Search results for: mobile payment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1841

Search results for: mobile payment

1361 Indoor Visible Light Communication Channel Characterization for User Mobility: A Use-Case Study

Authors: Pooja Sanathkumar, Srinidhi Murali, Sethuraman TV, Saravanan M, Paventhan Arumugam, Ashwin Ashok

Abstract:

The last decade has witnessed a significant interest in visible light communication (VLC) technology, as VLC can potentially achieve high data rate links and secure communication channels. However, the use of VLC under mobile settings is fundamentally limited as its a line-of-sight (LOS) technology and there has been limited breakthroughs in realizing VLC for mobile settings. In this regard, this work targets to study the VLC channel under mobility. Through a use-case study analysis with experiment data traces this paper presents an empirical VLC channel study considering the application of VLC for smart lighting in an indoor room environment. This paper contributes a calibration study of a prototype VLC smart lighting system in an indoor environment and through the inferences gained from the calibration, and considering a user is carrying a mobile device fit with a VLC receiver, this work presents recommendations for user's position adjustments, with the goal to ensure maximum connectivity across the room.

Keywords: visible light communication, mobility, empirical study, channel characterization

Procedia PDF Downloads 106
1360 Agile Smartphone Porting and App Integration of Signal Processing Algorithms Obtained through Rapid Development

Authors: Marvin Chibuzo Offiah, Susanne Rosenthal, Markus Borschbach

Abstract:

Certain research projects in Computer Science often involve research on existing signal processing algorithms and developing improvements on them. Research budgets are usually limited, hence there is limited time for implementing the algorithms from scratch. It is therefore common practice, to use implementations provided by other researchers as a template. These are most commonly provided in a rapid development, i.e. 4th generation, programming language, usually Matlab. Rapid development is a common method in Computer Science research for quickly implementing and testing new developed algorithms, which is also a common task within agile project organization. The growing relevance of mobile devices in the computer market also gives rise to the need to demonstrate the successful executability and performance measurement of these algorithms on a mobile device operating system and processor, particularly on a smartphone. Open mobile systems such as Android, are most suitable for this task, which is to be performed most efficiently. Furthermore, efficiently implementing an interaction between the algorithm and a graphical user interface (GUI) that runs exclusively on the mobile device is necessary in cases where the project’s goal statement also includes such a task. This paper examines different proposed solutions for porting computer algorithms obtained through rapid development into a GUI-based smartphone Android app and evaluates their feasibilities. Accordingly, the feasible methods are tested and a short success report is given for each tested method.

Keywords: SMARTNAVI, Smartphone, App, Programming languages, Rapid Development, MATLAB, Octave, C/C++, Java, Android, NDK, SDK, Linux, Ubuntu, Emulation, GUI

Procedia PDF Downloads 461
1359 Gendered Economic, Social, and Health Effects of the Mobile Health and Nutritional Services of the International Medical Corps (IMC) in Vulnerable Areas of Ethiopia

Authors: Abdela Zeinu Yasin

Abstract:

The current research aimed to assess the status of IMC in providing treatment for malnourished children and programs in water, sanitation, and hygiene (WASH), food and livelihood security, and comprehensive healthcare through Mobile health and nutrition programs during the last 5 years period. We have conducted 60 in-depth interviews with women during the period from conception to a child’s birthday, health facility staff, and female community health volunteers (FCHVs), as well as 12 focus group discussions with health facility staff and other household decision-makers. We employed thematic analysis using framework matrices and analytical memorandums. The study revealed that 78% of the respondents, of whom 97% were women, have benefited from the selected vulnerable areas. The use of the clear water and sanitization program has reached the 81% of selected households. The use of a modern baby delivery system among the respondent has been 68% of the women and health facilities among the decision-makers/focal person. More than 8 in 10 participants (84%) could read and understand the health facility instructions, and the majority (82%) of women, health facility staff, and male decision-makers can also read and write bulletins and instructions. We found that decision-maker women preferred participative education, whereas health facilities and the IMC desired educational and motivational bulletins. A Mobile Health and Nutrition program intervention by the IMC is acceptable in the conditions of the Ethiopian community and has the potential to improve community health and nutrition service utilization, particularly by providing clean water and sanitization; women’s birth control, and health improvement in the vulnerable regions of the country. The current research findings shall contribute to text IMC Mobile Health and Nutritional intervention design in under-resourced settings.

Keywords: clean water, health and nutrition services, hygiene, IMC, mobile health, sanitation

Procedia PDF Downloads 66
1358 A Distributed Mobile Agent Based on Intrusion Detection System for MANET

Authors: Maad Kamal Al-Anni

Abstract:

This study is about an algorithmic dependence of Artificial Neural Network on Multilayer Perceptron (MPL) pertaining to the classification and clustering presentations for Mobile Adhoc Network vulnerabilities. Moreover, mobile ad hoc network (MANET) is ubiquitous intelligent internetworking devices in which it has the ability to detect their environment using an autonomous system of mobile nodes that are connected via wireless links. Security affairs are the most important subject in MANET due to the easy penetrative scenarios occurred in such an auto configuration network. One of the powerful techniques used for inspecting the network packets is Intrusion Detection System (IDS); in this article, we are going to show the effectiveness of artificial neural networks used as a machine learning along with stochastic approach (information gain) to classify the malicious behaviors in simulated network with respect to different IDS techniques. The monitoring agent is responsible for detection inference engine, the audit data is collected from collecting agent by simulating the node attack and contrasted outputs with normal behaviors of the framework, whenever. In the event that there is any deviation from the ordinary behaviors then the monitoring agent is considered this event as an attack , in this article we are going to demonstrate the  signature-based IDS approach in a MANET by implementing the back propagation algorithm over ensemble-based Traffic Table (TT), thus the signature of malicious behaviors or undesirable activities are often significantly prognosticated and efficiently figured out, by increasing the parametric set-up of Back propagation algorithm during the experimental results which empirically shown its effectiveness  for the ratio of detection index up to 98.6 percentage. Consequently it is proved in empirical results in this article, the performance matrices are also being included in this article with Xgraph screen show by different through puts like Packet Delivery Ratio (PDR), Through Put(TP), and Average Delay(AD).

Keywords: Intrusion Detection System (IDS), Mobile Adhoc Networks (MANET), Back Propagation Algorithm (BPA), Neural Networks (NN)

Procedia PDF Downloads 167
1357 Providing Emotional Support to Children under Long-Term Health Treatments

Authors: Ramón Cruzat, Sergio F. Ochoa, Ignacio Casas, Luis A. Guerrero, José Bravo

Abstract:

Patients under health treatments that involve long stays at a hospital or health centre (e.g. cancer, organ transplants and severe burns), tend to get bored or depressed because of the lack of social interaction with family and friends. Such a situation also affects the evolution and effectiveness of their treatments. In many cases, the solution to this problem involves extra challenges, since many patients need to rest quietly (or remain in bed) to their being contagious. Considering the weak health condition in which usually are these kinds, keeping them motivated and quiet represents an important challenge for nurses and caregivers. This article presents a mobile ubiquitous game called MagicRace, which allows hospitalized kinds to interact socially with one another without putting to risk their sensitive health conditions. The game does not require a communication infrastructure at the hospital, but instead, it uses a mobile ad hoc network composed of the handheld devices used by the kids to play. The usability and performance of this application was tested in two different sessions. The preliminary results show that users experienced positive feelings from this experience.

Keywords: ubiquitous game, children's emotional support, social isolation, mobile collaborative interactions

Procedia PDF Downloads 405
1356 Performance Assessment of Carrier Aggregation-Based Indoor Mobile Networks

Authors: Viktor R. Stoynov, Zlatka V. Valkova-Jarvis

Abstract:

The intelligent management and optimisation of radio resource technologies will lead to a considerable improvement in the overall performance in Next Generation Networks (NGNs). Carrier Aggregation (CA) technology, also known as Spectrum Aggregation, enables more efficient use of the available spectrum by combining multiple Component Carriers (CCs) in a virtual wideband channel. LTE-A (Long Term Evolution–Advanced) CA technology can combine multiple adjacent or separate CCs in the same band or in different bands. In this way, increased data rates and dynamic load balancing can be achieved, resulting in a more reliable and efficient operation of mobile networks and the enabling of high bandwidth mobile services. In this paper, several distinct CA deployment strategies for the utilisation of spectrum bands are compared in indoor-outdoor scenarios, simulated via the recently-developed Realistic Indoor Environment Generator (RIEG). We analyse the performance of the User Equipment (UE) by integrating the average throughput, the level of fairness of radio resource allocation, and other parameters, into one summative assessment termed a Comparative Factor (CF). In addition, comparison of non-CA and CA indoor mobile networks is carried out under different load conditions: varying numbers and positions of UEs. The experimental results demonstrate that the CA technology can improve network performance, especially in the case of indoor scenarios. Additionally, we show that an increase of carrier frequency does not necessarily lead to improved CF values, due to high wall-penetration losses. The performance of users under bad-channel conditions, often located in the periphery of the cells, can be improved by intelligent CA location. Furthermore, a combination of such a deployment and effective radio resource allocation management with respect to user-fairness plays a crucial role in improving the performance of LTE-A networks.

Keywords: comparative factor, carrier aggregation, indoor mobile network, resource allocation

Procedia PDF Downloads 155
1355 Evaluating the Location of Effective Product Advertising on Facebook Ads

Authors: Aulia F. Hadining, Atya Nur Aisha, Dimas Kurninatoro Aji

Abstract:

Utilization of social media as a marketing tool is growing rapidly, including for SMEs. Social media allows the user to give product evaluation and recommendations to the public. In addition, the social media facilitate word-of-mouth marketing communication. One of the social media that can be used is Facebook, with Facebook Ads. This study aimed to evaluate the location of Facebook Ads, to obtain an appropriate advertising design. There are three alternatives location consist of desktop, right-hand column and mobile. The effectiveness and efficiency of advertising will be measured based on advertising metrics such as reach, click, Cost per Click (CUC) and Unique Click-Through-Rate (UCTR). Facebook's Ads Manager was used for seven days, targeted by age (18-24), location (Bandung), language (Indonesia) and keywords. The result was 13,999 total reach, as well as 342 clicks. Based on the results of comparison using ANOVA, there was a significant difference for each placement location based on advertising metrics. Mobile location was chosen to be successful ads, because it produces the lowest CUC, amounting to Rp 691,- per click and 14% UCTR. Results of this study showed Facebook Ads was useful and cost-effective media to promote the product of SME, because it could be view by many people in the same time.

Keywords: marketing communication, social media, Facebook Ads, mobile location

Procedia PDF Downloads 323
1354 Survey of Potential Adverse Health Effects of Mobile Phones, and Wireless Base Stations in Nigeria

Authors: Nureni A. Yekini, Isaac T. Babalola, Edwin E. Aighokhan, Agnes K. Akinwole, N. Stephen Igwe

Abstract:

Survey was conducted to gather information on potential adverse health effects of Mobile Phones, and Telecommunication Tower Base Stations in Nigeria. Data was sourced from two sampled populations. Firstly from the people living in close proximity to base stations, and secondly from cell phone users. Questionnaire was used to gathered information from 574 people on thirteen non-specific health symptoms. Data obtained was presented and analyzed. The analysis shows that people living close to the based stations over a long period of time with or without cell phone, and also the heavy phone users with close proximity to the base stations are liable to have some potential health hazards, such as fatigue, sleep disturbances, headaches, feeling of discomfort, difficulty in concentrating, depression, memory loss, visual disruptions, irritability, hearing disruptions, skin problems, cardiovascular disorders, and dizziness.

Keywords: health hazards, wireless base stations, phone users, mobile phones, Nigeria

Procedia PDF Downloads 293
1353 Assessing Household Energy Savings and Consumer Behavior in Padang City

Authors: Prima Fithri, Lusi Susanti, Karin Bestarina

Abstract:

Indonesia's electrification ratio is still around 80.1%, which means that approximately 19.9% of households in Indonesia have not been getting the flow of electrical energy. Household electricity consumptions in Indonesia are generally still dominated by the public urban. In the city of Padang, West Sumatera, Indonesia, about 94.10% are power users of government services (PLN). The most important thing of the issue is human resources efficient energy. Consumer behavior in utilizing electricity becomes significant. Intensive questioner survey, in-depth interview and statistical analysis are carried out to collect scientific evidences of the behavioral based changes instruments to reduce electricity consumption in household sector. The questioner was developed to include five factors assuming affect the electricity consumption pattern in household sector. They are: attitude, energy price, household income, knowledge and other determinants. The survey was carried out in Padang, West Sumatra Province Indonesia. About 210 questioner papers were proportionally distributed to households in 11 districts in Padang. Stratified sampling was used as a method to select respondents. The results show that the household size, income, payment methods and size of house are factors affecting electricity saving behavior in residential sector. Household expenses on electricity are strongly influenced by gender, type of job, level of education, size of house, income, payment method and level of installed power. These results provide a scientific evidence for stakeholders on the potential of controlling electricity consumption and designing energy policy by government in residential sector.

Keywords: electricity, energy saving, household, behavior, policy

Procedia PDF Downloads 499
1352 An Android Geofencing App for Autonomous Remote Switch Control

Authors: Jamie Wong, Daisy Sang, Chang-Shyh Peng

Abstract:

Geofence is a virtual fence defined by a preset physical radius around a target location. Geofencing App provides location-based services which define the actionable operations upon the crossing of a geofence. Geofencing requires continual location tracking, which can consume noticeable amount of battery power. Additionally, location updates need to be frequent and accurate or order so that actions can be triggered within an expected time window after the mobile user navigate through the geofence. In this paper, we build an Android mobile geofencing Application to remotely and autonomously control a power switch.

Keywords: location based service, geofence, autonomous, remote switch

Procedia PDF Downloads 289
1351 Mobile Technology as a Catalyst for Creative Teaching: A Developmental Based Research Study in a Large Public School in Mozambique

Authors: L. O'Sullivan, C. Murphy

Abstract:

This study examined the impact, if any, of mobile technology on the achievement of United Nations Sustainable Development Goal 4: Quality Education for All. It focused specifically on teachers and their practice, in a school with large class sizes and limited teaching resources. Teachers in third grade in a large public school in Mozambique were provided with an iPad connected to a projector, powered by a mobile solar-panel. Teachers also participated in ten days of professional development workshops over thirteen months. Teacher discussions, micro-teaching sessions and classes in the school were video-recorded, and data was triangulated using surveys and additional documents including class plans, digital artifacts created by teachers, workshop notes and researcher field notes. The catalyst for teachers’ creativity development was to use the photographic capabilities of the iPad to capture the local context and make lessons relevant to the lived experience of the students. In the transition stage, teachers worked with lesson plans and support from the professional development workshops to make small incremental changes to their practice, which scaffolded their growing competence in the creative use of the technology as a tool for teaching and developing new teaching resources. Over the full period of the study, these small changes in practice resulted in a cultural shift in how teachers approached all lessons, even those in which they were not using the technology. They developed into working as a community of practice. The digital lessons created were re-used and further developed by other teachers, providing a relevant and valuable bank of content in a context lacking in books and other teaching resources. This study demonstrated that mobile technology proved to be a successful catalyst for impacting creative teaching practice in this context, and supports the Quality Education for All Sustainable Development Goal.

Keywords: mobile technology, creative teaching, sub-Saharan Africa, quality education for all

Procedia PDF Downloads 97
1350 Design and Development of an Application for the Evaluation of Personal Injury and Disability in Occupational and Forensic Medicine

Authors: Daniel Suárez, Jesús Tomas, Sandra Sendra, Sandra Viciano-Tudela, Luis Felipe Calle, Javier Urios, Jaime Lloret

Abstract:

Our study is to develop a tool for the mobile phone to an assessment of body damage or determination of the degree of disability. This is a field of action of legal medicine and insurance with obvious economic implications. Those people who have suffered an accident or bodily harm demand a quantification of it. The assessment of bodily harm or disability by the expert medical professional is not exempt from complexity. Sometimes it is difficult to quantify pain; other times, the doctor faces simulators or exaggerators, and on many occasions, it is difficult to remember the extensive tables of scales whose details are complex to remember and apply. We present a tool, as a mobile application, that allows entering the sociodemographic date of the patient as well as the characteristics of the accident suffered by the person. With these preliminary data and introducing bodily damage, an approximate calculation of the compensation that the injured party should receive can be made. One of the results of this study is that it allows calculating joint mobility angles without the need to use a goniometer.

Keywords: mobile tool, body damage, personal injury and disability, telemedicine

Procedia PDF Downloads 58
1349 Fast Adjustable Threshold for Uniform Neural Network Quantization

Authors: Alexander Goncharenko, Andrey Denisov, Sergey Alyamkin, Evgeny Terentev

Abstract:

The neural network quantization is highly desired procedure to perform before running neural networks on mobile devices. Quantization without fine-tuning leads to accuracy drop of the model, whereas commonly used training with quantization is done on the full set of the labeled data and therefore is both time- and resource-consuming. Real life applications require simplification and acceleration of quantization procedure that will maintain accuracy of full-precision neural network, especially for modern mobile neural network architectures like Mobilenet-v1, MobileNet-v2 and MNAS. Here we present a method to significantly optimize training with quantization procedure by introducing the trained scale factors for discretization thresholds that are separate for each filter. Using the proposed technique, we quantize the modern mobile architectures of neural networks with the set of train data of only ∼ 10% of the total ImageNet 2012 sample. Such reduction of train dataset size and small number of trainable parameters allow to fine-tune the network for several hours while maintaining the high accuracy of quantized model (accuracy drop was less than 0.5%). Ready-for-use models and code are available in the GitHub repository.

Keywords: distillation, machine learning, neural networks, quantization

Procedia PDF Downloads 293
1348 State of the Science: Digital Therapies in Pediatric Mental Health

Authors: Billy Zou

Abstract:

Statement of the Problem: The burden of mental illness and problem behaviors in adolescence has risen worldwide. While less than 50% of teens have access to traditional mental health care, more than 73% have smartphones. Internet-based interventions offer advantages such as cost-effectiveness, availability, and flexibility. Methodology & Theoretical Orientation: A literature review was done using a PubMed search with the words mental health app yielding 2113 results. 103 articles that met inclusion criteria were reviewed, and findings were then described and synthesized. Findings: 1. Computer-based CBT was found to be effective for OCD, depression, social phobia, and panic disorder. 2. Web-based psychoeducation reduced problem behavior and improved parental well-being. 3. There is limited evidence for mobile-phone-based apps, but preliminary results suggest computer-based interventions are transferrable to mobile apps. 4. Adherence to app-based treatment was correlated with impressions about the user interface Conclusion & Significance: There is evidence for the effectiveness of computer-based programs in filling the significant gaps that currently exist in mental health delivery in the United States and internationally. There is also potential and theoretical validity for mobile-based apps to do the same, though more data is needed.

Keywords: children's mental health, mental health app, child and adolecent psychiatry, digital therapy

Procedia PDF Downloads 53
1347 Research on Malware Application Patterns of Using Permission Monitoring System

Authors: Seung-Hwan Ju, Yo-Han Choi, Hee-Suk Seo, Tae-Kyung Kim

Abstract:

This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. In this study, we develop a system to monitor that mobile application permission at application update. This study is a service-based malware analysis. It will be based on the mobile security study.

Keywords: malware patterns, application permission, application analysis, security

Procedia PDF Downloads 490
1346 Human Tracking across Heterogeneous Systems Based on Mobile Agent Technologies

Authors: Tappei Yotsumoto, Atsushi Nomura, Kozo Tanigawa, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara

Abstract:

In a human tracking system, expanding a monitoring range of one system is complicating the management of devices and increasing its cost. Therefore, we propose a method to realize a wide-range human tracking by connecting small systems. In this paper, we examined an agent deploy method and information contents across the heterogeneous human tracking systems. By implementing the proposed method, we can construct a human tracking system across heterogeneous systems, and the system can track a target continuously between systems.

Keywords: human tracking system, mobile agent, monitoring, heterogeneous systems

Procedia PDF Downloads 501
1345 CERD: Cost Effective Route Discovery in Mobile Ad Hoc Networks

Authors: Anuradha Banerjee

Abstract:

A mobile ad hoc network is an infrastructure less network, where nodes are free to move independently in any direction. The nodes have limited battery power; hence, we require energy efficient route discovery technique to enhance their lifetime and network performance. In this paper, we propose an energy-efficient route discovery technique CERD that greatly reduces the number of route requests flooded into the network and also gives priority to the route request packets sent from the routers that has communicated with the destination very recently, in single or multi-hop paths. This does not only enhance the lifetime of nodes but also decreases the delay in tracking the destination.

Keywords: ad hoc network, energy efficiency, flooding, node lifetime, route discovery

Procedia PDF Downloads 321
1344 Development of Portable Water Jet Cutter Mobile Hand Tool: Analysis of Nozzle Geometries and Materials

Authors: Razali Bin Abidin

Abstract:

This paper presents the development of a portable water jet cutter for soft materials such as meat. Twelve geometries of nozzles were simulated using finite element method. Water pressure was set to 1500 lb/in². Through the simulation, highest average water output speed was 133.04 m/s. The nozzle was fabricated from Al - alloy 5052 with the Factor of Safety~ 3. This indicates that the nozzle made of Al-alloy 5052 is capable of performing the cutting process without any fracture. Preliminary design of mobile water jet hand tool is presented at the end of this paper.

Keywords: water jet, finite element, Al-alloy 5052, nozzle geometry

Procedia PDF Downloads 350
1343 Digital Environment as a Factor of the City's Competitiveness in Attracting Tourists: The Case of Yekaterinburg

Authors: Alexander S. Burnasov, Anatoly V. Stepanov, Maria Y. Ilyushkina

Abstract:

In the conditions of transition to the digital economy, the digital environment of the city becomes one of the key factors of its tourism attractiveness. Modern digital environment makes travelling more accessible, improves the quality of travel services and the attractiveness of many tourist destinations. The digitalization of the industry allows to use resources more efficiently, to simplify business processes, to minimize risks, and to improve travel safety. The city promotion as a tourist destination in the foreign market becomes decisive in the digital environment. Information technologies are extremely important for the functioning of not only any tourist enterprise but also the city as a whole. In addition to solving traditional problems, it is also possible to implement some innovations from the tourism industry, such as the availability of city services in international systems of booking tickets and booking rooms in hotels, the possibility of early booking of theater and museum tickets, the possibility of non-cash payment by cards of international payment systems, Internet access in the urban environment for travelers. The availability of the city's digital services makes it possible to reduce ordering costs, contributes to the optimal selection of tourist products that meet the requirements of the tourist, provides increased transparency of transactions. The users can compare prices, features, services, and reviews of the travel service. The ability to share impressions with friends thousands of miles away directly affects the image of the city. It is possible to promote the image of the city in the digital environment not only through world-scale events (such as World Cup 2018, international summits, etc.) but also through the creation and management of services in the digital environment aimed at supporting tourism services, which will help to improve the positioning of the city in the global tourism market.

Keywords: competitiveness, digital environment, travelling, Yekaterinburg

Procedia PDF Downloads 112
1342 Virtual 3D Environments for Image-Based Navigation Algorithms

Authors: V. B. Bastos, M. P. Lima, P. R. G. Kurka

Abstract:

This paper applies to the creation of virtual 3D environments for the study and development of mobile robot image based navigation algorithms and techniques, which need to operate robustly and efficiently. The test of these algorithms can be performed in a physical way, from conducting experiments on a prototype, or by numerical simulations. Current simulation platforms for robotic applications do not have flexible and updated models for image rendering, being unable to reproduce complex light effects and materials. Thus, it is necessary to create a test platform that integrates sophisticated simulated applications of real environments for navigation, with data and image processing. This work proposes the development of a high-level platform for building 3D model’s environments and the test of image-based navigation algorithms for mobile robots. Techniques were used for applying texture and lighting effects in order to accurately represent the generation of rendered images regarding the real world version. The application will integrate image processing scripts, trajectory control, dynamic modeling and simulation techniques for physics representation and picture rendering with the open source 3D creation suite - Blender.

Keywords: simulation, visual navigation, mobile robot, data visualization

Procedia PDF Downloads 229
1341 Advertising Appeals and Cultural Values in Social Media Commercials in Uk, Brasil and India: Cases Study of Nokia and Samsung

Authors: Han Nguyen

Abstract:

The objective of this study is to investigate the impact of culture on advertising appeals in mobile phone industry via social media channel in UK, Brazil and India. Content analysis on Samsung and Nokia commercials in YouTube is conducted. The result indicates that the advertising appeals are both congruent and incongruent with cultural dimensions in UK, Brazil and India. The result suggests that Hofstede and value paradoxes might be the tools to predict the relationship between cultural values and advertising appeals.

Keywords: mobile phone advertising, international advertising, social media advertising.

Procedia PDF Downloads 491
1340 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 411
1339 A Survey on Various Technique of Modified TORA over MANET

Authors: Shreyansh Adesara, Sneha Pandiya

Abstract:

The mobile ad-hoc network (MANET) is an important and open area research for the examination and determination of the performance evolution. Temporary ordered routing algorithm (TORA) is adaptable and distributed MANET routing algorithm which is totally dependent on internet MANET Encapsulation protocol (IMEP) for the detection of the link and sensing of the link. If IMEP detect the wrong link failure then the network suffer from congestion and unnecessary route maintenance. Thus, the improvement in link detection method of TORA is introduced by various methods on IMEP by different perspective from different person. There are also different reactive routing protocols like AODV, TORA and DSR has been compared for the knowledge of the routing scenario for different parameter and using different model.

Keywords: IMEP, mobile ad-hoc network, protocol, TORA

Procedia PDF Downloads 427
1338 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks

Authors: Sungchul Ha, Hyunwoo Kim

Abstract:

In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.

Keywords: MANETs, IDS, power control, minimum spanning tree

Procedia PDF Downloads 342
1337 Power-Aware Adaptive Coverage Control with Consensus Protocol

Authors: Mert Turanli, Hakan Temeltas

Abstract:

In this paper, we propose a new approach to coverage control problem by using adaptive coordination and power aware control laws. Nonholonomic mobile nodes position themselves suboptimally according to a time-varying density function using Centroidal Voronoi Tesellations. The Lyapunov stability analysis of the adaptive and decentralized approach is given. A linear consensus protocol is used to establish synchronization among the mobile nodes. Also, repulsive forces prevent nodes from collision. Simulation results show that by using power aware control laws, energy consumption of the nodes can be reduced.

Keywords: power aware, coverage control, adaptive, consensus, nonholonomic, coordination

Procedia PDF Downloads 328
1336 Factorial Design Analysis for Quality of Video on MANET

Authors: Hyoup-Sang Yoon

Abstract:

The quality of video transmitted by mobile ad hoc networks (MANETs) can be influenced by several factors, including protocol layers; parameter settings of each protocol. In this paper, we are concerned with understanding the functional relationship between these influential factors and objective video quality in MANETs. We illustrate a systematic statistical design of experiments (DOE) strategy can be used to analyse MANET parameters and performance. Using a 2k factorial design, we quantify the main and interactive effects of 7 factors on a response metric (i.e., mean opinion score (MOS) calculated by PSNR with Evalvid package) we then develop a first-order linear regression model between the influential factors and the performance metric.

Keywords: evalvid, full factorial design, mobile ad hoc networks, ns-2

Procedia PDF Downloads 385
1335 Development of a Hamster Knowledge System Based on Android Application

Authors: Satien Janpla, Thanawan Boonpuck, Pattarapan Roonrakwit

Abstract:

In this paper, we present a hamster knowledge system based on android application. The objective of this system is to advice user to upkeep and feed hamsters based on mobile application. We describe the design approaches and functional components of this system. The system was developed based on knowledge based of hamster experts. The results were divided by the research purposes into 2 parts: developing the mobile application for advice users and testing and evaluating the system. Black box technique was used to evaluate application performances and questionnaires were applied to measure user satisfaction with system usability by specialists and users.

Keywords: hamster knowledge, Android application, black box, questionnaires

Procedia PDF Downloads 314
1334 Sampled-Data Model Predictive Tracking Control for Mobile Robot

Authors: Wookyong Kwon, Sangmoon Lee

Abstract:

In this paper, a sampled-data model predictive tracking control method is presented for mobile robots which is modeled as constrained continuous-time linear parameter varying (LPV) systems. The presented sampled-data predictive controller is designed by linear matrix inequality approach. Based on the input delay approach, a controller design condition is derived by constructing a new Lyapunov function. Finally, a numerical example is given to demonstrate the effectiveness of the presented method.

Keywords: model predictive control, sampled-data control, linear parameter varying systems, LPV

Procedia PDF Downloads 284
1333 Willingness to Pay for Improvements of MSW Disposal: Views from Online Survey

Authors: Amornchai Challcharoenwattana, Chanathip Pharino

Abstract:

Rising amount of MSW every day, maximizing material diversions from landfills via recycling is a prefer method to land dumping. Characteristic of Thai MSW is classified as 40 -60 per cent compostable wastes while potentially recyclable materials in waste streams are composed of plastics, papers, glasses, and metals. However, rate of material recovery from MSW, excluding composting or biogas generation, in Thailand is still low. Thailand’s recycling rate in 2010 was only 20.5 per cent. Central government as well as local governments in Thailand have tried to curb this problem by charging some of MSW management fees at the users. However, the fee is often too low to promote MSW minimization. The objective of this paper is to identify levels of willingness-to-pay (WTP) for MSW recycling in different social structures with expected outcome of sustainable MSW managements for different town settlements to maximize MSW recycling pertaining to each town’s potential. The method of eliciting WTP is a payment card. The questionnaire was deployed using online survey during December 2012. Responses were categorized into respondents living in Bangkok, living in other municipality areas, or outside municipality area. The responses were analysed using descriptive statistics, and multiple linear regression analysis to identify relationships and factors that could influence high or low WTP. During the survey period, there were 168 filled questionnaires from total 689 visits. However, only 96 questionnaires could be usable. Among respondents in the usable questionnaires, 36 respondents lived in within the boundary of Bangkok Metropolitan Administration while 45 respondents lived in the chartered areas that were classified as other municipality but not in BMA. Most of respondents were well-off as 75 respondents reported positive monthly cash flow (77.32%), 15 respondents reported neutral monthly cash flow (15.46%) while 7 respondent reported negative monthly cash flow (7.22%). For WTP data including WTP of 0 baht with valid responses, ranking from the highest means of WTP to the lowest WTP of respondents by geographical locations for good MSW management were Bangkok (196 baht/month), municipalities (154 baht/month), and non-urbanized towns (111 baht/month). In-depth analysis was conducted to analyse whether there are additional room for further increase of MSW management fees from the current payment that each correspondent is currently paying. The result from multiple-regression analysis suggested that the following factors could impacts the increase or decrease of WTP: incomes, age, and gender. Overall, the outcome of this study suggests that survey respondents are likely to support improvement of MSW treatments that are not solely relying on landfilling technique. Recommendations for further studies are to obtain larger sample sizes in order to improve statistical powers and to provide better accuracy of WTP study.

Keywords: MSW, willingness to pay, payment card, waste seperation

Procedia PDF Downloads 268
1332 Design and Construction of a Solar Mobile Anaerobic Digestor for Rural Communities

Authors: César M. Moreira, Marco A. Pazmiño-Hernández, Marco A. Pazmiño-Barreno, Kyle Griffin, Pratap Pullammanappallil

Abstract:

An anaerobic digestion system that was completely operated on solar power (both photovoltaic and solar thermal energy), and mounted on a trailer to make it mobile, was designed and constructed. A 55-gallon batch digester was placed within a chamber that was heated by hot water pumped through a radiator. Hot water was produced by a solar thermal collector and photovoltaic panels charged a battery which operated pumps for recirculating water. It was found that the temperature in the heating chamber was maintained above ambient temperature but it follows the same trend as ambient temperature. The temperature difference between the chamber and ambient values was not constant but varied with time of day. Advantageously, the temperature difference was highest during night and early morning and lowest near noon. In winter, when ambient temperature dipped to 2 °C during early morning hours, the chamber temperature did not drop below 10 °C. Model simulations showed that even if the digester is subjected to diurnal variations of temperature (as observed in winter of a subtropical region), about 63 % of the waste that would have been processed under constant digester temperature of 38 °C, can still be processed. The cost of the digester system without the trailer was $1,800.

Keywords: anaerobic digestion, solar-mobile, rural communities, solar, hybrid

Procedia PDF Downloads 241