Search results for: data communication
26776 Parents-Children Communication in College
Authors: Yin-Chen Liu, Chih-Chun Wu, Mei-He Shih
Abstract:
In this technology society, using ICT(Information and communications technology) to contact each other is very common. Interpersonal ICT communication maintains social support. Therefore, the study investigated the ICT communication between undergraduates and their parents, and gender differences were also detected. The sample size was 1,209 undergraduates, including 624(51.6%) males, 584(48.3%) females, and 1 gender unidentified. In the sample, 91.8% of the sample used phones to contact their fathers and 93.8% of them use phones to contact their mothers. 78.5% and 87.6% of the sample utilized LINE to contact their fathers and mothers respectively. As for Facebook, only 13.4% and 16.5% of the sample would use to contact their fathers and mothers respectively. Aforementioned results implied that the undergraduates nowadays use phone and LINE to contact their parents more common than Facebook. According to results from Pearson correlations, the more undergraduates refused to add their fathers as their Facebook friends, the more they refused to add their mothers as Facebook friends. The possible reasons for it could be that to distinguish different social network such as family and friends. Another possible reason could be avoiding parents’ controlling. It could be why the kids prefer to use phone and LINE to Facebook when contacting their parents. Result from Pearson correlations showed that the more undergraduates actively contact their fathers, the more they actively contact their mothers. On the other hand, the more their fathers actively contact them, the more their mothers actively contact them. Based on the results, this study encourages both parents and undergraduates to contact each other, for any contact between any two family members is associated with contact between other two family members. Obviously, the contact between family members is bidirectional. Future research might want to investigate if this bidirectional contact is associated with the family relation. For gender differences, results from the independent t-tests showed that compared to sons, daughters actively contacted their parents more. Maybe it is because parents keep saying that it is dangerous out there for their daughters, so they build up the habit for their daughters to contact them more. Results from paired sample t-tests showed that the undergraduates agreed that talking to mother on the phone had more satisfaction, felt more intimacy and supported than fathers.Keywords: family ICT communication, parent-child ICT communication, FACEBOOK and LINE, gender differences
Procedia PDF Downloads 20226775 A Survey on Genetic Algorithm for Intrusion Detection System
Authors: Prikhil Agrawal, N. Priyanka
Abstract:
With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security
Procedia PDF Downloads 29526774 The Data Quality Model for the IoT based Real-time Water Quality Monitoring Sensors
Authors: Rabbia Idrees, Ananda Maiti, Saurabh Garg, Muhammad Bilal Amin
Abstract:
IoT devices are the basic building blocks of IoT network that generate enormous volume of real-time and high-speed data to help organizations and companies to take intelligent decisions. To integrate this enormous data from multisource and transfer it to the appropriate client is the fundamental of IoT development. The handling of this huge quantity of devices along with the huge volume of data is very challenging. The IoT devices are battery-powered and resource-constrained and to provide energy efficient communication, these IoT devices go sleep or online/wakeup periodically and a-periodically depending on the traffic loads to reduce energy consumption. Sometime these devices get disconnected due to device battery depletion. If the node is not available in the network, then the IoT network provides incomplete, missing, and inaccurate data. Moreover, many IoT applications, like vehicle tracking and patient tracking require the IoT devices to be mobile. Due to this mobility, If the distance of the device from the sink node become greater than required, the connection is lost. Due to this disconnection other devices join the network for replacing the broken-down and left devices. This make IoT devices dynamic in nature which brings uncertainty and unreliability in the IoT network and hence produce bad quality of data. Due to this dynamic nature of IoT devices we do not know the actual reason of abnormal data. If data are of poor-quality decisions are likely to be unsound. It is highly important to process data and estimate data quality before bringing it to use in IoT applications. In the past many researchers tried to estimate data quality and provided several Machine Learning (ML), stochastic and statistical methods to perform analysis on stored data in the data processing layer, without focusing the challenges and issues arises from the dynamic nature of IoT devices and how it is impacting data quality. A comprehensive review on determining the impact of dynamic nature of IoT devices on data quality is done in this research and presented a data quality model that can deal with this challenge and produce good quality of data. This research presents the data quality model for the sensors monitoring water quality. DBSCAN clustering and weather sensors are used in this research to make data quality model for the sensors monitoring water quality. An extensive study has been done in this research on finding the relationship between the data of weather sensors and sensors monitoring water quality of the lakes and beaches. The detailed theoretical analysis has been presented in this research mentioning correlation between independent data streams of the two sets of sensors. With the help of the analysis and DBSCAN, a data quality model is prepared. This model encompasses five dimensions of data quality: outliers’ detection and removal, completeness, patterns of missing values and checks the accuracy of the data with the help of cluster’s position. At the end, the statistical analysis has been done on the clusters formed as the result of DBSCAN, and consistency is evaluated through Coefficient of Variation (CoV).Keywords: clustering, data quality, DBSCAN, and Internet of things (IoT)
Procedia PDF Downloads 13726773 A Survey of Feature-Based Steganalysis for JPEG Images
Authors: Syeda Mainaaz Unnisa, Deepa Suresh
Abstract:
Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography
Procedia PDF Downloads 21626772 Case Study: Throughput Analysis over PLC Infrastructure as Last Mile Residential Solution in Colombia
Authors: Edward P. Guillen, A. Karina Martinez Barliza
Abstract:
Powerline Communications (PLC) as last mile solution to provide communication services, has the advantage of transmitting over channels already used for electrical distribution. However these channels have been not designed with this purpose, for that reason telecommunication companies in Colombia want to know how good would be using PLC in costs and network performance in comparison to cable modem or DSL. This paper analyzes PLC throughput for residential complex scenarios using a PLC network scenarios and some statistical results are shown.Keywords: home network, power line communication, throughput analysis, power factor, cost, last mile solution
Procedia PDF Downloads 26526771 Human Computer Interaction Using Computer Vision and Speech Processing
Authors: Shreyansh Jain Jeetmal, Shobith P. Chadaga, Shreyas H. Srinivas
Abstract:
Internet of Things (IoT) is seen as the next major step in the ongoing revolution in the Information Age. It is predicted that in the near future billions of embedded devices will be communicating with each other to perform a plethora of tasks with or without human intervention. One of the major ongoing hotbed of research activity in IoT is Human Computer Interaction (HCI). HCI is used to facilitate communication between an intelligent system and a user. An intelligent system typically comprises of a system consisting of various sensors, actuators and embedded controllers which communicate with each other to monitor data collected from the environment. Communication by the user to the system is typically done using voice. One of the major ongoing applications of HCI is in home automation as a personal assistant. The prime objective of our project is to implement a use case of HCI for home automation. Our system is designed to detect and recognize the users and personalize the appliances in the house according to their individual preferences. Our HCI system is also capable of speaking with the user when certain commands are spoken such as searching on the web for information and controlling appliances. Our system can also monitor the environment in the house such as air quality and gas leakages for added safety.Keywords: human computer interaction, internet of things, computer vision, sensor networks, speech to text, text to speech, android
Procedia PDF Downloads 36126770 Control and Automation of Sensors in Metering System of Fluid
Authors: Abdelkader Harrouz, Omar Harrouz, Ali Benatiallah
Abstract:
This paper is to present the essential definitions, roles and characteristics of automation of metering system. We discuss measurement, data acquisition and metrological control of a signal sensor from dynamic metering system. After that, we present control of instruments of metering system of fluid with more detailed discussions to the reference standards.Keywords: communication, metering, computer, sensor
Procedia PDF Downloads 55226769 Load-Enabled Deployment and Sensing Range Optimization for Lifetime Enhancement of WSNs
Authors: Krishan P. Sharma, T. P. Sharma
Abstract:
Wireless sensor nodes are resource constrained battery powered devices usually deployed in hostile and ill-disposed areas to cooperatively monitor physical or environmental conditions. Due to their limited power supply, the major challenge for researchers is to utilize their battery power for enhancing the lifetime of whole network. Communication and sensing are two major sources of energy consumption in sensor networks. In this paper, we propose a deployment strategy for enhancing the average lifetime of a sensor network by effectively utilizing communication and sensing energy to provide full coverage. The proposed scheme is based on the fact that due to heavy relaying load, sensor nodes near to the sink drain energy at much faster rate than other nodes in the network and consequently die much earlier. To cover this imbalance, proposed scheme finds optimal communication and sensing ranges according to effective load at each node and uses a non-uniform deployment strategy where there is a comparatively high density of nodes near to the sink. Probable relaying load factor at particular node is calculated and accordingly optimal communication distance and sensing range for each sensor node is adjusted. Thus, sensor nodes are placed at locations that optimize energy during network operation. Formal mathematical analysis for calculating optimized locations is reported in present work.Keywords: load factor, network lifetime, non-uniform deployment, sensing range
Procedia PDF Downloads 38126768 Control the Flow of Big Data
Authors: Shizra Waris, Saleem Akhtar
Abstract:
Big data is a research area receiving attention from academia and IT communities. In the digital world, the amounts of data produced and stored have within a short period of time. Consequently this fast increasing rate of data has created many challenges. In this paper, we use functionalism and structuralism paradigms to analyze the genesis of big data applications and its current trends. This paper presents a complete discussion on state-of-the-art big data technologies based on group and stream data processing. Moreover, strengths and weaknesses of these technologies are analyzed. This study also covers big data analytics techniques, processing methods, some reported case studies from different vendor, several open research challenges and the chances brought about by big data. The similarities and differences of these techniques and technologies based on important limitations are also investigated. Emerging technologies are suggested as a solution for big data problems.Keywords: computer, it community, industry, big data
Procedia PDF Downloads 19226767 Causes and Consequences of Intuitive Animal Communication: A Case Study at Panthera Africa
Authors: Cathrine Scharning Cornwall-Nyquist, David Rafael Vaz Fernandes
Abstract:
Since its origins, mankind has been dreaming of communicating directly with other animals. Past civilizations interacted on different levels with other species and recognized them in their rituals and daily activities. However, recent scientific developments have limited the ability of humans to consider deeper levels of interaction beyond observation and/or physical behavior. In recent years, animal caretakers and facilities such as sanctuaries or rescue centers have been introducing new techniques based on intuition. Most of those initiatives are related to specific cases, such as the incapacity to understand an animal’s behavior. Respected organizations also include intuitive animal communication (IAC) sessions to follow up on past interventions with their animals. Despite the lack of credibility of this discipline, some animal caring structures have opted to integrate IAC into their daily routines and approaches to animal welfare. At this stage, animal communication will be generally defined as the ability of humans to communicate with animals on an intuitive level. The trend in the field remains to be explored. The lack of theory and previous research urges the scientific community to improve the description of the phenomenon and its consequences. Considering the current scenario, qualitative approaches may become a suitable pathway to explore this topic. The purpose of this case study is to explore the beliefs behind and the consequences of an approach based on intuitive animal communication techniques for Panthera Africa (PA), an ethical sanctuary located in South Africa. Due to their personal experience, the Sanctuary’s founders have developed a philosophy based on IAC while respecting the world's highest standards for big cat welfare. Their dual approach is reflected in their rescues, daily activities, and healing animals’ trauma. The case study's main research questions will be: (i) Why do they choose to apply IAC in their work? (ii) What consequences to their activities do IAC bring? (iii) What effects do IAC techniques bring in their interactions with the outside world? Data collection will be gathered on-site via: (i) Complete participation (field notes); (ii) Semi-structured interviews (audio transcriptions); (iii) Document analysis (internal procedures and policies); (iv) Audio-visual material (communication with third parties). The main researcher shall become an active member of the Sanctuary during a 30-day period and have full access to the site. Access to documents and audio-visual materials will be granted on a request basis. Interviews are expected to be held with PA founders and staff members and with IAC practitioners related to the facility. The information gathered shall enable the researcher to provide an extended description of the phenomenon and explore its internal and external consequences for Panthera Africa.Keywords: animal welfare, intuitive animal communication, Panthera Africa, rescue
Procedia PDF Downloads 9126766 Intensive Intercultural English Language Pedagogy among Parents from Culturally and Linguistically Diverse Backgrounds (CALD)
Authors: Ann Dashwood
Abstract:
Using Standard Australian English with confidence is a cultural expectation of parents of primary school aged children who want to engage effectively with their children’s teachers and school administration. That confidence in support of their children’s learning at school is seldom experienced by parents whose first language is not English. Sharing language with competence in an intercultural environment is the common denominator for meaningful communication and engagement to occur in a school community. Experience in relevant, interactive sessions is known to enhance engagement and participation. The purpose of this paper is to identify a pedagogy for parents otherwise isolated from daily use of functional Australian cultural language learned to engage effectively in their children’s learning at school. The outcomes measure parents’ intercultural engagement with classroom teachers and attention to the school’s administrative procedures using quantitative and qualitative methods. A principled communicative task-based language learning approach, combined with intercultural communication strategies provide the theoretical base for intensive English inquiry-based learning and engagement. The quantitative analysis examines data samples collected by classroom teachers and administrators and parents’ writing samples. Interviews and observations qualitatively inform the study. Currently, significant numbers of projects are active in community centers and schools to enhance English language knowledge of parents from Language Backgrounds Other Than English (LBOTE). The study is significant to explore the effects of an intensive English pedagogy with parents of varied English language backgrounds, by targeting inquiry-based language use for social interactions in the school and wider community, specific engagement and cultural interaction with teachers and school activities and procedures.Keywords: engagement, intercultural communication, language teaching pedagogy, LBOTE, school community
Procedia PDF Downloads 11926765 Student-Athletes Self-Concept, GPA and Training in the Climate of Social Networking
Authors: Indhumathi Gopal, Ashley Johnson
Abstract:
Social media use for communication among college student-athletes is growing. There is little research on student-athletes use of Blogs, one of the online communication tool outlets. Twenty-seven student-athletes, aged 18-24 years completed a student perception questionnaire which assessed demographics, the effect of blogging on college student-athletes self-concept, the correlation of age, GPA and blogging as well as the training students received in the use of social media. Descriptive statistics and Pearson correlations were analyzed examined. Results indicated a significant correlation between use of Blogs and student age (p < .01) and student GPA earned (p < .01). With respect to self-concept, results suggest that blogging could be a useful tool for communication but can present challenges, could affect student self-esteem either, positively or negatively. The training student-athletes received in the use of social media was not adequate. College athletes’ can more easily divulge information about their personal lives and opinions on social media and challenge the athletic programs and their own future. The findings of the study suggest implications for student-athletes to be better prepared for the current media climate.Keywords: college student-athletes, self-concept, use of social media training, social networking
Procedia PDF Downloads 59226764 Security Model for RFID Systems
Authors: John Ayoade
Abstract:
Radio Frequency Identification (RFID) has gained a lot of popularity in all walks of life due to its usefulness and diverse use of the technology in almost every application. However, there have been some security concerns most especially in regards to how authentic readers and tags can confirm their authenticity before confidential data is exchanged between them. In this paper, Kerberos protocol is adopted for the mutual authentication of RFID system components in order to ensure the secure communication between those components and to realize the authenticity of the communicating components.Keywords: RFID, security, mutual authentication, Kerberos
Procedia PDF Downloads 46626763 1,8-Naphthalimide Substituted 4,4-Difluoroboradiaza-S-Indacene Dyads: Synthesis, Structure, Properties and Live-Cell Imaging
Authors: Madhurima Poddar, Vinay Sharma, Shaikh M. Mobin, Rajneesh Misra
Abstract:
Three 1,8-naphthalimide (NPI) substituted 4,4-difluoroboradiaza-s-indacene (BODIPY) dyads were synthesized via Pd-catalyzed Sonogashira cross-coupling reaction of ethynyl substituted NPI with the meso-, β- and α-halogenated BODIPYs, respectively. The photophysical and electrochemical data reveals considerable electronic communication between the BODIPY and NPI moieties. The electronic absorption spectrum reveals that the substitution of NPI at α position of BODIPY exhibit better electronic communication between the NPI and the BODIPY units. The electronic structures of all the dyads exhibit planar geometries which are in a good correlation with the structures obtained from single crystal X-ray diffraction. The crystal structures of the dyads exhibit interesting supramolecular interactions. The dyads show good cytocompatibility with the potential of multicolor live-cell imaging; making them excellent candidates for biological applications. The work provides an important strategy of screening the substitution pattern at different position of BODIPYs which will be useful for the design of BODIPY based organic molecules for various optoelectronic applications as well as bio-imaging.Keywords: bio-imaging studies, cross-coupling, cyclic voltammetry, density functional calculations, fluorescence spectra, single crystal XRD, UV/Vis spectroscopy
Procedia PDF Downloads 14426762 Analysing Tertiary Lecturers’ Teaching Practices and Their English Major Students’ Learning Practices with Information and Communication Technology (ICT) Utilization in Promoting Higher-Order Thinking Skills (HOTs)
Authors: Malini Ganapathy, Sarjit Kaur
Abstract:
Maximising learning with higher-order thinking skills with Information and Communications Technology (ICT) has been deep-rooted and emphasised in various developed countries such as the United Kingdom, the United States of America and Singapore. The transformation of the education curriculum in the Malaysia Education Development Plan (PPPM) 2013-2025 focuses on the concept of Higher Order Thinking (HOT) skills which aim to produce knowledgeable students who are critical and creative in their thinking and can compete at the international level. HOT skills encourage students to apply, analyse, evaluate and think creatively in and outside the classroom. In this regard, the National Education Blueprint (2013-2025) is grounded based on high-performing systems which promote a transformation of the Malaysian education system in line with the vision of Malaysia’s National Philosophy in achieving educational outcomes which are of world class status. This study was designed to investigate ESL students’ learning practices on the emphasis of promoting HOTs while using ICT in their curricula. Data were collected using a stratified random sampling where 100 participants were selected to take part in the study. These respondents were a group of undergraduate students who undertook ESL courses in a public university in Malaysia. A three-part questionnaire consisting of demographic information, students’ learning experience and ICT utilization practices was administered in the data collection process. Findings from this study provide several important insights on students’ learning experiences and ICT utilization in developing HOT skills.Keywords: English as a second language students, critical and creative thinking, learning, information and communication technology and higher order thinking skills
Procedia PDF Downloads 48826761 A CMOS D-Band Power Amplifier in 22FDSOI Technology for 6G Applications
Authors: Karandeep Kaur
Abstract:
This paper presents the design of power amplifier (PA) for mmWave communication systems. The designed amplifier uses GlobalFoundries 22 FDX technology and works at an operational frequency of 140 GHz in the D-Band. With a supply voltage of 0.8V for the super low threshold voltage transistors, the amplifier is biased in class AB and has a total current consumption of 50 mA. The measured saturated output power from the power amplifier is 5.6 dBm with an output-referred 1dB-compression point of 1.6dBm. The measured gain of PA is 19 dB with 3 dB-bandwidth ranging from 120 GHz to 140 GHz. The chip occupies an area of 795µm × 410µm.Keywords: mmWave communication system, power amplifiers, 22FDX, D-Band, cross-coupled capacitive neutralization
Procedia PDF Downloads 16026760 A Smart Monitoring System for Preventing Gas Risks in Indoor
Authors: Gyoutae Park, Geunjun Lyu, Yeonjae Lee, Jaheon Gu, Sanguk Ahn, Hiesik Kim
Abstract:
In this paper, we propose a system for preventing gas risks through the use of wireless communication modules and intelligent gas safety appliances. Our system configuration consists of an automatic extinguishing system, detectors, a wall-pad, and a microcomputer controlled micom gas meter to monitor gas flow and pressure as well as the occurrence of earthquakes. The automatic fire extinguishing system checks for both combustible gaseous leaks and monitors the environmental temperature, while the detector array measures smoke and CO gas concentrations. Depending on detected conditions, the micom gas meter cuts off an inner valve and generates a warning, the automatic fire-extinguishing system cuts off an external valve and sprays extinguishing materials, or the sensors generate signals and take further action when smoke or CO are detected. Information on intelligent measures taken by the gas safety appliances and sensors are transmitted to the wall-pad, which in turn relays this as real time data to a server that can be monitored via an external network (BcN) connection to a web or mobile application for the management of gas safety. To validate this smart-home gas management system, we field-tested its suitability for use in Korean apartments under several scenarios.Keywords: gas sensor, leak, gas safety, gas meter, gas risk, wireless communication
Procedia PDF Downloads 41326759 Cryptocurrency-Based Mobile Payments with Near-Field Communication-Enabled Devices
Authors: Marko Niinimaki
Abstract:
Cryptocurrencies are getting increasingly popular, but very few of them can be conveniently used in daily mobile phone purchases. To solve this problem, we demonstrate how to build a functional prototype of a mobile cryptocurrency-based e-commerce application the communicates with Near-Field Communication (NFC) tags. Using the system, users are able to purchase physical items with an NFC tag that contains an e-commerce URL. The payment is done simply by touching the tag with a mobile device and accepting the payment. Our method is constructive: we describe the design and technologies used in the implementation and evaluate the security and performance of the solution. Our main finding is that the analysis and measurements show that our solution is feasible for e-commerce.Keywords: cryptocurrency, e-commerce, NFC, mobile devices
Procedia PDF Downloads 18126758 Assessment of Maternal Satisfaction Regarding Quality of Care during Labor
Authors: Farida Habib, Haya Alfozan, Eman Miligi, Najla Alotaibi
Abstract:
Background: Women’s satisfaction with maternity services, especially care during labor and birth, has become highly significant to healthcare providers, administrators, and policymakers. Purpose: The aims of this study were to assess maternal satisfaction regarding the quality of care during labor and to compare the level of maternal satisfaction between women who delivered by physicians and those delivered by midwives. Methodology: A descriptive, cross-sectional, correlational design was used. A convenient sample of 180 low-risk cases of immediate postpartum women who delivered at King Abdul-Aziz medical city was recruited. Women whose babies were diagnosed with serious health problems were excluded from the study. Data were collected using a self-administered questionnaire. The validity and reliability of the questionnaire were ensured. The questionnaire included three parts, namely: demographics data, medical history, and obstetrical history, and the last part is the satisfaction assessment tool. Ethical confederations were ensured. Maternal satisfaction during labor was classified in terms of health care, health workers' communication, and the environment. Results: Regarding health care, women were highly satisfied with care received from nurse (M = 4.21 + 0.88), medical care received (M = 4.17 + 0.79), and comfort techniques (M = 4.04 + 0.91). Regarding health workers' communication, women were highly satisfied with the provider to treat with dignity and respect (M = 4.03 + 0.91) and orientation to the toilet, bathroom, washing area (M = 4.00 + 0.93). Regarding the environment, women were highly satisfied with the experience of their baby's birth (M = 4.18 + 0.98) and supplies with drugs and supplies (M = 4.09 + 0.97). There was no statistically significant difference in maternal satisfaction between women who delivered by physicians and those delivered by midwives. Conclusion: Women were generally satisfied with their labor and delivery experience. There was no difference in maternal satisfaction on the labor process between women who delivered by physicians and those delivered by midwives.Keywords: maternity, satisfaction, labor, delivery
Procedia PDF Downloads 18726757 Controlling Drone Flight Missions through Natural Language Processors Using Artificial Intelligence
Authors: Sylvester Akpah, Selasi Vondee
Abstract:
Unmanned Aerial Vehicles (UAV) as they are also known, drones have attracted increasing attention in recent years due to their ubiquitous nature and boundless applications in the areas of communication, surveying, aerial photography, weather forecasting, medical delivery, surveillance amongst others. Operated remotely in real-time or pre-programmed, drones can fly autonomously or on pre-defined routes. The application of these aerial vehicles has successfully penetrated the world due to technological evolution, thus a lot more businesses are utilizing their capabilities. Unfortunately, while drones are replete with the benefits stated supra, they are riddled with some problems, mainly attributed to the complexities in learning how to master drone flights, collision avoidance and enterprise security. Additional challenges, such as the analysis of flight data recorded by sensors attached to the drone may take time and require expert help to analyse and understand. This paper presents an autonomous drone control system using a chatbot. The system allows for easy control of drones using conversations with the aid of Natural Language Processing, thus to reduce the workload needed to set up, deploy, control, and monitor drone flight missions. The results obtained at the end of the study revealed that the drone connected to the chatbot was able to initiate flight missions with just text and voice commands, enable conversation and give real-time feedback from data and requests made to the chatbot. The results further revealed that the system was able to process natural language and produced human-like conversational abilities using Artificial Intelligence (Natural Language Understanding). It is recommended that radio signal adapters be used instead of wireless connections thus to increase the range of communication with the aerial vehicle.Keywords: artificial ntelligence, chatbot, natural language processing, unmanned aerial vehicle
Procedia PDF Downloads 14126756 Factors Affecting M-Government Deployment and Adoption
Authors: Saif Obaid Alkaabi, Nabil Ayad
Abstract:
Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.Keywords: e-government, m-government, system dependability, system security, trust
Procedia PDF Downloads 38026755 High Performance Computing and Big Data Analytics
Authors: Branci Sarra, Branci Saadia
Abstract:
Because of the multiplied data growth, many computer science tools have been developed to process and analyze these Big Data. High-performance computing architectures have been designed to meet the treatment needs of Big Data (view transaction processing standpoint, strategic, and tactical analytics). The purpose of this article is to provide a historical and global perspective on the recent trend of high-performance computing architectures especially what has a relation with Analytics and Data Mining.Keywords: high performance computing, HPC, big data, data analysis
Procedia PDF Downloads 51826754 Innovation as Entrepreneurial Drives in the Romanian Automotive Industry
Authors: Alina Petronela Negrea, Valentin Cojanu
Abstract:
The article examines the synergy between innovation and entrepreneurship by means of a qualitative research on actors in the automotive industry in the Romanian southern region, Muntenia. The region is of particular interest because most of the industry suppliers are located there, as well as because it gathers the full range of key actors involved in the innovation process. The research design aims (1) to reflect entrepreneurs’ approach to and perception on innovation; (2) to underline forces driving or stifling innovation in the automotive industry; and (3) to evaluate the awareness of the existing knowledge database and the communication channels through which it is transferred within and between innovation networks. Empirical evidence results from triangula¬tion of three data collection methods: statistical data and other publicly available materials; semi - structured inter¬views, and experiential visits. The conclusions emphasize the convergent opinion of the entrepreneurs about the vital role of innovation in their investment plans.Keywords: automotive industry, entrepreneurship, innovation, Romania
Procedia PDF Downloads 54926753 Social Network Roles in Organizations: Influencers, Bridges, and Soloists
Authors: Sofia Dokuka, Liz Lockhart, Alex Furman
Abstract:
Organizational hierarchy, traditionally composed of individual contributors, middle management, and executives, is enhanced by the understanding of informal social roles. These roles, identified with organizational network analysis (ONA), might have an important effect on organizational functioning. In this paper, we identify three social roles – influencers, bridges, and soloists, and provide empirical analysis based on real-world organizational networks. Influencers are employees with broad networks and whose contacts also have rich networks. Influence is calculated using PageRank, initially proposed for measuring website importance, but now applied in various network settings, including social networks. Influencers, having high PageRank, become key players in shaping opinions and behaviors within an organization. Bridges serve as links between loosely connected groups within the organization. Bridges are identified using betweenness and Burt’s constraint. Betweenness quantifies a node's control over information flows by evaluating its role in the control over the shortest paths within the network. Burt's constraint measures the extent of interconnection among an individual's contacts. A high constraint value suggests fewer structural holes and lesser control over information flows, whereas a low value suggests the contrary. Soloists are individuals with fewer than 5 stable social contacts, potentially facing challenges due to reduced social interaction and hypothetical lack of feedback and communication. We considered social roles in the analysis of real-world organizations (N=1,060). Based on data from digital traces (Slack, corporate email and calendar) we reconstructed an organizational communication network and identified influencers, bridges and soloists. We also collected employee engagement data through an online survey. Among the top-5% of influencers, 10% are members of the Executive Team. 56% of the Executive Team members are part of the top influencers group. The same proportion of top influencers (10%) is individual contributors, accounting for just 0.6% of all individual contributors in the company. The majority of influencers (80%) are at the middle management level. Out of all middle managers, 19% hold the role of influencers. However, individual contributors represent a small proportion of influencers, and having information about these individuals who hold influential roles can be crucial for management in identifying high-potential talents. Among the bridges, 4% are members of the Executive Team, 16% are individual contributors, and 80% are middle management. Predominantly middle management acts as a bridge. Bridge positions of some members of the executive team might indicate potential micromanagement on the leader's part. Recognizing the individuals serving as bridges in an organization uncovers potential communication problems. The majority of soloists are individual contributors (96%), and 4% of soloists are from middle management. These managers might face communication difficulties. We found an association between being an influencer and attitude toward a company's direction. There is a statistically significant 20% higher perception that the company is headed in the right direction among influencers compared to non-influencers (p < 0.05, Mann-Whitney test). Taken together, we demonstrate that considering social roles in the company might indicate both positive and negative aspects of organizational functioning that should be considered in data-driven decision-making.Keywords: organizational network analysis, social roles, influencer, bridge, soloist
Procedia PDF Downloads 10426752 A Car Parking Monitoring System Using a Line-Topology Wireless Sensor Network
Authors: Dae Il Kim, Jungho Moon, Tae Yun Chung
Abstract:
This paper presents a car parking monitoring system using a wireless sensor network. The presented sensor network has a line-shaped topology and adopts a TDMA-based protocol for allowing multi-hop communications. Sensor nodes are deployed in the ground of an outdoor parking lot in such a way that a sensor node monitors a parking space. Each sensor node detects the availability of the associated parking space and transmits the detection result to a sink node via intermediate sensor nodes existing between the source sensor node and the sink node. We evaluate the feasibility of the presented sensor network and the TDMA-based communication protocol through experiments using 11 sensor nodes deployed in a real parking lot. The result shows that the presented car parking monitoring system is robust to changes in the communication environments and efficient for monitoring parking spaces of outdoor parking lots.Keywords: multi-hop communication, parking monitoring system, TDMA, wireless sensor network
Procedia PDF Downloads 30126751 Communication Competence or Language Proficiency for Employability: An Investigation on Malaysian Polytechnics ESL Engineering Students
Authors: Chong Ling Ling
Abstract:
In the Malaysian polytechnic, there are concerns about language proficiency, communicative competence, and employability among Malaysian polytechnic ESL engineering students. This study examined the relationships between communicative competence, language proficiency, and employability using descriptive analysis and inferential statistics. Next, Pearson’s Correlation determines the correlation between communication competence, language proficiency, and employability skills of Malaysian Polytechnic ESL engineering students. The total number of participants was 81 final-year engineering students. The findings revealed high positive correlations between the communicative competence -'I can talk with a friend in English.' and employability skill (r = 0.854, p = .031), also, language proficiency -'I can understand the English songs I listen to' and employability skill (r = 0.887, p = .038). The result is consistent with the theories. The result revealed that for the 81 students, communication competence and language proficiency, and employability skills are firmly and significantly correlated. Thus, it concluded that both communicative competence and language proficiency equally essential to ensure a higher employability rate among Malaysian polytechnic ESL engineering students.Keywords: communicative competence, employability, language proficiency, Malaysian polytechnic
Procedia PDF Downloads 15826750 Scalable Cloud-Based LEO Satellite Constellation Simulator
Authors: Karim Sobh, Khaled El-Ayat, Fady Morcos, Amr El-Kadi
Abstract:
Distributed applications deployed on LEO satellites and ground stations require substantial communication between different members in a constellation to overcome the earth coverage barriers imposed by GEOs. Applications running on LEO constellations suffer the earth line-of-sight blockage effect. They need adequate lab testing before launching to space. We propose a scalable cloud-based net-work simulation framework to simulate problems created by the earth line-of-sight blockage. The framework utilized cloud IaaS virtual machines to simulate LEO satellites and ground stations distributed software. A factorial ANOVA statistical analysis is conducted to measure simulator overhead on overall communication performance. The results showed a very low simulator communication overhead. Consequently, the simulation framework is proposed as a candidate for testing LEO constellations with distributed software in the lab before space launch.Keywords: LEO, cloud computing, constellation, satellite, network simulation, netfilter
Procedia PDF Downloads 38426749 A Landscape of Research Data Repositories in Re3data.org Registry: A Case Study of Indian Repositories
Authors: Prashant Shrivastava
Abstract:
The purpose of this study is to explore re3dat.org registry to identify research data repositories registration workflow process. Further objective is to depict a graph for present development of research data repositories in India. Preliminarily with an approach to understand re3data.org registry framework and schema design then further proceed to explore the status of research data repositories of India in re3data.org registry. Research data repositories are getting wider relevance due to e-research concepts. Now available registry re3data.org is a good tool for users and researchers to identify appropriate research data repositories as per their research requirements. In Indian environment, a compatible National Research Data Policy is the need of the time to boost the management of research data. Registry for Research Data Repositories is a crucial tool to discover specific information in specific domain. Also, Research Data Repositories in India have not been studied. Re3data.org registry and status of Indian research data repositories both discussed in this study.Keywords: research data, research data repositories, research data registry, re3data.org
Procedia PDF Downloads 32226748 Fair Federated Learning in Wireless Communications
Authors: Shayan Mohajer Hamidi
Abstract:
Federated Learning (FL) has emerged as a promising paradigm for training machine learning models on distributed data without the need for centralized data aggregation. In the realm of wireless communications, FL has the potential to leverage the vast amounts of data generated by wireless devices to improve model performance and enable intelligent applications. However, the fairness aspect of FL in wireless communications remains largely unexplored. This abstract presents an idea for fair federated learning in wireless communications, addressing the challenges of imbalanced data distribution, privacy preservation, and resource allocation. Firstly, the proposed approach aims to tackle the issue of imbalanced data distribution in wireless networks. In typical FL scenarios, the distribution of data across wireless devices can be highly skewed, resulting in unfair model updates. To address this, we propose a weighted aggregation strategy that assigns higher importance to devices with fewer samples during the aggregation process. By incorporating fairness-aware weighting mechanisms, the proposed approach ensures that each participating device's contribution is proportional to its data distribution, thereby mitigating the impact of data imbalance on model performance. Secondly, privacy preservation is a critical concern in federated learning, especially in wireless communications where sensitive user data is involved. The proposed approach incorporates privacy-enhancing techniques, such as differential privacy, to protect user privacy during the model training process. By adding carefully calibrated noise to the gradient updates, the proposed approach ensures that the privacy of individual devices is preserved without compromising the overall model accuracy. Moreover, the approach considers the heterogeneity of devices in terms of computational capabilities and energy constraints, allowing devices to adaptively adjust the level of privacy preservation to strike a balance between privacy and utility. Thirdly, efficient resource allocation is crucial for federated learning in wireless communications, as devices operate under limited bandwidth, energy, and computational resources. The proposed approach leverages optimization techniques to allocate resources effectively among the participating devices, considering factors such as data quality, network conditions, and device capabilities. By intelligently distributing the computational load, communication bandwidth, and energy consumption, the proposed approach minimizes resource wastage and ensures a fair and efficient FL process in wireless networks. To evaluate the performance of the proposed fair federated learning approach, extensive simulations and experiments will be conducted. The experiments will involve a diverse set of wireless devices, ranging from smartphones to Internet of Things (IoT) devices, operating in various scenarios with different data distributions and network conditions. The evaluation metrics will include model accuracy, fairness measures, privacy preservation, and resource utilization. The expected outcomes of this research include improved model performance, fair allocation of resources, enhanced privacy preservation, and a better understanding of the challenges and solutions for fair federated learning in wireless communications. The proposed approach has the potential to revolutionize wireless communication systems by enabling intelligent applications while addressing fairness concerns and preserving user privacy.Keywords: federated learning, wireless communications, fairness, imbalanced data, privacy preservation, resource allocation, differential privacy, optimization
Procedia PDF Downloads 7526747 Virtual Social Networks and the Formation of the Mental Image of Tehran Metro Vendors of Themselves
Authors: Seyed Alireza Mirmohammadi
Abstract:
Tehran Metro vendors are one of the working minorities in the capital, which is an essential cross-cultural case study. Today, with difficult economic conditions, subway vendors are increasing. Tehran metro vendors are in daily contact with many people in different metro stations. Due to the ban on their activities in this place and sometimes the humiliating look of some people, they experience special conditions compared to other people in the community. One of the most critical sources of shaping people's mentality toward their social status and identity in the media and, in the meantime, virtual social networks, due to various communication facilities such as Dualism and the possibility of high activity of users have a special place. Statistics have shown that virtual social networks have become an indispensable source of communication, information, and entertainment today. In this study, 15 semi-structured interviews were conducted with 15 metro vendors in Tehran about their membership in various virtual social networks and their mental perception of using them. The research results indicate that the obtained mentality of metro peddlers towards themselves is negative in virtual social networks, and they do not receive a good image of themselves in these networks.Keywords: metro, tehran, intercultural communication, metro vendors, self image
Procedia PDF Downloads 115