Search results for: Broadband internet
930 Load Balancing Algorithms for SIP Server Clusters in Cloud Computing
Authors: Tanmay Raj, Vedika Gupta
Abstract:
For its groundbreaking and substantial power, cloud computing is today’s most popular breakthrough. It is a sort of Internet-based computing that allows users to request and receive numerous services in a cost-effective manner. Virtualization, grid computing, and utility computing are the most widely employed emerging technologies in cloud computing, making it the most powerful. However, cloud computing still has a number of key challenges, such as security, load balancing, and non-critical failure adaption, to name a few. The massive growth of cloud computing will put an undue strain on servers. As a result, network performance will deteriorate. A good load balancing adjustment can make cloud computing more productive and in- crease client fulfillment execution. Load balancing is an important part of cloud computing because it prevents certain nodes from being overwhelmed while others are idle or have little work to perform. Response time, cost, throughput, performance, and resource usage are all parameters that may be improved using load balancing.Keywords: cloud computing, load balancing, computing, SIP server clusters
Procedia PDF Downloads 123929 Students' Statistical Reasoning and Attitudes towards Statistics in Blended Learning, E-Learning and On-Campus Learning
Authors: Petros Roussos
Abstract:
The present study focused on students' statistical reasoning related to Null Hypothesis Statistical Testing and p-values. Its objective was to test the hypothesis that neither the place (classroom, at a distance, online) nor the medium that actually supports the learning (ICT, internet, books) has an effect on understanding of statistical concepts. In addition, it was expected that students' attitudes towards statistics would not predict understanding of statistical concepts. The sample consisted of 385 undergraduate and postgraduate students from six state and private universities (five in Greece and one in Cyprus). Students were administered two questionnaires: a) the Greek version of the Survey of Attitudes Toward Statistics, and b) a short instrument which measures students' understanding of statistical significance and p-values. Results suggest that attitudes towards statistics do not predict students' understanding of statistical concepts, whereas the medium did not have an effect.Keywords: attitudes towards statistics, blended learning, e-learning, statistical reasoning
Procedia PDF Downloads 310928 IACOP - Route Optimization in Wireless Networks Using Improved Ant Colony Optimization Protocol
Authors: S. Vasundra, D. Venkatesh
Abstract:
Wireless networks have gone through an extraordinary growth in the past few years, and will keep on playing a crucial role in future data communication. The present wireless networks aim to make communication possible anywhere and anytime. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Since an ad hoc network may consist of a large number of mobile hosts, this imposes a significant challenge on the design of an effective and efficient routing protocol that can work well in an environment with frequent topological changes. This paper proposes improved ant colony optimization (IACO) technique. It also maintains load balancing in wireless networks. The simulation results show that the proposed IACO performs better than existing routing techniques.Keywords: wireless networks, ant colony optimization, load balancing, architecture
Procedia PDF Downloads 421927 Telehealth Ecosystem: Challenge and Opportunity
Authors: Rattakorn Poonsuph
Abstract:
Technological innovation plays a crucial role in virtual healthcare services. A growing number of telehealth platforms are concentrating on using digital tools to improve the quality and availability of care. As a result, telehealth represents an opportunity to redesign the way health services are delivered. The research objective is to discover a new business model for digital health services and related industries to participate with telehealth solutions. The business opportunity is valuable for healthcare investors as a startup company to further investigations or implement the telehealth platform. The paper presents a digital healthcare business model and business opportunities to related industries. These include digital healthcare services extending from a traditional business model and use cases of business opportunities to related industries. Although there are enormous business opportunities, telehealth is still challenging due to the patient adaption and digital transformation process within a healthcare organization.Keywords: telehealth, Internet hospital, HealthTech, InsurTech
Procedia PDF Downloads 168926 Challenges and Opportunities for Online Consumer Selling Process Development in Coming Years in World
Authors: Prakash Prajapati
Abstract:
E commerce is certainly one of the business alternatives that individual will have to analyze in the forthcoming years. E-commerce is said to bring about arched type conversion in the world for exchange market. Prognosis E-commerce is presenting dreadful business advancement in our country. Endorsed by ascending online user base & mobile phone presentation, Indian e-commerce has been splendid development in the last few years. Conceding India’s analytical dividend and spiraling internet admittance, the sector is contracted to scale higher heights. Although, India’s overall peddle opportunity is consequential, the sector is beset with some deliberate challenges. The current study has been proceeded to explore the present scenario, status & future advancement of e-commerce in India and review the challenges and opportunities of e-commerce in India.Keywords: online selling, retail selling online, product process, business opportunity
Procedia PDF Downloads 146925 Random Access in IoT Using Naïve Bayes Classification
Authors: Alhusein Almahjoub, Dongyu Qiu
Abstract:
This paper deals with the random access procedure in next-generation networks and presents the solution to reduce total service time (TST) which is one of the most important performance metrics in current and future internet of things (IoT) based networks. The proposed solution focuses on the calculation of optimal transmission probability which maximizes the success probability and reduces TST. It uses the information of several idle preambles in every time slot, and based on it, it estimates the number of backlogged IoT devices using Naïve Bayes estimation which is a type of supervised learning in the machine learning domain. The estimation of backlogged devices is necessary since optimal transmission probability depends on it and the eNodeB does not have information about it. The simulations are carried out in MATLAB which verify that the proposed solution gives excellent performance.Keywords: random access, LTE/LTE-A, 5G, machine learning, Naïve Bayes estimation
Procedia PDF Downloads 145924 Features for Measuring Credibility on Facebook Information
Authors: Kanda Runapongsa Saikaew, Chaluemwut Noyunsan
Abstract:
Nowadays social media information, such as news, links, images, or VDOs, is shared extensively. However, the effectiveness of disseminating information through social media lacks in quality: less fact checking, more biases, and several rumors. Many researchers have investigated about credibility on Twitter, but there is no the research report about credibility information on Facebook. This paper proposes features for measuring credibility on Facebook information. We developed the system for credibility on Facebook. First, we have developed FB credibility evaluator for measuring credibility of each post by manual human’s labelling. We then collected the training data for creating a model using Support Vector Machine (SVM). Secondly, we developed a chrome extension of FB credibility for Facebook users to evaluate the credibility of each post. Based on the usage analysis of our FB credibility chrome extension, about 81% of users’ responses agree with suggested credibility automatically computed by the proposed system.Keywords: facebook, social media, credibility measurement, internet
Procedia PDF Downloads 356923 Twitter's Impact on Print Media with Respect to Real World Events
Authors: Basit Shahzad, Abdullatif M. Abdullatif
Abstract:
Recent advancements in Information and Communication Technologies (ICT) and easy access to Internet have made social media the first choice for information sharing related to any important events or news. On Twitter, trend is a common feature that quantifies the level of popularity of a certain news or event. In this work, we examine the impact of Twitter trends on real world events by hypothesizing that Twitter trends have an influence on print media in Pakistan. For this, Twitter is used as a platform and Twitter trends as a base line. We first collect data from two sources (Twitter trends and print media) in the period May to August 2016. Obtained data from two sources is analyzed and it is observed that social media is significantly influencing the print media and majority of the news printed in newspaper are posted on Twitter earlier.Keywords: twitter trends, text mining, effectiveness of trends, print media
Procedia PDF Downloads 258922 A Novel Image Steganography Scheme Based on Mandelbrot Fractal
Authors: Adnan H. M. Al-Helali, Hamza A. Ali
Abstract:
Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography
Procedia PDF Downloads 541921 Lessons Learnt from Tutors’ Perspectives on Online Tutorial’s Policies in Open and Distance Education Institution
Authors: Durri Andriani, Irsan Tahar, Lilian Sarah Hiariey
Abstract:
Every institution has to develop, implement, and control its policies to ensure the effectiveness of the institution. In doing so, all related stakeholders have to be involved to maximize the benefit of the policies and minimize the potential constraints and resistances. Open and distance education (ODE) institution is no different. As an education institution, ODE institution has to focus their attention to fulfilling academic needs of their students through open and distance measures. One of them is quality learning support system. Significant stakeholders in learning support system are tutors since they are the ones who directly communicate with students. Tutors are commonly seen as objects whose main responsibility is limited to implementing policies decided by management in ODE institutions. Nonetheless, tutors’ perceptions of tutorials are believed to influence tutors’ performances in facilitating learning support. It is therefore important to analyze tutors’ perception on various aspects of learning support. This paper presents analysis of tutors’ perceptions on policies of tutoriala in ODE institution using Policy Analysis Framework (PAF) modified by King, Nugent, Russell, and Lacy. Focus of this paper is on on-line tutors, those who provide tutorials via Internet. On-line tutors were chosen to stress the increasingly important used of Internet in ODE system. The research was conducted in Universitas Terbuka (UT), Indonesia. UT is purposely selected because of its large number (1,234) of courses offered and large area coverage (6000 inhabited islands). These posed UT in a unique position where learning support system has, to some extent, to be standardized while at the same time it has to be able to cater the needs of different courses in different places for students with different backgrounds. All 598 listed on-line tutors were sent the research questionnaires. Around 20% of the email addresses could not be reached. Tutors were asked to fill out open-ended questionnaires on their perceptions on definition of on-line tutorial, roles of tutors and students in on-line tutorials, requirement for on-line tutors, learning materials, and student evaluation in on-line tutorial. Data analyzed was gathered from 40 on-line tutors who sent back filled-out questionnaires. Data were analyzed qualitatively using content analysis from all 40 tutors. The results showed that using PAF as entry point in choosing learning support services as area of policy with delivery learning materials as the issue at UT has been able to provide new insights of aspects need to be consider in formulating policies in online tutorial and in learning support services. Involving tutors as source of information could be proven to be productive. In general, tutors had clear understanding about definition of online tutorial, roles of tutors and roles of students, and requirement of tutor. Tutors just need to be more involved in the policy formulation since they could provide data on students and problem faced in online tutorial. However, tutors need an adjustment in student evaluation which according tutors too focus on administrative aspects and subjective.Keywords: distance education, on-line tutorial, tutorial policy, tutors’ perspectives
Procedia PDF Downloads 253920 [Keynote Talk]: Evidence Fusion in Decision Making
Authors: Mohammad Abdullah-Al-Wadud
Abstract:
In the current era of automation and artificial intelligence, different systems have been increasingly keeping on depending on decision-making capabilities of machines. Such systems/applications may range from simple classifiers to sophisticated surveillance systems based on traditional sensors and related equipment which are becoming more common in the internet of things (IoT) paradigm. However, the available data for such problems are usually imprecise and incomplete, which leads to uncertainty in decisions made based on traditional probability-based classifiers. This requires a robust fusion framework to combine the available information sources with some degree of certainty. The theory of evidence can provide with such a method for combining evidence from different (may be unreliable) sources/observers. This talk will address the employment of the Dempster-Shafer Theory of evidence in some practical applications.Keywords: decision making, dempster-shafer theory, evidence fusion, incomplete data, uncertainty
Procedia PDF Downloads 425919 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation
Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal
Abstract:
We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).Keywords: authentication, edge computing, industrial IoT, post-quantum resistance
Procedia PDF Downloads 197918 Analysis and Forecasting of Bitcoin Price Using Exogenous Data
Authors: J-C. Leneveu, A. Chereau, L. Mansart, T. Mesbah, M. Wyka
Abstract:
Extracting and interpreting information from Big Data represent a stake for years to come in several sectors such as finance. Currently, numerous methods are used (such as Technical Analysis) to try to understand and to anticipate market behavior, with mixed results because it still seems impossible to exactly predict a financial trend. The increase of available data on Internet and their diversity represent a great opportunity for the financial world. Indeed, it is possible, along with these standard financial data, to focus on exogenous data to take into account more macroeconomic factors. Coupling the interpretation of these data with standard methods could allow obtaining more precise trend predictions. In this paper, in order to observe the influence of exogenous data price independent of other usual effects occurring in classical markets, behaviors of Bitcoin users are introduced in a model reconstituting Bitcoin value, which is elaborated and tested for prediction purposes.Keywords: big data, bitcoin, data mining, social network, financial trends, exogenous data, global economy, behavioral finance
Procedia PDF Downloads 355917 Analysis of Network Performance Using Aspect of Quantum Cryptography
Authors: Nisarg A. Patel, Hiren B. Patel
Abstract:
Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).Keywords: cryptography, networking, quantum, encryption and decryption
Procedia PDF Downloads 184916 Systemic Functional Grammar Analysis of Barack Obama's Second Term Inaugural Speech
Authors: Sadiq Aminu, Ahmed Lamido
Abstract:
This research studies Barack Obama’s second inaugural speech using Halliday’s Systemic Functional Grammar (SFG). SFG is a text grammar which describes how language is used, so that the meaning of the text can be better understood. The primary source of data in this research work is Barack Obama’s second inaugural speech which was obtained from the internet. The analysis of the speech was based on the ideational and textual metafunctions of Systemic Functional Grammar. Specifically, the researcher analyses the Process Types and Participants (ideational) and the Theme/Rheme (textual). It was found that material process (process of doing) was the most frequently used ‘Process type’ and ‘We’ which refers to the people of America was the frequently used ‘Theme’. Application of the SFG theory, therefore, gives a better meaning to Barack Obama’s speech.Keywords: ideational, metafunction, rheme, textual, theme
Procedia PDF Downloads 159915 Online Community Suitable for e-Masjid ?
Authors: Norlizam Md Sukiban, Muhammad Faisal Ashaari, Hidayah bt Rahmalan
Abstract:
The role that a mosque or masjid have applied during the life of the Prophet Muhammad (S.A.W) was magnificent. Masjid managed to gather the community in lots of ways. It was the center of the first Islamic community and nation, with greatest triumphs and tragedies. It was a place to accommodate for the community center, homeless refuge, university and mosque all rolled into one. However, the role of masjid applied today was less than the time of the Prophet Muhammad (S.A.W) was alive. The advanced technology such as the internet has a major impact to the community nowadays. For example, community online has been chosen for lots of people to maintain their relationship and suggest various events among the communities members. This study is to investigate the possibility of the role of e-Masjid in adapting the concept of community online in order to remain the role played as such as role of masjid during the lifetime of the Prophet Muhammad (S.A.W). Definition and the characteristic of the online community were listed, along with the benefits of the online community. Later, discussion on the possibility of the online community to be adapted in e-Masjid.Keywords: e-masjid, online community, virtual community, e-community
Procedia PDF Downloads 495914 A Novel Image Steganography Method Based on Mandelbrot Fractal
Authors: Adnan H. M. Al-Helali, Hamza A. Ali
Abstract:
The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography
Procedia PDF Downloads 618913 Patterns of Positive Feedback Formation in the System of Online Action
Authors: D. Gvozdikov
Abstract:
The purpose of this study is an attempt to describe an online action as a system that combines disjointed events and behavioral chains into a whole. The research focuses on patterns of naturally-formed chains of actions united by an orientation towards the online environment. A key characteristic of the system of online action is that it acts as an attractor for separate actions and chains of behavioral repertoire accumulating time and efforts made by users. The article demonstrates how the chains of online-offline actions are combined into a single pattern due to a simple identifiable mechanism, a positive feedback system. Using methods of digital ethnography and analyzing the content of the Instagram application and media blogs, the research reveals how through the positive feedback mechanism the entire system of online action acquires stability and can expand involving new spheres of human activity.Keywords: digital anthropology, internet studies, systems theory, social media
Procedia PDF Downloads 133912 Gamma-Hydroxybutyrate (GHB): A Review for the Prehospital Clinician
Authors: Theo Welch
Abstract:
Background: Gamma-hydroxybutyrate (GHB) is a depressant of the central nervous system with euphoric effects. It is being increasingly used recreationally in the United Kingdom (UK) despite associated morbidity and mortality. Due to the lack of evidence, healthcare professionals remain unsure as to the optimum management of GHB acute toxicity. Methods: A literature review was undertaken of its pharmacology and the emergency management of its acute toxicity.Findings: GHB is inexpensive and readily available over the Internet. Treatment of GHB acute toxicity is supportive. Clinicians should pay particular attention to the airway as emesis is common. Intubation is required in a minority of cases. Polydrug use is common and worsens prognosis. Conclusion: An inexpensive and readily available drug, GHB acute toxicity can be difficult to identify and treat. GHB acute toxicity is generally treated conservatively. Further research is needed to ascertain the indications, benefits, and risks of intubating patients with GHB acute toxicity. instructions give you guidelines for preparing papers for the conference.Keywords: GHB, gamma-hydroxybutyrate, prehospital, emergency, toxicity, management
Procedia PDF Downloads 201911 A Web and Cloud-Based Measurement System Analysis Tool for the Automotive Industry
Authors: C. A. Barros, Ana P. Barroso
Abstract:
Any industrial company needs to determine the amount of variation that exists within its measurement process and guarantee the reliability of their data, studying the performance of their measurement system, in terms of linearity, bias, repeatability and reproducibility and stability. This issue is critical for automotive industry suppliers, who are required to be certified by the 16949:2016 standard (replaces the ISO/TS 16949) of International Automotive Task Force, defining the requirements of a quality management system for companies in the automotive industry. Measurement System Analysis (MSA) is one of the mandatory tools. Frequently, the measurement system in companies is not connected to the equipment and do not incorporate the methods proposed by the Automotive Industry Action Group (AIAG). To address these constraints, an R&D project is in progress, whose objective is to develop a web and cloud-based MSA tool. This MSA tool incorporates Industry 4.0 concepts, such as, Internet of Things (IoT) protocols to assure the connection with the measuring equipment, cloud computing, artificial intelligence, statistical tools, and advanced mathematical algorithms. This paper presents the preliminary findings of the project. The web and cloud-based MSA tool is innovative because it implements all statistical tests proposed in the MSA-4 reference manual from AIAG as well as other emerging methods and techniques. As it is integrated with the measuring devices, it reduces the manual input of data and therefore the errors. The tool ensures traceability of all performed tests and can be used in quality laboratories and in the production lines. Besides, it monitors MSAs over time, allowing both the analysis of deviations from the variation of the measurements performed and the management of measurement equipment and calibrations. To develop the MSA tool a ten-step approach was implemented. Firstly, it was performed a benchmarking analysis of the current competitors and commercial solutions linked to MSA, concerning Industry 4.0 paradigm. Next, an analysis of the size of the target market for the MSA tool was done. Afterwards, data flow and traceability requirements were analysed in order to implement an IoT data network that interconnects with the equipment, preferably via wireless. The MSA web solution was designed under UI/UX principles and an API in python language was developed to perform the algorithms and the statistical analysis. Continuous validation of the tool by companies is being performed to assure real time management of the ‘big data’. The main results of this R&D project are: MSA Tool, web and cloud-based; Python API; New Algorithms to the market; and Style Guide of UI/UX of the tool. The MSA tool proposed adds value to the state of the art as it ensures an effective response to the new challenges of measurement systems, which are increasingly critical in production processes. Although the automotive industry has triggered the development of this innovative MSA tool, other industries would also benefit from it. Currently, companies from molds and plastics, chemical and food industry are already validating it.Keywords: automotive Industry, industry 4.0, Internet of Things, IATF 16949:2016, measurement system analysis
Procedia PDF Downloads 214910 Virtual Learning during the Period of COVID-19 Pandemic at a Saudi University
Authors: Ahmed Mohammed Omer Alghamdi
Abstract:
Since the COVID-19 pandemic started, a rapid, unexpected transition from face-to-face to virtual classroom (VC) teaching has involved several challenges and obstacles. However, there are also opportunities and thoughts that need to be examined and discussed. In addition, the entire world is witnessing that the teaching system and, more particularly, higher education institutes have been interrupted. To maintain the learning and teaching practices as usual, countries were forced to transition from traditional to virtual classes using various technology-based devices. In this regard, the Kingdom of Saudi Arabia (KSA) is no exception. Focusing on how the current situation has forced many higher education institutes to change to virtual classes may possibly provide a clear insight into adopted practices and implications. The main purpose of this study, therefore, was to investigate how both Saudi English as a foreign language (EFL) teachers and students perceived the implementation of virtual classes as a key factor for useful language teaching and learning process during the COVID-19 pandemic period at a Saudi university. The impetus for the research was, therefore, the need to find ways of identifying the deficiencies in this application and to suggest possible solutions that might rectify those deficiencies. This study seeks to answer the following overarching research question: “How do Saudi EFL instructors and students perceive the use of virtual classes during the COVID-19 pandemic period in their language teaching and learning context?” The following sub-questions are also used to guide the design of the study to answer the main research question: (1) To what extent are virtual classes important intra-pandemic from Saudi EFL instructors’ and students’ perspectives? (2) How effective are virtual classes for fostering English language students’ achievement? (3) What are the challenges and obstacles that instructors and students may face during the implementation of virtual teaching? A mixed method approach was employed in this study; the questionnaire data collection represented the quantitative method approach for this study, whereas the transcripts of recorded interviews represented the qualitative method approach. The participants included EFL teachers (N = 4) and male and female EFL students (N = 36). Based on the findings of this study, various aspects from teachers' and students’ perspectives were examined to determine the use of the virtual classroom applications in terms of fulfilling the students’ English language learning needs. The major findings of the study revealed that the virtual classroom applications during the current pandemic situation encountered three major challenges, among which the existence of the following essential aspects, namely lack of technology and an internet connection, having a large number of students in a virtual classroom and lack of students’ and teachers’ interactions during the virtual classroom applications. Finally, the findings indicated that although Saudi EFL students and teachers view the virtual classrooms in a positive light during the pandemic period, they reported that for long and post-pandemic period, they preferred the traditional face-to-face teaching procedure.Keywords: virtual classes, English as a foreign language, COVID-19, Internet, pandemic
Procedia PDF Downloads 86909 The Impact of Online Games, Massively Multiplayer Online Game towards Undergraduate Students in Malaysia
Authors: Rubijesmin Abdul Latif, Norshakirah Abdul Aziz, Mohd Taufik Abdul Jalil
Abstract:
This paper focuses on the impact of online games among Malaysian undergraduate students. The purpose of this study is to investigate whether online games (especially MMOGs) impacted students positively or vice versa; focusing on three elements (time management, social life, and emotion). A total of 83 respondents comprised from 14 Malaysia universities, randomly selected undergraduate students who play MMOGs (casual and hardcore gamers i.e. addiction to MMOGs) were involved in this study. The results showed that MMOGs have only negative impact on students capabilities in time management, meanwhile as for the elements social life and emotion, MMOGs do not affect them negatively.Keywords: internet game addiction, online games, MMOGs, impact, undergraduate students
Procedia PDF Downloads 583908 Radical Web Text Classification Using a Composite-Based Approach
Authors: Kolade Olawande Owoeye, George R. S. Weir
Abstract:
The widespread of terrorism and extremism activities on the internet has become a major threat to the government and national securities due to their potential dangers which have necessitated the need for intelligence gathering via web and real-time monitoring of potential websites for extremist activities. However, the manual classification for such contents is practically difficult or time-consuming. In response to this challenge, an automated classification system called composite technique was developed. This is a computational framework that explores the combination of both semantics and syntactic features of textual contents of a web. We implemented the framework on a set of extremist webpages dataset that has been subjected to the manual classification process. Therein, we developed a classification model on the data using J48 decision algorithm, this is to generate a measure of how well each page can be classified into their appropriate classes. The classification result obtained from our method when compared with other states of arts, indicated a 96% success rate in classifying overall webpages when matched against the manual classification.Keywords: extremist, web pages, classification, semantics, posit
Procedia PDF Downloads 145907 Parental Monitoring of Learners’ Cell Phone Use in the Eastern Cape, South Africa
Authors: Melikhaya Skhephe, Robert Mawuli Kwasi Boadzo, Zanoxolo Berington Gobingca
Abstract:
This research study sought to examine parental monitoring of learners’ cell phone use in the Eastern Cape, South Africa. To this end, the researchers employed a quantitative approach. Data were obtained through questionnaires, with a sample of 15 parents having been purposively selected. The findings revealed that parents are unaware that they have to monitor the learner’s cell phone. Another finding was that parents in the 21-century did not support the use of mobile phones in education. The researchers recommend that parent’s discussion forums be created to educate parents on how a cell phone can be used in education. Cellphone companies need to be encouraged to educate parents on how they monitor cell phones used by learners. Another recommendation was that network providers need to restrict access to searching on the internet according to age.Keywords: parental monitoring, app blocking services, learner’s cell phone use, cell phone
Procedia PDF Downloads 159906 Justyna Skrzyńska, Zdzisław Kobos, Zbigniew Wochyński
Authors: Vahid Bairami Rad
Abstract:
Due to the tremendous progress in computer technology in the last decades, the capabilities of computers increased enormously and working with a computer became a normal activity for nearly everybody. With all the possibilities a computer can offer, humans and their interaction with computers are now a limiting factor. This gave rise to a lot of research in the field of HCI (human computer interaction) aiming to make interaction easier, more intuitive, and more efficient. To research eye gaze based interfaces it is necessary to understand both sides of the interaction–the human eye and the eye tracker. The first section gives an overview on the anatomy of the eye. The second section accuracy and calibration issue. The subsequent section presents data from a user study where eye movements have been recorded while watching a video and while surfing the Internet. Statistics on the eye movement during these tasks for several individuals provide typical values and ranges for fixation times and saccade lengths and are the foundation for discussions in later chapters. The data also reveal typical limitations of eye trackers.Keywords: human computer interaction, gaze tracking, calibration, eye movement
Procedia PDF Downloads 537905 Electronic Government Services Adoption from Multi-Nationalities Perspectives
Authors: Isaac Kofi Mensah, Jianing Mi, Cheng Feng
Abstract:
Electronic government is the application of Information and Communication Technologies (ICTs) by the government to improve public service delivery to citizens and businesses. The purpose of this study is to investigate factors influencing the adoption and use of e-government services from different nationalities perspectives. The Technology Acceptance Model (TAM) will be used as the theoretical framework for the study. A questionnaire would be developed and administered to 500 potential respondents who are students from different nationalities in China. Predictors such as perceived usefulness, perceived ease of use, computer self-efficacy, trust in both the internet and government, social influence and perceived service quality would be examined with regard to their impact on the intention to use e-government services. This research is currently at the design and implementation stage. The completion of this study will provide useful insights into understanding factors impacting the decision to use e-government services from a cross and multi nationalities perspectives.Keywords: different nationalities, e-government, e-government services, technology acceptance model (TAM)
Procedia PDF Downloads 429904 Omni: Data Science Platform for Evaluate Performance of a LoRaWAN Network
Authors: Emanuele A. Solagna, Ricardo S, Tozetto, Roberto dos S. Rabello
Abstract:
Nowadays, physical processes are becoming digitized by the evolution of communication, sensing and storage technologies which promote the development of smart cities. The evolution of this technology has generated multiple challenges related to the generation of big data and the active participation of electronic devices in society. Thus, devices can send information that is captured and processed over large areas, but there is no guarantee that all the obtained data amount will be effectively stored and correctly persisted. Because, depending on the technology which is used, there are parameters that has huge influence on the full delivery of information. This article aims to characterize the project, currently under development, of a platform that based on data science will perform a performance and effectiveness evaluation of an industrial network that implements LoRaWAN technology considering its main parameters configuration relating these parameters to the information loss.Keywords: Internet of Things, LoRa, LoRaWAN, smart cities
Procedia PDF Downloads 148903 Public Awareness of Aphasia in Taiwan: A Pilot Study
Authors: Ching-Yu Lin
Abstract:
The number of patients with aphasia has been gradually increasing; however, public awareness of aphasia is still limited. Moreover, surveys about public awareness of aphasia have been conducted in several countries, but there is no research about public awareness of aphasia in Taiwan so far. Therefore, this study aims at the investigation of public awareness of aphasia in Taiwan. In this pilot study, the original English-version questionnaire will be translated into Mandarin Chinese by a speech therapist (the author), and 100 Taiwanese over 18 years old will be recruited to finish the questionnaire. People with an occupation about health or medical will be excluded. In order to reach more people, the questionnaire will be an Internet survey by Google Forms, and the URL of the survey will be distributed by messaging, i.e. e-mail, Facebook Messenger, Instagram DM, or Line. Data will be analyzed via PASW Statistic 18. Descriptive statistics will be used to summarize what proportion of the public have heard of aphasia and what proportion of the public have basic knowledge of aphasia in Taiwan. The sources of information about aphasia will also be investigated. Further, differences in awareness of aphasia due to age, gender, and education level will be discussed.Keywords: aphasia, public awareness, public knowledge, taiwan
Procedia PDF Downloads 105902 Tinder, Image Merchandise and Desire: The Configuration of Social Ties in Today's Neoliberalism
Authors: Daniel Alvarado Valencia
Abstract:
Nowadays, the market offers us solutions for everything, creating the idea of an immediate availability of anything we could desire, and the Internet is the mean through which to obtain all this. The proposal of this conference is that this logic puts the subjects in a situation of self-exploitation, and considers the psyche as a productive force by configuring affection and desire from a neoliberal value perspective. It uses Tinder, starting from ethnographical data from Mexico City users, as an example for this. Tinder is an application created to get dates, have sexual encounters and find a partner. It works from the creation and management of a digital profile. It is an example of how futuristic and lonely the current era can be since we got used to interact with other people through screens and images. However, at the same time, it provides solutions to loneliness, since technology transgresses, invades and alters social practices in different ways. Tinder fits into this contemporary context, it is a concrete example of the processes of technification in which social bonds develop through certain devices offered by neoliberalism, through consumption, and where the search of love and courtship are possible through images and their consumption.Keywords: desire, image, merchandise, neoliberalism
Procedia PDF Downloads 121901 The Effect of Artificial Intelligence on Real Estate and Construction Marketing
Authors: Michael Saad Thabet Azrek
Abstract:
Experiential advertising method is an unforgettable revel that remains deeply anchored within the customer's memory. Furthermore, client pleasure is defined as the emotional reaction to the stories provided that relate to precise products or services bought. Consequently, experiential advertising sports can influence the extent of consumer pleasure and loyalty. In this context, they have a look at pursuits to observe the connection between experiential advertising, purchaser satisfaction and loyalty to splendor merchandise in Konya. The outcomes of this examination confirmed that experiential marketing is an important indicator of consumer pride and loyalty, and that experiential advertising and marketing have a large positive impact on patron satisfaction and loyalty.Keywords: sponsorship, marketing communication theories, marketing communication tools internet, marketing, tourism, tourism management corporate responsibility, employee organizational performance, internal marketing, internal customer experiential marketing, customer satisfaction, customer loyalty, social sciences.
Procedia PDF Downloads 30