Search results for: Internet of Thing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1790

Search results for: Internet of Thing

1070 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 418
1069 Research and Design of Functional Mixed Community: A Model Based on the Construction of New Districts in China

Authors: Wu Chao

Abstract:

The urban design of the new district in China is different from other existing cities at the city planning level, including Beijing, Shanghai, Guangzhou, etc. And the urban problems of these super-cities are same as many big cities around the world. The goal of the new district construction plan is to enable people to live comfortably, to improve the well-being of residents, and to create a way of life different from that of other urban communities. To avoid the emergence of the super community, the idea of "decentralization" is taken as the overall planning idea, and the function and form of each community are set up with a homogeneous allocation of resources so that the community can grow naturally. Similar to the growth of vines in nature, each community groups are independent and connected through roads, with clear community boundaries that limit their unlimited expansion. With a community contained 20,000 people as a case, the community is a mixture for living, production, office, entertainment, and other functions. Based on the development of the Internet, to create more space for public use, and can use data to allocate resources in real time. And this kind of shared space is the main part of the activity space in the community. At the same time, the transformation of spatial function can be determined by the usage feedback of all kinds of existing space, and the use of space can be changed by the changing data. Take the residential unit as the basic building function mass, take the lower three to four floors of the building as the main flexible space for use, distribute functions such as entertainment, service, office, etc. For the upper living space, set up a small amount of indoor and outdoor activity space, also used as shared space. The transformable space of the bottom layer is evenly distributed, combined with the walking space connected the community, the service and entertainment network can be formed in the whole community, and can be used in most of the community space. With the basic residential unit as the replicable module, the design of the other residential units runs through the idea of decentralization and the concept of the vine community, and the various units are reasonably combined. At the same time, a small number of office buildings are added to meet the special office needs. The new functional mixed community can change many problems of the present city in the future construction, at the same time, it can keep its vitality through the adjustment function of the Internet.

Keywords: decentralization, mixed functional community, shared space, spatial usage data

Procedia PDF Downloads 103
1068 Identifying Effective Strategies to Promote Vietnamese Fashion Brands in an Internationally Dominated Market

Authors: Lam Hong Lan, Gabor Sarlos

Abstract:

It is hard to search for best practices in promotion for local fashion brands in Vietnam as the industry is still very young. Local fashion start-ups have grown quickly in the last five years, thanks in part to the internet and social media. However, local designer/owners can face a huge challenge when competing with international brands in the Vietnamese market – and few local case studies are available for guidance. In response, this paper studied how local small- to medium-sized enterprises (SMEs) promote to their target customers in order to compete with international brands. Knowledge of both successful and unsuccessful approaches generated by this study is intended to both contribute to the academic literature on local fashion in Vietnam as well as to help local designers to learn from and improve their brand-building strategy. The primary study featured qualitative data collection via semi-structured depth interviews. Transcription and data analysis were conducted manually in order to identify success factors that local brands should consider as part of their promotion strategy. Purposive sampling of SMEs identified five designers in Ho Chi Minh City (the biggest city in Vietnam) and three designers in Hanoi (the second biggest) as interviewees. Participant attributes included: born in the 1980s or 1990s; familiar with internet and social media; designer/owner of a successful local fashion brand in the key middle market and/or mass market segments (which are crucial to the growth of local brands). A secondary study was conducted using social listening software to gather further qualitative data on what were considered to be successful or unsuccessful approaches to local fashion brand promotion on social media. Both the primary and secondary studies indicated that local designers had maximized their promotion budget by using owned media and earned media instead of paid media. Findings from the qualitative interviews indicate that internet and social media have been used as effective promotion platforms by local fashion start-ups. Facebook and Instagram were the most popular social networks used by the SMEs interviewed, and these social platforms were believed to offer a more affordable promotional strategy than traditional media such as TV and/or print advertising. Online stores were considered an important factor in helping the SMEs to reach customers beyond the physical store. Furthermore, a successful online store allowed some SMEs to reduce their business rental costs by maintaining their physical store in a cheaper, less central city area as opposed to a more traditional city center store location. In addition, the small comparative size of the SMEs allowed them to be more attentive to their customers, leading to higher customer satisfaction and rate of return. In conclusion, this study found that these kinds of cost savings helped the SMEs interviewed to focus their scarce resources on producing unique, high-quality collections in order to differentiate themselves from international brands. Facebook and Instagram were the main platforms used for promotion and brand-building. The main challenge to this promotion strategy identified by the SMEs interviewed was to continue to find innovative ways to maximize the impact of a limited marketing budget.

Keywords: Vietnam, SMEs, fashion brands, promotion, marketing, social listening

Procedia PDF Downloads 111
1067 The Knowledge-Behavior Gap in the Online Information Seeking Process

Authors: Yen-Mei Lee

Abstract:

The concept of a knowledge-behavior gap has been discussed for several years. It is addressed that an individual’s knowledge does not sufficiently transfer to his or her actual actions. This concept is mostly focused on fields related to medicine or applied to health care issues to explain how people or patients connect their personal knowledge to actual health care behaviors. To our knowledge, seldomly has this research been applied to discuss people’s online information seeking behavior. In the current study, the main purpose is to investigate the relationship between web users’ personal values and their actual performances when seeking information on the Internet. The total number of twenty-eight participants, divided into one experienced group (n=14) and one novice group (n=14), were recruited and asked to complete a self-report questionnaire of fifty items related to information seeking actions and behaviors. During the execution, participants needed to rate the importance level (how important each item is) and the performance level (how often they actually do each item) from 1 to 10 points on each item. In this paper, the mean scores of the importance and the performance level are analyzed and discussed. The results show that there is a gap between web user’s knowledge and their actual online seeking behaviors. Both experienced group and novice group have higher average scores of the importance level (experienced group = 7.57, novice group = 6.01) than the actual performance level (experienced group = 6.89, novice group = 5.00) in terms of the fifty online information seeking actions. On the other hand, the experienced group perceives more importance of the fifty online seeking actions and performs actual behaviors better than the novice group. Moreover, experienced participants express a consistent result between their concept knowledge and actual behaviors. For instance, they feel extending a seeking strategy is important and frequently perform this action when seeking online. However, novice participants do not have a consistency between their knowledge and behaviors. For example, though they perceive browsing and judging information are less important than they get lost in the online information seeking process. However, in the actual behavior rating, the scores show that novices do browsing and judge information more often than they get lost when seeking information online. These results, therefore, help scholars and educators have a better understanding of the difference between experienced and novice web users regarding their concept knowledge and actual behaviors. In future study, figuring out how to narrow down the knowledge-behavior gap and create practical guidance for novice users to increase their online seeking efficiency is crucial. Not only could it help experienced users be aware of their actual information seeking behaviors, but also help the novice become mastery to concisely obtain information on the Internet.

Keywords: experienced web user, information seeking behavior, knowledge-behavior gap, novice, online seeking efficiency

Procedia PDF Downloads 108
1066 Internet of Things-Based Electric Vehicle Charging Notification

Authors: Nagarjuna Pitty

Abstract:

It is believed invention “Advanced Method and Process Quick Electric Vehicle Charging” is an Electric Vehicles (EVs) are quickly turning into the heralds of vehicle innovation. This study endeavors to address the inquiries of how module charging process correspondence has been performed between the EV and Electric Vehicle Supply Equipment (EVSE). The energy utilization of gas-powered motors is higher than that of electric engines. An invention is related to an Advanced Method and Process Quick Electric Vehicle Charging. In this research paper, readings on the electric vehicle charging approaches will be checked, and the module charging phases will be described comprehensively.

Keywords: electric, vehicle, charging, notification, IoT, supply, equipment

Procedia PDF Downloads 50
1065 Design of a Rectifier with Enhanced Efficiency and a High-gain Antenna for Integrated and Compact-size Rectenna Circuit

Authors: Rawaa Maher, Ahmed Allam, Haruichi Kanaya, Adel B. Abdelrahman

Abstract:

In this paper, a compact, high-efficiency integrated rectenna is presented to operate in the 2.45 GHz band. A comparison between two rectifier topologies is performed to verify the benefits of removing the matching network from the rectifier. A rectifier high conversion efficiency of 74.1% is achieved. To complete the rectenna system, a novel omnidirectional antenna with high gain (3.72 dB) and compact size (25 mm * 29 mm) is designed and fabricated. The same antenna is used with a reflector for raising the gain to nearly 8.3 dB. The simulation and measurement results of the antenna are in good agreement.

Keywords: internet of things, integrated rectenna, rectenna, RF energy harvesting, wireless sensor networks(WSN)

Procedia PDF Downloads 163
1064 Development and Range Testing of a LoRaWAN System in an Urban Environment

Authors: N. R. Harris, J. Curry

Abstract:

This paper describes the construction and operation of an experimental LoRaWAN network surrounding the University of Southampton in the United Kingdom. Following successful installation, an experimental node design is built and characterised, with particular emphasis on radio range. Several configurations are investigated, including different data rates, and varying heights of node. It is concluded that although range can be great (over 8 km in this case), environmental topology is critical. However, shorter range implementations, up to about 2 km in an urban environment, are relatively insensitive although care is still needed. The example node and the relatively simple base station reported demonstrate that LoraWan can be a very low cost and practical solution to Internet of Things type applications for distributed monitoring systems with sensors spread over distances of several km.

Keywords: long-range, wireless, sensor, network

Procedia PDF Downloads 119
1063 Distributive Justice through Constitution

Authors: Rohtash

Abstract:

Academically, the concept of Justice in the literature is vast, and theories are voluminous and definitions are numerous but it is very difficult to define. Through the ages, justice has been evolving and developing reasoning that how individuals and communities do the right thing that is just and fair to all in that society. Justice is a relative and dynamic concept, not absolute one. It is different in different societies based on their morality and ethics. The idea of justice cannot arise from a single morality but interaction of competing moralities and contending perspectives. Justice is the conditional and circumstantial term. Therefore, justice takes different meanings in different contexts. Justice is the application of the Laws. It is a values-based concept in order to protect the rights and liberties of the people. It is a socially created concept that has no physical reality. It exists in society on the basis of the spirit of sharing by the communities and members of society. The conception of justice in society or among communities and individuals is based on their social coordination. It can be effective only when people’s judgments are based on collective reasoning. Their behavior is shaped by social values, norms and laws. People must accept, share and respect the set of principles for delivering justice. Thus justice can be a reasonable solution to conflicts and to coordinate behavior in society. The subject matter of distributive justice is the Public Good and societal resources that should be evenly distributed among the different sections of society on the principles developed and established by the State through legislation, public policy and Executive orders. The Socioeconomic transformation of the society is adopted by the constitution within the limit of its morality and gives a new dimension to transformative justice. Therefore, both Procedural and Transformative justice is part of Distributive justice. Distributive justice is purely an economic phenomenon. It concerns the allocation of resources among the communities and individuals. The subject matter of distributive justice is the distribution of rights, responsibilities, burdens and benefits in society on the basis of the capacity and capability of individuals.

Keywords: distributive justice, constitutionalism, institutionalism, constitutional morality

Procedia PDF Downloads 65
1062 The Optical OFDM Equalization Based on the Fractional Fourier Transform

Authors: A. Cherifi, B. S. Bouazza, A. O. Dahman, B. Yagoubi

Abstract:

Transmission over Optical channels will introduce inter-symbol interference (ISI) as well as inter-channel (or inter-carrier) interference (ICI). To decrease the effects of ICI, this paper proposes equalizer for the Optical OFDM system based on the fractional Fourier transform (FrFFT). In this FrFT-OFDM system, traditional Fourier transform is replaced by fractional Fourier transform to modulate and demodulate the data symbols. The equalizer proposed consists of sampling the received signal in the different time per time symbol. Theoretical analysis and numerical simulation are discussed.

Keywords: OFDM, fractional fourier transform, internet and information technology

Procedia PDF Downloads 386
1061 Science Subjects Studied and Relation to Income after University Graduation: An Empirical Analysis in Japan

Authors: Kazuo Nishimura, Junichi Hirata, Tadashi Yagi, Junko Urasaka

Abstract:

This paper is an investigation of the effect of science education during the high school education how science graduates of universities are appreciated in the labor market in Japan. We conducted a survey utilizing the internet and analyzed the subjects they were good at and their annual income. The results confirm that among science graduates, workers adept at physics tend to have higher incomes compared to workers good at other subjects. Generational analysis based on the curriculum guideline amendments reveals that the generational difference is small among science majors who are good at physics.

Keywords: curriculum, income, physics, science

Procedia PDF Downloads 272
1060 Kuehne + Nagel's PharmaChain: IoT-Enabled Product Monitoring Using Radio Frequency Identification

Authors: Rebecca Angeles

Abstract:

This case study features the Kuehne + Nagel PharmaChain solution for ‘cold chain’ pharmaceutical and biologic product shipments with IOT-enabled features for shipment temperature and location tracking. Using the case study method and content analysis, this research project investigates the application of the structurational model of technology theory introduced by Orlikowski in order to interpret the firm’s entry and participation in the IOT-impelled marketplace.

Keywords: Internet of Things (IOT), radio frequency identification (RFID), structurational model of technology (Orlikowski), supply chain management

Procedia PDF Downloads 218
1059 Advanced Analysis on Dissemination of Pollutant Caused by Flaring System Effect Using Computational Fluid Dynamics (CFD) Fluent Model with WRF Model Input in Transition Season

Authors: Benedictus Asriparusa

Abstract:

In the area of the oil industry, there is accompanied by associated natural gas. The thing shows that a large amount of energy is being wasted mostly in the developing countries by contributing to the global warming process. This research represents an overview of methods in Minas area employed by these researchers in PT. Chevron Pacific Indonesia to determine ways of measuring and reducing gas flaring and its emission drastically. It provides an approximation includes analytical studies, numerical studies, modeling, computer simulations, etc. Flaring system is the controlled burning of natural gas in the course of routine oil and gas production operations. This burning occurs at the end of a flare stack or boom. The combustion process will release emissions of greenhouse gases such as NO2, CO2, SO2, etc. This condition will affect the air and environment around the industrial area. Therefore, we need a simulation to create the pattern of the dissemination of pollutant. This research paper has being made to see trends in gas flaring model and current developments to predict dominant variable which gives impact to dissemination of pollutant. Fluent models used to simulate the distribution of pollutant gas coming out of the stack. While WRF model output is used to overcome the limitations of the analysis of meteorological data and atmospheric conditions in the study area. This study condition focused on transition season in 2012 at Minas area. The goal of the simulation is looking for the exact time which is most influence towards dissemination of pollutants. The most influence factor divided into two main subjects. It is the quickest wind and the slowest wind. According to the simulation results, it can be seen that quickest wind moves to horizontal way and slowest wind moves to vertical way.

Keywords: flaring system, fluent model, dissemination of pollutant, transition season

Procedia PDF Downloads 364
1058 The Impact of Different Social Networks on the Development of Digital Entrepreneurship

Authors: Mohammad Mehdizadeh, Sara Miri

Abstract:

In today's world, competition is one of the essential components of different markets. Therefore, in addition to economic factors, social factors can also affect the development and prosperity of businesses. In this regard, social networks are of particular importance and play a critical role in the flourishing and development of Internet businesses. The purpose of this article is to investigate the effect of different social networks in promoting digital entrepreneurship. The research method is the descriptive survey. The results show that social networks have a positive and significant impact on digital entrepreneurship development. Among the social networks studied, Instagram and Facebook have the most positive effect on digital entrepreneurship.

Keywords: entrepreneurship, Facebook, Instagram, social media

Procedia PDF Downloads 329
1057 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data

Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda

Abstract:

Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.

Keywords: BGP, BGP hijacking, cybersecurity, detection

Procedia PDF Downloads 60
1056 A Study on Al-Riba Al-Hukmi and Its Instances from View of Islam

Authors: Abolfazl Alishahi Ghalehjoughi, Bi Bi Zeinab Hoseni

Abstract:

Islam is a comprehensive religion, and has rules for any thing. Islam attaches respect and importance to properties as well, and outlaws some types of transaction. A type of transaction that is strictly forbidden by the Islam is riba (usury), for which special punishments is considered in the Qur’an and hadiths. Usury is divided into (riba qarzi) loan usury and riba muamili (transaction usury); sometimes, in transaction and interest free loan contracts, ziyadah aini (interest in kind and of the same kind as that of the object of transaction) is not stipulated, but performance of work, provision of an advantage or a service, or a respite is stipulated, in which case although no ziyadah aini is in place, the transaction still constitutes usury and is outlaw. For instance, if a bank stipulates in an interest free loan contract that it pays a person the interest free loan only if he/she deposits a sum in the bank, this is an instance of riba hukmi. Or, for muamilah sarfi (transaction is which object of transaction and consideration is gold or silver) to be legitimate, it necessary that both the object of transaction and the consideration be handed over between the parties, because if a party takes delivery of the considered or object of transaction while the other party does not, the party who has taken delivery will accrue a benefit, as he/she wins time until he/she makes delivery to the other party, and this tantamount to usury in muamilah sarfi. Or, if a person lends a sum to another person, while the lender is indebted to the borrower, if the lender stipulates that he/she lends such amount only if the borrower postpones the maturity date of the lender’s debt to borrower, which is in one month, for a particular period of time, such loan will constitute usury. This research first provides views on riba hukmi, and then proceeds to analysis of views, trying to study fundamentals and proof regarding prohibition of riba hukmi, and to analyze instances of riba hukmi according to religious and hadith books.

Keywords: Islam, riba, prohibition, riba hukmi

Procedia PDF Downloads 356
1055 Online Language Tandem: Focusing on Intercultural Communication Competence and Non-Verbal Cues

Authors: Amira Benabdelkader

Abstract:

Communication presents the channel by which humankind create and maintain their relationship with others, express themselves, exchange information, learn and teach etc. The context of communication plays a distinctive role in deciding about the language to be used. The term context is mainly used to refer to the interlocutors, their cultures, languages, relationship, physical surrounding that is the communication setting, type of the information to be transmitted, the topic etc. Cultures, on one hand, impose on humans certain behaviours, attitudes, gestures and beliefs. On the other hand, the focus on language is inevitable as it is with its verbal and non-verbal components, a key tool in and for communication. Moreover, each language has its particularity in how people voice, address and express their thoughts, feelings and beliefs. Being in the same setting with people from different cultures and languages and having conversations with them would call upon the intercultural communicative competence. This latter would promote the success of their conversations. Additionally, this competence could manifest in several ways during their interactions, to the extent that no one can predict when and how the interlocutors would use it. The only thing probably that could be confirmed is that the setting and culture would in a way or another intervene and often shape the flow of their communication, if not the whole communication. Therefore, this paper will look at the intercultural communicative competence of language learners when introducing their cultures to each other in an online language tandem (henceforth OLT) using their second and/or foreign language with the L1 language speakers. The participants of this study are Algerian (use L2: French, FL: English), British (L1: English, L2/FL: French). In other words, this current paper will provide a qualitative analysis of the OLT experiment by emphasising how language learners can overcome the cultural differences in an intercultural setting while communicating online using Skype (video conversations) with people from different countries, cultures and L1. The non-verbal cues will have the lion share in the analysis by focusing on how they have been used to maintain this intercultural communication or hinder it through the misinterpretation of gestures, head movements, grimaces etc.

Keywords: intercultural communicative competence, non-verbal cues, online language tandem, Skype

Procedia PDF Downloads 259
1054 Identity Formation of Mixed-Race Children in Japan

Authors: Shuko Takeshita

Abstract:

This study investigates the identity formation of mixed-race children in Japan. From the latter half of the 1980s to the mid-2000s, Japan experienced an 'intermarriage boom,' which was soon followed by a fairly significant number of children born to these unions. These children are now coming of age. Among mixed-race children, some embraced both cultural traditions, while others chose a monocultural path despite exposure to two cultural traditions as they grew up. What factors are involved in shaping the identity of mixed-race children? How does identity formation actually occur in these children? This study addresses these questions through an interview survey of 139 cross-cultural families since 1999, including 23 Pakistani-Japanese families, 20 Turkish-Japanese families, 26 families comprising other international Muslim husbands and Japanese wives, 33 Filipino-Japanese families, and 37 Brazilian-Japanese families. The results of this two-decade-long study reveal that in cases where one cannot tell at first glance that children are mixed race, there is a tendency for them to hide their mixed background due to fear of bullying at school, as well as for their parents to encourage them to do this. To pass as a Japanese is one strategy for avoiding discrimination and prejudice, and it can provide a measure of ethnic security or a way of coping with social intolerance. Certainly, among my informants, there are some children who were bullied or teased at school, and as a result, they stopped attending or transferred to other schools. But the mixed-race experience is not always a negative thing in Japan. There is clearly a double standard involved in that mixed-race children of a Caucasian parent are more readily accepted by society than those of a non-Caucasian parent. The perceived social status of mixed-race individuals is usually understood in relation to the hierarchical positionings of monoracial groups. Mixed-race children could be guaranteed the right to enjoy the benefit of maintaining and developing an identity as a Japanese, in addition to one more identity. We need to encourage a new awareness of the children as agents for a transition from a monocultural system to a multicultural system in Japanese society.

Keywords: identity formation, intermarriage, mixed race, multicultural children

Procedia PDF Downloads 180
1053 Poultry in Motion: Text Mining Social Media Data for Avian Influenza Surveillance in the UK

Authors: Samuel Munaf, Kevin Swingler, Franz Brülisauer, Anthony O’Hare, George Gunn, Aaron Reeves

Abstract:

Background: Avian influenza, more commonly known as Bird flu, is a viral zoonotic respiratory disease stemming from various species of poultry, including pets and migratory birds. Researchers have purported that the accessibility of health information online, in addition to the low-cost data collection methods the internet provides, has revolutionized the methods in which epidemiological and disease surveillance data is utilized. This paper examines the feasibility of using internet data sources, such as Twitter and livestock forums, for the early detection of the avian flu outbreak, through the use of text mining algorithms and social network analysis. Methods: Social media mining was conducted on Twitter between the period of 01/01/2021 to 31/12/2021 via the Twitter API in Python. The results were filtered firstly by hashtags (#avianflu, #birdflu), word occurrences (avian flu, bird flu, H5N1), and then refined further by location to include only those results from within the UK. Analysis was conducted on this text in a time-series manner to determine keyword frequencies and topic modeling to uncover insights in the text prior to a confirmed outbreak. Further analysis was performed by examining clinical signs (e.g., swollen head, blue comb, dullness) within the time series prior to the confirmed avian flu outbreak by the Animal and Plant Health Agency (APHA). Results: The increased search results in Google and avian flu-related tweets showed a correlation in time with the confirmed cases. Topic modeling uncovered clusters of word occurrences relating to livestock biosecurity, disposal of dead birds, and prevention measures. Conclusions: Text mining social media data can prove to be useful in relation to analysing discussed topics for epidemiological surveillance purposes, especially given the lack of applied research in the veterinary domain. The small sample size of tweets for certain weekly time periods makes it difficult to provide statistically plausible results, in addition to a great amount of textual noise in the data.

Keywords: veterinary epidemiology, disease surveillance, infodemiology, infoveillance, avian influenza, social media

Procedia PDF Downloads 91
1052 A Survey on Various Technique of Modified TORA over MANET

Authors: Shreyansh Adesara, Sneha Pandiya

Abstract:

The mobile ad-hoc network (MANET) is an important and open area research for the examination and determination of the performance evolution. Temporary ordered routing algorithm (TORA) is adaptable and distributed MANET routing algorithm which is totally dependent on internet MANET Encapsulation protocol (IMEP) for the detection of the link and sensing of the link. If IMEP detect the wrong link failure then the network suffer from congestion and unnecessary route maintenance. Thus, the improvement in link detection method of TORA is introduced by various methods on IMEP by different perspective from different person. There are also different reactive routing protocols like AODV, TORA and DSR has been compared for the knowledge of the routing scenario for different parameter and using different model.

Keywords: IMEP, mobile ad-hoc network, protocol, TORA

Procedia PDF Downloads 431
1051 Revolutionizing Healthcare Facility Maintenance: A Groundbreaking AI, BIM, and IoT Integration Framework

Authors: Mina Sadat Orooje, Mohammad Mehdi Latifi, Behnam Fereydooni Eftekhari

Abstract:

The integration of cutting-edge Internet of Things (IoT) technologies with advanced Artificial Intelligence (AI) systems is revolutionizing healthcare facility management. However, the current landscape of hospital building maintenance suffers from slow, repetitive, and disjointed processes, leading to significant financial, resource, and time losses. Additionally, the potential of Building Information Modeling (BIM) in facility maintenance is hindered by a lack of data within digital models of built environments, necessitating a more streamlined data collection process. This paper presents a robust framework that harmonizes AI with BIM-IoT technology to elevate healthcare Facility Maintenance Management (FMM) and address these pressing challenges. The methodology begins with a thorough literature review and requirements analysis, providing insights into existing technological landscapes and associated obstacles. Extensive data collection and analysis efforts follow to deepen understanding of hospital infrastructure and maintenance records. Critical AI algorithms are identified to address predictive maintenance, anomaly detection, and optimization needs alongside integration strategies for BIM and IoT technologies, enabling real-time data collection and analysis. The framework outlines protocols for data processing, analysis, and decision-making. A prototype implementation is executed to showcase the framework's functionality, followed by a rigorous validation process to evaluate its efficacy and gather user feedback. Refinement and optimization steps are then undertaken based on evaluation outcomes. Emphasis is placed on the scalability of the framework in real-world scenarios and its potential applications across diverse healthcare facility contexts. Finally, the findings are meticulously documented and shared within the healthcare and facility management communities. This framework aims to significantly boost maintenance efficiency, cut costs, provide decision support, enable real-time monitoring, offer data-driven insights, and ultimately enhance patient safety and satisfaction. By tackling current challenges in healthcare facility maintenance management it paves the way for the adoption of smarter and more efficient maintenance practices in healthcare facilities.

Keywords: artificial intelligence, building information modeling, healthcare facility maintenance, internet of things integration, maintenance efficiency

Procedia PDF Downloads 33
1050 Determinants of Youth Engagement with Health Information on Social Media Platforms in United Arab Emirates

Authors: Niyi Awofeso, Yunes Gaber, Moyosola Bamidele

Abstract:

Since most social media platforms are accessible anytime and anywhere where Internet connections and smartphones are available, the invisibility of the reader raises questions about accuracy, appropriateness and comprehensibility of social media communication. Furthermore, the identity and motives of individuals and organizations who post articles on social media sites are not always transparent. In the health sector, through socially networked platforms constitute a common source of health-related information, given their purported wealth of information. Nevertheless, fake blogs and sponsored postings for marketing 'natural cures' pervade most commonly used social media platforms, thus complicating readers’ abilities to access and understand trustworthy health-related information. This purposive sampling study of 120 participants aged 18-35 year in UAE was conducted between September and December 2017, and explored commonly used social media platforms, frequency of use of social media for accessing health related information, and approaches for assessing the trustworthiness of health information on social media platforms. Results indicate that WhatsApp (95%), Instagram (87%) and Youtube (82%) were the most commonly used social media platforms among respondents. Majority of respondents (81%) indicated that they regularly access social media to get health-associated information. More than half of respondents (55%) with non-chronic health status relied on unsolicited messages to obtain health-related information. Doctors’ health blogs (21%) and social media sites of international healthcare organizations (20%) constitute the most trusted source of health information among respondents, with UAE government health agencies’ social media accounts trusted by 15% of respondents. Cardiovascular diseases, diabetes, and hypertension were the most commonly searched topics on social media (29%), followed by nutrition (20%) and skin care (16%). Majority of respondents (41%) rely on reliability of hits on Google search engines, 22% check for health information only from 'reliable' social media sites, while 8% utilize 'logic' to ascertain reliability of health information. As social media has rapidly become an integral part of the health landscape, it is important that health care policy makers, healthcare providers and social media companies collaborate to promote the positive aspects of social media for young people, whilst mitigating the potential negatives. Utilizing popular social media platforms for posting reader-friendly health information will achieve high coverage. Improving youth digital literacy will facilitate easier access to trustworthy information on the internet.

Keywords: social media, United Arab Emirates, youth engagement, digital literacy

Procedia PDF Downloads 104
1049 Perceptions and Experiences of Students and Their Instructors on Online versus Face-To-Face Classrooms

Authors: Rahime Filiz Kiremit

Abstract:

This study involves investigating the comparisons of both online and face-to-face classes, along with providing their respective differences. The research project contains information pertaining to the two courses, provided with testimony from students and instructors alike. There were a total of 37 participants involved within the study from San Jacinto College; 35 students and the two instructors of their respective courses. The online instructor has a total of four years of teaching experience, while the face-to-face instructor has accrued 11 years of instructional education. The both instructors were interviewed and the samples were collected from three different classes - TECA 1311-702 (Educating Young Children 13 week distance learning), TECA 1311-705 (Educating Young Children 13 week distance learning) and TECA 1354 (Child Growth and Development). Among all three classes, 13 of the 29 students enrolled in either of the online courses considered participation within the survey, while 22 of the 28 students enrolled in the face-to-face course elected to do the same thing. With regards to the students’ prior class enrollment, 25 students had taken online classes previously, 9 students had taken early-childhood courses, 4 students had taken general classes, 11 students had taken both types of classes, 10 students had not yet taken online classes, and only 1 of them had taken a hybrid course. 10 of the participants professed that they like face-to-face classes, because they find that they can interact with their classmates and teachers. They find that online classes have more work to do, because they need to read the chapters and instructions on their own time. They said that during the face-to-face instruction, they could take notes and converse concerns with professors and fellow peers. They can have hands-on activities during face-to-face classes, and, as a result, improve their abilities to retain what they have learned within that particular time. Some of the students even mentioned that they are supposed to discipline themselves, because the online classes require more work. According to the remaining six students, online classes are easier than face-to-face classes. Most of them believe that the easiness of a course is dependent on the types of classes, the instructors, and the respective subjects of which they teach. With considerations of all 35 students, almost 63% of the students agreed that they interact more with their classmates in face-to-face classes.

Keywords: distance education, face-to-face education, online classroom, students' perceptions

Procedia PDF Downloads 266
1048 Organization of the Purchasing Function for Innovation

Authors: Jasna Prester, Ivana Rašić Bakarić, Božidar Matijević

Abstract:

Various prominent scholars and substantial practitioner-oriented literature on innovation orientation have shown positive effects on firm performance. There is a myriad of factors that influence and enhance innovation but it has been found in the literature that new product innovations accounted for an average of 14 percent of sales revenues for all firms. If there is one thing that has changed in innovation management during the last decade, it is the growing reliance on external partners. As a consequence, a new task for purchasing arises, as firms need to understand which suppliers actually do have high potential contributing to the innovativeness of the firm and which do not. Purchasing function in an organization is extremely important as it deals on an average of 50% or more of a firm's expenditures. In the nineties the purchasing department was largely seen as a transaction-oriented, clerical function but today purchasing integration provides a formal interface mechanism between purchasing and other firm functions that services other functions within the company. Purchasing function has to be organized differently to enable firm innovation potential. However, innovations are inherently risky. There are behavioral risk (that some partner will take advantage of the other party), technological risk in terms of complexity of products and processes of manufacturing and incoming materials and finally market risks, which in fact judge the value of the innovation. These risks are investigated in this work since it has been found in the literature that the higher the technological risk, higher will be the centralization of the purchasing function as an interface with other supply chain members. Most researches on organization of purchasing function were done by case study analysis of innovative firms. This work actually tends to prove or discard results found in the literature based on case study method. A large data set of 1493 companies, from 25 countries collected in the GMRG 4 survey served as a basis for analysis.

Keywords: purchasing function organization, innovation, technological risk, GMRG 4 survey

Procedia PDF Downloads 468
1047 A Survey of Crowdsourcing Technology

Authors: Qianjia Cheng, Hongquan Jiang

Abstract:

Crowdsourcing solves the problems that computers can't handle by integrating computers and the Internet. Its extensive knowledge sources, high efficiency and high quality, make crowdsourcing attract wide attention in industry and academia in recent years. The development of online crowdsourcing platforms such as Clickworker and Amazon Mechanical Turk(Mturk) tend to mature gradually. This paper sorts out the concept of crowdsourcing, sorts out the workflow of competitive crowdsourcing, summarizes the related technologies of crowdsourcing based on the workflow, quality control, cost control and delay control, introduces the typical crowdsourcing platform. Finally, we highlight some open problems of the current crowdsourcing and present some future research direction in this area.

Keywords: application, crowdsourcing, crowdsourcing platform, system architecture

Procedia PDF Downloads 55
1046 Analysis of Operation System Reorganization for Load Balancing of Parcel Sorting

Authors: J. H. Lee

Abstract:

As the internet and smartphone use increases, the E-Commerce is constantly growing. Therefore, the parcel is increasing continuously every year. If the larger amount than the processing capacity of the current facilities is received, they do not process, and the delivery quality becomes low. In this paper, therefore, we analyze comparatively at the cost perspective between the case of building a new facility for the increasing parcel volumes and the case of reorganizing the current operating system. We propose the optimal discount policy per parcel by calculating the construction cost of new automated facility and manual facilities until the construction of the new automated facility, and discount price.

Keywords: system reorganization, load balancing, parcel sorting, discount policy

Procedia PDF Downloads 253
1045 On Multiobjective Optimization to Improve the Scalability of Fog Application Deployments Using Fogtorch

Authors: Suleiman Aliyu

Abstract:

Integrating IoT applications with Fog systems presents challenges in optimization due to diverse environments and conflicting objectives. This study explores achieving Pareto optimal deployments for Fog-based IoT systems to address growing QoS demands. We introduce Pareto optimality to balance competing performance metrics. Using the FogTorch optimization framework, we propose a hybrid approach (Backtracking search with branch and bound) for scalable IoT deployments. Our research highlights the advantages of Pareto optimality over single-objective methods and emphasizes the role of FogTorch in this context. Initial results show improvements in IoT deployment cost in Fog systems, promoting resource-efficient strategies.

Keywords: pareto optimality, fog application deployment, resource allocation, internet of things

Procedia PDF Downloads 59
1044 IEEE802.15.4e Based Scheduling Mechanisms and Systems for Industrial Internet of Things

Authors: Ho-Ting Wu, Kai-Wei Ke, Bo-Yu Huang, Liang-Lin Yan, Chun-Ting Lin

Abstract:

With the advances in advanced technology, wireless sensor network (WSN) has become one of the most promising candidates to implement the wireless industrial internet of things (IIOT) architecture. However, the legacy IEEE 802.15.4 based WSN technology such as Zigbee system cannot meet the stringent QoS requirement of low powered, real-time, and highly reliable transmission imposed by the IIOT environment. Recently, the IEEE society developed IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) access mode to serve this purpose. Furthermore, the IETF 6TiSCH working group has proposed standards to integrate IEEE 802.15.4e with IPv6 protocol smoothly to form a complete protocol stack for IIOT. In this work, we develop key network technologies for IEEE 802.15.4e based wireless IIoT architecture, focusing on practical design and system implementation. We realize the OpenWSN-based wireless IIOT system. The system architecture is divided into three main parts: web server, network manager, and sensor nodes. The web server provides user interface, allowing the user to view the status of sensor nodes and instruct sensor nodes to follow commands via user-friendly browser. The network manager is responsible for the establishment, maintenance, and management of scheduling and topology information. It executes centralized scheduling algorithm, sends the scheduling table to each node, as well as manages the sensing tasks of each device. Sensor nodes complete the assigned tasks and sends the sensed data. Furthermore, to prevent scheduling error due to packet loss, a schedule inspection mechanism is implemented to verify the correctness of the schedule table. In addition, when network topology changes, the system will act to generate a new schedule table based on the changed topology for ensuring the proper operation of the system. To enhance the system performance of such system, we further propose dynamic bandwidth allocation and distributed scheduling mechanisms. The developed distributed scheduling mechanism enables each individual sensor node to build, maintain and manage the dedicated link bandwidth with its parent and children nodes based on locally observed information by exchanging the Add/Delete commands via two processes. The first process, termed as the schedule initialization process, allows each sensor node pair to identify the available idle slots to allocate the basic dedicated transmission bandwidth. The second process, termed as the schedule adjustment process, enables each sensor node pair to adjust their allocated bandwidth dynamically according to the measured traffic loading. Such technology can sufficiently satisfy the dynamic bandwidth requirement in the frequently changing environments. Last but not least, we propose a packet retransmission scheme to enhance the system performance of the centralized scheduling algorithm when the packet delivery rate (PDR) is low. We propose a multi-frame retransmission mechanism to allow every single network node to resend each packet for at least the predefined number of times. The multi frame architecture is built according to the number of layers of the network topology. Performance results via simulation reveal that such retransmission scheme is able to provide sufficient high transmission reliability while maintaining low packet transmission latency. Therefore, the QoS requirement of IIoT can be achieved.

Keywords: IEEE 802.15.4e, industrial internet of things (IIOT), scheduling mechanisms, wireless sensor networks (WSN)

Procedia PDF Downloads 143
1043 Remote Wireless Communications Lab in Real Time

Authors: El Miloudi Djelloul

Abstract:

Technology nowadays enables the remote access to laboratory equipment and instruments via Internet. This is especially useful in engineering education, where students can conduct laboratory experiment remotely. Such remote laboratory access can enable student to use expensive laboratory equipment, which is not usually available to students. In this paper, we present a method of creating a Web-based Remote Laboratory Experimentation in the master degree course “Wireless Communications Systems” which is part of “ICS (Information and Communication Systems)” and “Investment Management in Telecommunications” curriculums. This is done within the RIPLECS Project and the NI2011 FF005 Research Project “Implementation of Project-Based Learning in an Interdisciplinary Master Program”.

Keywords: remote access, remote laboratory, wireless telecommunications, external antenna-switching controller board (EASCB)

Procedia PDF Downloads 497
1042 A Survey of Crowdsourcing Technology and Application

Authors: Qianjia Cheng, Hongquan Jiang

Abstract:

Crowdsourcing solves the problems that computers can't handle by integrating computers and the Internet. Its extensive knowledge sources, high efficiency, and high quality have made crowdsourcing attract wide attention in industry and academia in recent years. The development of online crowdsourcing platforms such as Clickworker, Amazon Mechanical Turk(Mturk) tends to mature gradually. This paper sorts out the concept of crowdsourcing, sorts out the workflow of competitive crowdsourcing, summarizes the related technologies of crowdsourcing based on workflow, quality control, cost control, and delay control, and introduces the typical crowdsourcing platform. Finally, we highlight some open problems of the current crowdsourcing and present some future research directions in this area.

Keywords: application, crowdsourcing, crowdsourcing platform, system architecture

Procedia PDF Downloads 70
1041 The Egyptian eGovernment Journey

Authors: Ali Abdelsattar Elshabrawy

Abstract:

The Egyptian government is struggling to build it's eGovernment project. They succeeded to build the Egyptian digital portal, which contain links for number of services provided by different ministries. For achieving such success, their are requirements necessary to build such a project such as: internet dissemination, IT literacy, Strategy, disqualification of paper based services. This paper is going to clarify the main obstacles to the Egyptian eGovernment project from both the supply and demand sides. Also will clarify the most critical requirements in this phase of the project lifecycle. This paper should be in great value for the project team and also for many other developing countries that share the same obstacles.

Keywords: the egyptian egovernment project lifecycle, supply side barriers, demand side barriers, egovernment project requirements

Procedia PDF Downloads 137