Search results for: internet of things technologies
4875 Reduction of Energy Consumption Using Smart Home Techniques in the Household Sector
Authors: Ahmed Al-Adaileh, Souheil Khaddaj
Abstract:
Outcomes of exhaustion of natural resources started influencing each spirit on this planet. Energy is an essential factor in this aspect. To restore the circumstance to the appropriate track, all attempts must focus on two fundamental branches: producing electricity from clean and renewable reserves and decreasing the overall unnecessary consumption of energy. The focal point of this paper will be on lessening the power consumption in the household's segment. This paper is an attempt to give a clear understanding of a framework called Reduction of Energy Consumption in Household Sector (RECHS) and how it should help householders to reduce their power consumption by substituting their household appliances, turning-off the appliances when stand-by modus is detected, and scheduling their appliances operation periods. Technically, the framework depends on utilizing Z-Wave compatible plug-ins which will be connected to the usual house devices to gauge and control them remotely and semi-automatically. The suggested framework underpins numerous quality characteristics, for example, integrability, scalability, security and adaptability.Keywords: smart energy management systems, internet of things, wireless mesh networks, microservices, cloud computing, big data
Procedia PDF Downloads 1954874 Development and Investigation of Sustainable Wireless Sensor Networks for forest Ecosystems
Authors: Shathya Duobiene, Gediminas Račiukaitis
Abstract:
Solar-powered wireless sensor nodes work best when they operate continuously with minimal energy consumption. Wireless Sensor Networks (WSNs) are a new technology opens up wide studies, and advancements are expanding the prevalence of numerous monitoring applications and real-time aid for environments. The Selective Surface Activation Induced by Laser (SSAIL) technology is an exciting development that gives the design of WSNs more flexibility in terms of their shape, dimensions, and materials. This research work proposes a methodology for using SSAIL technology for forest ecosystem monitoring by wireless sensor networks. WSN monitoring the temperature and humidity were deployed, and their architectures are discussed. The paper presents the experimental outcomes of deploying newly built sensor nodes in forested areas. Finally, a practical method is offered to extend the WSN's lifespan and ensure its continued operation. When operational, the node is independent of the base station's power supply and uses only as much energy as necessary to sense and transmit data.Keywords: internet of things (IoT), wireless sensor network, sensor nodes, SSAIL technology, forest ecosystem
Procedia PDF Downloads 724873 Learning Management System Technologies for Teaching Computer Science at a Distance Education Institution
Authors: Leila Goosen, Dalize van Heerden
Abstract:
The performance outcomes of first year Computer Science and Information Technology students across the world are of great concern, whether they are being taught in a face-to-face environment or via distance education. In the face-to-face environment, it is, however, somewhat easier to teach and support students than it is in a distance education environment. The face-to-face academic can more easily gauge the level of understanding and participation of students and implement interventions to address issues, which may arise. With the inroads that Web 2.0 and Web 3.0 technologies are making, the world of online teaching and learning are rapidly expanding, bringing about technologies, which allows for similar interactions between online academics and their students as available to their face-to-face counter parts. At the University of South Africa (UNISA), the Learning Management System (LMS) is called myUNISA and it is deployed on a SAKAI platform. In this paper, we will take a look at some of the myUNISA technologies implemented in the teaching of a first year programming course, how they are implemented and, in some cases, we will indicate how this affects the performance outcomes of students.Keywords: computer science, Distance Education Technologies, Learning Management System, face-to-face environment
Procedia PDF Downloads 4954872 A Novel Gateway Location Algorithm for Wireless Mesh Networks
Authors: G. M. Komba
Abstract:
The Internet Gateway (IGW) has extra ability than a simple Mesh Router (MR) and the responsibility to route mostly the all traffic from Mesh Clients (MCs) to the Internet backbone however, IGWs are more expensive. Choosing strategic locations for the Internet Gateways (IGWs) best location in Backbone Wireless Mesh (BWM) precarious to the Wireless Mesh Network (WMN) and the location of IGW can improve a quantity of performance related problem. In this paper, we propose a novel algorithm, namely New Gateway Location Algorithm (NGLA), which aims to achieve four objectives, decreasing the network cost effective, minimizing delay, optimizing the throughput capacity, Different from existing algorithms, the NGLA increasingly recognizes IGWs, allocates mesh routers (MRs) to identify IGWs and promises to find a feasible IGW location and install minimum as possible number of IGWs while regularly conserving the all Quality of Service (QoS) requests. Simulation results showing that the NGLA outperforms other different algorithms by comparing the number of IGWs with a large margin and it placed 40% less IGWs and 80% gain of throughput. Furthermore the NGLA is easy to implement and could be employed for BWM.Keywords: Wireless Mesh Network, Gateway Location Algorithm, Quality of Service, BWM
Procedia PDF Downloads 3704871 A Unified Approach for Digital Forensics Analysis
Authors: Ali Alshumrani, Nathan Clarke, Bogdan Ghite, Stavros Shiaeles
Abstract:
Digital forensics has become an essential tool in the investigation of cyber and computer-assisted crime. Arguably, given the prevalence of technology and the subsequent digital footprints that exist, it could have a significant role across almost all crimes. However, the variety of technology platforms (such as computers, mobiles, Closed-Circuit Television (CCTV), Internet of Things (IoT), databases, drones, cloud computing services), heterogeneity and volume of data, forensic tool capability, and the investigative cost make investigations both technically challenging and prohibitively expensive. Forensic tools also tend to be siloed into specific technologies, e.g., File System Forensic Analysis Tools (FS-FAT) and Network Forensic Analysis Tools (N-FAT), and a good deal of data sources has little to no specialist forensic tools. Increasingly it also becomes essential to compare and correlate evidence across data sources and to do so in an efficient and effective manner enabling an investigator to answer high-level questions of the data in a timely manner without having to trawl through data and perform the correlation manually. This paper proposes a Unified Forensic Analysis Tool (U-FAT), which aims to establish a common language for electronic information and permit multi-source forensic analysis. Core to this approach is the identification and development of forensic analyses that automate complex data correlations, enabling investigators to investigate cases more efficiently. The paper presents a systematic analysis of major crime categories and identifies what forensic analyses could be used. For example, in a child abduction, an investigation team might have evidence from a range of sources including computing devices (mobile phone, PC), CCTV (potentially a large number), ISP records, and mobile network cell tower data, in addition to third party databases such as the National Sex Offender registry and tax records, with the desire to auto-correlate and across sources and visualize in a cognitively effective manner. U-FAT provides a holistic, flexible, and extensible approach to providing digital forensics in technology, application, and data-agnostic manner, providing powerful and automated forensic analysis.Keywords: digital forensics, evidence correlation, heterogeneous data, forensics tool
Procedia PDF Downloads 1964870 Performance Analysis of a Hybrid Channel for Foglet Assisted Smart Asset Reporting
Authors: Hasan Farahneh
Abstract:
Smart asset management along roadsides and in deserted areas is a topic of deprived attention. We find most of the work in emergency reporting services in intelligent transportation systems (ITS) and rural areas but not much in asset reporting. Currently, available asset management mechanisms are based on scheduled maintenance and do not effectively report any emergency situation in a timely manner. This paper is the continuation of our previous work, in which we proposed the usage of Foglets and VLC link between smart vehicles and road side assets. In this paper, we propose a hybrid communication system for asset management and emergency reporting architecture for smart transportation. We incorporate Foglets along with visible light communication (VLC) and radio frequency (RF) communication. We present the channel model and parameters of a hybrid model to support an intelligent transportation system (ITS) system. Simulations show high improvement in the system performance in terms of communication range and received data. We present a comparative analysis of a hybrid ITS system.Keywords: Internet of Things, Foglets, VLC, RF, smart vehicle, roadside asset management
Procedia PDF Downloads 1334869 A Survey of Crowdsourcing Technology and Application
Authors: Qianjia Cheng, Hongquan Jiang
Abstract:
Crowdsourcing solves the problems that computers can't handle by integrating computers and the Internet. Its extensive knowledge sources, high efficiency, and high quality have made crowdsourcing attract wide attention in industry and academia in recent years. The development of online crowdsourcing platforms such as Clickworker, Amazon Mechanical Turk(Mturk) tends to mature gradually. This paper sorts out the concept of crowdsourcing, sorts out the workflow of competitive crowdsourcing, summarizes the related technologies of crowdsourcing based on workflow, quality control, cost control, and delay control, and introduces the typical crowdsourcing platform. Finally, we highlight some open problems of the current crowdsourcing and present some future research directions in this area.Keywords: application, crowdsourcing, crowdsourcing platform, system architecture
Procedia PDF Downloads 894868 Perceived and Performed E-Health Literacy: Survey and Simulated Performance Test
Authors: Efrat Neter, Esther Brainin, Orna Baron-Epel
Abstract:
Background: Connecting end-users to newly developed ICT technologies and channeling patients to new products requires an assessment of compatibility. End user’s assessment is conveyed in the concept of eHealth literacy. The study examined the association between perceived and performed eHealth literacy (EHL) in a heterogeneous age sample in Israel. Methods: Participants included 100 Israeli adults (mean age 43,SD 13.9) who were first phone interviewed and then tested on a computer simulation of health-related Internet tasks. Performed, perceived and evaluated EHL were assessed. Levels of successful completion of tasks represented EHL performance and evaluated EHL included observed motivation, confidence, and amount of help provided. Results: The skills of accessing, understanding, appraising, applying, and generating new information had a decreasing successful completion rate with increase in complexity of the task. Generating new information, though highly correlated with all other skills, was least correlated with the other skills. Perceived and performed EHL were correlated (r=.40, P=.001), while facets of performance (i.e, digital literacy and EHL) were highly correlated (r=.89, P<.001). Participants low and high in performed EHL were significantly different: low performers were older, had attained less education, used the Internet for less time and perceived themselves as less healthy. They also encountered more difficulties, required more assistance, were less confident in their conduct and exhibited less motivation than high performers. Conclusions: The association in this age-hetrogenous ample was larger than in previous age-homogenous samples. The moderate association between perceived and performed EHL indicates that the two are associated yet distinct, the latter requiring separate assessment. Features of future rapid performed EHL tools are discussed.Keywords: eHealth, health literacy, performance, simulation
Procedia PDF Downloads 2364867 Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies
Authors: Alec Wells, Aminu Bello Usman, Justin McKeown
Abstract:
The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analysed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.Keywords: direct voice input, risk, security, technology, trust
Procedia PDF Downloads 1914866 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services
Authors: A. Al Drees, A. Alahmari, R. Almuwayshir
Abstract:
The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.Keywords: e-banking, account aggregation, security, enterprise development
Procedia PDF Downloads 3274865 Analyzing of Speed Disparity in Mixed Vehicle Technologies on Horizontal Curves
Authors: Tahmina Sultana, Yasser Hassan
Abstract:
Vehicle technologies rapidly evolving due to their multifaceted advantages. Adapted different vehicle technologies like connectivity and automation on the same roads with conventional vehicles controlled by human drivers may increase speed disparity in mixed vehicle technologies. Identifying relationships between speed distribution measures of different vehicles and road geometry can be an indicator of speed disparity in mixed technologies. Previous studies proved that speed disparity measures and traffic accidents are inextricably related. Horizontal curves from three geographic areas were selected based on relevant criteria, and speed data were collected at the midpoint of the preceding tangent and starting, ending, and middle point of the curve. Multiple linear mixed effect models (LME) were developed using the instantaneous speed measures representing the speed of vehicles at different points of horizontal curves to recognize relationships between speed variance (standard deviation) and road geometry. A simulation-based framework (Monte Carlo) was introduced to check the speed disparity on horizontal curves in mixed vehicle technologies when consideration is given to the interactions among connected vehicles (CVs), autonomous vehicles (AVs), and non-connected vehicles (NCVs) on horizontal curves. The Monte Carlo method was used in the simulation to randomly sample values for the various parameters from their respective distributions. Theresults show that NCVs had higher speed variation than CVs and AVs. In addition, AVs and CVs contributed to reduce speed disparity in the mixed vehicle technologies in any penetration rates.Keywords: autonomous vehicles, connected vehicles, non-connected vehicles, speed variance
Procedia PDF Downloads 1454864 Online Teacher Professional Development: An Extension of the Unified Theory of Acceptance and Use of Technology Model
Authors: Lovemore Motsi
Abstract:
The rapid pace of technological innovation, along with a global fascination with the internet, continues to result in a dominating call to integrate internet technologies in institutions of learning. However, the pressing question remains – how can online in-service training for teachers, support quality and success in professional development programmers. The aim of this study was to examine an integrated model that extended the Unified Theory of Acceptance and Use of Technology (UTAUT) with additional constructs – including attitude and behaviour intention – adopted from the Theory of Planned Behaviour (TPB) to answer the question. Data was collected from secondary school teachers at 10 selected schools in the Tshwane South district by means of the Statistical Package for Social Scientists (SPSS v 23.0), and the collected data was analysed quantitatively. The findings are congruent with model testing under conditions of volitional usage behaviour. In this regard, the role of facilitating condition variables is insignificant as a determinant of usage behaviour. Social norm variables also proved to be a weak determinant of behavioural intentions. Findings demonstrate that effort expectancy is the key determinant of online INSET usage. Based on these findings, the variable social influence and facilitating conditions are important factors in ensuring the acceptance of online INSET among teachers in selected secondary schools in the Tshwane South district.Keywords: unified theory of acceptance and use of technology (UTAUT), teacher professional development, secondary schools, online INSET
Procedia PDF Downloads 2154863 English is Not Going to the Dog (E): Rising Fame of Doge Speak
Abstract:
Doge speak is an Internet variety with its own linguistic patterns and regularities. Doge meme contains some unconventional grammar rules which make it recognizable. With the use of doge corpus, certain characteristics of doge speak as well as reasons for its popularity are analyzed. The study concludes that doge memes can be applied to a variety of situations, for instance advertising or fashion industry. Doge users play with language and create surprising linguistic combinations. To sum up, doge meme making is a multiperson task. Doge users predict and comment on the world with the use of doge memes.Keywords: dogespeak, internet language, language play, meme
Procedia PDF Downloads 4784862 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures
Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius
Abstract:
The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal
Procedia PDF Downloads 4874861 Influencing Factors to Mandatory versus Non-Mandatory E-Government Services Adoption in India: An Empirical Study
Authors: Rajiv Kumar, Amit Sachan, Arindam Mukherjee
Abstract:
Government agencies around the world, including India, are incorporating digital technologies and processes into their day-to-day operations to become more efficient. Despite low internet penetration (around 34.8% of total population) in India, Government of India has made some public services mandatory to access online (e.g. passport, tax filing).This is insisting citizens to access mandatory public services online. However, due to digital divide, all citizens do not have equal access to internet. In light of this, it is an interesting topic to explore how citizens are able to access mandatory online public services. It is important to understand how citizens are adopting these mandatory e-government services and how the adoption behavior of these mandatory e-government services is different or similar to adoption behavior of non-mandatory e-government services. The purpose of this research is to investigate the factors that influence adoption of mandatory and non-mandatory e-government services in India. A quantitative technique is employed in this study. A conceptual model has been proposed by integrating the influencing factors to adopt e-government services from previous studies. The proposed conceptual model highlights a comprehensive set of potential factors influencing the adoption of e-government services. The proposed model has been validated by keeping in view the local context of Indian society. Online and paper based survey was administered, collected data was analyzed and results have been discussed. A total of 463 valid responses were received and further the responses were analyzed. The research reveals that the influencing factors to adopt e-government services are not same for both mandatory and non-mandatory e-government services. There are some factors that influence adoption of both mandatory and non-mandatory e-government services but there are some which are relevant for either of mandatory and non-mandatory e-government services. The research findings may help government or concerned agencies in successfully implementing e-government services.Keywords: adoption, e-government, India, mandatory, non-mandatory
Procedia PDF Downloads 3184860 Time Management in the Public Sector in Nigeria
Authors: Sunny Ewankhiwimen Aigbomian
Abstract:
Time, is a scarce resource and in everything we do, time is required to accomplish any given task. The need for this presentation is predicated on the way majority of Nigerian especially in the public sector operators see “Time Management”. Time as resources cannot be regained if lost or managed badly. As a significant aspect of human life it should be handled with diligence and utmost seriousness if the public sector is to function as a coordinated entity. In our homes, private life and offices, we schedule different things to ensure that some things do not go the unexpected. When it comes to service delivery on the part of government, it ought to be more serious because government is all about effect and efficient service delivery and “Time” is a significant variable necessary to successful accomplishment. The need for Nigerian government to re-examine time management in her public sector with a view of repositioning the sector to be able to compete well with other public sectors in the world. The peculiarity of Time management in Public Sector in Nigerian context as examined and some useful recommendations of immerse assistance proffered.Keywords: Nigeria, public sector, time management, task
Procedia PDF Downloads 994859 A Deep Learning-Based Pedestrian Trajectory Prediction Algorithm
Authors: Haozhe Xiang
Abstract:
With the rise of the Internet of Things era, intelligent products are gradually integrating into people's lives. Pedestrian trajectory prediction has become a key issue, which is crucial for the motion path planning of intelligent agents such as autonomous vehicles, robots, and drones. In the current technological context, deep learning technology is becoming increasingly sophisticated and gradually replacing traditional models. The pedestrian trajectory prediction algorithm combining neural networks and attention mechanisms has significantly improved prediction accuracy. Based on in-depth research on deep learning and pedestrian trajectory prediction algorithms, this article focuses on physical environment modeling and learning of historical trajectory time dependence. At the same time, social interaction between pedestrians and scene interaction between pedestrians and the environment were handled. An improved pedestrian trajectory prediction algorithm is proposed by analyzing the existing model architecture. With the help of these improvements, acceptable predicted trajectories were successfully obtained. Experiments on public datasets have demonstrated the algorithm's effectiveness and achieved acceptable results.Keywords: deep learning, graph convolutional network, attention mechanism, LSTM
Procedia PDF Downloads 704858 Awareness and Utilization of E-Learning Technologies in Teaching and Learning of Human Kinetics and Health Education Courses in Nigeria Universities
Authors: Ibrahim Laro ABUBAKAR
Abstract:
The study examined the Availability and Utilization of E-Learning Technologies in Teaching of Human Kinetics and Health Education courses in Nigerian Universities, specifically, Universities in Kwara State. Two purposes were formulated to guide the study from which two research questions and two hypotheses were raised. The descriptive research design was used in the research. Three Hundred respondents (100 Lecturers and 200 Students) made up the population for the study. There was no sampling, as the population of the study was not much. A structured questionnaire tagged ‘Availability and Utilization of E-Learning Technologies in Teaching and Learning Questionnaire’ (AUETTLQ) was used for data collection. The questionnaire was subjected to face and content validation, and it was equally pilot tested. The validation yielded a reliability coefficient of 0.78. The data collected from the study were statistically analyzed using frequencies and percentage count for personal data of the respondents, mean and standard deviation to answer the research questions. The null hypotheses were tested at 0.05 level of significance using the independent t-test. One among other findings of this study showed that lecturers and Student are aware of synchronous e-learning technologies in teaching and learning of Human Kinetics and Health Education but often utilize the synchronous e-learning technologies. It was recommended among others that lecturers and Students should be sensitized through seminars and workshops on the need to maximally utilize available e-learning technologies in teaching and learning of Human Kinetics and Health Education courses in Universities.Keywords: awareness, utilization, E-Learning, technologies, human kinetics synchronous
Procedia PDF Downloads 1194857 Improvement of Protein Extraction From Shrimp by Product Used for Electrospinning by Applying Emerging Technologies
Authors: Mario Pérez-Won, Vilbett Briones L., Guido Trautmann, María José Bugueño, Gipsy Tabilo-Munizaga, Luis Gonzalez-Cavieres
Abstract:
The fishing industry generates a significant amount of shrimp byproducts, which often result in environmental contamination. Protein extraction from these by-products is a potential solution to minimize waste and revalue the by-products. To improve the extraction of proteins (by chemical method) from shrimp (Pleuroncodes monodon) by-products, the emerging technologies of ohmic heating (OH), microwaves (MW) and pulsed electric fields (PEF) were used. The results show that microwaves, electrical pulses, and ohmic heating improved performance by 28.19%, 19.25%, and 3.65%, respectively. Furthermore, conformational changes were studied by DSC and FTIR. Subsequently, the use of these proteins in electrospinning technology was evaluated. In conclusion, this study demonstrates that the application of emerging technologies, can significantly improve the extraction yield of proteins from shrimp by-products.Keywords: electrospinning, emerging technologies, improving extraction, shrimp by-products
Procedia PDF Downloads 764856 A Digital Twin Approach to Support Real-time Situational Awareness and Intelligent Cyber-physical Control in Energy Smart Buildings
Authors: Haowen Xu, Xiaobing Liu, Jin Dong, Jianming Lian
Abstract:
Emerging smart buildings often employ cyberinfrastructure, cyber-physical systems, and Internet of Things (IoT) technologies to increase the automation and responsiveness of building operations for better energy efficiency and lower carbon emission. These operations include the control of Heating, Ventilation, and Air Conditioning (HVAC) and lighting systems, which are often considered a major source of energy consumption in both commercial and residential buildings. Developing energy-saving control models for optimizing HVAC operations usually requires the collection of high-quality instrumental data from iterations of in-situ building experiments, which can be time-consuming and labor-intensive. This abstract describes a digital twin approach to automate building energy experiments for optimizing HVAC operations through the design and development of an adaptive web-based platform. The platform is created to enable (a) automated data acquisition from a variety of IoT-connected HVAC instruments, (b) real-time situational awareness through domain-based visualizations, (c) adaption of HVAC optimization algorithms based on experimental data, (d) sharing of experimental data and model predictive controls through web services, and (e) cyber-physical control of individual instruments in the HVAC system using outputs from different optimization algorithms. Through the digital twin approach, we aim to replicate a real-world building and its HVAC systems in an online computing environment to automate the development of building-specific model predictive controls and collaborative experiments in buildings located in different climate zones in the United States. We present two case studies to demonstrate our platform’s capability for real-time situational awareness and cyber-physical control of the HVAC in the flexible research platforms within the Oak Ridge National Laboratory (ORNL) main campus. Our platform is developed using adaptive and flexible architecture design, rendering the platform generalizable and extendable to support HVAC optimization experiments in different types of buildings across the nation.Keywords: energy-saving buildings, digital twins, HVAC, cyber-physical system, BIM
Procedia PDF Downloads 1104855 An Analysis of Brand-Building Characteristics in the Iran Airline Websites
Authors: Pedram Behyar, Zahra Bayat
Abstract:
The internet and web are changing ways of “far reaching scope and potential for transformation of the marketing functions”. The web is developing in a faster rate than any previous new communication medium. The website of destination has become a crucial branding channel, that is why all businesses are changing their way to communicate with their customers to encounter their needs and wants in better ways. Website provides numerous opportunities for businesses to strengthen their relationship with their customers. One of these opportunities is website component that enables internet users to make two-way communication with the businesses.Keywords: marketing communication, brand image, usability, privacy and security, personalization and customization, responsiveness, customer online web experience
Procedia PDF Downloads 5034854 Monitoring Cellular Networks Performance Using Crowd Sourced IoT System: My Operator Coverage (MOC)
Authors: Bassem Boshra Thabet, Mohammed Ibrahim Elsabagh, Mohammad Adly Talaat
Abstract:
The number of cellular mobile phone users has increased enormously worldwide over the last two decades. Consequently, the monitoring of the performance of the Mobile Network Operators (MNOs) in terms of network coverage and broadband signal strength has become vital for both of the MNOs and regulators. This monitoring helps telecommunications operators and regulators keeping the market playing fair and most beneficial for users. However, the adopted methodologies to facilitate this continuous monitoring process are still problematic regarding cost, effort, and reliability. This paper introduces My Operator Coverage (MOC) system that is using Internet of Things (IoT) concepts and tools to monitor the MNOs performance using a crowd-sourced real-time methodology. MOC produces robust and reliable geographical maps for the user-perceived quality of the MNOs performance. MOC is also meant to enrich the telecommunications regulators with concrete, and up-to-date information that allows for adequate mobile market management strategies as well as appropriate decision making.Keywords: mobile performance monitoring, crowd-sourced applications, mobile broadband performance, cellular networks monitoring
Procedia PDF Downloads 3964853 Factors Affecting eHealth Literacy among Nursing Students in Jordan
Authors: Laila Habiballah, Ahmad Tubaishat
Abstract:
Background: with the development of information and communication technology, using the internet as a source to obtain health information is increasing. Nursing students as future health care providers should have the skills of locating, evaluating and using online health information. This will enable them to help their patients and families to make informed decisions. Aim: this study has a two-fold aim. The first is to assess the eHealth literacy among nursing students in Jordan. The second aim is to explore the factors that have an effect on the eHealth literacy. Methods: this is a descriptive cross-sectional survey that conducted in two universities in Jordan; public and private one. A number of 541 students from both universities were completed the eHEALS scale, which is an instrument designed to measure the eHealth literacy. Some additional personal and demographical variable were collected to explore its effect on eHealth literacy. Results: Students have a high perceived level of e-Health literacy (M=3.62, SD=0.58). They are aware of the available online health resources, know how to search, locate, and use these resources. But, they do not have the skills to evaluate these resources and cannot differentiate between the high and low-quality resources. The results showed as well that type of university, type of students' admission, academic level, students' skills of using the internet, and the perception of usefulness and importance of internet have an effect on the eHealth literacy. While the age, gender, GPA, and the frequency of using the internet was no significant factors. Conclusion: This study represents a baseline reference for the eHealth literacy in Jordan. Students have some skills of eHealth literacy and other skills need to be improved. Nursing educators and administrators should integrate and incorporate the skills of eHealth literacy in the curriculum.Keywords: eHealth, literacy, nursing, students, Jordan
Procedia PDF Downloads 3954852 Effective Microorganisms as a Sustainable Environment Product and Their Application: A Study in Pakistan
Authors: Jaffar Hussain, Farman Ali Shah
Abstract:
As we know that Pakistan is the developing country so it adopts new technologies for progress. In last three decays, some new technologies were introduced in the world in which Effective Microorganism was one of them. Microorganisms are one of the most power full living forces on earth. Originally, EM was developed as an odor control, farm, and animal health, human health many industrial treatments. Effective Microorganism is an organic fertilizer that contains a mixture of co-existing valuable microorganism composed from the environment. There are vast application of the EM in the world in which the researchers are explained in literature .In Pakistan work on EM technologies are under process, researcher are doing work to make them most valuable. At that time the application of EM are in agriculture, water treatment, to increase Cement strength, improving saline soil etc. Effective microorganisms are environmentally friendly , not-naturally organized, not chemically synthesized, not dangerous and not pathogenic.Keywords: developing country, technologies, effective microorganism, researchers, Pakistan, agriculture
Procedia PDF Downloads 4844851 General Awareness of Teenagers in Information Security
Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek
Abstract:
The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system
Procedia PDF Downloads 3904850 The Application of AI in Developing Assistive Technologies for Non-Verbal Individuals with Autism
Authors: Ferah Tesfaye Admasu
Abstract:
Autism Spectrum Disorder (ASD) often presents significant communication challenges, particularly for non-verbal individuals who struggle to express their needs and emotions effectively. Assistive technologies (AT) have emerged as vital tools in enhancing communication abilities for this population. Recent advancements in artificial intelligence (AI) hold the potential to revolutionize the design and functionality of these technologies. This study explores the application of AI in developing intelligent, adaptive, and user-centered assistive technologies for non-verbal individuals with autism. Through a review of current AI-driven tools, including speech-generating devices, predictive text systems, and emotion-recognition software, this research investigates how AI can bridge communication gaps, improve engagement, and support independence. Machine learning algorithms, natural language processing (NLP), and facial recognition technologies are examined as core components in creating more personalized and responsive communication aids. The study also discusses the challenges and ethical considerations involved in deploying AI-based AT, such as data privacy and the risk of over-reliance on technology. Findings suggest that integrating AI into assistive technologies can significantly enhance the quality of life for non-verbal individuals with autism, providing them with greater opportunities for social interaction and participation in daily activities. However, continued research and development are needed to ensure these technologies are accessible, affordable, and culturally sensitive.Keywords: artificial intelligence, autism spectrum disorder, non-verbal communication, assistive technology, machine learning
Procedia PDF Downloads 194849 Secure Optimized Ingress Filtering in Future Internet Communication
Authors: Bander Alzahrani, Mohammed Alreshoodi
Abstract:
Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.Keywords: forwarding identifier, filling factor, information centric network, topology manager
Procedia PDF Downloads 1544848 Reimagining the Potential of Street Lighting Infrastructure in Nairobi City
Authors: Clifford Otieno Ochieng, Nsenda Lukumwena
Abstract:
Cities worldwide and most notably those in the global south, including Nairobi City are experiencing accelerated population growth and urban sprawl, accompanied with multiple socioeconomic challenges’ which in turn increase the pressure on already limited infrastructure such as public lighting and on limited financial resources. Based on this premise, through reimaging the value of street lighting infrastructure, the study attempts to highlight the affordance and affordability of streetlights and suggests them as a tool to optimally address limited financial resources that characterize cities in the global south. As a methodology, the paper reviews and analyzes literature available online including Nairobi city budgets; reports from Kenya Power, World Health Organization and United Nations; and articles on enterprise level Internet of Things (IoT) solutions. In conclusion, this study illustrates that streetlights can go well beyond their traditional roles of illuminating cities at night. They can be as suggested in this paper charging stations, communication network terminals and disease prevention nodes.Keywords: affordance, Nairobi, developing economies, IoT, smart street lights, smart cities
Procedia PDF Downloads 1854847 Compliance and Assessment Process of Information Technology in Accounting, in Turkey
Authors: Kocakaya Eda, Argun Doğan
Abstract:
This study analyzed the present state of information technology in the field of accounting by bibliometric analysis of scientific studies on the impact on the transformation of e-billing and tax managementin Turkey. With comparative bibliometric analysis, the innovation and positive effects of the process that changed with e-transformation in the field of accounting with e-transformation in businesses and the information technologies used in accounting and tax management were analyzed comparatively. By evaluating the data obtained as a result of these analyzes, suggestions on the use of information technologies in accounting and tax management and the positive and negative effects of e-transformation on the analyzed activities of the enterprises were emphasized. With the e-transformation, which will be realized with the most efficient use of information technologies in Turkey. The synergy and efficiency of IT technology developments in avcoounting and finance should be revealed in the light of scientific data, from the smallest business to the largest economic enterprises.Keywords: information technologies, E-invoice, E-Tax management, E-transformation, accounting programs
Procedia PDF Downloads 1194846 Classifying the Role of Technology in Technology Development
Authors: Hyun Joung No, Chul Lee
Abstract:
Even though technology evolves and develops through interaction with each other, not all technologies contribute to the development of technology equally. While some technologies play a central role in developing technology, others play a secondary role. The role of the technological components can be classified as core or non-core (peripheral) technology. The core technologies have a considerable knowledge interaction with other technological components while the non-core technologies barely interact with others within the system. This study introduces the concept that classifies the technological components into core or peripheral technology according to their role and importance in the technology field. The study adapted the social network analysis to examine the relationship between technological components. Using a continuous core-periphery analysis, it identifies the technological network structure and classifies the core and peripheral nodes. Based on their knowledge inflow/outflow direction and their dependence/influence on core technologies, the technological clusters are classified into four categories: (1) high dependence and high influence on core technology, (2) high dependence and low influence on core technology, (3) low dependence and high influence on core technology, and (4) low dependence and low influence on core technology.Keywords: core technology, periphery technology, technological components, technological role
Procedia PDF Downloads 537