learning problem to predict machine fault/failures. By showing a step-by-step process of data labeling, feature engineering, model construction and evaluation, we share following experiences: (1) what are the specific data quality issues that have crucial impact on predictive maintenance use cases; (2) how to train and evaluate a model when training data contains inter-dependent records. Four, we review the tools available to build such a data pipeline that digests the data and produce insights. We show the tools we use including data injection, streaming data processing, machine learning model training, and the tool that coordinates/schedules different jobs. In addition, we show the visualization tool that creates rich data visualizations for both real-time insights and prediction results. To conclude, there are two key takeaways from this study. (1) It summarizes the landscape and challenges of predictive maintenance applications. (2) It takes an example in aerospace with publicly available data to illustrate each component in the proposed data pipeline and showcases how the solution can be deployed as a live demo.

Keywords: Internet of Things, machine learning, predictive maintenance, streaming data

Procedia PDF Downloads 387
512 Youth Involvement in Cybercrime in Nigeria: A Case Study of Ikeja Local Government Area

Authors: Niyi Adegoke, Saanumi Jimmy Omolou

Abstract:

The prevalence rate of youth involving in cybercrime is alarming, which calls for concern among the government, parents, NGO and religious bodies, hence this paper aims at examining youth involvement in cybercrime in Nigeria. Achievement motivation theory was used to explain the activities of cyber-criminals in Nigerian society. A descriptive survey method was adopted for the study. The sample for the study was one hundred and fifty (150) respondents randomly selected from the population of the study. A questionnaire was used to gather information and data from the respondents. Data collected through the questionnaire were analyzed using percentage tool for the respondents’ bio-data while chi-square was employed to test the hypotheses. Findings from the study have revealed that parental negligence, unemployment, peer influence, and quest for materialism were responsible for cyber-crimes in Nigeria. The study concludes with the following recommendations among which are: creating employment opportunities for the youths and ensure good governance and accountability among other things will go a long way to solve the problem of cybercrime in our society.

Keywords: cybercrime, youth, Nigeria, unemployment, information communication technology

Procedia PDF Downloads 230
511 Fostering Multiculturalism on University Campuses: A Global Perspective

Authors: Ashok Chaskar

Abstract:

The present paper aims at fostering multiculturalism on the university campuses as each university campus now a day is crowded with variety of students representing different countries and cultures. The students of different countries and communities have to respect cultural diversity and promote the idea of inclusion. Multiculturalism has defining promotional values and functions, which establish cultural contacts, exchanges cultural ideologies and promotes the value of harmonious coexistence of many cultures. Living together on university campuses is a life-long experience to the students coming from various backgrounds, therefore multiculturalism can teach them the value of appreciation of interdependence, understanding cultural differences, spirit of respect, mutual understanding, peaceful coexistence, spirit of solidarity and help them in managing conflicts. By fostering multiculturalism on the university campuses, the students can learn new things; they can share their new experiences and contribute innovative ideas with each other. However, religious and ethnic diversity enrich the educational experiences of the students of various backgrounds.

Keywords: culture, cultural pluralism, cultural diversity, ethnic diversity, ethnic groups, egalitarianism, autonomy, socio-cultural harmony, tolerance, harmonious coexistence

Procedia PDF Downloads 502
510 Diagnostic of Breakdown in High Voltage Bushing Power Transformer 500 kV Cirata Substation

Authors: Andika Bagaskara, Andhika Rizki Pratama, Lalu Arya Repatmaja, Septhian Ditaputra Raharja

Abstract:

The power transformer is one of the critical things in system transmission. Regular testing of the power transformer is very important to maintain the reliability of the power. One of the causes of the failure of the transformer is the breakdown of insulation caused by the presence of voids in the equipment that is electrified. As a result of the voids that occur in this power transformer equipment, it can cause partial discharge. Several methods were used to determine the occurrence of damage to the power transformer equipment, such as Sweep Frequency Response Analysis (SFRA) and Tan Delta. In Inter Bus Transformer (IBT) 500/150 kV Cirata Extra High Voltage (EHV) Substation, a breakdown occurred in the T-phase tertiary bushing. From the lessons learned in this case, a complete electrical test was carried out. From the results of the complete electrical test, there was a suspicion of deterioration in the post-breakdown SFRA results. After overhaul and inspection, traces of voids were found on the tertiary bushing, which indicated a breakdown in the tertiary bushing of the IBT 500/150kV Cirata Substation transformer.

Keywords: void, bushing, SFRA, Tan Delta

Procedia PDF Downloads 142
509 Initiative Programme to Reform Education in Thailand

Authors: Piyapat Chitpirom, Teerakiat Jareonsettasin, Chintida Vichitsophaphan

Abstract:

The Foundation of Virtuous Youth was established and supported by the Crown Property Bureau, with the intention to instill goodness in Thai youth. The Centre for Educational Psychology is one of the three units under the foundation. We aim to develop programmes that can be used to improve the quality of education in schools. Translation of the King’s message in keeping with the modern research from various sources, our team create 6 programmes: (1) Teacher-Student Relationship (2) Growth Mindset (3) Socratic Teaching (4) Peer Tutoring (5) Parental Involvement (6) Inclusion. After nine months of implementing the programmes in the schools, we found that there were more cooperation between student-student, teacher-student, teacher-parent, and student-parent and the school regained trust from the community. Our ideas were accepted well by the government as our director was promoted to be the Vice Minister of Education in order to implement our programmes into national education system. We consider that the key of our success is that we do practical things. We are still continuing, improving, and learning from our work with hope that the quality of Thai education will improve in near future.

Keywords: education reform, educational psychology, effective teaching, teacher-student relationship

Procedia PDF Downloads 440
508 Numerical Simulation of Different Enhanced Oil Recovery (EOR) Scenarios on a Volatile Oil Reservoir

Authors: Soheil Tavakolpour

Abstract:

Enhance Oil Recovery (EOR) can be considered as an undeniable action in reservoirs life period. Different kind of EOR methods are available, but suitable EOR method depends on reservoir properties, like rock and fluid properties. In this paper, we nominated fifth SPE’s Comparative Solution Projects (CSP) for testing different scenarios. We used seven EOR scenarios for this reservoir and we simulated it for 10 years after 2 years production without any injection. The first scenario is waterflooding for whole of the 10 years period. The second scenario is gas injection for ten years. The third scenario is Water-Alternation-Gas (WAG). In the next scenario, water injected for 4 years before starting WAG injection for the next 6 years. In the fifth scenario, water injected after 6 years WAG injection for 4 years. For sixth and last scenarios, all the things are similar to fourth and fifth scenarios, but gas injected instead of water. Results show that fourth scenario was the most efficient method for 10 years EOR, but it resulted very high water production. Fifth scenario was efficient too, with little water production in comparison to the fourth scenario. Gas injection was not economically attractive. In addition to high gas production, it produced less oil in comparison to other scenarios.

Keywords: WAG, SPE’s comparative solution projects, numerical simulation, EOR scenarios

Procedia PDF Downloads 434
507 Intelligent Crop Circle: A Blockchain-Driven, IoT-Based, AI-Powered Sustainable Agriculture System

Authors: Mishak Rahul, Naveen Kumar, Bharath Kumar

Abstract:

Conceived as a high-end engine to revolutionise sustainable agri-food production, the intelligent crop circle (ICC) aims to incorporate the Internet of Things (IoT), blockchain technology and artificial intelligence (AI) to bolster resource efficiency and prevent waste, increase the volume of production and bring about sustainable solutions with long-term ecosystem conservation as the guiding principle. The operating principle of the ICC relies on bringing together multidisciplinary bottom-up collaborations between producers, researchers and consumers. Key elements of the framework include IoT-based smart sensors for sensing soil moisture, temperature, humidity, nutrient and air quality, which provide short-interval and timely data; blockchain technology for data storage on a private chain, which maintains data integrity, traceability and transparency; and AI-based predictive analysis, which actively predicts resource utilisation, plant growth and environment. This data and AI insights are built into the ICC platform, which uses the resulting DSS (Decision Support System) outlined as help in decision making, delivered through an easy-touse mobile app or web-based interface. Farmers are assumed to use such a decision-making aid behind the power of the logic informed by the data pool. Building on existing data available in the farm management systems, the ICC platform is easily interoperable with other IoT devices. ICC facilitates connections and information sharing in real-time between users, including farmers, researchers and industrial partners, enabling them to cooperate in farming innovation and knowledge exchange. Moreover, ICC supports sustainable practice in agriculture by integrating gamification techniques to stimulate farm adopters, deploying VR technologies to model and visualise 3D farm environments and farm conditions, framing the field scenarios using VR headsets and Real-Time 3D engines, and leveraging edge technologies to facilitate secure and fast communication and collaboration between users involved. And through allowing blockchain-based marketplaces, ICC offers traceability from farm to fork – that is: from producer to consumer. It empowers informed decision-making through tailor-made recommendations generated by means of AI-driven analysis and technology democratisation, enabling small-scale and resource-limited farmers to get their voice heard. It connects with traditional knowledge, brings together multi-stakeholder interactions as well as establishes a participatory ecosystem to incentivise continuous growth and development towards more sustainable agro-ecological food systems. This integrated approach leverages the power of emerging technologies to provide sustainable solutions for a resilient food system, ensuring sustainable agriculture worldwide.

Keywords: blockchain, internet of things, artificial intelligence, decision support system, virtual reality, gamification, traceability, sustainable agriculture

Procedia PDF Downloads 45
506 IoT Based Information Processing and Computing

Authors: Mannan Ahmad Rasheed, Sawera Kanwal, Mansoor Ahmad Rasheed

Abstract:

The Internet of Things (IoT) has revolutionized the way we collect and process information, making it possible to gather data from a wide range of connected devices and sensors. This has led to the development of IoT-based information processing and computing systems that are capable of handling large amounts of data in real time. This paper provides a comprehensive overview of the current state of IoT-based information processing and computing, as well as the key challenges and gaps that need to be addressed. This paper discusses the potential benefits of IoT-based information processing and computing, such as improved efficiency, enhanced decision-making, and cost savings. Despite the numerous benefits of IoT-based information processing and computing, several challenges need to be addressed to realize the full potential of these systems. These challenges include security and privacy concerns, interoperability issues, scalability and reliability of IoT devices, and the need for standardization and regulation of IoT technologies. Moreover, this paper identifies several gaps in the current research related to IoT-based information processing and computing. One major gap is the lack of a comprehensive framework for designing and implementing IoT-based information processing and computing systems.

Keywords: IoT, computing, information processing, Iot computing

Procedia PDF Downloads 190
505 Adopting Home Nursing as a Remedy for Child Labour in Nigeria

Authors: T. O. Adeoye

Abstract:

In Nigeria prior to the arrival of the colonial masters, there used to be good family relationship, things were done through cooperation and community effort, even training and upbringing of a child was the responsibility of every member of the community. The advent of western education and civilization brought about movement of youths from rural to urban areas. Hence the tie that binds the village life is broken, community as a whole is no more responsible for the upbringing or home training of her children any more. The study investigates adoption of home nursing as a remedy for child labour in Nigeria, considered challenges like poverty, broken homes and illiteracy among others. For the purpose of verification, a survey in form of an opinion poll was conducted by means of interview using questionnaires for about 3000 respondents. However, out of the respondents that were interviewed as regard parental poverty and its resultant effect on a child only 14.2% of the respondent strongly disagreed that children work on the street because their parents are poor. The study shows that possible solutions of effective ways of controlling child labour is home nursing and also promoting and advocating for the policies against child labour in Nigeria.

Keywords: child abuse, child labour, psychological problem, Street children

Procedia PDF Downloads 335
504 Intelligent Cooperative Integrated System for Road Safety and Road Infrastructure Maintenance

Authors: Panagiotis Gkekas, Christos Sougles, Dionysios Kehagias, Dimitrios Tzovaras

Abstract:

This paper presents the architecture of the “Intelligent cooperative integrated system for road safety and road infrastructure maintenance towards 2020” (ODOS2020) advanced infrastructure, which implements a number of cooperative ITS applications based on Internet of Things and Infrastructure-to-Vehicle (V2I) technologies with the purpose to enhance the active road safety level of vehicles through the provision of a fully automated V2I environment. The primary objective of the ODOS2020 project is to contribute to increased road safety but also to the optimization of time for maintenance of road infrastructure. The integrated technological solution presented in this paper addresses all types of vehicles and requires minimum vehicle equipment. Thus, the ODOS2020 comprises a low-cost solution, which is one of its main benefits. The system architecture includes an integrated notification system to transmit personalized information on road, traffic, and environmental conditions, in order for the drivers to receive real-time and reliable alerts concerning upcoming critical situations. The latter include potential dangers on the road, such as obstacles or road works ahead, extreme environmental conditions, etc., but also informative messages, such as information on upcoming tolls and their charging policies. At the core of the system architecture lies an integrated sensorial network embedded in special road infrastructures (strips) that constantly collect and transmit wirelessly information about passing vehicles’ identification, type, speed, moving direction and other traffic information in combination with environmental conditions and road wear monitoring and predictive maintenance data. Data collected from sensors is transmitted by roadside infrastructure, which supports a variety of communication technologies such as ITS-G5 (IEEE-802.11p) wireless network and Internet connectivity through cellular networks (3G, LTE). All information could be forwarded to both vehicles and Traffic Management Centers (TMC) operators, either directly through the ITS-G5 network, or to smart devices with Internet connectivity, through cloud-based services. Therefore, through its functionality, the system could send personalized notifications/information/warnings and recommendations for upcoming events to both road users and TMC operators. In the course of the ODOS2020 project pilot operation has been conducted to allow drivers of both C-ITS equipped and non-equipped vehicles to experience the provided added value services. For non-equipped vehicles, the provided information is transmitted to a smartphone application. Finally, the ODOS2020 system and infrastructure is appropriate for installation on both urban, rural, and highway environments. The paper presents the various parts of the system architecture and concludes by outlining the various challenges that had to be overcome during its design, development, and deployment in a real operational environment. Acknowledgments: Work presented in this paper was co-financed by the European Regional Development Fund of the European Union and Greek national funds through the Operational Program Competitiveness, Entrepreneurship and Innovation (call RESEARCH–CREATE–INNOVATE) under contract no. Τ1EDK-03081 (project ODOS2020).

Keywords: infrastructure to vehicle, intelligent transportation systems, internet of things, road safety

Procedia PDF Downloads 125
503 Automatic Classification of Periodic Heart Sounds Using Convolutional Neural Network

Authors: Jia Xin Low, Keng Wah Choo

Abstract:

This paper presents an automatic normal and abnormal heart sound classification model developed based on deep learning algorithm. MITHSDB heart sounds datasets obtained from the 2016 PhysioNet/Computing in Cardiology Challenge database were used in this research with the assumption that the electrocardiograms (ECG) were recorded simultaneously with the heart sounds (phonocardiogram, PCG). The PCG time series are segmented per heart beat, and each sub-segment is converted to form a square intensity matrix, and classified using convolutional neural network (CNN) models. This approach removes the need to provide classification features for the supervised machine learning algorithm. Instead, the features are determined automatically through training, from the time series provided. The result proves that the prediction model is able to provide reasonable and comparable classification accuracy despite simple implementation. This approach can be used for real-time classification of heart sounds in Internet of Medical Things (IoMT), e.g. remote monitoring applications of PCG signal.

Keywords: convolutional neural network, discrete wavelet transform, deep learning, heart sound classification

Procedia PDF Downloads 349
502 Conceptualizing IoT Based Framework for Enhancing Environmental Accounting By ERP Systems

Authors: Amin Ebrahimi Ghadi, Morteza Moalagh

Abstract:

This research is carried out to find how a perfect combination of IoT architecture (Internet of Things) and ERP system can strengthen environmental accounting to incorporate both economic and environmental information. IoT (e.g., sensors, software, and other technologies) can be used in the company’s value chain from raw material extraction through materials processing, manufacturing products, distribution, use, repair, maintenance, and disposal or recycling products (Cradle to Grave model). The desired ERP software then will have the capability to track both midpoint and endpoint environmental impacts on a green supply chain system for the whole life cycle of a product. All these enable environmental accounting to calculate, and real-time analyze the operation environmental impacts, control costs, prepare for environmental legislation and enhance the decision-making process. In this study, we have developed a model on how to use IoT devices in life cycle assessment (LCA) to gather emissions, energy consumption, hazards, and wastes information to be processed in different modules of ERP systems in an integrated way for using in environmental accounting to achieve sustainability.

Keywords: ERP, environmental accounting, green supply chain, IOT, life cycle assessment, sustainability

Procedia PDF Downloads 172
501 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing

Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas

Abstract:

This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.

Keywords: cyber security, threat intelligence, forensics, heath care

Procedia PDF Downloads 67
500 E Learning/Teaching and the Impact on Student Performance at the Postgraduate Level

Authors: Charles Lemckert

Abstract:

E-Learning and E-Teaching can mean many things to different people. For some, the implication is that all material must be delivered in an E way, while for others it only forms part of the learning/teaching process, and (unfortunately) for some it is considered too much work. However, just look around and you will see all generations learning using E devices. In this study we used different forms of teaching, including E, to look at how students responded to set activities and how they performed academically. The particular context was set around a postgraduate university course where students were either present at a face-to-face intensive workshop (on water treatment plant design) or where they were not. For the latter, students needed to make sole use of E media. It is relevant to note that even though some were at the face-to-face class, they were still exposed to E material as the lecturer did use PC projections. Additionally, some also accessed the associate E material (pdf slides and video recordings) to assist their required activities. Analysis of the student performance, in their set assignment, showed that the actual form of delivery did not affect the student performance. This is because, in the end, all the students had access to the recorded/presented E material. The study also showed (somewhat expectedly) that when the material they required for the assignment was clear, the student performance did drop. Therefore, it is possible to enhance future delivery of courses through careful reflection and appropriate support. In the end, we must remember innovation is not just restricted to E.

Keywords: postgraduate, engineering, assignment, perforamance

Procedia PDF Downloads 333
499 Relationship between Entrepreneurial Orientation and Small and Medium Enterprises Growth in Bauchi Metropolis, Nigeria

Authors: Muhammed Auwal Umar, M. Saleh

Abstract:

The main purpose of this research is to examine the relationship between entrepreneurial orientation (innovativeness, risk-taking propensity, and proactiveness) and SME's growth in Bauchi metropolis. The study is quantitative in nature using a cross-sectional survey. The population of the study was 364 SMEs. Using simple random sampling, 183 questionnaires were personally distributed, out of which 165 (90%) were found valid for the analysis. Kregcie and Morgan (1970) table was used to determine the sample size. Pearson correlation was used to test the hypotheses. The analysis was conducted with the aid of IBM Statistical Package for Social Sciences (SPSS) version 20. The results established that innovativeness, risk-taking propensity, and proactiveness have significant positive relationship with SME's growth. It is therefore recommended that SMEs’ owners/managers should change their attitude by changing their product and mode of operation in line with customer demand, being proactive ahead of other competitors in trying a better way of doing things, and taking calculated risks in anticipation of high return in order for their businesses to survive and grow.

Keywords: SMEs growth, innovativeness, risk-taking propensity, proactiveness

Procedia PDF Downloads 118
498 A Marketplace for Indonesian Culinary Innovation

Authors: Wildan Maulana, Machfudz Sa'idi

Abstract:

Yogyakarta is a city with the most students in Indonesia, more than 250 thousand students living in Yogyakarta and more than 140 universities in Yogyakarta. Therefore, Yogyakarta is a very strategic place for the culinary business. Food is a basic requirement of all living things, and the tasty food and cheap is the target of almost all students. The objective of this paper is to give an idea and the innovation of culinary business in Yogyakarta who apply the concept sociopreneur and technology as a tool to facilitate the course of this business. KedaiKampus is a startup that brings the food business operators such as food stalls, restaurants or angkringan (a traditional restaurant of Indonesia) and people who want to find the food with the best price and the best taste. The uniqueness of this business is offered weekly and monthly food packages for students in particular or for everyone who needs and will be delivered to their homes each every hour meal. KedaiKampus is also a marketspace for industrial and culinary houses, using technology based mobile application and website will allow the food industry to connect them with customers, but it also allows them to know the customer's desire for food trending in the market. The application to be developed is designed for ease of access to customers in finding their favorite foods and convenience for the culinary home to create amazing culinary innovation.

Keywords: marketplace, sociopreneur, culinary, meal

Procedia PDF Downloads 293
497 The Utilization of Bamboo for Wood Bamboo Composite in Lieu of Materials Furniture: Case Study of Furniture Industry in Jepara Indonesia

Authors: Muhammad Nurrizka Ramadhan

Abstract:

Today,Demand for wood increase in rapid rate. Wood is widely used for many things range from building materials to furniture materials. This makes the forest area in Indonesia dropped dramatically, it is estimated that the area of Indonesiaan forest in 2020 will be only about 16 million hectares. The more forest in Indonesia loss, people are required to look for another material to subtitute wood for the furniture. Jepara, a city with the largest furniture industry in Indonesia, requires a large supply of wood, it can reach 300.000 – 500.000 cubic meters per year. Most of the furniture in Jepara use teak, mahogany, and rosewood. Though teak wood is a rare species that must be protected. Today the availability of bamboo in Indonesia is very big. With cheap price, and the period of rapid growth makes bamboo can be used as a substitute for wood for the furniture industry in the future. By making use bamboo to make wood bamboo composite to replace the use of wood for furniture material. This paper is about the use of bamboo as a substitute for wood bamboo composite for the furniture industry. Expected in future, wood can be replaced by a wood bamboo composite.

Keywords: bamboo, composite, furniture, wood

Procedia PDF Downloads 377
496 Cybersecurity Protective Behavior in Industrial Revolution 4.0 Era: A Conceptual Framework

Authors: Saif Hussein Abdallah Alghazo, Norshima Humaidi

Abstract:

Adopting cybersecurity protective behaviour among the employees is seriously considered in the organization, especially when the Internet of Things (IoT) is widely used in Industrial Revolution 4.0 (IR 4.0) era. Cybersecurity issues arise due to weaknesses of employees’ behaviour such as carelessness and failure to adopt good practices of information security behaviour. Therefore, this study aims to explore the dimensions that might influence employees’ behaviour to adopt good cybersecurity practices and to develop a new holistic model related to this concept. The study proposed this by reviewing the existing works of literature related to this field extensively, especially by focusing on the existing theory such as Protection Motivation Theory (PMT). Moreover, this study has also explored the role of cybersecurity competency among the security manager in the organization since this construct is essential to enhance the protective behaviour towards cybersecurity among the employees in the organization. The proposed research model is important to be quantitatively tested in the future as the findings will serve as the input to the act that will enhance employee’s cybersecurity protective behaviour in the IR 4.0 environment.

Keywords: cybersecurity protective behaviour, protection motivation theory, IR 4.0, cybersecurity competency

Procedia PDF Downloads 153
495 Facility Anomaly Detection with Gaussian Mixture Model

Authors: Sunghoon Park, Hank Kim, Jinwon An, Sungzoon Cho

Abstract:

Internet of Things allows one to collect data from facilities which are then used to monitor them and even predict malfunctions in advance. Conventional quality control methods focus on setting a normal range on a sensor value defined between a lower control limit and an upper control limit, and declaring as an anomaly anything falling outside it. However, interactions among sensor values are ignored, thus leading to suboptimal performance. We propose a multivariate approach which takes into account many sensor values at the same time. In particular Gaussian Mixture Model is used which is trained to maximize likelihood value using Expectation-Maximization algorithm. The number of Gaussian component distributions is determined by Bayesian Information Criterion. The negative Log likelihood value is used as an anomaly score. The actual usage scenario goes like a following. For each instance of sensor values from a facility, an anomaly score is computed. If it is larger than a threshold, an alarm will go off and a human expert intervenes and checks the system. A real world data from Building energy system was used to test the model.

Keywords: facility anomaly detection, gaussian mixture model, anomaly score, expectation maximization algorithm

Procedia PDF Downloads 272
494 Artificial Intelligence for Cloud Computing

Authors: Sandesh Achar

Abstract:

Artificial intelligence is being increasingly incorporated into many applications across various sectors such as health, education, security, and agriculture. Recently, there has been rapid development in cloud computing technology, resulting in AI’s implementation into cloud computing to enhance and optimize the technology service rendered. The deployment of AI in cloud-based applications has brought about autonomous computing, whereby systems achieve stated results without human intervention. Despite the amount of research into autonomous computing, work incorporating AI/ML into cloud computing to enhance its performance and resource allocation remain a fundamental challenge. This paper highlights different manifestations, roles, trends, and challenges related to AI-based cloud computing models. This work reviews and highlights excellent investigations and progress in the domain. Future directions are suggested for leveraging AI/ML in next-generation computing for emerging computing paradigms such as cloud environments. Adopting AI-based algorithms and techniques to increase operational efficiency, cost savings, automation, reducing energy consumption and solving complex cloud computing issues are the major findings outlined in this paper.

Keywords: artificial intelligence, cloud computing, deep learning, machine learning, internet of things

Procedia PDF Downloads 110
493 Adsorption of Methylene Blue by Pectin from Durian (Durio zibethinus) Seeds

Authors: Siti Nurkhalimah, Devita Wijiyanti, Kuntari

Abstract:

Methylene blue is a popular water-soluble dye that is used for dyeing a variety of substrates such as bacteria, wool, and silk. Methylene blue discharged into the aquatic environment will cause health problems for living things. Treatment method for industrial wastewater may be divided into three main categories: physical, chemical, and biological. Among them, adsorption technology is generally considered to be an effective method for quickly lowering the concentration of dissolved dyes in a wastewater. This has attracted considerable research into low-cost alternative adsorbents for adsorbing or removing coloring matter. In this research, pectin from durian seeds was utilized here to assess their ability for the removal of methylene blue. Adsorption parameters are contact time and dye concentration were examined in the batch adsorption processes. Pectin characterization was performed by FTIR spectrometry. Methylene blue concentration was determined by using UV-Vis spectrophotometer. FTIR results show that the samples showed the typical fingerprint in IR spectrogram. The adsorption result on 10 mL of 5 mg/L methylene blue solution achieved 95.12% when contact time 10 minutes and pectin 0.2 g.

Keywords: pectin, methylene blue, adsorption, durian seed

Procedia PDF Downloads 187
492 Challenges of Online Education and Emerging E-Learning Technologies in Nigerian Tertiary Institutions Using Adeyemi College of Education as a Case Study

Authors: Oluwatofunmi Otobo

Abstract:

This paper presents a review of the challenges of e-learning and e-learning technologies in tertiary institutions. This review is based on the researchers observations of the challenges of making use of ICT for learning in Nigeria using Adeyemi College of Education as a case study; this is in comparison to tertiary institutions in the UK, US and other more developed countries. In Nigeria and probably Africa as a whole, power is the major challenge. Its inconsistency and fluctuations pose the greatest challenge to making use of online education inside and outside the classroom. Internet and its supporting infrastructures in many places in Nigeria are slow and unreliable. This, in turn, could frustrate any attempt at making use of online education and e-learning technologies. Lack of basic knowledge of computer, its technologies and facilities could also prove to be a challenge as many young people up until now are yet to be computer literate. Personal interest on both the parts of lecturers and students is also a challenge. Many people are not interested in learning how to make use of technologies. This makes them resistant to changing from the ancient methods of doing things. These and others were reviewed by this paper, suggestions, and recommendations were proffered.

Keywords: education, e-learning, Nigeria, tertiary institutions

Procedia PDF Downloads 202