Search results for: internet of things (IOT)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2085

Search results for: internet of things (IOT)

1515 Digi-Buddy: A Smart Cane with Artificial Intelligence and Real-Time Assistance

Authors: Amaladhithyan Krishnamoorthy, Ruvaitha Banu

Abstract:

Vision is considered as the most important sense in humans, without which leading a normal can be often difficult. There are many existing smart canes for visually impaired with obstacle detection using ultrasonic transducer to help them navigate. Though the basic smart cane increases the safety of the users, it does not help in filling the void of visual loss. This paper introduces the concept of Digi-Buddy which is an evolved smart cane for visually impaired. The cane consists for several modules, apart from the basic obstacle detection features; the Digi-Buddy assists the user by capturing video/images and streams them to the server using a wide-angled camera, which then detects the objects using Deep Convolutional Neural Network. In addition to determining what the particular image/object is, the distance of the object is assessed by the ultrasonic transducer. The sound generation application, modelled with the help of Natural Language Processing is used to convert the processed images/object into audio. The object detected is signified by its name which is transmitted to the user with the help of Bluetooth hear phones. The object detection is extended to facial recognition which maps the faces of the person the user meets in the database of face images and alerts the user about the person. One of other crucial function consists of an automatic-intimation-alarm which is triggered when the user is in an emergency. If the user recovers within a set time, a button is provisioned in the cane to stop the alarm. Else an automatic intimation is sent to friends and family about the whereabouts of the user using GPS. In addition to safety and security by the existing smart canes, the proposed concept devices to be implemented as a prototype helping visually-impaired visualize their surroundings through audio more in an amicable way.

Keywords: artificial intelligence, facial recognition, natural language processing, internet of things

Procedia PDF Downloads 329
1514 Parents' Motivating Factors for Their Deaf and Mute Children to Participate in Physical and Recreational Activities

Authors: Ruben L. Tagare, Jr

Abstract:

This study was conducted to determine the parents’ motivating factors for their deaf and mute children to participate in physical and recreational activities. Data were collected from the 17 parents of the deaf and mute children using a specifically designed survey questionnaire as the primary instrument used in the study. Data analysis and interpretation were done with the aid of descriptive statistics, such as frequency, percentage, weighted mean and multiple responses. Most of the respondents were female with a mean average age of 38 years old. The average age of their children was 10 years old. In terms of monthly income, the respondents had an average monthly income of PhP 13,945. Furthermore, most of the respondents lived in the urban area and were all Catholic by faith or religion. As to the factors that parents used to motivate their deaf and mute children to engage in physical and recreational activities, these included the followings: First; to make my child experience and explore more meaningful things through physical and recreational activities; second; to gain other’s respect; third; to build friendship and interact with his peers; fourth; to experience the feeling of belongingness; and fifth: to learn and discover new things. On the other hand, the least chosen factors were: first; to help achieve and maintain a healthy weight; second; to reduce fats and lowering blood pressure; third; to improve balance, coordination and strength; fourth; to improve posture; and fifth; to assist the child in the development of gross motor and fine motor skills. Based on the findings of the study, it is hereby recommended that since the first factor is 'to make my child experience and explore more meaningful things through physical and recreational activities' and the other top factors are more on social aspect, the school should design extra-curricular activities such as theatrical play and other similar activities that the students will find interesting while the parents will be more motivated to engage their children into physical and recreational activities. Also, since the least chosen factors are more on physical aspect, the school should organize or conduct a seminar for the parents to be aware of the benefits of participating in physical and recreational activities for their deaf and mute children. They can also conduct an information campaign to encourage the other parents of deaf and mute children, whom they keep only inside their home to enroll in the school and let their children be exposed to the natural world. Considering that parents are the primary motivators that can best help their children become more interested in physical and recreational activities for their own development, the school should always remain motivated by creating activities for the deaf and mute children with their parents. The study also recommends conducting further study on the level of knowledge/understanding of the parents on the benefits that can be derived from participating in physical and recreational activities.

Keywords: deaf and mute, participation, physical and recreational activities, adaptive PE

Procedia PDF Downloads 168
1513 Developing a Sustainable Business Model for Platform-Based Applications in Small and Medium-Sized Enterprise Sawmills: A Systematic Approach

Authors: Franziska Mais, Till Gramberg

Abstract:

The paper presents the development of a sustainable business model for a platform-based application tailored for sawing companies in small and medium-sized enterprises (SMEs). The focus is on the integration of sustainability principles into the design of the business model to ensure a technologically advanced, legally sound, and economically efficient solution. Easy2IoT is a research project that aims to enable companies in the prefabrication sheet metal and sheet metal processing industry to enter the Industrial Internet of Things (IIoT) with a low-threshold and cost-effective approach. The methodological approach of Easy2IoT includes an in-depth requirements analysis and customer interviews with stakeholders along the value chain. Based on these insights, actions, requirements, and potential solutions for smart services are derived. The structuring of the business ecosystem within the application plays a central role, whereby the roles of the partners, the management of the IT infrastructure and services, as well as the design of a sustainable operator model are considered. The business model is developed using the value proposition canvas, whereby a detailed analysis of the requirements for the business model is carried out, taking sustainability into account. This includes coordination with the business model patterns, according to Gassmann, and integration into a business model canvas for the Easy2IoT product. Potential obstacles and problems are identified and evaluated in order to formulate a comprehensive and sustainable business model. In addition, sustainable payment models and distribution channels are developed. In summary, the article offers a well-founded insight into the systematic development of a sustainable business model for platform-based applications in SME sawmills, with a particular focus on the synergy of ecological responsibility and economic efficiency.

Keywords: business model, sustainable business model, IIoT, IIoT-platform, industrie 4.0, big data

Procedia PDF Downloads 45
1512 The Influence of Negative Online Word of Mouth on Consumer's Online Purchasing Intention in Sri Lanka through Virtual Snowball Sampling Method: A Special Reference from Northern Province

Authors: Sutharsini Jesuthasan, N. Umakanth

Abstract:

Presently the impact of electronic word of mouth on consumer’s purchasing intentions very popular one for a long time period. Even though now this E-WOM got a new evolution through social media. Before this new concept, general people were able to speak with any people on the internet. But likely social media enable people to talk with colleagues, friends and other people on the internet. Meanwhile, this new path way of E-WOM might be more powerful in terms of confusing purchase intention. And negative side of E-WOM very important in this competitive era. So, this study elaborates the negative E-WOM within the context of social media such as face book. And especially this study identifies the influence of negative E-WOM in social media on consumer’s purchase intention. Virtual snowball sampling method was used by researcher to identify the hidden population. Finally, spss 20.0 also used for data analysis purpose. And conclusion and recommendations are given based on the findings. And this research also will support to both parties such as researcher and participants.

Keywords: word of mouth, social media, purchase intention, electronic word of mouth

Procedia PDF Downloads 126
1511 Improving Fingerprinting-Based Localization System Using Generative Artificial Intelligence

Authors: Getaneh Berie Tarekegn

Abstract:

A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 39 cm, and more than 90% of the errors are less than 82 cm. That is, numerical results proved that, in comparison to traditional methods, the proposed SRCLoc method can significantly improve positioning performance and reduce radio map construction costs.

Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine

Procedia PDF Downloads 47
1510 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim

Abstract:

As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).

Keywords: intrusion detection, supervised learning, traffic classification, computer networks

Procedia PDF Downloads 327
1509 Analyzing the Plausible Alternatives in Contracting the Societal Fissure Caused by Digital Divide in Sri Lanka

Authors: Manuela Nayantara Jeyaraj

Abstract:

'Digital Divide' is a concept that has existed in this paradigm ever since the discovery of the first-generation technologies. Before the turn of the century, it was basically used to describe the gap between those with telephone communication access and those without it. At present, it is plainly descriptive in itself to illustrate the cavity among those with Internet access and those without. Though the concept of digital divide has been merely lying in sight for as long as time itself, the friction it caused has not yet been fully realized to solve major crisis situations. Unlike well-developed countries, Sri Lanka is still in the verge of moving farther away from a developing country in the race towards reaching a developed state. Access to technological resources varies from region to region, even within the island itself, with one region having a considerable percentage of its community exposed to the Internet and its related technologies, and the other unaware of such. Thus, this paper intends to analyze the roots for the still-extant gap instigated based on the concept of ‘Digital Divide’ and explores the plausible potentials that could be brought about by narrowing this prevailing percentage among the population, specifically entrenching the advantages reaped towards an economic augmentation and culture or lifestyle revolution on the path towards development.

Keywords: communication, digital divide, society, Sri Lanka

Procedia PDF Downloads 209
1508 Investigating the Trends in Tourism and Hospitality Industry in Nigeria at Centenary

Authors: Pius Agbebi Alaba

Abstract:

The study emphasized on the effects of contemporary and prospect trends on the development of Hospitality and Tourism in Nigeria. Specifically, the study examined globalization, safety and security, diversity, service, technology, demographic changes and price–value as contemporary trends while prospect trends such as green and Eco-lodgings, Development of mega hotels, Boutique hotels, Intelligent hotels with advanced technology using the guest’s virtual fingerprint in order to perform all the operations, increasing employee salaries in order retain the existing Staff, More emphasis on the internet and technology, Guests’ virtual and physical social network were equally examined. The methodology for the study involved review of existing related study, books, journal and internet. The findings emanated from the exercise showed clearly that the impact of both trends on the development of Hospitality and Tourism in Nigeria would bring about rapid positive transformation of her socio-economic, political and cultural environment. The implication of the study is that it will prepare both private and corporate individuals in hospitality and tourism business for the challenges inherent in both trends.

Keywords: hospitality and tourism, Nigeria's centenary, trends, implications

Procedia PDF Downloads 313
1507 Females’ Usage Patterns of Information and Communication Technologies (ICTs) in the Vhembe District, South Africa

Authors: Fulufhelo Oscar Maphiri-Makananise

Abstract:

The main purpose of this paper is to explore and provide substantiated evidence based on the usage patterns of Information and Communication Technologies (ICTs) by females in the Vhembe District in Limpopo-Province, South Africa. The study presents a broader picture and understanding about the usage of ICTs from female’s perspective. The significance of this study stems from the need to discover the role, relevance and usage patterns of ICTs such as smartphones, computers, laptops, and iPods, internet and social networking sites among females following the trends of new media technologies in the society. The main objective of the study was to investigate the usability and accessibility of ICTs to empower the Vhembe District females in South Africa. The study used quantitative research method together with elements of qualitative research to determine the major ideas, perceptions and usage patterns of ICTs by females in the District. Data collection involved structured and self-administered questionnaire with both closed-ended and open-ended questions. Two groups of respondents participated in this study. Media Studies female students (n=50) at the University of Venda provided their ideas and perceptions about the usefulness and usage patterns of ICTs such as smartphones, internet and computers at the university level, while the second group were (n=50) Makhado comprehensive school learners who also provided their perceptions and ideas about the use of ICTs at the high school level. Also, the study provides a more balanced, accurate and rational results on the pertinent issues that concern the use of ICTs by females in the Vhembe District. The researcher also believes that the findings of the study are useful as a guideline and model for ICT intervention that work as an empowerment to women in South Africa. The study showed that the main purpose of using ICTs by females was to search information for writing assignments, conducting research, dating, exchanging ideas and networking with friends and relatives that are also members of social networking sites and maintaining existing friends in real life. The study further revealed that most females were using ICTs for social purposes and accessing the internet than entertaining themselves. The finding also indicated a high number of females that used ICTs for e-learning (62%) and social purposes (85%). Moreover, the study centred on providing strong insightful information on the females’ usage patterns and their perceptions of ICTs in the Vhembe district of Limpopo province.

Keywords: female users, information and communication technologies, internet, usage patterns

Procedia PDF Downloads 195
1506 GAILoc: Improving Fingerprinting-Based Localization System Using Generative Artificial Intelligence

Authors: Getaneh Berie Tarekegn

Abstract:

A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 39 cm, and more than 90% of the errors are less than 82 cm. That is, numerical results proved that, in comparison to traditional methods, the proposed SRCLoc method can significantly improve positioning performance and reduce radio map construction costs.

Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine

Procedia PDF Downloads 47
1505 The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law

Authors: Sara Vora (Hoxha)

Abstract:

Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age.

Keywords: European international private law, personality rights, internet, jurisdiction, cross-border disputes, data protection

Procedia PDF Downloads 57
1504 Comparative Analysis of Predictive Models for Customer Churn Prediction in the Telecommunication Industry

Authors: Deepika Christopher, Garima Anand

Abstract:

To determine the best model for churn prediction in the telecom industry, this paper compares 11 machine learning algorithms, namely Logistic Regression, Support Vector Machine, Random Forest, Decision Tree, XGBoost, LightGBM, Cat Boost, AdaBoost, Extra Trees, Deep Neural Network, and Hybrid Model (MLPClassifier). It also aims to pinpoint the top three factors that lead to customer churn and conducts customer segmentation to identify vulnerable groups. According to the data, the Logistic Regression model performs the best, with an F1 score of 0.6215, 81.76% accuracy, 68.95% precision, and 56.57% recall. The top three attributes that cause churn are found to be tenure, Internet Service Fiber optic, and Internet Service DSL; conversely, the top three models in this article that perform the best are Logistic Regression, Deep Neural Network, and AdaBoost. The K means algorithm is applied to establish and analyze four different customer clusters. This study has effectively identified customers that are at risk of churn and may be utilized to develop and execute strategies that lower customer attrition.

Keywords: attrition, retention, predictive modeling, customer segmentation, telecommunications

Procedia PDF Downloads 33
1503 New Media and Deliberative Democracy in Malaysia

Authors: Rosyidah Muhamad

Abstract:

This article seeks to access the democratic implication of new media in Malaysia through three important key points of deliberative democracy; information access, rational critical deliberation and mechanism of vertical accountability. The article suggests that the Internet is expanding political opportunity in which contributed to a more diverse discourse. It is depending on how users used it; for democratic or non-democratic outcome. The Internet has been a key instrument in exposing human rights abuse, corruption, organizing protests and mobilizing voters during election campaigns. It therefore pushes for transparency and accountability and thus increasing the rise of deliberative democracy in Malaysia. While there are some elements of an emerging deliberative politics, it is also clear that the Malaysian online political discourse is acting as moderate forms of discourse as the sphere increasingly exist in a chaotic and diversified online discourse. Yet, the online sphere still allows citizens to discuss public affairs. When the public opinion is strong enough, it can influence public policies to ensure that they reflect the public interest. It is suggesting an increased space of negotiation and contestation among the previously muzzled offline situation. This is a big step in the progress democracy in Malaysia.

Keywords: Keywords: New Media, democratization, deliberative democracy, Malaysian politics

Procedia PDF Downloads 280
1502 Mastering Digital Transformation with the Strategy Tandem Innovation Inside-Out/Outside-In: An Approach to Drive New Business Models, Services and Products in the Digital Age

Authors: S. N. Susenburger, D. Boecker

Abstract:

In the age of Volatility, Uncertainty, Complexity, and Ambiguity (VUCA), where digital transformation is challenging long standing traditional hardware and manufacturing companies, innovation needs a different methodology, strategy, mindset, and culture. What used to be a mindset of scaling per quantity is now shifting to orchestrating ecosystems, platform business models and service bundles. While large corporations are trying to mimic the nimbleness and versatile mindset of startups in the core of their digital strategies, they’re at the frontier of facing one of the largest organizational and cultural changes in history. This paper elaborates on how a manufacturing giant transformed its Corporate Information Technology (IT) to enable digital and Internet of Things (IoT) business while establishing the mindset and the approaches of the Innovation Inside-Out/Outside-In Strategy. It gives insights into the core elements of an innovation culture and the tactics and methodologies leveraged to support the cultural shift and transformation into an IoT company. This paper also outlines the core elements for an innovation culture and how the persona 'Connected Engineer' thrives in the digital innovation environment. Further, it explores how tapping domain-focused ecosystems in vibrant innovative cities can be used as a part of the strategy to facilitate partner co-innovation. Therefore, findings from several use cases, observations and surveys led to conclusion for the strategy tandem of Innovation Inside-Out/Outside-In. The findings indicate that it's crucial in which phases and maturity level the Innovation Inside-Out/Outside-In Strategy is activated: cultural aspects of the business and the regional ecosystem need to be considered, as well as cultural readiness from management and active contributors. The 'not invented here syndrome' is a barrier of large corporations that need to be addressed and managed to successfully drive partnerships, as well as embracing co-innovation and a mindset shifting away from physical products toward new business models, services, and IoT platforms. This paper elaborates on various methodologies and approaches tested in different countries and cultures, including the U.S., Brazil, Mexico, and Germany.

Keywords: innovation management, innovation culture, innovation methodologies, digital transformation

Procedia PDF Downloads 116
1501 Performance Analysis of Microelectromechanical Systems-Based Piezoelectric Energy Harvester

Authors: Sanket S. Jugade, Swapneel U. Naphade, Satyabodh M. Kulkarni

Abstract:

Microscale energy harvesters can be used to convert ambient mechanical vibrations to electrical energy. Such devices have great applications in low powered electronics in remote environments like powering wireless sensor nodes of Internet of Things, lightings on highways or in ships, etc. In this paper, a Microelectromechanical systems (MEMS) based energy harvester has been modeled using Analytical and Finite Element Method (FEM). The device consists of a microcantilever with a proof mass attached to its free end and a Polyvinylidene Fluoride (PVDF) piezoelectric thin film deposited on the surface of microcantilever in a unimorph or bimorph configuration. For the analytical method, the energy harvester was modeled as an equivalent electrical system in SIMULINK. The Finite element model was developed and analyzed using the commercial package COMSOL Multiphysics. The modal analysis was performed first to find the fundamental natural frequency and its variation with geometrical parameters of the system. Then the harmonic analysis was performed to find the input mechanical power, output electrical voltage, and power for a range of excitation frequencies and base acceleration values. The variation of output power with load resistance, PVDF film thickness, and damping values was also found out. The results from FEM were then validated with that of the analytical model. Finally, the performance of the device was optimized with respect to various electro-mechanical parameters. For a unimorph configuration consisting of single crystal silicon microcantilever of dimensions 8mm×2mm×80µm and proof mass of 9.32 mg with optimal values of the thickness of PVDF film and load resistance as 225 µm and 20 MΩ respectively, the maximum electrical power generated for base excitation of 0.2g at 630 Hz is 0.9 µW.

Keywords: bimorph, energy harvester, FEM, harmonic analysis, MEMS, PVDF, unimorph

Procedia PDF Downloads 166
1500 The Return of the Rejected Kings: A Comparative Study of Governance and Procedures of Standards Development Organizations under the Theory of Private Ordering

Authors: Olia Kanevskaia

Abstract:

Standardization has been in the limelight of numerous academic studies. Typically described as ‘any set of technical specifications that either provides or is intended to provide a common design for a product or process’, standards do not only set quality benchmarks for products and services, but also spur competition and innovation, resulting in advantages for manufacturers and consumers. Their contribution to globalization and technology advancement is especially crucial in the Information and Communication Technology (ICT) and telecommunications sector, which is also characterized by a weaker state-regulation and expert-based rule-making. Most of the standards developed in that area are interoperability standards, which allow technological devices to establish ‘invisible communications’ and to ensure their compatibility and proper functioning. This type of standard supports a large share of our daily activities, ranging from traffic coordination by traffic lights to the connection to Wi-Fi networks, transmission of data via Bluetooth or USB and building the network architecture for the Internet of Things (IoT). A large share of ICT standards is developed in the specialized voluntary platforms, commonly referred to as Standards Development Organizations (SDOs), which gather experts from various industry sectors, private enterprises, governmental agencies and academia. The institutional architecture of these bodies can vary from semi-public bodies, such as European Telecommunications Standards Institute (ETSI), to industry-driven consortia, such as the Internet Engineering Task Force (IETF). The past decades witnessed a significant shift of standard setting to those institutions: while operating independently from the states regulation, they offer a rather informal setting, which enables fast-paced standardization and places technical supremacy and flexibility of standards above other considerations. Although technical norms and specifications developed by such nongovernmental platforms are not binding, they appear to create significant regulatory impact. In the United States (US), private voluntary standards can be used by regulators to achieve their policy objectives; in the European Union (EU), compliance with harmonized standards developed by voluntary European Standards Organizations (ESOs) can grant a product a free-movement pass. Moreover, standards can de facto manage the functioning of the market when other regulative alternatives are not available. Hence, by establishing (potentially) mandatory norms, SDOs assume regulatory functions commonly exercised by States and shape their own legal order. The purpose of this paper is threefold: First, it attempts to shed some light on SDOs’ institutional architecture, focusing on private, industry-driven platforms and comparing their regulatory frameworks with those of formal organizations. Drawing upon the relevant scholarship, the paper then discusses the extent to which the formulation of technological standards within SDOs constitutes a private legal order, operating in the shadow of governmental regulation. Ultimately, this contribution seeks to advise whether a state-intervention in industry-driven standard setting is desirable, and whether the increasing regulatory importance of SDOs should be addressed in legislation on standardization.

Keywords: private order, standardization, standard-setting organizations, transnational law

Procedia PDF Downloads 147
1499 Identifying a Drug Addict Person Using Artificial Neural Networks

Authors: Mustafa Al Sukar, Azzam Sleit, Abdullatif Abu-Dalhoum, Bassam Al-Kasasbeh

Abstract:

Use and abuse of drugs by teens is very common and can have dangerous consequences. The drugs contribute to physical and sexual aggression such as assault or rape. Some teenagers regularly use drugs to compensate for depression, anxiety or a lack of positive social skills. Teen resort to smoking should not be minimized because it can be "gateway drugs" for other drugs (marijuana, cocaine, hallucinogens, inhalants, and heroin). The combination of teenagers' curiosity, risk taking behavior, and social pressure make it very difficult to say no. This leads most teenagers to the questions: "Will it hurt to try once?" Nowadays, technological advances are changing our lives very rapidly and adding a lot of technologies that help us to track the risk of drug abuse such as smart phones, Wireless Sensor Networks (WSNs), Internet of Things (IoT), etc. This technique may help us to early discovery of drug abuse in order to prevent an aggravation of the influence of drugs on the abuser. In this paper, we have developed a Decision Support System (DSS) for detecting the drug abuse using Artificial Neural Network (ANN); we used a Multilayer Perceptron (MLP) feed-forward neural network in developing the system. The input layer includes 50 variables while the output layer contains one neuron which indicates whether the person is a drug addict. An iterative process is used to determine the number of hidden layers and the number of neurons in each one. We used multiple experiment models that have been completed with Log-Sigmoid transfer function. Particularly, 10-fold cross validation schemes are used to access the generalization of the proposed system. The experiment results have obtained 98.42% classification accuracy for correct diagnosis in our system. The data had been taken from 184 cases in Jordan according to a set of questions compiled from Specialists, and data have been obtained through the families of drug abusers.

Keywords: drug addiction, artificial neural networks, multilayer perceptron (MLP), decision support system

Procedia PDF Downloads 274
1498 Early Prediction of Diseases in a Cow for Cattle Industry

Authors: Ghufran Ahmed, Muhammad Osama Siddiqui, Shahbaz Siddiqui, Rauf Ahmad Shams Malick, Faisal Khan, Mubashir Khan

Abstract:

In this paper, a machine learning-based approach for early prediction of diseases in cows is proposed. Different ML algos are applied to extract useful patterns from the available dataset. Technology has changed today’s world in every aspect of life. Similarly, advanced technologies have been developed in livestock and dairy farming to monitor dairy cows in various aspects. Dairy cattle monitoring is crucial as it plays a significant role in milk production around the globe. Moreover, it has become necessary for farmers to adopt the latest early prediction technologies as the food demand is increasing with population growth. This highlight the importance of state-ofthe-art technologies in analyzing how important technology is in analyzing dairy cows’ activities. It is not easy to predict the activities of a large number of cows on the farm, so, the system has made it very convenient for the farmers., as it provides all the solutions under one roof. The cattle industry’s productivity is boosted as the early diagnosis of any disease on a cattle farm is detected and hence it is treated early. It is done on behalf of the machine learning output received. The learning models are already set which interpret the data collected in a centralized system. Basically, we will run different algorithms on behalf of the data set received to analyze milk quality, and track cows’ health, location, and safety. This deep learning algorithm draws patterns from the data, which makes it easier for farmers to study any animal’s behavioral changes. With the emergence of machine learning algorithms and the Internet of Things, accurate tracking of animals is possible as the rate of error is minimized. As a result, milk productivity is increased. IoT with ML capability has given a new phase to the cattle farming industry by increasing the yield in the most cost-effective and time-saving manner.

Keywords: IoT, machine learning, health care, dairy cows

Procedia PDF Downloads 42
1497 Post-Experts in Polish Mainstream Media: Quantitative and Qualitative Analysis of Selected Information Programs

Authors: Aldona Guzik

Abstract:

Experts have always played a special role in society. Drawing on their opinions was and most certainly is one of the most important strategies that direct people when they make decisions; something often used with the aim of exerting influence and ensuring social conformism. Many factors decide on who becomes an expert. The most important of these have hitherto been: the possession of extensive knowledge, charisma, authority as well as experience. Increasingly, however, these factors are insufficient and may even be deemed unnecessary. This state of affairs has been brought about (among other things) by the development of the media and the media’s influence on our lives. The inspiration to write the present article has its grounding in the book by Tom Nichols The Death of Expertise. The Campaign Against Established Knowledge and Why it Matters, in which the author claims that in our present-day open society experts and their expertise count for increasingly less for everyone who has unlimited access to the Internet and education. This has, in turn, resulted in the creation of so-called ‘collective wisdom,’ which is placed higher than any of the specialist knowledge proclaimed by experts. However, this is an incomplete picture, because admittedly, access to knowledge is nowadays unlimited, but on the other hand, the ubiquitous risk causes that the expert is someone who allows them to minimize it. Therefore, a modern society so readily refers to their opinion; from the smallest matters, eg home appliance, to important political issues. Hence, many information services include numerous experts (scientists, journalists, specialists, celebrities), whose task is to explain to the viewers in a simple way the presented reality. However, more and more often their role is also to give credence to what they explain. Hence the questions arise: who are the experts, what is their typology and what roles they play in Polish information services? To answer them, quantitative and qualitative research was used, such as analysis of lists of 100 most influential experts, analysis of expert profiles and their statements in three differentiated information services (TVN - commercial, TVP1 - public, TV Trwam - non-commercial/religious). They will be the basis for answering the above-mentioned questions and, above all, determining their role in information services in Poland.

Keywords: experts, media, public discours, symbolic elites

Procedia PDF Downloads 107
1496 Characteristics and Guiding Strategies of College Students' Online Discourse: Based on the Analysis of One Student Forum

Authors: Hanwei Cheng, Chengbei Xu, Yijie Wang

Abstract:

More and more college students are accustomed to surfing the Internet everyday. As community members, college students have ability to express opinions and participate in social affairs, they not only accept information passively, but also voice their concerns on the Internet. We interpret the online discourses featured with anonymization, so it helps us more effectively and conveniently understand the behaviors and thoughts of college students, and educators can thus grasp the scales and directions in guiding online language. We analyzed online comments in both content and form aspects in one student forum (named Dandan, the BNU’s campus forum), and through methods of literature review and interview, we found that in term of content, college students pay attention to practical information online, emphasize on personal development and pursue hot issues; in term of form, college students' online language displays cross-border quality sometimes under the general feature of normative, and they often explore a certain topic in the form of question or discussion, and they like to show feelings in ironic and stream-of-consciousness ways. It is argued that college students intend to establish a community to facilitate personal development and meet emotional needs through the student forum, and by making comments at the forum they are also able to get involved in public affairs. We should pay attention to problems of college students' online discourse, such as boundary issues (like informal advertisement and information authenticity), emotional issues and the spread of gossip. Some possible solutions to solving online discourse problems can be applied, like we can improve access systems of student forum, clarify principles of Internet langue use, change oversimplified management approaches and use some other tactics, in order to form a mechanism of student self-regulation, also deepen the trust and cooperation between school administrators and students.

Keywords: online language, youth discourse, content and form, implication and strategy

Procedia PDF Downloads 116
1495 Awareness and Utilization of Social Network Tools among Agricultural Science Students in Colleges of Education in Ogun State, Nigeria

Authors: Adebowale Olukayode Efunnowo

Abstract:

This study was carried out to assess the awareness and utilization of Social Network Tools (SNTs) among agricultural science students in Colleges of Education in Ogun State, Nigeria. Simple random sampling techniques were used to select 280 respondents from the study area. Descriptive statistics was used to describe the objectives while Pearson Product Moment Correlation was used to test the hypothesis. The result showed that the majority (71.8%) of the respondents were single, with a mean age of 20 years. Almost all (95.7%) the respondents were aware of Facebook and 2go as a Social Network Tools (SNTs) while 85.0% of the respondents were not aware of Blackplanet, LinkedIn, MyHeritage and Bebo. Many (41.1%) of the respondents had views that using SNTs can enhance extensive literature survey, increase internet browsing potential, promote teaching proficiency, and update on outcomes of researches. However, 51.4% of the respondents perceived that SNTs usage as what is meant for the lecturers/adults only while 16.1% considered it as mainly used by internet fraudsters. Findings revealed that about 50.0% of the respondents browsed Facebook and 2go daily while more than 80% of the respondents used Blackplanet, MyHeritage, Skyrock, Bebo, LinkedIn and My YearBook as the need arise. Major constraints to the awareness and utilization of SNTs were high cost and poor quality of ICTs facilities (77.1%), epileptic power supply (75.0%), inadequate telecommunication infrastructure (71.1%), low technical know-how (62.9%) and inadequate computer knowledge (61.1%). The result of PPMC analysis showed that there was an inverse relationship between constraints and utilization of SNTs at p < 0.05. It can be concluded that constraints affect efficient and effective utilization of SNTs in the study area. It is hereby recommended that management of colleges of education and agricultural institutes should provide good internet connectivity, computer facilities, and alternative power supply in order to increase the awareness and utilization of SNTs among students.

Keywords: awareness, utilization, social network tools, constraints, students

Procedia PDF Downloads 330
1494 Building Energy Modeling for Networks of Data Centers

Authors: Eric Kumar, Erica Cochran, Zhiang Zhang, Wei Liang, Ronak Mody

Abstract:

The objective of this article was to create a modelling framework that exposes the marginal costs of shifting workloads across geographically distributed data-centers. Geographical distribution of internet services helps to optimize their performance for localized end users with lowered communications times and increased availability. However, due to the geographical and temporal effects, the physical embodiments of a service's data center infrastructure can vary greatly. In this work, we first identify that the sources of variances in the physical infrastructure primarily stem from local weather conditions, specific user traffic profiles, energy sources, and the types of IT hardware available at the time of deployment. Second, we create a traffic simulator that indicates the IT load at each data-center in the set as an approximator for user traffic profiles. Third, we implement a framework that quantifies the global level energy demands using building energy models and the traffic profiles. The results of the model provide a time series of energy demands that can be used for further life cycle analysis of internet services.

Keywords: data-centers, energy, life cycle, network simulation

Procedia PDF Downloads 125
1493 The Role of Social Media in the Success or Failure of a Revolution: A Comparative Case Study of 2008/2018 Revolutions in Armenia

Authors: Nane Giloyan

Abstract:

The rapid development of social networks in the 21st century increases the interests towards the role and impact of social media on the success or failure of a revolution. Even though studies are investigating the role of social media on the outcome of a revolution, still, the conclusions on this matter are ambiguous so far. Hence, this research aims to investigate the role of social media in the success or failure of a revolution and make a contribution to the literature gap. The study aims to examine the research question whether the use of social media explains the success or failure of revolutions in 2008 and 2018 in Armenia. The research question is investigated through content analysis of two cases; failed revolution in 2008 and the successful revolution in 2018 in Armenia. The secondary data analysis was based on information devoted to two revolutions using local and major international news articles, journal and critical articles, in Armenian, Russian and English, also videos, posts and live streams of the revolutionary leaders. There can be many factors explaining the success or failure of a revolution. However, the investigation of the factors and their role to explain the outcome of a revolution other than the use of social media is beyond the scope of this research study. The study holds other variables constant and concludes that in the cases of 2008 and 2018 revolutions in Armenia the mobilization of society through social media explains the differences in the outcomes (failed or successful). The comparative case study of the revolutions in 2008 and 2018 in Armenia emphasizes the important role and impact of the use of social media on the success or failure of a revolution. The results highlight that the use of the Internet, particularly social media and live streams, by the opposition was the essential difference between two revolutions. Social media platforms, live streams, and communication apps that were absent in the revolutionary situation in 2008 were fundamental to the Armenian Velvet Revolution in 2018. The changes in the situation in favor of the opposition, so the outcome of the protests, were mainly based on the Internet-based mobilization of the society. It is also important to take into consideration that the country experienced a great increase in penetration rates over the decade. The percentage of access to the Internet drastically increased between 2008 and 2018. This fact may help to have a clearer understanding of the use of the Internet and social media by the opposition and the reliance on social media by society. According to the results of the continent analysis, the use of social media to direct the protests and to mobilize the society, have a vital role and positive impact on the outcome of a revolution. Thus the study concludes that it is the use of social media to initiate, organize, and direct the protests that explain the success or failure of two Armenian revolutions.

Keywords: social media, revolution, Armenia, success, failure

Procedia PDF Downloads 110
1492 Off-Body Sub-GHz Wireless Channel Characterization for Dairy Cows in Barns

Authors: Said Benaissa, David Plets, Emmeric Tanghe, Jens Trogh, Luc Martens, Leen Vandaele, Annelies Van Nuffel, Frank A. M. Tuyttens, Bart Sonck, Wout Joseph

Abstract:

The herd monitoring and managing - in particular the detection of ‘attention animals’ that require care, treatment or assistance is crucial for effective reproduction status, health, and overall well-being of dairy cows. In large sized farms, traditional methods based on direct observation or analysis of video recordings become labour-intensive and time-consuming. Thus, automatic monitoring systems using sensors have become increasingly important to continuously and accurately track the health status of dairy cows. Wireless sensor networks (WSNs) and internet-of-things (IoT) can be effectively used in health tracking of dairy cows to facilitate herd management and enhance the cow welfare. Since on-cow measuring devices are energy-constrained, a proper characterization of the off-body wireless channel between the on-cow sensor nodes and the back-end base station is required for a power-optimized deployment of these networks in barns. The aim of this study was to characterize the off-body wireless channel in indoor (barns) environment at 868 MHz using LoRa nodes. LoRa is an emerging wireless technology mainly targeted at WSNs and IoT networks. Both large scale fading (i.e., path loss) and temporal fading were investigated. The obtained path loss values as a function of the transmitter-receiver separation were well fitted by a lognormal path loss model. The path loss showed an additional increase of 4 dB when the wireless node was actually worn by the cow. The temporal fading due to movement of other cows was well described by Rician distributions with a K-factor of 8.5 dB. Based on this characterization, network planning and energy consumption optimization of the on-body wireless nodes could be performed, which enables the deployment of reliable dairy cow monitoring systems.

Keywords: channel, channel modelling, cow monitoring, dairy cows, health monitoring, IoT, LoRa, off-body propagation, PLF, propagation

Procedia PDF Downloads 293
1491 E-Commercial Enterprises' Behavior on China's Local Government's Economic Policy: An Example from Zhejiang Province

Authors: Chia-Chi Cheng

Abstract:

After the implementation of “the internet plus,” several puzzles emerge as below: why does China impose more regulation and laws on economic development on the Internet? Why does China urge the importance of manufacturing industry? Why does China’s local government passively implement the policy imposed by the central government? What kind of factors can influence China’s local government’s economic preference? In the framework of neo-institutionalism, this research considers China’s local government as changing agents to analyze its preferences and behavior. In general, the interests urged by the local government will decide its preference and behaviors. They will change its counterpart to cooperate if the change will bring more benefits. Thus, they will change its preference and behavior while the external environment alters. While the local government has the same definition on political activity and economic interest, they will prefer to cooperate with the local enterprises in the way of laying symbiont, within the presumption that the institution remains. While the local government has the different positions on political activity and economic interest, they will re-define the existed regulation or create new regulation in the condition of institution vacuum. Sequentially, they will replace the targets, and the policy, which does not fit in the Central government’s policy, will emerge.

Keywords: China, institutional change, government enterprise relationship, e-commercial policy

Procedia PDF Downloads 216
1490 Solving the Wireless Mesh Network Design Problem Using Genetic Algorithm and Simulated Annealing Optimization Methods

Authors: Moheb R. Girgis, Tarek M. Mahmoud, Bahgat A. Abdullatif, Ahmed M. Rabie

Abstract:

Mesh clients, mesh routers and gateways are components of Wireless Mesh Network (WMN). In WMN, gateways connect to Internet using wireline links and supply Internet access services for users. We usually need multiple gateways, which takes time and costs a lot of money set up, due to the limited wireless channel bit rate. WMN is a highly developed technology that offers to end users a wireless broadband access. It offers a high degree of flexibility contrasted to conventional networks; however, this attribute comes at the expense of a more complex construction. Therefore, a challenge is the planning and optimization of WMNs. In this paper, we concentrate on this challenge using a genetic algorithm and simulated annealing. The genetic algorithm and simulated annealing enable searching for a low-cost WMN configuration with constraints and determine the number of used gateways. Experimental results proved that the performance of the genetic algorithm and simulated annealing in minimizing WMN network costs while satisfying quality of service. The proposed models are presented to significantly outperform the existing solutions.

Keywords: wireless mesh networks, genetic algorithms, simulated annealing, topology design

Procedia PDF Downloads 438
1489 Project Marayum: Creating a Community Built Mobile Phone Based, Online Web Dictionary for Endangered Philippine Languages

Authors: Samantha Jade Sadural, Kathleen Gay Figueroa, Noel Nicanor Sison II, Francis Miguel Quilab, Samuel Edric Solis, Kiel Gonzales, Alain Andrew Boquiren, Janelle Tan, Mario Carreon

Abstract:

Of the 185 languages in the Philippines, 28 are endangered, 11 are dying off, and 4 are extinct. Language documentation, as a prerequisite to language education, can be one of the ways languages can be preserved. Project Marayum is envisioned to be a collaboratively built, mobile phone-based, online dictionary platform for Philippine languages. Although there are many online language dictionaries available on the Internet, Project Marayum aims to give a sense of ownership to the language community's dictionary as it is built and maintained by the community for the community. From a seed dictionary, members of a language community can suggest changes, add new entries, and provide language examples. Going beyond word definitions, the platform can be used to gather sample sentences and even audio samples of word usage. These changes are reviewed by language experts of the community, sourced from the local state universities or local government units. Approved changes are then added to the dictionary and can be viewed instantly through the Marayum website. A companion mobile phone application allows users to browse the dictionary in remote areas where Internet connectivity is nonexistent. The dictionary will automatically be updated once the user regains Internet access. Project Marayum is still a work in progress. At the time of this abstract's writing, the Project has just entered its second year. Prototypes are currently being tested with the Asi language of Romblon island as its initial language testbed. In October 2020, Project Marayum will have both a webpage and mobile application with Asi, Ilocano, and Cebuano language dictionaries available for use online or for download. In addition, the Marayum platform would be then easily expandable for use of the more endangered language communities. Project Marayum is funded by the Philippines Department of Science and Technology.

Keywords: collaborative language dictionary, community-centered lexicography, content management system, software engineering

Procedia PDF Downloads 142
1488 Online Self-Help Metacognitive Therapy for OCD: A Case Series

Authors: C. Pearcy, C. Rees

Abstract:

Cognitive behavioural therapy (CBT) and exposure and response prevention (ERP) are currently the most efficacious treatments for Obsessive-compulsive disorder (OCD). Many clients, however, remain symptomatic following treatment. As a result, refusal of treatment, withdrawal from treatment, and partial adherence to treatment are common amongst ERP. Such limitations have caused few professionals to actually engage in ERP therapy, which has warranted the exploration of alternative treatments. This study evaluated an online self-help treatment program for OCD (the OCD Doctor Online); a 4-week Metacognitive Therapy (MCT) program which has implemented strategies from Wells’ Metacognitive model of OCD. The aim of the present study was to investigate whether an online self-help treatment using MCT would reduce symptoms of OCD, reduce unhelpful metacognitions and improve quality of life. Treatment effectiveness was assessed using a case series methodology in 3 consecutively referred individuals. At post-treatment, all participants showed reductions in unhelpful metacognitive beliefs (MCQ-30) and improvements in quality of life (Q-LES-Q), which were maintained through to 4 week follow-up. Two of the three participants showed reductions in OCD symptomology (OCI-R), which were further reduced at 4-week follow-up. The present study suggests that internet-based self-help treatment may be an effective means of delivering MCT to adults with OCD.

Keywords: internet-based, metacognitive therapy, obsessive-compulsive disorder, self-help

Procedia PDF Downloads 408
1487 Generative Behaviors and Psychological Well-Being in Mexican Elders

Authors: Ana L. Gonzalez-Celis, Edgardo Ruiz-Carrillo, Karina Reyes-Jarquin, Margarita Chavez-Becerra

Abstract:

Since recent decades, the aging has been viewed from a more positive perspective, where is not only about losses and damage, but also about being on a stage where you can enjoy life and live with well-being and quality of life. The challenge to feel better is to find those resources that seniors have. For that reason, psychological well-being has shown interest in the study of the affect and life satisfaction (hedonic well-being), while from a more recent tradition, focus on the development of capabilities and the personal growth, considering both as the main indicators of the quality of life. A resource that can be used in the later age is generativity, which refers to the ability of older people to develop and grow through activities that contribute with the improvement of the context in which they live and participate. In this way the generative interest is understood as a favourable attitude that contribute to the common benefit while strengthening and enriching the social institutions, to ensure continuity between generations and social development. On the other hand, generative behavior, differentiating from generative interest, is the expression of that attitude reflected in activities that make a social contribution and a benefit for generations to come. Hence the purpose of the research was to test if there is an association between the generative behaviour type and the psychological well-being with their dimensions. For this reason 188 Mexican adults from 60 to 94 years old (M = 69.78), 67% women, 33% men, completed two instruments: The Ryff’s Well-Being Scales to measure psychological well-being with 39 items with two dimensions (Hedonic and Eudaimonic well-being), and the Loyola’s Generative Behaviors Scale, grouped in five categories: Knowledge transmitted to the next generation, things to be remember, creativity, be productive, contribution to the community, and responsibility of other people. In addition, the socio-demographic data sheet was tested, and self-reported health status. The results indicated that the psychological well-being and its dimensions were significantly associated with the presence of generative behavior, where the level of well-being was higher when the frequency of some generative behaviour excelled; finding that the behavior with greater psychological well-being (M = 81.04, SD = 8.18) was "things to be remembered"; while with greater hedonic well-being (M = 73.39, SD = 12.19) was the behavior "responsibility of other people"; and with greater Eudaimonic well-being (M = 84.61, SD = 6.63), was the behavior "things to be remembered”. The most important findings highlight the importance of generative behaviors in adulthood, finding empirical evidence that the generativity in the last stage of life is associated with well-being. However, by finding differences in the types of generative behaviors at the level of well-being, is proposed the idea that generativity is not situated as an isolated construct, but needs other contextualized and related constructs that can simultaneously operate at different levels, taking into account the relationship between the environment and the individual, encompassing both the social and psychological dimension.

Keywords: eudaimonic well-being, generativity, hedonic well-being, Mexican elders, psychological well-being

Procedia PDF Downloads 246
1486 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 124