Search results for: internet of things (IOT)
1537 Comparative Analysis of Predictive Models for Customer Churn Prediction in the Telecommunication Industry
Authors: Deepika Christopher, Garima Anand
Abstract:
To determine the best model for churn prediction in the telecom industry, this paper compares 11 machine learning algorithms, namely Logistic Regression, Support Vector Machine, Random Forest, Decision Tree, XGBoost, LightGBM, Cat Boost, AdaBoost, Extra Trees, Deep Neural Network, and Hybrid Model (MLPClassifier). It also aims to pinpoint the top three factors that lead to customer churn and conducts customer segmentation to identify vulnerable groups. According to the data, the Logistic Regression model performs the best, with an F1 score of 0.6215, 81.76% accuracy, 68.95% precision, and 56.57% recall. The top three attributes that cause churn are found to be tenure, Internet Service Fiber optic, and Internet Service DSL; conversely, the top three models in this article that perform the best are Logistic Regression, Deep Neural Network, and AdaBoost. The K means algorithm is applied to establish and analyze four different customer clusters. This study has effectively identified customers that are at risk of churn and may be utilized to develop and execute strategies that lower customer attrition.Keywords: attrition, retention, predictive modeling, customer segmentation, telecommunications
Procedia PDF Downloads 571536 Performance Analysis of Microelectromechanical Systems-Based Piezoelectric Energy Harvester
Authors: Sanket S. Jugade, Swapneel U. Naphade, Satyabodh M. Kulkarni
Abstract:
Microscale energy harvesters can be used to convert ambient mechanical vibrations to electrical energy. Such devices have great applications in low powered electronics in remote environments like powering wireless sensor nodes of Internet of Things, lightings on highways or in ships, etc. In this paper, a Microelectromechanical systems (MEMS) based energy harvester has been modeled using Analytical and Finite Element Method (FEM). The device consists of a microcantilever with a proof mass attached to its free end and a Polyvinylidene Fluoride (PVDF) piezoelectric thin film deposited on the surface of microcantilever in a unimorph or bimorph configuration. For the analytical method, the energy harvester was modeled as an equivalent electrical system in SIMULINK. The Finite element model was developed and analyzed using the commercial package COMSOL Multiphysics. The modal analysis was performed first to find the fundamental natural frequency and its variation with geometrical parameters of the system. Then the harmonic analysis was performed to find the input mechanical power, output electrical voltage, and power for a range of excitation frequencies and base acceleration values. The variation of output power with load resistance, PVDF film thickness, and damping values was also found out. The results from FEM were then validated with that of the analytical model. Finally, the performance of the device was optimized with respect to various electro-mechanical parameters. For a unimorph configuration consisting of single crystal silicon microcantilever of dimensions 8mm×2mm×80µm and proof mass of 9.32 mg with optimal values of the thickness of PVDF film and load resistance as 225 µm and 20 MΩ respectively, the maximum electrical power generated for base excitation of 0.2g at 630 Hz is 0.9 µW.Keywords: bimorph, energy harvester, FEM, harmonic analysis, MEMS, PVDF, unimorph
Procedia PDF Downloads 1901535 New Media and Deliberative Democracy in Malaysia
Authors: Rosyidah Muhamad
Abstract:
This article seeks to access the democratic implication of new media in Malaysia through three important key points of deliberative democracy; information access, rational critical deliberation and mechanism of vertical accountability. The article suggests that the Internet is expanding political opportunity in which contributed to a more diverse discourse. It is depending on how users used it; for democratic or non-democratic outcome. The Internet has been a key instrument in exposing human rights abuse, corruption, organizing protests and mobilizing voters during election campaigns. It therefore pushes for transparency and accountability and thus increasing the rise of deliberative democracy in Malaysia. While there are some elements of an emerging deliberative politics, it is also clear that the Malaysian online political discourse is acting as moderate forms of discourse as the sphere increasingly exist in a chaotic and diversified online discourse. Yet, the online sphere still allows citizens to discuss public affairs. When the public opinion is strong enough, it can influence public policies to ensure that they reflect the public interest. It is suggesting an increased space of negotiation and contestation among the previously muzzled offline situation. This is a big step in the progress democracy in Malaysia.Keywords: Keywords: New Media, democratization, deliberative democracy, Malaysian politics
Procedia PDF Downloads 3001534 Identifying a Drug Addict Person Using Artificial Neural Networks
Authors: Mustafa Al Sukar, Azzam Sleit, Abdullatif Abu-Dalhoum, Bassam Al-Kasasbeh
Abstract:
Use and abuse of drugs by teens is very common and can have dangerous consequences. The drugs contribute to physical and sexual aggression such as assault or rape. Some teenagers regularly use drugs to compensate for depression, anxiety or a lack of positive social skills. Teen resort to smoking should not be minimized because it can be "gateway drugs" for other drugs (marijuana, cocaine, hallucinogens, inhalants, and heroin). The combination of teenagers' curiosity, risk taking behavior, and social pressure make it very difficult to say no. This leads most teenagers to the questions: "Will it hurt to try once?" Nowadays, technological advances are changing our lives very rapidly and adding a lot of technologies that help us to track the risk of drug abuse such as smart phones, Wireless Sensor Networks (WSNs), Internet of Things (IoT), etc. This technique may help us to early discovery of drug abuse in order to prevent an aggravation of the influence of drugs on the abuser. In this paper, we have developed a Decision Support System (DSS) for detecting the drug abuse using Artificial Neural Network (ANN); we used a Multilayer Perceptron (MLP) feed-forward neural network in developing the system. The input layer includes 50 variables while the output layer contains one neuron which indicates whether the person is a drug addict. An iterative process is used to determine the number of hidden layers and the number of neurons in each one. We used multiple experiment models that have been completed with Log-Sigmoid transfer function. Particularly, 10-fold cross validation schemes are used to access the generalization of the proposed system. The experiment results have obtained 98.42% classification accuracy for correct diagnosis in our system. The data had been taken from 184 cases in Jordan according to a set of questions compiled from Specialists, and data have been obtained through the families of drug abusers.Keywords: drug addiction, artificial neural networks, multilayer perceptron (MLP), decision support system
Procedia PDF Downloads 2991533 The Return of the Rejected Kings: A Comparative Study of Governance and Procedures of Standards Development Organizations under the Theory of Private Ordering
Authors: Olia Kanevskaia
Abstract:
Standardization has been in the limelight of numerous academic studies. Typically described as ‘any set of technical specifications that either provides or is intended to provide a common design for a product or process’, standards do not only set quality benchmarks for products and services, but also spur competition and innovation, resulting in advantages for manufacturers and consumers. Their contribution to globalization and technology advancement is especially crucial in the Information and Communication Technology (ICT) and telecommunications sector, which is also characterized by a weaker state-regulation and expert-based rule-making. Most of the standards developed in that area are interoperability standards, which allow technological devices to establish ‘invisible communications’ and to ensure their compatibility and proper functioning. This type of standard supports a large share of our daily activities, ranging from traffic coordination by traffic lights to the connection to Wi-Fi networks, transmission of data via Bluetooth or USB and building the network architecture for the Internet of Things (IoT). A large share of ICT standards is developed in the specialized voluntary platforms, commonly referred to as Standards Development Organizations (SDOs), which gather experts from various industry sectors, private enterprises, governmental agencies and academia. The institutional architecture of these bodies can vary from semi-public bodies, such as European Telecommunications Standards Institute (ETSI), to industry-driven consortia, such as the Internet Engineering Task Force (IETF). The past decades witnessed a significant shift of standard setting to those institutions: while operating independently from the states regulation, they offer a rather informal setting, which enables fast-paced standardization and places technical supremacy and flexibility of standards above other considerations. Although technical norms and specifications developed by such nongovernmental platforms are not binding, they appear to create significant regulatory impact. In the United States (US), private voluntary standards can be used by regulators to achieve their policy objectives; in the European Union (EU), compliance with harmonized standards developed by voluntary European Standards Organizations (ESOs) can grant a product a free-movement pass. Moreover, standards can de facto manage the functioning of the market when other regulative alternatives are not available. Hence, by establishing (potentially) mandatory norms, SDOs assume regulatory functions commonly exercised by States and shape their own legal order. The purpose of this paper is threefold: First, it attempts to shed some light on SDOs’ institutional architecture, focusing on private, industry-driven platforms and comparing their regulatory frameworks with those of formal organizations. Drawing upon the relevant scholarship, the paper then discusses the extent to which the formulation of technological standards within SDOs constitutes a private legal order, operating in the shadow of governmental regulation. Ultimately, this contribution seeks to advise whether a state-intervention in industry-driven standard setting is desirable, and whether the increasing regulatory importance of SDOs should be addressed in legislation on standardization.Keywords: private order, standardization, standard-setting organizations, transnational law
Procedia PDF Downloads 1631532 Early Prediction of Diseases in a Cow for Cattle Industry
Authors: Ghufran Ahmed, Muhammad Osama Siddiqui, Shahbaz Siddiqui, Rauf Ahmad Shams Malick, Faisal Khan, Mubashir Khan
Abstract:
In this paper, a machine learning-based approach for early prediction of diseases in cows is proposed. Different ML algos are applied to extract useful patterns from the available dataset. Technology has changed today’s world in every aspect of life. Similarly, advanced technologies have been developed in livestock and dairy farming to monitor dairy cows in various aspects. Dairy cattle monitoring is crucial as it plays a significant role in milk production around the globe. Moreover, it has become necessary for farmers to adopt the latest early prediction technologies as the food demand is increasing with population growth. This highlight the importance of state-ofthe-art technologies in analyzing how important technology is in analyzing dairy cows’ activities. It is not easy to predict the activities of a large number of cows on the farm, so, the system has made it very convenient for the farmers., as it provides all the solutions under one roof. The cattle industry’s productivity is boosted as the early diagnosis of any disease on a cattle farm is detected and hence it is treated early. It is done on behalf of the machine learning output received. The learning models are already set which interpret the data collected in a centralized system. Basically, we will run different algorithms on behalf of the data set received to analyze milk quality, and track cows’ health, location, and safety. This deep learning algorithm draws patterns from the data, which makes it easier for farmers to study any animal’s behavioral changes. With the emergence of machine learning algorithms and the Internet of Things, accurate tracking of animals is possible as the rate of error is minimized. As a result, milk productivity is increased. IoT with ML capability has given a new phase to the cattle farming industry by increasing the yield in the most cost-effective and time-saving manner.Keywords: IoT, machine learning, health care, dairy cows
Procedia PDF Downloads 711531 Post-Experts in Polish Mainstream Media: Quantitative and Qualitative Analysis of Selected Information Programs
Authors: Aldona Guzik
Abstract:
Experts have always played a special role in society. Drawing on their opinions was and most certainly is one of the most important strategies that direct people when they make decisions; something often used with the aim of exerting influence and ensuring social conformism. Many factors decide on who becomes an expert. The most important of these have hitherto been: the possession of extensive knowledge, charisma, authority as well as experience. Increasingly, however, these factors are insufficient and may even be deemed unnecessary. This state of affairs has been brought about (among other things) by the development of the media and the media’s influence on our lives. The inspiration to write the present article has its grounding in the book by Tom Nichols The Death of Expertise. The Campaign Against Established Knowledge and Why it Matters, in which the author claims that in our present-day open society experts and their expertise count for increasingly less for everyone who has unlimited access to the Internet and education. This has, in turn, resulted in the creation of so-called ‘collective wisdom,’ which is placed higher than any of the specialist knowledge proclaimed by experts. However, this is an incomplete picture, because admittedly, access to knowledge is nowadays unlimited, but on the other hand, the ubiquitous risk causes that the expert is someone who allows them to minimize it. Therefore, a modern society so readily refers to their opinion; from the smallest matters, eg home appliance, to important political issues. Hence, many information services include numerous experts (scientists, journalists, specialists, celebrities), whose task is to explain to the viewers in a simple way the presented reality. However, more and more often their role is also to give credence to what they explain. Hence the questions arise: who are the experts, what is their typology and what roles they play in Polish information services? To answer them, quantitative and qualitative research was used, such as analysis of lists of 100 most influential experts, analysis of expert profiles and their statements in three differentiated information services (TVN - commercial, TVP1 - public, TV Trwam - non-commercial/religious). They will be the basis for answering the above-mentioned questions and, above all, determining their role in information services in Poland.Keywords: experts, media, public discours, symbolic elites
Procedia PDF Downloads 1291530 Characteristics and Guiding Strategies of College Students' Online Discourse: Based on the Analysis of One Student Forum
Authors: Hanwei Cheng, Chengbei Xu, Yijie Wang
Abstract:
More and more college students are accustomed to surfing the Internet everyday. As community members, college students have ability to express opinions and participate in social affairs, they not only accept information passively, but also voice their concerns on the Internet. We interpret the online discourses featured with anonymization, so it helps us more effectively and conveniently understand the behaviors and thoughts of college students, and educators can thus grasp the scales and directions in guiding online language. We analyzed online comments in both content and form aspects in one student forum (named Dandan, the BNU’s campus forum), and through methods of literature review and interview, we found that in term of content, college students pay attention to practical information online, emphasize on personal development and pursue hot issues; in term of form, college students' online language displays cross-border quality sometimes under the general feature of normative, and they often explore a certain topic in the form of question or discussion, and they like to show feelings in ironic and stream-of-consciousness ways. It is argued that college students intend to establish a community to facilitate personal development and meet emotional needs through the student forum, and by making comments at the forum they are also able to get involved in public affairs. We should pay attention to problems of college students' online discourse, such as boundary issues (like informal advertisement and information authenticity), emotional issues and the spread of gossip. Some possible solutions to solving online discourse problems can be applied, like we can improve access systems of student forum, clarify principles of Internet langue use, change oversimplified management approaches and use some other tactics, in order to form a mechanism of student self-regulation, also deepen the trust and cooperation between school administrators and students.Keywords: online language, youth discourse, content and form, implication and strategy
Procedia PDF Downloads 1411529 Awareness and Utilization of Social Network Tools among Agricultural Science Students in Colleges of Education in Ogun State, Nigeria
Authors: Adebowale Olukayode Efunnowo
Abstract:
This study was carried out to assess the awareness and utilization of Social Network Tools (SNTs) among agricultural science students in Colleges of Education in Ogun State, Nigeria. Simple random sampling techniques were used to select 280 respondents from the study area. Descriptive statistics was used to describe the objectives while Pearson Product Moment Correlation was used to test the hypothesis. The result showed that the majority (71.8%) of the respondents were single, with a mean age of 20 years. Almost all (95.7%) the respondents were aware of Facebook and 2go as a Social Network Tools (SNTs) while 85.0% of the respondents were not aware of Blackplanet, LinkedIn, MyHeritage and Bebo. Many (41.1%) of the respondents had views that using SNTs can enhance extensive literature survey, increase internet browsing potential, promote teaching proficiency, and update on outcomes of researches. However, 51.4% of the respondents perceived that SNTs usage as what is meant for the lecturers/adults only while 16.1% considered it as mainly used by internet fraudsters. Findings revealed that about 50.0% of the respondents browsed Facebook and 2go daily while more than 80% of the respondents used Blackplanet, MyHeritage, Skyrock, Bebo, LinkedIn and My YearBook as the need arise. Major constraints to the awareness and utilization of SNTs were high cost and poor quality of ICTs facilities (77.1%), epileptic power supply (75.0%), inadequate telecommunication infrastructure (71.1%), low technical know-how (62.9%) and inadequate computer knowledge (61.1%). The result of PPMC analysis showed that there was an inverse relationship between constraints and utilization of SNTs at p < 0.05. It can be concluded that constraints affect efficient and effective utilization of SNTs in the study area. It is hereby recommended that management of colleges of education and agricultural institutes should provide good internet connectivity, computer facilities, and alternative power supply in order to increase the awareness and utilization of SNTs among students.Keywords: awareness, utilization, social network tools, constraints, students
Procedia PDF Downloads 3521528 Building Energy Modeling for Networks of Data Centers
Authors: Eric Kumar, Erica Cochran, Zhiang Zhang, Wei Liang, Ronak Mody
Abstract:
The objective of this article was to create a modelling framework that exposes the marginal costs of shifting workloads across geographically distributed data-centers. Geographical distribution of internet services helps to optimize their performance for localized end users with lowered communications times and increased availability. However, due to the geographical and temporal effects, the physical embodiments of a service's data center infrastructure can vary greatly. In this work, we first identify that the sources of variances in the physical infrastructure primarily stem from local weather conditions, specific user traffic profiles, energy sources, and the types of IT hardware available at the time of deployment. Second, we create a traffic simulator that indicates the IT load at each data-center in the set as an approximator for user traffic profiles. Third, we implement a framework that quantifies the global level energy demands using building energy models and the traffic profiles. The results of the model provide a time series of energy demands that can be used for further life cycle analysis of internet services.Keywords: data-centers, energy, life cycle, network simulation
Procedia PDF Downloads 1471527 Off-Body Sub-GHz Wireless Channel Characterization for Dairy Cows in Barns
Authors: Said Benaissa, David Plets, Emmeric Tanghe, Jens Trogh, Luc Martens, Leen Vandaele, Annelies Van Nuffel, Frank A. M. Tuyttens, Bart Sonck, Wout Joseph
Abstract:
The herd monitoring and managing - in particular the detection of ‘attention animals’ that require care, treatment or assistance is crucial for effective reproduction status, health, and overall well-being of dairy cows. In large sized farms, traditional methods based on direct observation or analysis of video recordings become labour-intensive and time-consuming. Thus, automatic monitoring systems using sensors have become increasingly important to continuously and accurately track the health status of dairy cows. Wireless sensor networks (WSNs) and internet-of-things (IoT) can be effectively used in health tracking of dairy cows to facilitate herd management and enhance the cow welfare. Since on-cow measuring devices are energy-constrained, a proper characterization of the off-body wireless channel between the on-cow sensor nodes and the back-end base station is required for a power-optimized deployment of these networks in barns. The aim of this study was to characterize the off-body wireless channel in indoor (barns) environment at 868 MHz using LoRa nodes. LoRa is an emerging wireless technology mainly targeted at WSNs and IoT networks. Both large scale fading (i.e., path loss) and temporal fading were investigated. The obtained path loss values as a function of the transmitter-receiver separation were well fitted by a lognormal path loss model. The path loss showed an additional increase of 4 dB when the wireless node was actually worn by the cow. The temporal fading due to movement of other cows was well described by Rician distributions with a K-factor of 8.5 dB. Based on this characterization, network planning and energy consumption optimization of the on-body wireless nodes could be performed, which enables the deployment of reliable dairy cow monitoring systems.Keywords: channel, channel modelling, cow monitoring, dairy cows, health monitoring, IoT, LoRa, off-body propagation, PLF, propagation
Procedia PDF Downloads 3181526 The Role of Social Media in the Success or Failure of a Revolution: A Comparative Case Study of 2008/2018 Revolutions in Armenia
Authors: Nane Giloyan
Abstract:
The rapid development of social networks in the 21st century increases the interests towards the role and impact of social media on the success or failure of a revolution. Even though studies are investigating the role of social media on the outcome of a revolution, still, the conclusions on this matter are ambiguous so far. Hence, this research aims to investigate the role of social media in the success or failure of a revolution and make a contribution to the literature gap. The study aims to examine the research question whether the use of social media explains the success or failure of revolutions in 2008 and 2018 in Armenia. The research question is investigated through content analysis of two cases; failed revolution in 2008 and the successful revolution in 2018 in Armenia. The secondary data analysis was based on information devoted to two revolutions using local and major international news articles, journal and critical articles, in Armenian, Russian and English, also videos, posts and live streams of the revolutionary leaders. There can be many factors explaining the success or failure of a revolution. However, the investigation of the factors and their role to explain the outcome of a revolution other than the use of social media is beyond the scope of this research study. The study holds other variables constant and concludes that in the cases of 2008 and 2018 revolutions in Armenia the mobilization of society through social media explains the differences in the outcomes (failed or successful). The comparative case study of the revolutions in 2008 and 2018 in Armenia emphasizes the important role and impact of the use of social media on the success or failure of a revolution. The results highlight that the use of the Internet, particularly social media and live streams, by the opposition was the essential difference between two revolutions. Social media platforms, live streams, and communication apps that were absent in the revolutionary situation in 2008 were fundamental to the Armenian Velvet Revolution in 2018. The changes in the situation in favor of the opposition, so the outcome of the protests, were mainly based on the Internet-based mobilization of the society. It is also important to take into consideration that the country experienced a great increase in penetration rates over the decade. The percentage of access to the Internet drastically increased between 2008 and 2018. This fact may help to have a clearer understanding of the use of the Internet and social media by the opposition and the reliance on social media by society. According to the results of the continent analysis, the use of social media to direct the protests and to mobilize the society, have a vital role and positive impact on the outcome of a revolution. Thus the study concludes that it is the use of social media to initiate, organize, and direct the protests that explain the success or failure of two Armenian revolutions.Keywords: social media, revolution, Armenia, success, failure
Procedia PDF Downloads 1291525 E-Commercial Enterprises' Behavior on China's Local Government's Economic Policy: An Example from Zhejiang Province
Authors: Chia-Chi Cheng
Abstract:
After the implementation of “the internet plus,” several puzzles emerge as below: why does China impose more regulation and laws on economic development on the Internet? Why does China urge the importance of manufacturing industry? Why does China’s local government passively implement the policy imposed by the central government? What kind of factors can influence China’s local government’s economic preference? In the framework of neo-institutionalism, this research considers China’s local government as changing agents to analyze its preferences and behavior. In general, the interests urged by the local government will decide its preference and behaviors. They will change its counterpart to cooperate if the change will bring more benefits. Thus, they will change its preference and behavior while the external environment alters. While the local government has the same definition on political activity and economic interest, they will prefer to cooperate with the local enterprises in the way of laying symbiont, within the presumption that the institution remains. While the local government has the different positions on political activity and economic interest, they will re-define the existed regulation or create new regulation in the condition of institution vacuum. Sequentially, they will replace the targets, and the policy, which does not fit in the Central government’s policy, will emerge.Keywords: China, institutional change, government enterprise relationship, e-commercial policy
Procedia PDF Downloads 2371524 Generative Behaviors and Psychological Well-Being in Mexican Elders
Authors: Ana L. Gonzalez-Celis, Edgardo Ruiz-Carrillo, Karina Reyes-Jarquin, Margarita Chavez-Becerra
Abstract:
Since recent decades, the aging has been viewed from a more positive perspective, where is not only about losses and damage, but also about being on a stage where you can enjoy life and live with well-being and quality of life. The challenge to feel better is to find those resources that seniors have. For that reason, psychological well-being has shown interest in the study of the affect and life satisfaction (hedonic well-being), while from a more recent tradition, focus on the development of capabilities and the personal growth, considering both as the main indicators of the quality of life. A resource that can be used in the later age is generativity, which refers to the ability of older people to develop and grow through activities that contribute with the improvement of the context in which they live and participate. In this way the generative interest is understood as a favourable attitude that contribute to the common benefit while strengthening and enriching the social institutions, to ensure continuity between generations and social development. On the other hand, generative behavior, differentiating from generative interest, is the expression of that attitude reflected in activities that make a social contribution and a benefit for generations to come. Hence the purpose of the research was to test if there is an association between the generative behaviour type and the psychological well-being with their dimensions. For this reason 188 Mexican adults from 60 to 94 years old (M = 69.78), 67% women, 33% men, completed two instruments: The Ryff’s Well-Being Scales to measure psychological well-being with 39 items with two dimensions (Hedonic and Eudaimonic well-being), and the Loyola’s Generative Behaviors Scale, grouped in five categories: Knowledge transmitted to the next generation, things to be remember, creativity, be productive, contribution to the community, and responsibility of other people. In addition, the socio-demographic data sheet was tested, and self-reported health status. The results indicated that the psychological well-being and its dimensions were significantly associated with the presence of generative behavior, where the level of well-being was higher when the frequency of some generative behaviour excelled; finding that the behavior with greater psychological well-being (M = 81.04, SD = 8.18) was "things to be remembered"; while with greater hedonic well-being (M = 73.39, SD = 12.19) was the behavior "responsibility of other people"; and with greater Eudaimonic well-being (M = 84.61, SD = 6.63), was the behavior "things to be remembered”. The most important findings highlight the importance of generative behaviors in adulthood, finding empirical evidence that the generativity in the last stage of life is associated with well-being. However, by finding differences in the types of generative behaviors at the level of well-being, is proposed the idea that generativity is not situated as an isolated construct, but needs other contextualized and related constructs that can simultaneously operate at different levels, taking into account the relationship between the environment and the individual, encompassing both the social and psychological dimension.Keywords: eudaimonic well-being, generativity, hedonic well-being, Mexican elders, psychological well-being
Procedia PDF Downloads 2741523 Solving the Wireless Mesh Network Design Problem Using Genetic Algorithm and Simulated Annealing Optimization Methods
Authors: Moheb R. Girgis, Tarek M. Mahmoud, Bahgat A. Abdullatif, Ahmed M. Rabie
Abstract:
Mesh clients, mesh routers and gateways are components of Wireless Mesh Network (WMN). In WMN, gateways connect to Internet using wireline links and supply Internet access services for users. We usually need multiple gateways, which takes time and costs a lot of money set up, due to the limited wireless channel bit rate. WMN is a highly developed technology that offers to end users a wireless broadband access. It offers a high degree of flexibility contrasted to conventional networks; however, this attribute comes at the expense of a more complex construction. Therefore, a challenge is the planning and optimization of WMNs. In this paper, we concentrate on this challenge using a genetic algorithm and simulated annealing. The genetic algorithm and simulated annealing enable searching for a low-cost WMN configuration with constraints and determine the number of used gateways. Experimental results proved that the performance of the genetic algorithm and simulated annealing in minimizing WMN network costs while satisfying quality of service. The proposed models are presented to significantly outperform the existing solutions.Keywords: wireless mesh networks, genetic algorithms, simulated annealing, topology design
Procedia PDF Downloads 4581522 Project Marayum: Creating a Community Built Mobile Phone Based, Online Web Dictionary for Endangered Philippine Languages
Authors: Samantha Jade Sadural, Kathleen Gay Figueroa, Noel Nicanor Sison II, Francis Miguel Quilab, Samuel Edric Solis, Kiel Gonzales, Alain Andrew Boquiren, Janelle Tan, Mario Carreon
Abstract:
Of the 185 languages in the Philippines, 28 are endangered, 11 are dying off, and 4 are extinct. Language documentation, as a prerequisite to language education, can be one of the ways languages can be preserved. Project Marayum is envisioned to be a collaboratively built, mobile phone-based, online dictionary platform for Philippine languages. Although there are many online language dictionaries available on the Internet, Project Marayum aims to give a sense of ownership to the language community's dictionary as it is built and maintained by the community for the community. From a seed dictionary, members of a language community can suggest changes, add new entries, and provide language examples. Going beyond word definitions, the platform can be used to gather sample sentences and even audio samples of word usage. These changes are reviewed by language experts of the community, sourced from the local state universities or local government units. Approved changes are then added to the dictionary and can be viewed instantly through the Marayum website. A companion mobile phone application allows users to browse the dictionary in remote areas where Internet connectivity is nonexistent. The dictionary will automatically be updated once the user regains Internet access. Project Marayum is still a work in progress. At the time of this abstract's writing, the Project has just entered its second year. Prototypes are currently being tested with the Asi language of Romblon island as its initial language testbed. In October 2020, Project Marayum will have both a webpage and mobile application with Asi, Ilocano, and Cebuano language dictionaries available for use online or for download. In addition, the Marayum platform would be then easily expandable for use of the more endangered language communities. Project Marayum is funded by the Philippines Department of Science and Technology.Keywords: collaborative language dictionary, community-centered lexicography, content management system, software engineering
Procedia PDF Downloads 1631521 Map UI Design of IoT Application Based on Passenger Evacuation Behaviors in Underground Station
Authors: Meng-Cong Zheng
Abstract:
When the public space is in an emergency, how to quickly establish spatial cognition and emergency shelter in the closed underground space is the urgent task. This study takes Taipei Station as the research base and aims to apply the use of Internet of things (IoT) application for underground evacuation mobility design. The first experiment identified passengers' evacuation behaviors and spatial cognition in underground spaces by wayfinding tasks and thinking aloud, then defined the design conditions of User Interface (UI) and proposed the UI design. The second experiment evaluated the UI design based on passengers' evacuation behaviors by wayfinding tasks and think aloud again as same as the first experiment. The first experiment found that the design conditions that the subjects were most concerned about were "map" and hoping to learn the relative position of themselves with other landmarks by the map and watch the overall route. "Position" needs to be accurately labeled to determine the location in underground space. Each step of the escape instructions should be presented clearly in "navigation bar." The "message bar" should be informed of the next or final target exit. In the second experiment with the UI design, we found that the "spatial map" distinguishing between walking and non-walking areas with shades of color is useful. The addition of 2.5D maps of the UI design increased the user's perception of space. Amending the color of the corner diagram in the "escape route" also reduces the confusion between the symbol and other diagrams. The larger volume of toilets and elevators can be a judgment of users' relative location in "Hardware facilities." Fire extinguisher icon should be highlighted. "Fire point tips" of the UI design indicated fire with a graphical fireball can convey precise information to the escaped person. "Fire point tips" of the UI design indicated fire with a graphical fireball can convey precise information to the escaped person. However, "Compass and return to present location" are less used in underground space.Keywords: evacuation behaviors, IoT application, map UI design, underground station
Procedia PDF Downloads 2071520 Online Self-Help Metacognitive Therapy for OCD: A Case Series
Abstract:
Cognitive behavioural therapy (CBT) and exposure and response prevention (ERP) are currently the most efficacious treatments for Obsessive-compulsive disorder (OCD). Many clients, however, remain symptomatic following treatment. As a result, refusal of treatment, withdrawal from treatment, and partial adherence to treatment are common amongst ERP. Such limitations have caused few professionals to actually engage in ERP therapy, which has warranted the exploration of alternative treatments. This study evaluated an online self-help treatment program for OCD (the OCD Doctor Online); a 4-week Metacognitive Therapy (MCT) program which has implemented strategies from Wells’ Metacognitive model of OCD. The aim of the present study was to investigate whether an online self-help treatment using MCT would reduce symptoms of OCD, reduce unhelpful metacognitions and improve quality of life. Treatment effectiveness was assessed using a case series methodology in 3 consecutively referred individuals. At post-treatment, all participants showed reductions in unhelpful metacognitive beliefs (MCQ-30) and improvements in quality of life (Q-LES-Q), which were maintained through to 4 week follow-up. Two of the three participants showed reductions in OCD symptomology (OCI-R), which were further reduced at 4-week follow-up. The present study suggests that internet-based self-help treatment may be an effective means of delivering MCT to adults with OCD.Keywords: internet-based, metacognitive therapy, obsessive-compulsive disorder, self-help
Procedia PDF Downloads 4341519 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count
Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney
Abstract:
Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python
Procedia PDF Downloads 1431518 Use of Smartphones in 6th and 7th Grade (Elementary Schools) in Istria: Pilot Study
Authors: Maja Ruzic-Baf, Vedrana Keteles, Andrea Debeljuh
Abstract:
Younger and younger children are now using a smartphone, a device which has become ‘a must have’ and the life of children would be almost ‘unthinkable’ without one. Devices are becoming lighter and lighter but offering an array of options and applications as well as the unavoidable access to the Internet, without which it would be almost unusable. Numerous features such as taking of photographs, listening to music, information search on the Internet, access to social networks, usage of some of the chatting and messaging services, are only some of the numerous features offered by ‘smart’ devices. They have replaced the alarm clock, home phone, camera, tablet and other devices. Their use and possession have become a part of the everyday image of young people. Apart from the positive aspects, the use of smartphones has also some downsides. For instance, free time was usually spent in nature, playing, doing sports or other activities enabling children an adequate psychophysiological growth and development. The greater usage of smartphones during classes to check statuses on social networks, message your friends, play online games, are just some of the possible negative aspects of their application. Considering that the age of the population using smartphones is decreasing and that smartphones are no longer ‘foreign’ to children of pre-school age (smartphones are used at home or in coffee shops or shopping centers while waiting for their parents, playing video games often inappropriate to their age), particular attention must be paid to a very sensitive group, the teenagers who almost never separate from their ‘pets’. This paper is divided into two sections, theoretical and empirical ones. The theoretical section gives an overview of the pros and cons of the usage of smartphones, while the empirical section presents the results of a research conducted in three elementary schools regarding the usage of smartphones and, specifically, their usage during classes, during breaks and to search information on the Internet, check status updates and 'likes’ on the Facebook social network.Keywords: education, smartphone, social networks, teenagers
Procedia PDF Downloads 4531517 A Framework of Product Information Service System Using Mobile Image Retrieval and Text Mining Techniques
Authors: Mei-Yi Wu, Shang-Ming Huang
Abstract:
The online shoppers nowadays often search the product information on the Internet using some keywords of products. To use this kind of information searching model, shoppers should have a preliminary understanding about their interesting products and choose the correct keywords. However, if the products are first contact (for example, the worn clothes or backpack of passengers which you do not have any idea about the brands), these products cannot be retrieved due to insufficient information. In this paper, we discuss and study the applications in E-commerce using image retrieval and text mining techniques. We design a reasonable E-commerce application system containing three layers in the architecture to provide users product information. The system can automatically search and retrieval similar images and corresponding web pages on Internet according to the target pictures which taken by users. Then text mining techniques are applied to extract important keywords from these retrieval web pages and search the prices on different online shopping stores with these keywords using a web crawler. Finally, the users can obtain the product information including photos and prices of their favorite products. The experiments shows the efficiency of proposed system.Keywords: mobile image retrieval, text mining, product information service system, online marketing
Procedia PDF Downloads 3591516 Efficient Storage and Intelligent Retrieval of Multimedia Streams Using H. 265
Authors: S. Sarumathi, C. Deepadharani, Garimella Archana, S. Dakshayani, D. Logeshwaran, D. Jayakumar, Vijayarangan Natarajan
Abstract:
The need of the hour for the customers who use a dial-up or a low broadband connection for their internet services is to access HD video data. This can be achieved by developing a new video format using H. 265. This is the latest video codec standard developed by ISO/IEC Moving Picture Experts Group (MPEG) and ITU-T Video Coding Experts Group (VCEG) on April 2013. This new standard for video compression has the potential to deliver higher performance than the earlier standards such as H. 264/AVC. In comparison with H. 264, HEVC offers a clearer, higher quality image at half the original bitrate. At this lower bitrate, it is possible to transmit high definition videos using low bandwidth. It doubles the data compression ratio supporting 8K Ultra HD and resolutions up to 8192×4320. In the proposed model, we design a new video format which supports this H. 265 standard. The major areas of applications in the coming future would lead to enhancements in the performance level of digital television like Tata Sky and Sun Direct, BluRay Discs, Mobile Video, Video Conferencing and Internet and Live Video streaming.Keywords: access HD video, H. 265 video standard, high performance, high quality image, low bandwidth, new video format, video streaming applications
Procedia PDF Downloads 3541515 From Industry 4.0 to Agriculture 4.0: A Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability
Authors: Angelo Corallo, Maria Elena Latino, Marta Menegoli
Abstract:
Agri-food value chain involves various stakeholders with different roles. All of them abide by national and international rules and leverage marketing strategies to advance their products. Food products and related processing phases carry with it a big mole of data that are often not used to inform final customer. Some data, if fittingly identified and used, can enhance the single company, and/or the all supply chain creates a math between marketing techniques and voluntary traceability strategies. Moreover, as of late, the world has seen buying-models’ modification: customer is careful on wellbeing and food quality. Food citizenship and food democracy was born, leveraging on transparency, sustainability and food information needs. Internet of Things (IoT) and Analytics, some of the innovative technologies of Industry 4.0, have a significant impact on market and will act as a main thrust towards a genuine ‘4.0 change’ for agriculture. But, realizing a traceability system is not simple because of the complexity of agri-food supply chain, a lot of actors involved, different business models, environmental variations impacting products and/or processes, and extraordinary climate changes. In order to give support to the company involved in a traceability path, starting from business model analysis and related business process a Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability was conceived. Studying each process task and leveraging on modeling techniques lead to individuate information held by different actors during agri-food supply chain. IoT technologies for data collection and Analytics techniques for data processing supply information useful to increase the efficiency intra-company and competitiveness in the market. The whole information recovered can be shown through IT solutions and mobile application to made accessible to the company, the entire supply chain and the consumer with the view to guaranteeing transparency and quality.Keywords: agriculture 4.0, agri-food suppy chain, industry 4.0, voluntary traceability
Procedia PDF Downloads 1471514 Introduction of an Approach of Complex Virtual Devices to Achieve Device Interoperability in Smart Building Systems
Authors: Thomas Meier
Abstract:
One of the major challenges for sustainable smart building systems is to support device interoperability, i.e. connecting sensor or actuator devices from different vendors, and present their functionality to the external applications. Furthermore, smart building systems are supposed to connect with devices that are not available yet, i.e. devices that become available on the market sometime later. It is of vital importance that a sustainable smart building platform provides an appropriate external interface that can be leveraged by external applications and smart services. An external platform interface must be stable and independent of specific devices and should support flexible and scalable usage scenarios. A typical approach applied in smart home systems is based on a generic device interface used within the smart building platform. Device functions, even of rather complex devices, are mapped to that generic base type interface by means of specific device drivers. Our new approach, presented in this work, extends that approach by using the smart building system’s rule engine to create complex virtual devices that can represent the most diverse properties of real devices. We examined and evaluated both approaches by means of a practical case study using a smart building system that we have developed. We show that the solution we present allows the highest degree of flexibility without affecting external application interface stability and scalability. In contrast to other systems our approach supports complex virtual device configuration on application layer (e.g. by administration users) instead of device configuration at platform layer (e.g. platform operators). Based on our work, we can show that our approach supports almost arbitrarily flexible use case scenarios without affecting the external application interface stability. However, the cost of this approach is additional appropriate configuration overhead and additional resource consumption at the IoT platform level that must be considered by platform operators. We conclude that the concept of complex virtual devices presented in this work can be applied to improve the usability and device interoperability of sustainable intelligent building systems significantly.Keywords: Internet of Things, smart building, device interoperability, device integration, smart home
Procedia PDF Downloads 2711513 Factors Influencing the Continuance Usage of Online Mobile Payment Apps: A Case Study of WECHAT Users in China
Authors: Isaac Kofi Mensah, Jianing Mi, Feng Cheng
Abstract:
This research paper seeks to investigate the factors determining the continuance usage of online mobile payment applications among WECHAT users in China. Technology Acceptance Model (TAM) and the Diffusion of Innovation (DOI) theory would both be applied as the theoretical foundation for this study. A developed instrument would be administered to the targeted sample of 1000 WECHAT Users in the City of Harbin, China, through an online questionnaire administration platform. Factors such as perceived usefulness, perceived ease of use, perceived service quality, social influence, trust in the internet, internet self-efficacy, relative advantage, compatibility, and complexity would be explored to determine its significant impact on the continuance intention to use mobile payment apps. This study is at the development and implementation stage. The successful completion of this research article would not only provide an insightful understanding of the factors influencing the decision of WECHAT users in China to use mobile payment applications but also enrich the e-commerce adoption literature.Keywords: diffusion of innovation (DOI), e-commerce, mobile payment, technology acceptance model (TAM), WECHAT
Procedia PDF Downloads 1931512 Use of Social Media in Political Communications: Example of Facebook
Authors: Havva Nur Tarakci, Bahar Urhan Torun
Abstract:
The transformation that is seen in every area of life by technology, especially internet technology changes the structure of political communications too. Internet, which is at the top of new communication technologies, affects political communications with its structure in a way that no traditional communication tools ever have and enables interaction and the channel between receiver and sender, and it becomes one of the most effective tools preferred among the political communication applications. This state as a result of technological convergence makes Internet an unobtainable place for political communication campaigns. Political communications, which means every kind of communication strategies that political parties called 'actors of political communications' use with the aim of messaging their opinions and party programmes to their present and potential voters who are a target group for them, is a type of communication that is frequently used also among social media tools at the present day. The electorate consisting of different structures is informed, directed, and managed by social media tools. Political parties easily reach their electorate by these tools without any limitations of both time and place and also are able to take the opinions and reactions of their electorate by the element of interaction that is a feature of social media. In this context, Facebook, which is a place that political parties use in social media at most, is a communication network including in our daily life since 2004. As it is one of the most popular social networks today, it is among the most-visited websites in the global scale. In this way, the research is based on the question, “How do the political parties use Facebook at the campaigns, which they conduct during the election periods, for informing their voters?” and it aims at clarifying the Facebook using practices of the political parties. In direction of this objective the official Facebook accounts of the four political parties (JDP–AKParti, PDP–BDP, RPP-CHP, NMP-MHP), which reach their voters by social media besides other communication tools, are treated, and a frame for the politics of Turkey is formed. The time of examination is constricted with totally two weeks, one week before the mayoral elections and one week after the mayoral elections, when it is supposed that the political parties use their Facebook accounts in full swing. As a research method, the method of content analysis is preferred, and the texts and the visual elements that are gotten are interpreted based on this analysis.Keywords: Facebook, political communications, social media, electrorate
Procedia PDF Downloads 3831511 Digital Twin for University Campus: Workflow, Applications and Benefits
Authors: Frederico Fialho Teixeira, Islam Mashaly, Maryam Shafiei, Jurij Karlovsek
Abstract:
The ubiquity of data gathering and smart technologies, advancements in virtual technologies, and the development of the internet of things (IoT) have created urgent demands for the development of frameworks and efficient workflows for data collection, visualisation, and analysis. Digital twin, in different scales of the city into the building, allows for bringing together data from different sources to generate fundamental and illuminating insights for the management of current facilities and the lifecycle of amenities as well as improvement of the performance of current and future designs. Over the past two decades, there has been growing interest in the topic of digital twin and their applications in city and building scales. Most such studies look at the urban environment through a homogeneous or generalist lens and lack specificity in particular characteristics or identities, which define an urban university campus. Bridging this knowledge gap, this paper offers a framework for developing a digital twin for a university campus that, with some modifications, could provide insights for any large-scale digital twin settings like towns and cities. It showcases how currently unused data could be purposefully combined, interpolated and visualised for producing analysis-ready data (such as flood or energy simulations or functional and occupancy maps), highlighting the potential applications of such a framework for campus planning and policymaking. The research integrates campus-level data layers into one spatial information repository and casts light on critical data clusters for the digital twin at the campus level. The paper also seeks to raise insightful and directive questions on how digital twin for campus can be extrapolated to city-scale digital twin. The outcomes of the paper, thus, inform future projects for the development of large-scale digital twin as well as urban and architectural researchers on potential applications of digital twin in future design, management, and sustainable planning, to predict problems, calculate risks, decrease management costs, and improve performance.Keywords: digital twin, smart campus, framework, data collection, point cloud
Procedia PDF Downloads 681510 Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India
Authors: Anushtha Saxena
Abstract:
This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation.Keywords: data monetization, e-commerce companies, regulatory framework, GDPR
Procedia PDF Downloads 1201509 The Effect of Advertising on Brand Choices of Z Generation Children and Their Social Media Consumption Habits
Authors: Hüseyin Altubaş, Hasret Aktaş, A. Mücahid Zengin
Abstract:
Children determine the direction of the power of consumption. They affect the decisions of their parents but they also reached to a significant purchasing power themselves. Children, who are turning interactive behavior to normal behavior are becoming the decision makers in a company’s survival. Companies that analyze this effective target audience can communicate successfully with children. Children, who are interactive individuals, are closer to advertising. They are almost talking better with advertising. They are not afraid to express their likings, as well as their dislikes. Children have an interactive lifestyle and they were exposed to the vast changes in technology after year 2000. They do not know a life without internet, they spend mobile life in internet. This Z generation is the new determinants of brands. Z generation finds it appropriate to be brand ambassadors and they completely changed traditional media and traditional consumer behavior. These children live social reality with virtual reality and they feed brands differently. Brands that interact with Z generation are affected by this feeding positively, while brands that keep interaction in traditional levels are affected negatively. In this research we examine the communication, advertising and brand behaviors of Z generation. We especially analyze this generation’s interaction with social media brands and their interactive attitudes.Keywords: social media, Z generation, children, advertising, brand choice
Procedia PDF Downloads 5501508 Banking and Accounting Analysis Researches Effect on Environment
Authors: Michael Saad Thabet Azrek
Abstract:
The advanced facts era is becoming a vital element within the improvement of financial offerings enterprise, in particular, the banking enterprise. It has introduced new approaches to delivering banking to the patron, including Internet Banking. Banks started to observe digital banking (e-banking) as a means to update a number of their conventional branch features using the net as a brand-new distribution channel. A few purchasers have, as a minimum, a couple of accounts across banks and get the right of entry to these accounts using e-banking offerings. To study the contemporary net really worth role, clients ought to log in to each of their debts and get the info and paintings on consolidation. This not simplest takes enough time, but it's also a repetitive hobby at a specific frequency. To cope with this point, an account aggregation idea is introduced as an answer. E-banking account aggregation, as one of the e-banking types, appeared to construct a more potent dating with clients. Account Aggregation provider usually refers to a provider that permits clients to manage their financial institution debts maintained in distinct establishments through a not unusual net banking operating a platform, with an excessive situation to protection and privateness. This paper gives an outline of an e-banking account aggregation method as a new provider in the e-banking field.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 36