Search results for: internet behaviour
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3423

Search results for: internet behaviour

2883 Experimental Investigation on the Effect of Bond Thickness on the Interface Behaviour of Fibre Reinforced Polymer Sheet Bonded to Timber

Authors: Abbas Vahedian, Rijun Shrestha, Keith Crews

Abstract:

The bond mechanism between timber and fibre reinforced polymer (FRP) is relatively complex and is influenced by a number of variables including bond thickness, bond width, bond length, material properties, and geometries. This study investigates the influence of bond thickness on the behaviour of interface, failure mode, and bond strength of externally bonded FRP-to-timber interface. In the present study, 106 single shear joint specimens have been investigated. Experiment results showed that higher layers of FRP increase the ultimate load carrying capacity of interface; conversely, such increase led to decrease the slip of interface. Moreover, samples with more layers of FRPs may fail in a brittle manner without noticeable warning that collapse is imminent.

Keywords: fibre reinforced polymer, FRP, single shear test, bond thickness, bond strength

Procedia PDF Downloads 208
2882 Information Needs and Seeking Behaviour of Postgraduate Students of Kohat University of Science and Technology, Khyber Pakhtunkhwa, Pakistan

Authors: Saeed Ullah Jan, Muhammad Ali, Misbah Ullah Awan

Abstract:

Purpose: This study investigated the information needs and seeking behaviour, and hurdles to information seeking of Post Graduate students of Kohat University of Science and Technology (KUST), Khyber Pakhtunkhwa. It focused on the information requirements of the post-graduate students of the university, the pattern they use for seeking information, and the difficulties they face while seeking information. Design/Methodology/approach: This study used a quantitative approach, adapting a survey questionnaire method for data collection. The population of this study was composed of M.Phil. and Ph.D. students of 2019 and 2020 in the faculties of Physical and Numerical Sciences, Chemical and Pharmaceutical Sciences, Biological Sciences, and Social Sciences of KUST. The sample size was 260. Students were selected randomly. The study response rate was 77%, and data were analyzed through SPSS (22 versions). Key findings: The study revealed that Most students' information needs were for study and research activities, new knowledge, and career development. To fulfill these needs, the scholars use various sources and resources. The sources they used for information needs were journal articles, textbooks, and research projects commonly. For the information-seeking purpose, often, students prefer books that have some importance. The other factors that played an essential role in selecting material were topical relevance, Novelty, Recommended by colleagues, and publisher's reputation. Most of the students thought that Book Exhibitions, Open Access systems in the Library, and the Display of new arrivals could enhance the students' information-seeking. The main problem seeking information was faced by them was a shortage of printed information resources. Overall they wanted more facilities, enhancement in the library collection, and better services. Delimitations of the study: This study has not included 1) BS and M.Sc. Students of KUST; 2) The colleges and institutions affiliated with KUST; 3) This study was delimited only to the Post Graduate students of KUST. Practical implication(s): The findings of the study motivate the policymakers and authorities of KUST to restructure the information literacy programs to fulfill the scholars' information needs. It may inform the policymakers to know the difficulties faced by scholars during information seeking. Contribution to the knowledge: No significant work has been done on the students' information needs and seeking behaviour at KUST. The study analyzed the information needs and seeking behaviour of post graduate students. It brought a clear picture of information needs and seeking behaviour of scholars and addressed the problems faced by them during the seeking process.

Keywords: information needs of Pakistan, information-seeking behaviors, postgraduate students, university libraries, Kohat university of science and technology, Khyber Pakhtunkhwa, Pakistan

Procedia PDF Downloads 67
2881 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 256
2880 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 138
2879 Sustainable Design for Building Envelope in Hot Climates: A Case Study for the Role of the Dome as a Component of an Envelope in Heat Exchange

Authors: Akeel Noori Almulla Hwaish

Abstract:

Architectural design is influenced by the actual thermal behaviour of building components, and this in turn depends not only on their steady and periodic thermal characteristics, but also on exposure effects, orientation, surface colour, and climatic fluctuations at the given location. Design data and environmental parameters should be produced in an accurate way for specified locations, so that architects and engineers can confidently apply them in their design calculations that enable precise evaluation of the influence of various parameters relating to each component of the envelope, which indicates overall thermal performance of building. The present paper will be carried out with an objective of thermal behaviour assessment and characteristics of the opaque and transparent parts of one of the very unique components used as a symbolic distinguished element of building envelope, its thermal behaviour under the impact of solar temperatures, and its role in heat exchange related to a specific U-value of specified construction materials alternatives. The research method will consider the specified Hot-Dry weather and new mosque in Baghdad, Iraq as a case study. Also, data will be presented in light of the criteria of indoor thermal comfort in terms of design parameters and thermal assessment for a“model dome”. Design alternatives and considerations of energy conservation, will be discussed as well using comparative computer simulations. Findings will be incorporated to outline the conclusions clarifying the important role of the dome in heat exchange of the whole building envelope for approaching an indoor thermal comfort level and further research in the future.

Keywords: building envelope, sustainable design, dome impact, hot-climates, heat exchange

Procedia PDF Downloads 451
2878 Fracture Behaviour of Functionally Graded Materials Using Graded Finite Elements

Authors: Mohamad Molavi Nojumi, Xiaodong Wang

Abstract:

In this research fracture behaviour of linear elastic isotropic functionally graded materials (FGMs) are investigated using modified finite element method (FEM). FGMs are advantageous because they enhance the bonding strength of two incompatible materials, and reduce the residual stress and thermal stress. Ceramic/metals are a main type of FGMs. Ceramic materials are brittle. So, there is high possibility of crack existence during fabrication or in-service loading. In addition, damage analysis is necessary for a safe and efficient design. FEM is a strong numerical tool for analyzing complicated problems. Thus, FEM is used to investigate the fracture behaviour of FGMs. Here an accurate 9-node biquadratic quadrilateral graded element is proposed in which the influence of the variation of material properties is considered at the element level. The stiffness matrix of graded elements is obtained using the principle of minimum potential energy. The implementation of graded elements prevents the forced sudden jump of material properties in traditional finite elements for modelling FGMs. Numerical results are verified with existing solutions. Different numerical simulations are carried out to model stationary crack problems in nonhomogeneous plates. In these simulations, material variation is supposed to happen in directions perpendicular and parallel to the crack line. Two special linear and exponential functions have been utilized to model the material gradient as they are mostly discussed in literature. Also, various sizes of the crack length are considered. A major difference in the fracture behaviour of FGMs and homogeneous materials is related to the break of material symmetry. For example, when the material gradation direction is normal to the crack line, even under applying the mode I loading there exists coupled modes I and II of fracture which originates from the induced shear in the model. Therefore, the necessity of the proper modelling of the material variation should be considered in capturing the fracture behaviour of FGMs specially, when the material gradient index is high. Fracture properties such as mode I and mode II stress intensity factors (SIFs), energy release rates, and field variables near the crack tip are investigated and compared with results obtained using conventional homogeneous elements. It is revealed that graded elements provide higher accuracy with less effort in comparison with conventional homogeneous elements.

Keywords: finite element, fracture mechanics, functionally graded materials, graded element

Procedia PDF Downloads 155
2877 Internet Based Teleoperation of the Quad Rotor with Force Feedback Using Smith Predictor

Authors: K. Senthil Kumar, A. Vasumalaikannan

Abstract:

In this paper, teleoperation of the quadrotor using Internet with Force feedback is addressed. Teleoperation with Force feedback is the ability to remotely control a robot, where contact (obstacle) or environment (wind gust etc) information (force feedback) is communicated from the quadrotor to the master joystick and thus giving the operator a sense of telepresence. The stability and performance of such a teleoperator is highly dependent on the amount of time delay present in the control loop. This problem is further complicated given the fact that for network based communication the time delay is itself time varying and highly non deterministic. In this paper, a novel method using Neural based Smith Predictor at the master side the stability is achieved. The performance of the system even during worst case scenario is within acceptable.

Keywords: teleoperation, quadrotor, neural smith predictor, time delay

Procedia PDF Downloads 597
2876 Factors Relating to Motivation to Change Behaviors in Individuals Who Are Overweight

Authors: Teresa Wills, Geraldine Mccarthy, Nicola Cornally

Abstract:

Background: Obesity is an emerging healthcare epidemic affecting virtually all age and socio-economic groups and is one of the most serious and prevalent diseases of the 21st century. It is a public health challenge because of its prevalence, associated costs and health effects. The increasing prevalence of obesity has created a social perception that overweight body sizes are healthy and normal. This normalization of obesity within our society and the acceptance of higher body weights have led to individuals being unaware of the reality of their weight status and gravity of this situation thus impeding recognition of obesity. Given the escalating global health problem of obesity and its co-morbidities, the need to re-appraise its management is more compelling than ever. It is widely accepted that the causes of obesity are complex and multi-factorial. Engagement of individuals in weight management programmes is difficult if they do not perceive they have a problem with their weight. Recognition of the problem is a key component of obesity management and identifying the main predictors of behaviour is key to designing health behaviour interventions. Aim: The aim of the research was to determine factors relating to motivation to change behaviours in individuals who perceive themselves to be overweight. Method: The research design was quantitative, correlational and cross-sectional. The design was guided by the Health Belief Model. Data were collected online using a multi-section and multi-item questionnaire, developed from a review of the theoretical and empirical research. A sample of 202 men and women who perceived themselves to be overweight participated in the research. Descriptive and inferential statistical analyses were employed to describe relationships between variables. Findings: Following multivariate regression analysis, perceived barriers to weight loss and perceived benefits of weight loss were significant predictors of motivation to change behaviour. The perceived barriers to weight loss which were significant were psychological barriers to weight loss (p = < 0.019) and environmental barriers to physical activity (p= < 0.032).The greatest predictor of motivation to change behaviour was the perceived benefits of weight loss (p < 0.001). Perceived susceptibility to obesity and perceived severity of obesity did not emerge as significant predictors in this model. Total variance explained by the model was 33.5%. Conclusion: Perceived barriers to weight loss and perceived benefits of weight loss are important determinants of motivation to change behaviour. These findings have important implications for health professionals to help inform their practice and for the development of intervention programmes to prevent and control obesity.

Keywords: motivation to change behaviours, obesity, predictors of behavior, interventions, overweight

Procedia PDF Downloads 393
2875 Internet of Things: Route Search Optimization Applying Ant Colony Algorithm and Theory of Computer Science

Authors: Tushar Bhardwaj

Abstract:

Internet of Things (IoT) possesses a dynamic network where the network nodes (mobile devices) are added and removed constantly and randomly, hence the traffic distribution in the network is quite variable and irregular. The basic but very important part in any network is route searching. We have many conventional route searching algorithms like link-state, and distance vector algorithms but they are restricted to the static point to point network topology. In this paper we propose a model that uses the Ant Colony Algorithm for route searching. It is dynamic in nature and has positive feedback mechanism that conforms to the route searching. We have also embedded the concept of Non-Deterministic Finite Automata [NDFA] minimization to reduce the network to increase the performance. Results show that Ant Colony Algorithm gives the shortest path from the source to destination node and NDFA minimization reduces the broadcasting storm effectively.

Keywords: routing, ant colony algorithm, NDFA, IoT

Procedia PDF Downloads 419
2874 Application of Wireless Sensor Networks: A Survey in Thailand

Authors: Sathapath Kilaso

Abstract:

Nowadays, Today, wireless sensor networks are an important technology that works with Internet of Things. It is receiving various data from many sensor. Then sent to processing or storing. By wireless network or through the Internet. The devices around us are intelligent, can receiving/transmitting and processing data and communicating through the system. There are many applications of wireless sensor networks, such as smart city, smart farm, environmental management, weather. This article will explore the use of wireless sensor networks in Thailand and collect data from Thai Thesis database in 2012-2017. How to Implementing Wireless Sensor Network Technology. Advantage from this study To know the usage wireless technology in many fields. This will be beneficial for future research. In this study was found the most widely used wireless sensor network in agriculture field. Especially for smart farms. And the second is the adoption of the environment. Such as weather stations and water inspection.

Keywords: wireless sensor network, smart city, survey, Adhoc Network

Procedia PDF Downloads 184
2873 Influence of Yield Stress and Compressive Strength on Direct Shear Behaviour of Steel Fibre-Reinforced Concrete

Authors: Bensaid Boulekbache, Mostefa Hamrat, Mohamed Chemrouk, Sofiane Amziane

Abstract:

This study aims in examining the influence of the paste yield stress and compressive strength on the behaviour of fibre-reinforced concrete (FRC) versus direct shear. The parameters studied are the steel fibre contents, the aspect ratio of fibres and the concrete strength. Prismatic specimens of dimensions 10x10x35cm made of concrete of various yield stress reinforced with steel fibres hooked at the ends with three fibre volume fractions (i.e. 0, 0.5, and 1%) and two aspects ratio (65 and 80) were tested to direct shear. Three types of concretes with various compressive strength and yield stress were tested, an ordinary concrete (OC), a self-compacting concrete (SCC) and a high strength concrete (HSC). The concrete strengths investigated include 30 MPa for OC, 60 MPa for SCC and 80 MPa for HSC. The results show that the shear strength and ductility are affected and have been improved very significantly by the fibre contents, fibre aspect ratio and concrete strength. As the compressive strength and the volume fraction of fibres increase, the shear strength increases. However, yield stress of concrete has an important influence on the orientation and distribution of the fibres in the matrix. The ductility was much higher for ordinary and self-compacting concretes (concrete with good workability). The ductility in direct shear depends on the fibre orientation and is significantly improved when the fibres are perpendicular to the shear plane. On the contrary, for concrete with poor workability, an inadequate distribution and orientation of fibres occurred, leading to a weak contribution of the fibres to the direct shear behaviour.

Keywords: concrete, fibre, direct shear, yield stress, orientation, strength

Procedia PDF Downloads 520
2872 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 240
2871 Impact of Motor Behaviour Aspects of Autism on Cognitive Ability in Children with Autism Spectrum Disorder

Authors: Rana Zeina

Abstract:

Cognitive and behavioral symptoms may, in fact, overlap and be related to the level of the general cognitive function. We measured the behavioral aspects of autism and its correlation to the cognitive ability in 30 children with ASD. We used a neuropsychological battery CANTAB eclipse to evaluate the ASD children's cognitive ability. Individuals with ASDs and challenging behaviors showed significant correlation between some cognitive abilities and motor behavior aspects. Based on these findings we can conclude that the motor behavioral problems in autism affect specific cognitive abilities in ASDs such as comprehension, learning, reversal, acquisition, attention set shifting, and speed of reaction to one stimulus. Future research should also focus on the relationship between motor stereotypes and other subtypes of repetitive behaviors, such as verbal stereotypes, and ritual and routine adherence and use different types of CANTAB tests.

Keywords: cognitive ability, CANTAB test, behaviour motor aspects, autism spectrum disorders

Procedia PDF Downloads 472
2870 The Influence of Leader’s Sources of Power on Organizational Citizenship Behaviour

Authors: Noor Azlina Mohamed Yunus, Noorlaila Yunus, Kadulliah Ghazali

Abstract:

In this an era of intense competition, Malaysia aspires to be a fully developed country by 2020 and desires its citizens to perform and execute excellent work behaviors. For that reason, organizations are focusing on employees’ positive and constructive behaviors such as organizational citizenship behavior (OCB). They expect employees to not only complete their required duties by providing excellent performance but also keenly go beyond their roles that are not specifying in their formal job descriptions to ensure organizational success. The role and duty to acquire employees to engage and connect in OCB is the responsibility of a leader. Thus, leaders can utilize their sources of power to enable subordinates to accomplish organizational objective including OCB. Therefore, this paper formulates a framework postulating leader’s sources of power as an antecedent of organizational citizenship behavior (OCB). The discussion on implications for future theory development is discussed.

Keywords: organizational citizenship behaviour (OCB), leader’s sources of power, call centre industry, conceptual paper

Procedia PDF Downloads 296
2869 Automatic Identification and Monitoring of Wildlife via Computer Vision and IoT

Authors: Bilal Arshad, Johan Barthelemy, Elliott Pilton, Pascal Perez

Abstract:

Getting reliable, informative, and up-to-date information about the location, mobility, and behavioural patterns of animals will enhance our ability to research and preserve biodiversity. The fusion of infra-red sensors and camera traps offers an inexpensive way to collect wildlife data in the form of images. However, extracting useful data from these images, such as the identification and counting of animals remains a manual, time-consuming, and costly process. In this paper, we demonstrate that such information can be automatically retrieved by using state-of-the-art deep learning methods. Another major challenge that ecologists are facing is the recounting of one single animal multiple times due to that animal reappearing in other images taken by the same or other camera traps. Nonetheless, such information can be extremely useful for tracking wildlife and understanding its behaviour. To tackle the multiple count problem, we have designed a meshed network of camera traps, so they can share the captured images along with timestamps, cumulative counts, and dimensions of the animal. The proposed method takes leverage of edge computing to support real-time tracking and monitoring of wildlife. This method has been validated in the field and can be easily extended to other applications focusing on wildlife monitoring and management, where the traditional way of monitoring is expensive and time-consuming.

Keywords: computer vision, ecology, internet of things, invasive species management, wildlife management

Procedia PDF Downloads 116
2868 Providing Additional Advantages for STATCOM in Power Systems by Integration of Energy Storage Device

Authors: Reza Sedaghati

Abstract:

The use of Flexible AC Transmission System (FACTS) devices in a power system can potentially overcome limitations of the present mechanically controlled transmission system. Also, the advance of technology makes possible to include new energy storage devices in the electrical power system. The integration of Superconducting Magnetic Energy Storage (SMES) into Static Synchronous Compensator (STATCOM) can lead to increase their flexibility in improvement of power system dynamic behaviour by exchanging both active and reactive powers with power grids. This paper describes structure and behaviour of SMES, specifications and performance principles of the STATCOM/SMES compensator. Moreover, the benefits and effectiveness of integrated SMES with STATCOM in power systems is presented. Also, the performance of the STATCOM/SMES compensator is evaluated using an IEEE 3-bus system through the dynamic simulation by PSCAD/EMTDC software.

Keywords: STATCOM/SMES compensator, chopper, converter, energy storage system, power systems

Procedia PDF Downloads 537
2867 [Keynote Talk]: Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

Authors: Sa’ed Abed, Mohammad H. Al Shayeji, Ovais Ahmed, Sahel Alouneh

Abstract:

Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol and its sample services resulted from informal SIP specification. We create an “Abstract User Interface” using case analysis so that can be applied to identify SIP services more explicitly. The issued sample SIP features are then used as case scenarios; they are revised in MSCs format and validated to their corresponding SDL models.

Keywords: modeling, MSC, SDL, SIP, validating

Procedia PDF Downloads 189
2866 Freedom of Speech and Involvement in Hatred Speech on Social Media Networks

Authors: Sara Chinnasamy, Michelle Gun, M. Adnan Hashim

Abstract:

Federal Constitution guarantees Malaysians the right to free speech and expression; yet hatred speech can be commonly found on social media platforms such as Facebook, Twitter, and Instagram. In Malaysia social media sphere, most hatred speech involves religion, race and politics. Recent cases of racial attacks on social media have created social tensions among Malaysians. Many Malaysians always argue on their rights to freedom of speech. However, there are laws that limit their expression to the public and protecting social media users from being a victim of hate speech. This paper aims to explore the attitude and involvement of Malaysian netizens towards freedom of speech and hatred speech on social media. It also examines the relationship between involvement in hatred speech among Malaysian netizens and attitude towards freedom of speech. For most Malaysians, practicing total freedom of speech in the open is unthinkable. As a result, the best channel to articulate their feelings and opinions liberally is the internet. With the advent of the internet medium, more and more Malaysians are conveying their viewpoints using the various internet channels although sensitivity of the audience is seldom taken into account. Consequently, this situation has led to pockets of social disharmony among the citizens. Although this unhealthy activity is denounced by the authority, netizens are generally of the view that they have the right to write anything they want. Using the quantitative method, survey was conducted among Malaysians aged between 18 and 50 years who are active social media users. Results from the survey reveal that despite a weak relationship level between hatred speech involvement on social media and attitude towards freedom of speech, the association is still considerably significant. As such, it can be safely presumed that hatred speech on social media occurs due to the freedom of speech that exists by way of social media channels.

Keywords: freedom of speech, hatred speech, social media, Malaysia, netizens

Procedia PDF Downloads 432
2865 Application of ICT in the Teaching and Learning of English Language in Nigerian Secondary Schools

Authors: Richard Ayobayowa Foyewa

Abstract:

This work examined the application of ICT in the teaching and learning of English language in Nigerian secondary schools. The definition of ICT was given briefly before areas in which the ICT could be applied in teaching and learning of English language were observed. Teachers’ attitudes towards the use of the computer and Internet facilities were also observed. The conclusion drawn was that ICT is very relevant in the teaching and learning of English language in Nigerian secondary schools. It was therefore recommended that teachers who are not computer literate should go for the training without further delay; government should always employ English language teachers who are computer literates. Government should make fund available in schools for the training and re-training of English language teachers in various computer programmes and in making internet facilities available in secondary schools.

Keywords: ICT, Nigerian secondary schools, teaching and learning of English

Procedia PDF Downloads 290
2864 Data Mining Approach: Classification Model Evaluation

Authors: Lubabatu Sada Sodangi

Abstract:

The rapid growth in exchange and accessibility of information via the internet makes many organisations acquire data on their own operation. The aim of data mining is to analyse the different behaviour of a dataset using observation. Although, the subset of the dataset being analysed may not display all the behaviours and relationships of the entire data and, therefore, may not represent other parts that exist in the dataset. There is a range of techniques used in data mining to determine the hidden or unknown information in datasets. In this paper, the performance of two algorithms Chi-Square Automatic Interaction Detection (CHAID) and multilayer perceptron (MLP) would be matched using an Adult dataset to find out the percentage of an/the adults that earn > 50k and those that earn <= 50k per year. The two algorithms were studied and compared using IBM SPSS statistics software. The result for CHAID shows that the most important predictors are relationship and education. The algorithm shows that those are married (husband) and have qualification: Bachelor, Masters, Doctorate or Prof-school whose their age is > 41<57 earn > 50k. Also, multilayer perceptron displays marital status and capital gain as the most important predictors of the income. It also shows that individuals that their capital gain is less than 6,849 and are single, separated or widow, earn <= 50K, whereas individuals with their capital gain is > 6,849, work > 35 hrs/wk, and > 27yrs their income will be > 50k. By comparing the two algorithms, it is observed that both algorithms are reliable but there is strong reliability in CHAID which clearly shows that relation and education contribute to the prediction as displayed in the data visualisation.

Keywords: data mining, CHAID, multi-layer perceptron, SPSS, Adult dataset

Procedia PDF Downloads 361
2863 Dynamic Transmission Modes of Network Public Opinion on Subevents Clusters of an Emergent Event

Authors: Yuan Xu, Xun Liang, Meina Zhang

Abstract:

The rise and attenuation of the public opinion broadcast of an emergent accident, in the social network, has a close relationship with the dynamic development of its subevents cluster. In this article, we take Tianjin Port explosion's subevents as an example to research the dynamic propagation discipline of Internet public opinion in a sudden accident, and analyze the overall structure of dynamic propagation to propose four different routes for subevents clusters propagation. We also generate network diagrams for the dynamic public opinion propagation, analyze each propagation type specifically. Based on this, suggestions on the supervision and guidance of Internet public opinion broadcast can be made.

Keywords: network dynamic transmission modes, emergent subevents clusters, Tianjin Port explosion, public opinion supervision

Procedia PDF Downloads 265
2862 A Comparative Study between Different Techniques of Off-Page and On-Page Search Engine Optimization

Authors: Ahmed Ishtiaq, Maeeda Khalid, Umair Sajjad

Abstract:

In the fast-moving world, information is the key to success. If information is easily available, then it makes work easy. The Internet is the biggest collection and source of information nowadays, and with every single day, the data on internet increases, and it becomes difficult to find required data. Everyone wants to make his/her website at the top of search results. This can be possible when you have applied some techniques of SEO inside your application or outside your application, which are two types of SEO, onsite and offsite SEO. SEO is an abbreviation of Search Engine Optimization, and it is a set of techniques, methods to increase users of a website on World Wide Web or to rank up your website in search engine indexing. In this paper, we have compared different techniques of Onpage and Offpage SEO, and we have suggested many things that should be changed inside webpage, outside web page and mentioned some most powerful and search engine considerable elements and techniques in both types of SEO in order to gain high ranking on Search Engine.

Keywords: auto-suggestion, search engine optimization, SEO, query, web mining, web crawler

Procedia PDF Downloads 122
2861 The Mechanical Behavior of a Cement-Fiber Composite Material

Authors: K. Harrat, M. Hidjeb, M. T’kint

Abstract:

The aim of the present research work is to characterize a cement palm date fiber composite in order to be used in isolation and in the manufacture of new structural materials. This technique may possibly participate seriously in the preservation of the environment and develop a growing need for plant products. On one hand, It has been shown that the presence of natural fiber in the composite materials manufacture, based on hydraulic binder, has improved the mechanical behaviour of the material. On the Other hand, It has been proven that the durability of composite materials reinforced with untreated fibers was largely affected by the presence of organic matter. In order to extract the organic material, the fibers were treated with boiling water and then coated with different types of products. A considerable improvement in the sensitivity to water of the fibers, as well as in the mechanical strength and in the ductility of the composite material was observed. The fiber being sensitive to water, the study put the emphasis on its dimensional stability.

Keywords: cement composite, durability, heat treatment, mechanical behaviour, vegetal fiber

Procedia PDF Downloads 433
2860 Internet of Things for Smart Dedicated Outdoor Air System in Buildings

Authors: Dararat Tongdee, Surapong Chirarattananon, Somchai Maneewan, Chantana Punlek

Abstract:

Recently, the Internet of Things (IoT) is the important technology that connects devices to the network and people can access real-time communication. This technology is used to report, collect, and analyze the big data for achieving a purpose. For a smart building, there are many IoT technologies that enable management and building operators to improve occupant thermal comfort, indoor air quality, and building energy efficiency. In this research, we propose monitoring and controlling performance of a smart dedicated outdoor air system (SDOAS) based on IoT platform. The SDOAS was specifically designed with the desiccant unit and thermoelectric module. The designed system was intended to monitor, notify, and control indoor environmental factors such as temperature, humidity, and carbon dioxide (CO₂) level. The SDOAS was tested under the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE 62.2) and indoor air quality standard. The system will notify the user by Blynk notification when the status of the building is uncomfortable or tolerable limits are reached according to the conditions that were set. The user can then control the system via a Blynk application on a smartphone. The experimental result indicates that the temperature and humidity of indoor fresh air in the comfort zone are approximately 26 degree Celsius and 58% respectively. Furthermore, the CO₂ level was controlled lower than 1000 ppm by indoor air quality standard condition. Therefore, the proposed system can efficiently work and be easy to use for buildings.

Keywords: internet of things, indoor air quality, smart dedicated outdoor air system, thermal comfort

Procedia PDF Downloads 174
2859 TMBCoI-SIOT: Trust Management System Based on the Community of Interest for the Social Internet of Things

Authors: Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, Leila Saidane

Abstract:

In this paper, we propose a trust management system based on clustering architecture for the social internet of things called TMBCO-SIOT. The proposed model integrates numerous factors such as direct and indirect trust; transaction factor; precaution factor; and social modeling of trust. The novelty of our approach can be summed up in two aspects. The first aspect concerns the architecture based on the community of interest (CoT) where each community is headed by an administrator (admin). However, the second aspect is the trust management system that tries to prevent On-Off attacks and mitigates dishonest recommendations using the k-means algorithm and guarantor things. The effectiveness of the proposed system is proved by simulation against malicious nodes.

Keywords: IoT, trust management system, attacks, trust, dishonest recommendations, K-means algorithm

Procedia PDF Downloads 191
2858 Modelling the Effect of Alcohol Consumption on the Accelerating and Braking Behaviour of Drivers

Authors: Ankit Kumar Yadav, Nagendra R. Velaga

Abstract:

Driving under the influence of alcohol impairs the driving performance and increases the crash risks worldwide. The present study investigated the effect of different Blood Alcohol Concentrations (BAC) on the accelerating and braking behaviour of drivers with the help of driving simulator experiments. Eighty-two licensed Indian drivers drove on the rural road environment designed in the driving simulator at BAC levels of 0.00%, 0.03%, 0.05%, and 0.08% respectively. Driving performance was analysed with the help of vehicle control performance indicators such as mean acceleration and mean brake pedal force of the participants. Preliminary analysis reported an increase in mean acceleration and mean brake pedal force with increasing BAC levels. Generalized linear mixed models were developed to quantify the effect of different alcohol levels and explanatory variables such as driver’s age, gender and other driver characteristic variables on the driving performance indicators. Alcohol use was reported as a significant factor affecting the accelerating and braking performance of the drivers. The acceleration model results indicated that mean acceleration of the drivers increased by 0.013 m/s², 0.026 m/s² and 0.027 m/s² for the BAC levels of 0.03%, 0.05% and 0.08% respectively. Results of the brake pedal force model reported that mean brake pedal force of the drivers increased by 1.09 N, 1.32 N and 1.44 N for the BAC levels of 0.03%, 0.05% and 0.08% respectively. Age was a significant factor in both the models where one year increase in drivers’ age resulted in 0.2% reduction in mean acceleration and 19% reduction in mean brake pedal force of the drivers. It shows that driving experience could compensate for the negative effects of alcohol to some extent while driving. Female drivers were found to accelerate slower and brake harder as compared to the male drivers which confirmed that female drivers are more conscious about their safety while driving. It was observed that drivers who were regular exercisers had better control on their accelerator pedal as compared to the non-regular exercisers during drunken driving. The findings of the present study revealed that drivers tend to be more aggressive and impulsive under the influence of alcohol which deteriorates their driving performance. Drunk driving state can be differentiated from sober driving state by observing the accelerating and braking behaviour of the drivers. The conclusions may provide reference in making countermeasures against drinking and driving and contribute to traffic safety.

Keywords: alcohol, acceleration, braking behaviour, driving simulator

Procedia PDF Downloads 127
2857 The Role of Mobile Applications on Consumerism Case Study: Snappfood Application

Authors: Vajihe Fasihi

Abstract:

With the advancement of technology and the expansion of the Internet, a significant change in lifestyle and consumption can be seen in societies. The increasing number of mobile applications (such as SnappFood) has expanded the scope of using apps for wider access to services to citizens and meets the needs of a large number of citizens in the shortest time and with reasonable quality. First, this article seeks to understand the concept and function of the Internet distribution network on the Iranian society, which was investigated in a smaller sample (students of the Faculty of Social Sciences of the Tehran university ) and uses the semi-structured interview method, and then explores the concept of consumerism. The main issue of this research is the effect of mobile apps, especially SnappFood, on increasing consumption and the difference between real needs and false needs among consumers. The findings of this research show that the use of the mentioned program has been effective in increasing the false needs of the sample community and has led to the phenomenon of consumerism.

Keywords: consumerism economics, false needs, mobile applications, reel needs

Procedia PDF Downloads 40
2856 Extending Smart City Infrastructure to Cover Natural Disasters

Authors: Nina Dasari, Satvik Dasari

Abstract:

Smart city solutions are being developed across the globe to transform urban areas. However, the infrastructure enablement for alerting natural disasters such as floods and wildfires is deficient. This paper discusses an innovative device that could be used as part of the smart city initiative to detect and provide alerts in case of floods at road crossings and wildfires. An Internet of Things (IoT) smart city node was designed, tested, and deployed with collaboration from the City of Austin. The end to end solution includes a 3G enabled IoT device, flood and fire sensors, cloud, a mobile app, and IoT analytics. The real-time data was collected and analyzed using IoT analytics to refine the solution for the past year. The results demonstrate that the proposed solution is reliable and provides accurate results. This low-cost solution is viable, and it can replace the current solution which costs tens of thousands of dollars.

Keywords: analytics, internet of things, natural disasters, smart city

Procedia PDF Downloads 200
2855 Design and Implementation a Virtualization Platform for Providing Smart Tourism Services

Authors: Nam Don Kim, Jungho Moon, Tae Yun Chung

Abstract:

This paper proposes an Internet of Things (IoT) based virtualization platform for providing smart tourism services. The virtualization platform provides a consistent access interface to various types of data by naming IoT devices and legacy information systems as pathnames in a virtual file system. In the other words, the IoT virtualization platform functions as a middleware which uses the metadata for underlying collected data. The proposed platform makes it easy to provide customized tourism information by using tourist locations collected by IoT devices and additionally enables to create new interactive smart tourism services focused on the tourist locations. The proposed platform is very efficient so that the provided tourism services are isolated from changes in raw data and the services can be modified or expanded without changing the underlying data structure.

Keywords: internet of things (IoT), IoT platform, serviceplatform, virtual file system (VSF)

Procedia PDF Downloads 475
2854 A TiO₂-Based Memristor Reliable for Neuromorphic Computing

Authors: X. S. Wu, H. Jia, P. H. Qian, Z. Zhang, H. L. Cai, F. M. Zhang

Abstract:

A bipolar resistance switching behaviour is detected for a Ti/TiO2-x/Au memristor device, which is fabricated by a masked designed magnetic sputtering. The current dependence of voltage indicates the curve changes slowly and continuously. When voltage pulses are applied to the device, the set and reset processes maintains linearity, which is used to simulate the synapses. We argue that the conduction mechanism of the device is from the oxygen vacancy channel model, and the resistance of the device change slowly due to the reaction between the titanium electrode and the intermediate layer and the existence of a large number of oxygen vacancies in the intermediate layer. Then, Hopfield neural network is constructed to simulate the behaviour of neural network in image processing, and the accuracy rate is more than 98%. This shows that titanium dioxide memristor has a broad application prospect in high performance neural network simulation.

Keywords: memristor fabrication, neuromorphic computing, bionic synaptic application, TiO₂-based

Procedia PDF Downloads 59