Search results for: internet behaviour
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3504

Search results for: internet behaviour

3024 An Internet of Things Based Home Automation Based on Raspberry Pi and Node JS Server

Authors: Ahmed Khattab, Bassem Shetta

Abstract:

Today, there are many branches of technology, one of them is the internet of things. In this paper, it's focused specifically on automating all the home appliances through E-mail using Node JS server, the server side stores, and processes this data. The server side contains user interface and notification system functionalities which is operated by Raspberry Pi. It will present the security requirements for the smart home. In this application, the privilege of home control including special persons to use it, using the hardware appliances through mobiles and tablets is achieved. The proposed application delivers high quality of service, long lifetime, low maintenance, fast deployment, and low power requirements with low cost needed for development.

Keywords: Raspberry Pi, E-mail, home automation, temperature sensor, PIR sensor, actuators, relay

Procedia PDF Downloads 262
3023 An Automated Sensor System for Cochlear Implants Electrode Array Insertion

Authors: Lei Hou, Xinli Du, Nikolaos Boulgouris

Abstract:

A cochlear implant, referred to as a CI, is a small electronic device that can provide direct electrical stimulation to the auditory nerve. During cochlear implant surgery, atraumatic electrode array insertion is considered to be a crucial step. However, during implantation, the mechanical behaviour of an electrode array inside the cochlea is not known. The behaviour of an electrode array inside of the cochlea is hardly identified by regular methods. In this study, a CI electrode array capacitive sensor system is proposed. It is able to automatically determine the array state as a result of the capacitance variations. Instead of applying sensors to the electrode array, the capacitance information from the electrodes will be gathered and analysed. Results reveal that this sensing method is capable of recognising different states when fed into a pre-shaped model.

Keywords: cochlear implant, electrode, hearing preservation, insertion force, capacitive sensing

Procedia PDF Downloads 238
3022 System for Monitoring Marine Turtles Using Unstructured Supplementary Service Data

Authors: Luís Pina

Abstract:

The conservation of marine biodiversity keeps ecosystems in balance and ensures the sustainable use of resources. In this context, technological resources have been used for monitoring marine species to allow biologists to obtain data in real-time. There are different mobile applications developed for data collection for monitoring purposes, but these systems are designed to be utilized only on third-generation (3G) phones or smartphones with Internet access and in rural parts of the developing countries, Internet services and smartphones are scarce. Thus, the objective of this work is to develop a system to monitor marine turtles using Unstructured Supplementary Service Data (USSD), which users can access through basic mobile phones. The system aims to improve the data collection mechanism and enhance the effectiveness of current systems in monitoring sea turtles using any type of mobile device without Internet access. The system will be able to report information related to the biological activities of marine turtles. Also, it will be used as a platform to assist marine conservation entities to receive reports of illegal sales of sea turtles. The system can also be utilized as an educational tool for communities, providing knowledge and allowing the inclusion of communities in the process of monitoring marine turtles. Therefore, this work may contribute with information to decision-making and implementation of contingency plans for marine conservation programs.

Keywords: GSM, marine biology, marine turtles, unstructured supplementary service data (USSD)

Procedia PDF Downloads 206
3021 Caecotrophy Behaviour of the Rabbits (Oryctolagus cuniculus)

Authors: Awadhesh Kishore

Abstract:

One of the most unique characteristics of rabbit feeding behaviour is caecotrophy, which involves the excretion and immediate consumption of specific faeces known as soft faeces. Caecotrophy in rabbits is the instinctual behaviour of eating soft faeces; reduced caecotrophy decreases rabbit growth and lipid synthesis in the liver. Caecotroph ingestion is highest when rabbits are fed a diet high in indigestible fibre. The colon produces two types of waste: hard and soft pellets. The hard pellets are expelled, but the soft pellets are re-ingested by the rabbit directly upon being expelled from the anus by twisting itself around and sucking in those pellets as they emerge from the anus. The type of alfalfa hay in the feed of the rabbits does not affect volatile fatty acid concentration, the pattern of fermentation, or pH in the faeces. The cecal content and the soft faeces contain significant amounts of retinoids and carotenoids, while in the tissues (blood, liver, and kidney), these pigments do not occur in substantial amounts. Preventing caecotrophy reduced growth and altered lipid metabolism, depressing the development of new approaches for rabbit feeding and production. Relative abundance is depressed for genes related to metabolic pathways such as vitamin C and sugar metabolism, vitamin B2 metabolism, and bile secretion. The key microorganisms that regulate the rapid growth performance of rabbits may provide useful references for future research and the development of microecological preparations.

Keywords: caecocolonic microorganisms, caecotrophy, fasting caecotrophy, rabbits, soft pellets

Procedia PDF Downloads 50
3020 Heritage and Tourism in the Era of Big Data: Analysis of Chinese Cultural Tourism in Catalonia

Authors: Xinge Liao, Francesc Xavier Roige Ventura, Dolores Sanchez Aguilera

Abstract:

With the development of the Internet, the study of tourism behavior has rapidly expanded from the traditional physical market to the online market. Data on the Internet is characterized by dynamic changes, and new data appear all the time. In recent years the generation of a large volume of data was characterized, such as forums, blogs, and other sources, which have expanded over time and space, together they constitute large-scale Internet data, known as Big Data. This data of technological origin that derives from the use of devices and the activity of multiple users is becoming a source of great importance for the study of geography and the behavior of tourists. The study will focus on cultural heritage tourist practices in the context of Big Data. The research will focus on exploring the characteristics and behavior of Chinese tourists in relation to the cultural heritage of Catalonia. Geographical information, target image, perceptions in user-generated content will be studied through data analysis from Weibo -the largest social networks of blogs in China. Through the analysis of the behavior of heritage tourists in the Big Data environment, this study will understand the practices (activities, motivations, perceptions) of cultural tourists and then understand the needs and preferences of tourists in order to better guide the sustainable development of tourism in heritage sites.

Keywords: Barcelona, Big Data, Catalonia, cultural heritage, Chinese tourism market, tourists’ behavior

Procedia PDF Downloads 138
3019 The Perspectives of Adult Learners Towards Online Learning

Authors: Jacqueline Żammit

Abstract:

Online learning has become more popular as a substitute for traditional classroom instruction because of the COVID-19 epidemic. The study aimed to investigate how adult Maltese language learners evaluated the benefits and drawbacks of online instruction. 35 adult participants provided data through semi-structured interviews with open-ended questions. NVivo software was used to analyze the interview data using the thematic analysis method in order to find themes and group the data based on common responses. The advantages of online learning that the participants mentioned included accessing subject content even without live learning sessions, balancing learning with household duties, and lessening vulnerability to problems like fatigue, time-wasting traffic, school preparation, and parking space constraints. Conversely, inadequate Internet access, inadequate IT expertise, a shortage of personal computers, and domestic distractions adversely affected virtual learning. Lack of an Internet connection, IT expertise, a personal computer, or a phone with Internet access caused inequality in access to online learning sessions. Participants thought online learning was a way to resume academic activity, albeit with drawbacks. In order to address the challenges posed by online learning, several solutions are proposed in the research's conclusion.

Keywords: adult learners, online education, e-learning, challenges of online learning, benefits ofonline learning

Procedia PDF Downloads 60
3018 Reclaiming the House with Use of Web 2.0 Tools: Democratic Candidates and Social Media during Midterm Elections in 2018

Authors: Norbert Tomaszewski

Abstract:

Modern politicians tend to resign from the traditional media as Web 2.0 tools allow them to interact with a much bigger audience while spending less money on their campaign. Current studies on this subject prove that in order to win the elections, the candidate needs to show his personal side during the campaign to appeal to the voter as an average citizen. Because of that, the internet user may engage in the politician's campaign by spreading his message along with his followers. The aim of the study is to determine how did the Democratic candidates use the Web 2.0 tools during the 2018 midterm elections campaign and whether they managed to succeed. Taking into consideration the fact that the United States as a country, has always set important milestones for the political marketing as a field of science, the result of the research can set some examples on how to manage the modern internet campaign in less developed countries.

Keywords: political campaign, midterm elections, social media, Web 2.0

Procedia PDF Downloads 149
3017 The Use of Software and Internet Search Engines to Develop the Encoding and Decoding Skills of a Dyslexic Learner: A Case Study

Authors: Rabih Joseph Nabhan

Abstract:

This case study explores the impact of two major computer software programs Learn to Speak English and Learn English Spelling and Pronunciation, and some Internet search engines such as Google on mending the decoding and spelling deficiency of Simon X, a dyslexic student. The improvement in decoding and spelling may result in better reading comprehension and composition writing. Some computer programs and Internet materials can help regain the missing awareness and consequently restore his self-confidence and self-esteem. In addition, this study provides a systematic plan comprising a set of activities (four computer programs and Internet materials) which address the problem from the lowest to the highest levels of phoneme and phonological awareness. Four methods of data collection (accounts, observations, published tests, and interviews) create the triangulation to validly and reliably collect data before the plan, during the plan, and after the plan. The data collected are analyzed quantitatively and qualitatively. Sometimes the analysis is either quantitative or qualitative, and some other times a combination of both. Tables and figures are utilized to provide a clear and uncomplicated illustration of some data. The improvement in the decoding, spelling, reading comprehension, and composition writing skills that occurred is proved through the use of authentic materials performed by the student under study. Such materials are a comparison between two sample passages written by the learner before and after the plan, a genuine computer chat conversation, and the scores of the academic year that followed the execution of the plan. Based on these results, the researcher recommends further studies on other Lebanese dyslexic learners using the computer to mend their language problem in order to design and make a most reliable software program that can address this disability more efficiently and successfully.

Keywords: analysis, awareness, dyslexic, software

Procedia PDF Downloads 225
3016 Reinforcing Fibre Reinforced Polymer (FRP) Bridge Decks with Steel Plates

Authors: M. Alpaslan Koroglu

Abstract:

Fibre reinforced polymer (FRP) bridge decks have become an innovative alternative, and they have offered many advantages, and this has been increasing attention for applications in not only reinforcement of existing bridges decks but also construction of new bridges decks. The advantages of these FRP decks are; lightweight, high-strength FRP materials, corrosion resistance. However, this high strength deck is not ductile. In this study, the behaviour of hybrid FRP-steel decks are investigated. All FRP decks was analysed with the commercial package ABAQUS. In the FE model, the webs and flanges were discretised by 4 nodes shell elements. A full composite action between the steel and the FRP composite was assumed in the FE analysis because the bond-slip behaviour was unknown at that time. The performance of the proposed hybrid FRP deck panel with steel plates was evaluated by means of FE analysis.

Keywords: FRP, deck, bridge, finite element

Procedia PDF Downloads 475
3015 Drivers of Farmers' Contract Compliance Behaviour: Evidence from a Case Study of Dangote Tomato Processing Plant in Northern Nigeria.

Authors: Umar Shehu Umar

Abstract:

Contract farming is a viable strategy agribusinesses rely on to strengthen vertical coordination. However, low contract compliance remains a significant setback to agribusinesses' contract performance. The present study aims to understand what drives smallholder farmers’ contract compliance behaviour. Qualitative information was collected through Focus Group Discussions to enrich the design of the survey questionnaire administered on a sample of 300 randomly selected farmers contracted by the Dangote Tomato Processing Plant (DTPP) in four regions of northern Nigeria. Novel transaction level data of tomato sales covering one season were collected in addition to socio-economic information of the sampled farmers. Binary logistic model results revealed that open fresh market tomato prices and payment delays negatively affect farmers' compliance behaviour while quantity harvested, education level and input provision correlated positively with compliance. The study suggests that contract compliance will increase if contracting firms devise a reliable and timely payment plan (e.g., digital payment), continue input and service provisions (e.g., improved seeds, extension services) and incentives (e.g., loyalty rewards, bonuses) in the contract.

Keywords: contract farming, compliance, farmers and processors., smallholder

Procedia PDF Downloads 56
3014 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 446
3013 The Environmental Impact of Wireless Technologies in Nigeria: An Overview of the IoT and 5G Network

Authors: Powei Happiness Kerry

Abstract:

Introducing wireless technologies in Nigeria have improved the quality of lives of Nigerians, however, not everyone sees it in that light. The paper on the environmental impact of wireless technologies in Nigeria summarizes the scholarly views on the impact of wireless technologies on the environment, beaming its searchlight on 5G and internet of things in Nigeria while also exploring the theory of the Technology Acceptance Model (TAM). The study used a qualitative research method to gather important data from relevant sources and contextually draws inference from the derived data. The study concludes that the Federal Government of Nigeria, before agreeing to any latest development in the world of wireless technologies, should weigh the implications and deliberate extensively with all stalk holders putting into consideration the confirmation it will receive from the National Assembly.  

Keywords: Internet of Things, radiofrequency, electromagnetic radiation, information and communications technology, ICT, 5G

Procedia PDF Downloads 134
3012 The Analysis of the Blockchain Technology and Challenges Hampering Its Adoption

Authors: Sthembile Mthethwa

Abstract:

With the rise in the usage of internet in the past decades, this presented an opportunity for users to transact with each other over the use of internet. Cryptocurrencies have been introduced, which allows users to transact with each other without the involvement of a third party i.e. the bank. These systems are widely known as cryptocurrencies or digital currencies and the first system to be introduced was Bitcoin which has been receiving a lot of attention. Bitcoin introduced a new technology known as the blockchain technology. In the past years, blockchain has been getting attention; whereby new applications are introduced that utilize blockchain. Yet, most people are still hesitant about the adoption of blockchain and the adoption of cryptocurrencies at large. Some people still do not understand the technology. Thus, it leads to the slow adoption of this technology. In this paper, a review of the blockchain is provided, whereby the different types of blockchain are discussed in details. Details of the things that contribute to the hindrance of the process of adoption are discussed.

Keywords: bitcoin, blockchain, cryptocurrency, payment system

Procedia PDF Downloads 290
3011 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 293
3010 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 538
3009 Evaluation of Ultrasonic Techniques for the Estimation of Air Voids in Asphalt Concrete

Authors: Majid Zargar, Frank Bullen, Ron Ayers

Abstract:

One of the important factors in the design of asphalt concrete mixes is the accurate measurement of air voids and their variable distribution. Both can have significant impact on long and short term fatigue and creep behaviour under traffic. While some simple methods exist for overall evaluation of air voids, measuring air void distribution in asphalt concrete is very complex, involving expensive techniques such as X-ray methodologies. The research reported in the paper investigated the use of non-destructive ultrasonic techniques as an alternative to estimate the amount of air voids and their distribution within asphalt samples. Seventy-four Standard AC–14 asphalt samples made with three types of bitumen; Multigrade, PMB and C320 were analysed using ultrasonic techniques. The results have illustrated that ultrasonic testing has the potential of being a rapid, accurate and cost-effective method of estimating air void distribution in asphalt.

Keywords: asphalt concrete, air voids, ultrasonic, mechanical behaviour

Procedia PDF Downloads 346
3008 Investigating the Shear Behaviour of Fouled Ballast Using Discrete Element Modelling

Authors: Ngoc Trung Ngo, Buddhima Indraratna, Cholachat Rujikiathmakjornr

Abstract:

For several hundred years, the design of railway tracks has practically remained unchanged. Traditionally, rail tracks are placed on a ballast layer due to several reasons, including economy, rapid drainage, and high load bearing capacity. The primary function of ballast is to distributing dynamic track loads to sub-ballast and subgrade layers, while also providing lateral resistance and allowing for rapid drainage. Upon repeated trainloads, the ballast becomes fouled due to ballast degradation and the intrusion of fines which adversely affects the strength and deformation behaviour of ballast. This paper presents the use of three-dimensional discrete element method (DEM) in studying the shear behaviour of the fouled ballast subjected to direct shear loading. Irregularly shaped particles of ballast were modelled by grouping many spherical balls together in appropriate sizes to simulate representative ballast aggregates. Fouled ballast was modelled by injecting a specified number of miniature spherical particles into the void spaces. The DEM simulation highlights that the peak shear stress of the ballast assembly decreases and the dilation of fouled ballast increases with an increase level of fouling. Additionally, the distributions of contact force chain and particle displacement vectors were captured during shearing progress, explaining the formation of shear band and the evolutions of volumetric change of fouled ballast.

Keywords: railway ballast, coal fouling, discrete element modelling, discrete element method

Procedia PDF Downloads 452
3007 Pattern of Cybercrime Among Adolescents: An Exploratory Study

Authors: Mohamamd Shahjahan

Abstract:

Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.

Keywords: cybercrime, adolescents, pattern, internet

Procedia PDF Downloads 80
3006 Pedestrian Behavioral Analysis for Safety at Road Crossing at Selected Intersections in Dhaka City

Authors: Sumit Roy

Abstract:

A clear understanding of pedestrian behaviour at road crossing at intersections is needed for providing necessary infrastructure and also for enhancing pedestrian safety at any intersection. Pedestrian road crossing behaviour is studied at Motijheel and Kakrail intersections where Motijheel intersection is a controlled roundabout, and Kakrail intersection is a signalized intersection. Around 60 people at each intersection were interviewed for a questionnaire survey and video recording at different time of a day was done for observation at each intersection. In case of Motijeel intersection, we got pedestrian road crossings were much higher than Kakrail intersection. It is because the number of workplaces here is higher than Kakrail. From questionnaire survey, it is found that 80% of pedestrians crosses at intersection to avail buses and their loading and unloading locations are at intersection, whereas at Kakrail intersection only 25% pedestrian crosses the road for buses as buses do not slow down here. At Motijheel intersection 25 to 40% of pedestrians choose to jump over the barricade for crossing instead of using overbridge for saving time and labour. On the other hand, the pedestrians using overbridge told that they use overbridge for safety. Moreover, pedestrian crosses at the same pace for both red and green interval with vehicle movement in the range of 12.5 to 14.5 km/h and gaps between vehicle were more than 4 m. Here pedestrian crossing speed varies from 3.5 to 7.2 km/h. In Kakrail intersection the road crossing situation can be classified into 4 categories. In case of red time, pedestrians do not wait to cross the road, and crossing speed varies from 3.5 to 7.2 km/h. When vehicle speed varies from 5.4 to 7.4 km/h, and gaps between vehicle vary from 1.5 to 2 m, most of the pedestrians initially choose to wait and try to cross the road in group with crossing speed 2.7 to 3.5 km/h. When vehicle speed varies from 10.8 to 18 km/h, and gaps between vehicles varies from 2 to 3 m most of the people waits and cross the road in group with crossing speed 3.5 to 5.4 km/h. When vehicle speed varies from 25.2 to 32.4 km/h and gaps between vehicles vary from 4 to 6 m most of the pedestrians choose to wait until red time. In Kakrail intersection 87% of people said that they cross the road with risk and 60% of pedestrians told that it is risky to get on and off the bus at this intersection. Planned location of loading and unloading area for buses can improve the pedestrian road crossing behaviour at intersections.

Keywords: crossing speed, pedestrian behaviour, road crossing, use of overbridge

Procedia PDF Downloads 182
3005 Modified RSA in Mobile Communication

Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar

Abstract:

The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.

Keywords: M-RSA, sensor networks, sensor applications, security

Procedia PDF Downloads 342
3004 The Third Level Digital Divide: Millennials and Post-Millennials Online Activities in South Africa

Authors: Ayanda Magida, Brian Armstrong

Abstract:

The study aimed to assess the third level of the digital divide among the millennials and post-millennials in South Africa. The millennials are people born from 1981-to 1996, that is, people between the ages of 25-40 years old and post-millennials are people born from 1997 to date. For the study, only post-millennials born between 1997-2003 were included as they were old enough to consent to participation in the study. Data was collected as part of the Ph.D. project that focuses on the relationship between income inequality, the digital divide, and social cohesion in South Africa. The digital divide has three main levels, namely the first, second and third. The first and second focus on access and usage, respectively. The third-level digital divide can be defined as the differences in the benefits associated with being online. The current paper focuses on the third level: the benefits derived by being online using four domains: economic, educational, social, and personal benefits. The economic benefits include income, employment and finance-related activities; the social benefits include socializing belonging, identity, and informal networks. The personal benefits include personal wellbeing and self-actualization. A total of 763 participants completed the survey, and 61.3% were post-millennials between the ages of 18-24 and s 38.6 % were millennials between 25 and 40. The majority of the respondents were female (62%), male (34%) and nonbinary (1%), respectively. Most of the respondents were black, followed by whites, Indians and colored, respectively. Thus, they represented the status of the demographics of the country. Most of the respondents had access to the internet and smartphone. Most expressed that they use laptops (68%) or mobile (71%) to access the internet and 54 % access the internet using wireless/Wi-Fi. There were no differences between the millennial and post-millennial economic and educational benefits of being online. However, the post-millennials were more inclined to use the internet for social and personal benefits than the millennials. This could be attributed to many factors, such as age. The post-millennials are still discovering themselves and therefore would derive social and personal benefits associated with being online. The findings confirm studies that argue that younger generations derive more benefits from being online than the older generation. Based on the findings, it is evident that the post-millennials are not using the internet or online activities for social networks and socializing but can derive economic benefits such as job looking and education benefits from being online. It can be inferred that there are no significant differences between the two groups, and it seems like the third-level digital divide is not evident among the two groups as they both have been able to derive meaningful benefits from being online. Further studies should focus on the third-level divide between the baby boomers and Generation X.

Keywords: third-level digital divide, millennials, post-millennials, online activities

Procedia PDF Downloads 104
3003 Electoral Politics and Voting Behaviour in 2011 Assembly Election in West Bengal, India: A Case Study in Electoral Geography

Authors: Md Motibur Rahman

Abstract:

The present paper attempts to study the electoral politics and voting behavior of 2011 assembly election of West Bengal state in India. Electoral geography is considered as the study of geographical aspects of the organization, conduct, and result of elections. It deals with the spatial voting patterns/behaviour or the study of the spatial distribution of political phenomena of voting. Voting behavior is a form of political psychology which played a great role in political decision-making process. The voting behavior of the electorates is largely influenced by their perception that existing during the time of election. The main focus of the study will be to analyze the electoral politics of the party organizations and political profile of the electorates. The principle objectives of the present work are i) to study the spatial patterns of voting behavior in 2011 assembly election in West Bengal, ii) to analysis the result and finding of 2011 assembly election. The whole study based on the secondary source of data. The electoral data have taken from Election Commission of India, New Delhi and Centre for the study of Developing Societies (CSDS) in New Delhi. In the battle of 2011 Assembly election in West Bengal, the two major parties were Left Front and Trinamool Congress. This election witnessed the remarkable successes of Trinamool Congress and decline of 34 years longest ruler party that is Left Front. Trinamool Congress won a majority of seats that 227 out of 294 but Left Front won only 62 seats out of 294 seats. The significance of the present study is that it helps in understanding the voting pattern, voting behaviour, trends of voting and also helps for further study of electoral geography in West Bengal. The study would be highly significant and helpful to the planners, politicians, and administrators who are involved in the formulation of development plans and programmes for the people of the state.

Keywords: assembly election, electoral geography, electoral politics, voting behaviour

Procedia PDF Downloads 232
3002 Network Mobility Support in Content-Centric Internet

Authors: Zhiwei Yan, Jong-Hyouk Lee, Yong-Jin Park, Xiaodong Lee

Abstract:

In this paper, we analyze NEtwork MObility (NEMO) supporting problems in Content-Centric Networking (CCN), and propose the CCN-NEMO which can well support the deployment of the content-centric paradigm in large-scale mobile Internet. The CCN-NEMO extends the signaling message of the basic CCN protocol, to support the mobility discovery and fast trigger of Interest re-issuing during the network mobility. Besides, the Mobile Router (MR) is extended to optimize the content searching and relaying in the local subnet. These features can be employed by the nested NEMO to maximize the advantages of content retrieving with CCN. Based on the analysis, we compare the performance on handover latency between the basic CCN and our proposed CCN-NEMO. The results show that our scheme can facilitate the content-retrieving in the NEMO scenario with improved performance.

Keywords: NEMO, CCN, mobility, handover latency

Procedia PDF Downloads 470
3001 Assessment of Politeness Behavior on Communicating: Validation of Scale through Exploratory Factor Analysis and Confirmatory Factor Analysis

Authors: Abdullah Pandang, Mantasiah Rivai, Nur Fadhilah Umar, Azam Arifyadi

Abstract:

This study aims to measure the validity of the politeness behaviour scale and obtain a model that fits the scale. The researcher developed the Politeness Behavior on Communicating (PBC) scale. The research method uses descriptive quantitative by developing the PBC scale. The population in this study were students in three provinces, namely South Sulawesi, West Sulawesi, and Central Sulawesi, recorded in the 2022/2023 academic year. The sampling technique used stratified random sampling by determining the number of samples using the Slovin formula. The sample of this research is 1200 students. This research instrument uses the PBC scale, which consists of 5 (five) indicators: self-regulation of compensation behaviour, self-efficacy of compensation behaviour, fulfilment of social expectations, positive feedback, and no strings attached. The PBC scale consists of 34 statement items. The data analysis technique is divided into two types: the validity test on the correlated item values and the item reliability test referring to Cronbach's and McDonald's alpha standards using the JASP application. Furthermore, the data were analyzed using confirmatory factor analysis (CFA) and exploratory factor analysis (EFA). The results showed that the adaptation of the Politeness Behavior on Communicating (PBC) scale was on the Fit Index with a chi-square value (711,800/375), RMSEA (0.53), GFI (0.990), CFI (0.987), GFI (0.985).

Keywords: polite behavior in communicating, positive communication, exploration factor analysis, confirmatory factor analysis

Procedia PDF Downloads 124
3000 Correlates of Multiplicity of Risk Behavior among Injecting Drug Users in Three High HIV Prevalence States of India

Authors: Santosh Sharma

Abstract:

Background: Drug abuse, needle sharing, and risky sexual behaviour are often compounded to increase the risk of HIV transmission. Injecting Drug Users are at the duel risk of needle sharing and risky sexual Behaviour, becoming more vulnerable to STI and HIV. Thus, studying the interface of injecting drug use and risky sexual behaviour is important to curb the pace of HIV epidemic among IDUs. The aim of this study is to determine the factor associated with HIV among injecting drug users in three states of India. Materials and methods: This paper analyzes covariates of multiplicity of risk behavior among injecting drug users. Findings are based on data from Integrated Behavioral and Biological Assessment (IBBA) round 2, 2010. IBBA collects the information of IDUs from the six districts. IDUs were selected on the criteria of those who were 18 years or older, who injected addictive substances/drugs for non-medical purposes at least once in past six month. A total of 1,979 in round 2 were interviewed in the IBBA. The study employs quantitative techniques using standard statistical tools to achieve the above objectives. All results presented in this paper are unweighted univariate measures. Results: Among IDUs, average duration of injecting drugs is 5.2 years. Mean duration between first drug use to first injecting drugs among younger IDUs, belongs to 18-24 years is 2.6 years Needle cleaning practices is common with above two-fifths reporting its every time cleaning. Needle sharing is quite prevalent especially among younger IDUs. Further, IDUs practicing needle sharing exhibit pervasive multi-partner behavior. Condom use with commercial partners is almost 81 %, whereas with intimate partner it is 39 %. Coexistence of needle sharing and unprotected sex enhances STI prevalence (6.8 %), which is further pronounced among divorced/separated/widowed (9.4 %). Conclusion: Working towards risk reduction for IDUs must deal with multiplicity of risk. Interventions should deal with covariates of risk, addressing youth, and risky sexual behavior.

Keywords: IDUs, HIV, STI, behaviour

Procedia PDF Downloads 279
2999 To Examine Perceptions and Associations of Shock Food Labelling and to Assess the Impact on Consumer Behaviour: A Quasi-Experimental Approach

Authors: Amy Heaps, Amy Burns, Una McMahon-Beattie

Abstract:

Shock and fear tactics have been used to encourage consumer behaviour change within the UK regarding lifestyle choices such as smoking and alcohol abuse, yet such measures have not been applied to food labels to encourage healthier purchasing decisions. Obesity levels are continuing to rise within the UK, despite efforts made by government and charitable bodies to encourage consumer behavioural changes, which will have a positive influence on their fat, salt, and sugar intake. We know that taking extreme measures to shock consumers into behavioural changes has worked previously; for example, the anti-smoking television adverts and new standardised cigarette and tobacco packaging have reduced the numbers of the UK adult population who smoke or encouraged those who are currently trying to quit. The USA has also introduced new front-of-pack labelling, which is clear, easy to read, and includes concise health warnings on products high in fat, salt, or sugar. This model has been successful, with consumers reducing purchases of products with these warning labels present. Therefore, investigating if shock labels would have an impact on UK consumer behaviour and purchasing decisions would help to fill the gap within this research field. This study aims to develop an understanding of consumer’s initial responses to shock advertising with an interest in the perceived impact of long-term effect shock advertising on consumer food purchasing decisions, behaviour, and attitudes and will achieve this through a mixed methodological approach taken with a sample size of 25 participants ages ranging from 22 and 60. Within this research, shock mock labels were developed, including a graphic image, health warning, and get-help information. These labels were made for products (available within the UK) with large market shares which were high in either fat, salt, or sugar. The use of online focus groups and mouse-tracking experiments results helped to develop an understanding of consumer’s initial responses to shock advertising with interest in the perceived impact of long-term effect shock advertising on consumer food purchasing decisions, behaviour, and attitudes. Preliminary results have shown that consumers believe that the use of graphic images, combined with a health warning, would encourage consumer behaviour change and influence their purchasing decisions regarding those products which are high in fat, salt and sugar. Preliminary main findings show that graphic mock shock labels may have an impact on consumer behaviour and purchasing decisions, which will, in turn, encourage healthier lifestyles. Focus group results show that 72% of participants indicated that these shock labels would have an impact on their purchasing decisions. During the mouse tracking trials, this increased to 80% of participants, showing that more exposure to shock labels may have a bigger impact on potential consumer behaviour and purchasing decision change. In conclusion, preliminary results indicate that graphic shock labels will impact consumer purchasing decisions. Findings allow for a deeper understanding of initial emotional responses to these graphic labels. However, more research is needed to test the longevity of these labels on consumer purchasing decisions, but this research exercise is demonstrably the foundation for future detailed work.

Keywords: consumer behavior, decision making, labelling legislation, purchasing decisions, shock advertising, shock labelling

Procedia PDF Downloads 67
2998 Characteristics of Business Models of Industrial-Internet-of-Things Platforms

Authors: Peter Kress, Alexander Pflaum, Ulrich Loewen

Abstract:

The number of Internet-of-Things (IoT) platforms is steadily increasing across various industries, especially for smart factories, smart homes and smart mobility. Also in the manufacturing industry, the number of Industrial-IoT platforms is growing. Both IT players, start-ups and increasingly also established industry players and small-and-medium-enterprises introduce offerings for the connection of industrial equipment on platforms, enabled by advanced information and communication technology. Beside the offered functionalities, the established ecosystem of partners around a platform is one of the key differentiators to generate a competitive advantage. The key question is how platform operators design the business model around their platform to attract a high number of customers and partners to co-create value for the entire ecosystem. The present research tries to answer this question by determining the key characteristics of business models of successful platforms in the manufacturing industry. To achieve that, the authors selected an explorative qualitative research approach and created an inductive comparative case study. The authors generated valuable descriptive insights of the business model elements (e.g., value proposition, pricing model or partnering model) of various established platforms. Furthermore, patterns across the various cases were identified to derive propositions for the successful design of business models of platforms in the manufacturing industry.

Keywords: industrial-internet-of-things, business models, platforms, ecosystems, case study

Procedia PDF Downloads 243
2997 Poly(Butadiene-co-Acrylonitrile)-Polyaniline Dodecylbenzenesulfonate [NBR-PAni.DBSA] Blends for Corrosion Inhibition of Carbon Steel

Authors: Kok-Chong Yong

Abstract:

Poly(butadiene-co-acrylonitrile)-polyaniline Dodecylbenzenesulfonate [NBR-PAni.DBSA] blends with useful electrical conductivity (up to 0.1 S/cm) were prepared and their corrosion inhibiting behaviours for carbon steel were successfully assessed for the first time. The level of compatibility between NBR and PAni.DBSA was enhanced through the introduction of 1.0 wt % hydroquinone. As found from both total immersion and electrochemical corrosion tests, NBR-PAni.DBSA blends with 10.0-30.0 wt% of PAni.DBSA content exhibited the best corrosion inhibiting behaviour for carbon steel, either in acid or artificial brine environment. On the other hand, blends consisting of very low and very high PAni.DBSA contents (i.e. ≤ 5.0 wt % and ≥ 40.0 wt %) showed significantly poorer corrosion inhibiting behaviour for carbon steel.

Keywords: conductive rubber, nitrile rubber, polyaniline, carbon steel, corrosion inhibition

Procedia PDF Downloads 461
2996 Determination of the Bearing Capacity of Granular Pumice Soils by Laboratory Tests

Authors: Mustafa Yildiz, Ali Sinan Soganci

Abstract:

Pumice soils are countered in many projects such as transportation roads, channels and residential units throughout the World. The pumice deposits are characterized by the vesicular nature of their particles. When the pumice soils are evaluated considering the geotechnical viewpoint, they differ from silica sands in terms of physical and engineering characteristics. These differences are low grain strength, high friction angle, void ratio and compressibility. At stresses greater than a few hundred kPa, the stress-strain-strength behaviour of these soils is determined by particle crushing. Particle crushing leads to changes in the density and reduction in the components of shear stress due to expansion. In this study, the bearing capacity and behaviour of granular pumice soils compared to sand-gravels were investigated by laboratory model tests. Firstly the geotechnical properties of granular pumice soils were determined; then, the behaviour of pumice soils with an equivalent diameter of sand and gravel soils were investigated by model rectangular and circular foundation types and were compared with each other. For this purpose, basic types of model footing (15*15 cm, 20*20 cm, Φ=15 cm and Φ=20 cm) have been selected. When the experimental results of model bearing capacity are analyzed, the values of sand and gravel bearing capacity tests were found to be 1.0-1.5 times higher than the bearing capacity of pumice the same size. This fact has shown that sand and gravel have a higher bearing capacity than pumice of the similar particle sizes.

Keywords: pumice soils, laboratory model tests, bearing capacity, laboratory model tests, Nevşehir

Procedia PDF Downloads 214
2995 Improved Dielectric Properties of CaCu₃Ti₄O₁₂ by Calcination at Different Temperatures

Authors: Lovepreet Kaur Dhugga, Dwijendra P. Singh

Abstract:

Calcium copper titanate (CCTO) was synthesized via the sol-gel auto-combustion method. The precursor was calcined at 800°C and 1000°C for 6 hours providing brown-coloured powders, which were pelletized and sintered at 1000°C for 12 hrs to determine their dielectric behaviour in the frequency range (100Hz-10MHz) at room temperature. The dielectric constant(εr) and loss tangent (tanδ) has been found to be ~ 6153 and 0.5 for 800°C and ~ 5504 and 0.2 for 1000°C respectively, at frequency 1kHz. Microstructure study revealed maximum grain growth occurs in sample calcined at 800°C, responsible for its high dielectric constant. Phase identification of CaCu₃Ti₄O₁₂ has been carried out through X-ray diffraction. It can be used in various electronic applications as it shows large εᵣ and low tanδ values over a wide frequency spectrum, including energy storage devices, microwave shielding, and sensors.

Keywords: calcium copper titanate, dielectric behaviour, microstructure, X-ray diffraction

Procedia PDF Downloads 68