Search results for: internet data centre
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25914

Search results for: internet data centre

25854 Net Folklore as a Part of Kazakhstani Internet Literature

Authors: Dina Sabirova, Madina Moldagali

Abstract:

The rapid development of new media, especially the Internet, has led to major changes in folk culture. The net space is increasingly becoming a creation of the ‘folk’ imagination, saturated with multimedia stories with collective authorship, like traditional folklore. Moreover, the Internet picks up and changes old folklore traditions, such as the form of publication, the way of storytelling, or gave a new morality to the ‘old tales’. In this article, the similarities and differences between Internet folklore/ cyber-folklore/ digital folklore and oral folk art were examined by using the material of modern Kazakh authors. The relationship between tradition and innovation was studied in order to interpret the sequence of the authors' research taking into account the realities. The material of the article was the prose texts of Kazakh writers published in internet magazines and social networks. An immanent and intertextual analysis of the text was carried out. Thus, the new forms of Internet folklore lead to new forms of expression and social morality in society

Keywords: internet literature, modern Kazakhstani authors, net folklore, oral folk art

Procedia PDF Downloads 88
25853 Heritage and Tourism in the Era of Big Data: Analysis of Chinese Cultural Tourism in Catalonia

Authors: Xinge Liao, Francesc Xavier Roige Ventura, Dolores Sanchez Aguilera

Abstract:

With the development of the Internet, the study of tourism behavior has rapidly expanded from the traditional physical market to the online market. Data on the Internet is characterized by dynamic changes, and new data appear all the time. In recent years the generation of a large volume of data was characterized, such as forums, blogs, and other sources, which have expanded over time and space, together they constitute large-scale Internet data, known as Big Data. This data of technological origin that derives from the use of devices and the activity of multiple users is becoming a source of great importance for the study of geography and the behavior of tourists. The study will focus on cultural heritage tourist practices in the context of Big Data. The research will focus on exploring the characteristics and behavior of Chinese tourists in relation to the cultural heritage of Catalonia. Geographical information, target image, perceptions in user-generated content will be studied through data analysis from Weibo -the largest social networks of blogs in China. Through the analysis of the behavior of heritage tourists in the Big Data environment, this study will understand the practices (activities, motivations, perceptions) of cultural tourists and then understand the needs and preferences of tourists in order to better guide the sustainable development of tourism in heritage sites.

Keywords: Barcelona, Big Data, Catalonia, cultural heritage, Chinese tourism market, tourists’ behavior

Procedia PDF Downloads 124
25852 Screening for Internet Addiction among Medical Students in a Saudi Community

Authors: Nawaf A. Alqahtani, Ali M. Alqahtani, Khalid A. Alqahtani, Huda S. Abdullfattah, Ebtehal A. Alessa, Khalid S. Al Gelban, Ossama A. Mostafa

Abstract:

Background: The internet is an exciting medium that is becoming an essential part of everyday life. Although the internet is fully observed in Saudi Arabia, young people may be vulnerable to problematic internet use, possibly leading to addiction. Aim of study: To explore the magnitude of internet addiction (IA) among medical students associated risk factors and its impact on students' academic achievement. Subjects and Methods: A cross sectional study was conducted in 2014 on 571 medical students (293 males and 278 females) at the College of Medicine, King Khalid University, Abha, Saudi Arabia. Data Collection was done through using the Arabic version of the Compulsive Internet Use Scale and a checklist of demographic characteristics. Results: Age of participants ranged from 19 to 26 years (Mean+SD: 21.9+1.5 years). Internet access was available to 97.4% of students at home and to 80.2% of students at their mobile phones. The most frequently accessed websites by medical students were the social media (90.7%), scientific website (50.4%) and the news websites (31.3%). IA was mild in 47.8% of medical students while 5.8% had moderate IA. None of the students had severe IA. Prevalence of IA was significantly higher among female medical students (p=0.002), availability of internet at home (p=0.022), and availability of internet at the students' mobile phone (p=0.041). The mean General Point Average (GPA) was highest among students with mild IA (4.0+0.6), compared with 3.6+0.6 among those with moderate addiction, and 3.9+0.6 among those who did not show IA. Differences in mean GPA according to grade of IA were statistically significant ((P=0.001). Conclusions: Prevalence of IA is high among medical students in Saudi Arabia. Risk factors for IA include female gender, availability of internet at home or at the mobile phone. IA has a significant impact on students' GPA. Periodic screening of medical students for IA and raising their awareness toward the possible risk of IA are recommended.

Keywords: internet addiction, medical students, risk factors, Saudi Arabia

Procedia PDF Downloads 514
25851 The Public Relations Activities on Social Networking Sites for Communication to the Customer: Case Study the Company in Thailand

Authors: Phakit Treesukol

Abstract:

The purpose of this investigation is to ascertain Internet users’ behaviours towards companies’ public relations activities on social networking sites. In order to conduct a study of Internet users’ behaviour, data was collected using the quota sampling method from a total of 100 Internet users who are members of SNS and used the Internet during the period 10 December 2009 to 9 January 2010. An online self-administrated questionnaire was distributed through Facebook, Hi5 and Twitter to Internet users by using snowball sampling technique. Results of the study showed that the majority of the respondents were using social networking sites with the main purpose to contact their friends. Presently, most of the respondents were not regularly receiving companies’ public relations activities on social networking sites. The highest frequency of survey responses by the respondents was for hiding or deleting information introducing new products or services from companies on SNS also as well.

Keywords: media uses and gratification, online activities, public relations activities, social networking sites

Procedia PDF Downloads 239
25850 Profile of Internet and Smartphone Overuse Based on Internet Usage Needs

Authors: Yeoju Chung

Abstract:

Adolescents internet and smartphone addiction are increasing in Korea. But differences between internet addiction and smartphone addiction have been researched in these days. The main objective of this article is to explore the presence of clusters within a sample of adolescents based on dimensions associated with addiction and internet usage needs. The sample consists of 617 adolescents in the 14-19 year age group who were recruited in Korea A cluster analysis identified four groups of participants: internet overuse(IO), smartphone overuse(SO), both overuse(B) and normal(N) use group. MANOVA analysis based on internet usage showed that there are differences among four groups in internet usage needs. IO has higher cyber self-seeking needs and emotion and thought expression needs than SO. SO has higher real relationship and life needs with cyberworld than IO, B, and N. B has the highest cyber self-seeking needs and emotion and thought expression needs, however, game fun seeking needs is the highest in IO. These results support that IO seeks game fun needs, SO seeks real relationship and life needs, and B seeks cyber self and expression in cyberworld.

Keywords: addiction, internet, needs, smartphone

Procedia PDF Downloads 260
25849 Internet Usage Behavior on Mobile Phones of the Faculty of Management Science Students at Suan Sunandha Rajabhat University

Authors: Arpapron Phokajang

Abstract:

The objectives of this research were to study the internet usage, including; date, time, description of using service, network service, telephone charge, and to study the internet usage behavior on mobile phones of the Faculty of Management Science students at Suan Sunandha Rajabhat University. The samples consisted of 395 students from the Faculty of Management Science. Questionnaires were used for collecting the data. Descriptive statistics used in this research including percentage, mean, and standard deviation. The findings of this research found that most respondents were female, aged between 21 and 25 years old, used the monthly AIS network service calls on Monday to Friday around 6.01-12.00 p.m., the internet usage behavior on mobile phones for entertainment was found in the highest level in all aspects, and education, business and commerce, and communication were found in the moderate level and using the internet to watch YouTube in the highest level also.

Keywords: faculty of management science, internet usage behavior, mobile phones, Suan Sunandha Rajabhat University

Procedia PDF Downloads 233
25848 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 449
25847 Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand

Authors: Pichamon Chansuchai

Abstract:

The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control.

Keywords: audit, best practice, internet, payment

Procedia PDF Downloads 487
25846 Internet Pornography Consumption and Relationship Commitment of Filipino Married Individuals

Authors: Racidon P. Bernarte, Vincent Jude G. Estella, Dominador Jr. M. Nucon, Jin Danniel O. Villatema

Abstract:

Purpose: Internet pornography has many negative effects, but one of the disturbing phases of pornography usage is; users are insentient on how pornography influences and affects them. The acceptance of Internet pornography use in a relationship has been found to be higher among men than among women. The use of pornography directly correlates to a decrease in sexual intimacy. Hence, this might lead to the weakening of the relationship of the married individuals to their partner. To find out the relevance of the claim, the researchers aimed to explore the relationship of Internet pornography consumption to the relationship commitment of married individuals in the Philippines. Different factors such as level of satisfaction, the size of the investment, quality of alternatives, relationship stability, and viewing habits of the Filipino married individuals were also considered in determining the relationship of watching pornography online and the relationship commitment of the Filipino married individuals. Design/ Methodology/ Approach –The study used the quantitative research approach, specifically descriptive method and correlation in order to further analyze the gathered data. A self-administered survey was distributed to 400 selected Filipino married individuals who were married individuals that are watching pornography on the Internet who are living in Quezon City. Findings –It is revealed that Internet pornography consumption has a negative effect on the relationship commitment of married individuals. Furthermore, watching pornography online weakened the relationship commitment of the Filipino married individuals that leads to an unstable relationship.

Keywords: internet pornography consumption, relationship commitment, married individuals, polytechnic university of the Philippines

Procedia PDF Downloads 399
25845 New Media Impact on Newspaper Readership

Authors: Umar Lawal Maradun

Abstract:

Newspapers are very important sources of information and are trusted by majority of populations in America, Latin America, Europe and many parts of the world. In the mid-1950s newspapers were at the forefront of providing people with information. However, in the 1970s television took over, while in the 1980s cable satellites became popular and in the 1990s the Internet and World Wide Web became major sources of media content and also major threats to the print media form. This paper looks at how newspaper readership has been affected by new media technology, especially the Internet. It uses empirical data by reviewing available literature within the context of change that is likely to threaten conventional media. It discovers that there is a growing decline in newspaper readership as a result of widespread use of the Internet. The decline in readership has been discovered to be a global phenomenon. The paper suggests strategies for the survival and revenue generation for print-based newspapers.

Keywords: Internet, media, newspaper, press

Procedia PDF Downloads 239
25844 Internet Use and Academic Procrastination Behavior in High School Students

Authors: Endah Mastuti, Prihastuti Sudaryono

Abstract:

The rapid development of Internet usage and technology influences the academic behavior of students in high schools. One of the consequences is the emergence of academic procrastination behavior. Academic procrastination behavior is students’ procrastinate behavior in completing assignments. This study aimed to see whether there are differences in the duration of using the internet with academic procrastinate behavior among high school students in Surabaya. The number of research subject is 498 high school students. Instruments of the research are academic procrastination scale and duration of the internet usage questionnaire. The results from One Way Anova shows F value 0.241 with a significance level of 0.868 This demonstrates that there is no difference between the duration of the use of the Internet with academic procrastination behavior in high school students.

Keywords: academic procrastination, duration of internet usage, students, senior high school

Procedia PDF Downloads 344
25843 The Effect of Iran's Internet Filtering on Active Digital Marketing Businesses

Authors: Maryam Sheikhzadeh Noshabadi

Abstract:

There is no doubt that the Internet has connected the entire world. As a result of this flexible environment, virtual businesses have grown in importance and become one of the most important types of businesses. Although many governments use the internet and have free access to it, some are not happy with the free space and wide accessibility. As a result of recent events and civil protests in Iran, the country's government leaders have decided to once again cut off and filter its free and global Internet. Several issues were impacted by this decision; this includes the lives of businesses that were formed in virtual spaces platform. In this study, we explored the definitive impact of the Internet in Iran in September 1401, using semi-structured interviews with 20 digital marketing activists. This group was discussed in detail in terms of their financial and psychological damages. As a result of these conditions, this group has experienced a crisis of livelihood.

Keywords: internet, Iran, filtering, digital marketing.

Procedia PDF Downloads 67
25842 Awareness about Authenticity of Health Care Information from Internet Sources among Health Care Students in Malaysia: A Teaching Hospital Study

Authors: Renjith George, Preethy Mary Donald

Abstract:

Use of internet sources to retrieve health care related information among health care professionals has increased tremendously as the accessibility to internet is made easier through smart phones and tablets. Though there are huge data available at a finger touch, it is doubtful whether all the sources providing health care information adhere to evidence based practice. The objective of this survey was to study the prevalence of use of internet sources to get health care information, to assess the mind-set towards the authenticity of health care information available via internet sources and to study the awareness about evidence based practice in health care among medical and dental students in Melaka-Manipal Medical College. The survey was proposed as there is limited number of studies reported in the literature and this is the first of its kind in Malaysia. A cross sectional survey was conducted among the medical and dental students of Melaka-Manipal Medical College. A total of 521 students including medical and dental students in their clinical years of undergraduate study participated in the survey. A questionnaire consisting of 14 questions were constructed based on data available from the published literature and focused group discussion and was pre-tested for validation. Data analysis was done using SPSS. The statistical analysis of the results of the survey proved that the use of internet resources for health care information are equally preferred over the conventional resources among health care students. Though majority of the participants verify the authenticity of information from internet sources, there was considerable percentage of candidates who feels that all the information from the internet can be utilised for clinical decision making or were not aware about the need of verification of authenticity of such information. 63.7 % of the participants rely on evidence based practice in health care for clinical decision making while 34.2 % were not aware about it. A minority of 2.1% did not agree with the concept of evidence based practice. The observations of the survey reveals the increasing use of internet resources for health care information among health care students. The results warrants the need to move towards evidence based practice in health care as all health care information available online may not be reliable. The health care person should be judicious while utilising the information from such resources for clinical decision making.

Keywords: authenticity, evidence based practice, health care information, internet

Procedia PDF Downloads 439
25841 A Study of Barriers and Challenges Associated with Agriculture E-commerce in Afghanistan

Authors: Khwaja Bahman Qaderi, Noorullah Rafiqee

Abstract:

Background: With today's increasing Internet users, e-commerce has become a viable model for strengthening relationships between sellers, entrepreneurs, and consumers due to its speed, efficiency, and cost reduction. Agriculture is the economic backbone for 80 percent of the Afghan population. According to MCIT statistics, there are currently around 10 million internet users in Afghanistan. With this data, it was expected that Afghan people should have utilized e-commerce in their agricultural aspects, although it appears to be less used. Objective: This study examines the scope of e-commerce in Afghanistan's agriculture enterprises, how they harness the potential of internet users, and what obstacles they face in implementing e-commerce in their businesses. Method: The study distributed a 39-question questionnaire to agribusinesses in five different zones of Afghanistan. After extracting the responses and excluding the incomplete questionnaires, 280 were included in the analysis step to perform a non-parametric sign test. Result: E-commerce in Afghanistan faces four major political, economic, Internet, and technological obstacles, and no company in the country has implemented e-commerce. In addition, e-commerce is still in its infancy among agricultural companies in the country. Internet use is still primarily limited to email and sharing product images on Facebook & Instagram for advertising purposes. There are no companies that conduct international transactions via the Internet. Conclusion: This study contributes to knowing the challenges and barriers that the agriculture e-commerce faces in Afghanistan to find the effective solutions to use the capacity of internet users in the country and increase the sales rate of agricultural products through the Internet.

Keywords: E-commerce, barriers and challenges, agriculture companies, Afghanistan

Procedia PDF Downloads 81
25840 The Impact of Organizational Culture on Internet Marketing Adoption

Authors: Hafiz Mushtaq Ahmad, Syed Faizan Ali Shah, Bushra Hussain, Muneeb Iqbal

Abstract:

Purpose: The purpose of this study is to investigate the impact of organizational culture on internet marketing adoption. Moreover, the study intends to explore the role of organizational culture in the internet marketing adoption that helps business to achieve organizational growth and augmented market share. Background: With the enormous expansion of technology, organizations now need technology-based marketing paradigm in order to capture larger group of customers. Organizational culture plays a dominant and prominent role in the internet marketing adoption. Changes in the world economy have demolished current organizational competition and generating new technology standards and strategies. With all the technological advances, e-marketing has become one of the essential part of marketing strategies. Organizations require advance internet marketing strategies in order to compete in a global market. Methodology: The population of this study consists of telecom sector organizations of Pakistan. The sample size consists of 200 telecom sector employees. Data were gathered through the questionnaire instrument. The research strategy of this study is survey. The study uses a deductive approach. The sampling technique of this study is convenience sampling. Tentative Results: The study reveals that organizational culture played a vital role in the internet marketing adoption. The results show that there is a strong association between the organizational culture and internet marketing adoption. The results further show that flexible organizational culture helps organization to easily adopt internet marketing. Conclusion: The study discloses that flexible organizational culture helps organizations to easily adopt e-marketing. The study guides decision-makers and owners of organizations to recognize the importance of internet marketing strategy and help them to increase market share by using e-marketing. The study offers solution to the managers to develop flexible organizational culture that helps in internet marketing adoption.

Keywords: internet technology, internet marketing, marketing paradigm, organizational culture

Procedia PDF Downloads 220
25839 Young People, the Internet and Inequality: What are the Causes and Consequences of Exclusion?

Authors: Albin Wallace

Abstract:

Part of the provision within educational institutions is the design, commissioning and implementation of ICT facilities to improve teaching and learning. Inevitably, these facilities focus largely on Internet Protocol (IP) based provisions including access to the World Wide Web, email, interactive software and hardware tools. Educators should be committed to the use of ICT to improve learning and teaching as well as to issues relating to the Internet and educational disadvantage, especially with respect to access and exclusion concerns. In this paper I examine some recent research into the issue of inequality and use of the Internet during which I discuss the causes and consequences of exclusion in the context of social inequality, digital literacy and digital inequality, also touching on issues of global inequality.

Keywords: inequality, internet, education, design

Procedia PDF Downloads 478
25838 The Influence of Self-Concept on the Tendency of Body Dysmorphic Disorder of Beauty Salon and Fitness Centre Customers in Malang

Authors: Yunita Kurniawati

Abstract:

The aim of the research is to understand the influence of self concept on the tendency for body dysmorphic disorder among beauty salon and fitness centre customers in Malang. Subjects in this study amounted to 200 of beauty salon and fitness centre customers in Malang. Subjects completed a self-concept scale and the tendency of body dysmorphic scale. This study was analyzed using simple linear regression. The result shows that there are 14% influence of self concept on the tendency of body dysmorphic disorder among customers of beauty salon and fitness centre in Malang.

Keywords: self concept, tendency of body dysmorphic disorder, beauty salon and fitness centre customers, Malang

Procedia PDF Downloads 410
25837 Analysis of Scientific Attitude, Computer Anxiety, Educational Internet Use, Problematic Internet Use, and Academic Achievement of Middle School Students According to Demographic Variables

Authors: Mehmet Bekmezci, Ismail Celik, Ismail Sahin, Ahmet Kiray, A. Oguz Akturk

Abstract:

In this research, students’ scientific attitude, computer anxiety, educational use of the Internet, academic achievement, and problematic use of the Internet are analyzed based on different variables (gender, parents’ educational level and daily access to the Internet). The research group involves 361 students from two middle schools which are located in the center of Konya. The “general survey method” is adopted in the research. In accordance with the purpose of the study, percentage, mean, standard deviation, independent samples t--‐test, ANOVA (variance) are employed in the study. A total of four scales are implemented. These four scales include a total of 13 sub-dimensions. The scores from these scales and their subscales are studied in terms of various variables. In the research, students’ scientific attitude, computer anxiety, educational use of the Internet, the problematic Internet use and academic achievement (gender, parent educational level, and daily access to the Internet) are investigated based on various variables and some significant relations are found.

Keywords: scientific attitude, educational use of the internet, computer anxiety, problematic use of the internet, academic achievement

Procedia PDF Downloads 353
25836 Effects of Health Information Websites on Health Care Facility Visits

Authors: M. Aljumaan, F. Alkhadra, A. Aldajani, M. Alarfaj, A. Alawami, Y. Aljamaan

Abstract:

Introduction: The internet has been widely available with 18 million users in Saudi Arabia alone. It was shown that 58% of Saudis are using the internet as a source of health-related information which may contribute to overcrowding of the Emergency Room (ER). Not many studies have been conducted to show the effect of online searching for health related information (HRI) and its role in influencing internet users to visit various health care facilities. So the main objective is to determine a correlation between HRI website use and health care facility visits in Saudi Arabia. Methodology: By conducting a cross sectional study and distributing a questionnaire, a total number of 1095 people were included in the study. Demographic data was collected as well as questions including the use of HRI websites, type of websites used, the reason behind the internet search, which health care facility it lead them to visit and whether seeking health information on the internet influenced their attitude towards visiting health care facilities. The survey was distributed using an internet survey applications. The data was then put on an excel sheet and analyzed with the help of a biostatician for making a correlation. Results: We found 91.4% of our population have used the internet for medical information using mainly General medical websites (77.8%), Forums (34.2%), Social Media (21.6%), and government websites (21.6%). We also found that 66.9% have used the internet for medical information to diagnose and treat their medical conditions on their own while 34.7% did so due to the inability to have a close referral and 29.5% due to their lack of time. Searching for health related information online caused 62.5% of people to visit health care facilities. Outpatient clinics were most visited at 77.9% followed by the ER (27.9%). The remaining 37.5% do not visit because using HRI websites reassure them of their condition. Conclusion: In conclusion, there may be a correlation between health information website use and health care facility visits. However, to avoid potentially inaccurate medical information, we believe doctors have an important role in educating their patients and the public on where to obtain the correct information & advertise the sites that are regulated by health care officials.

Keywords: ER visits, health related information, internet, medical websites

Procedia PDF Downloads 177
25835 Keynote Talk: The Role of Internet of Things in the Smart Cities Power System

Authors: Abdul-Rahman Al-Ali

Abstract:

As the number of mobile devices is growing exponentially, it is estimated to connect about 50 million devices to the Internet by the year 2020. At the end of this decade, it is expected that an average of eight connected devices per person worldwide. The 50 billion devices are not mobile phones and data browsing gadgets only, but machine-to-machine and man-to-machine devices. With such growing numbers of devices the Internet of Things (I.o.T) concept is one of the emerging technologies as of recently. Within the smart grid technologies, smart home appliances, Intelligent Electronic Devices (IED) and Distributed Energy Resources (DER) are major I.o.T objects that can be addressable using the IPV6. These objects are called the smart grid internet of things (SG-I.o.T). The SG-I.o.T generates big data that requires high-speed computing infrastructure, widespread computer networks, big data storage, software, and platforms services. A company’s utility control and data centers cannot handle such a large number of devices, high-speed processing, and massive data storage. Building large data center’s infrastructure takes a long time, it also requires widespread communication networks and huge capital investment. To maintain and upgrade control and data centers’ infrastructure and communication networks as well as updating and renewing software licenses which collectively, requires additional cost. This can be overcome by utilizing the emerging computing paradigms such as cloud computing. This can be used as a smart grid enabler to replace the legacy of utilities data centers. The talk will highlight the role of I.o.T, cloud computing services and their development models within the smart grid technologies.

Keywords: intelligent electronic devices (IED), distributed energy resources (DER), internet, smart home appliances

Procedia PDF Downloads 311
25834 A Novel Technological Approach to Maintaining the Cold Chain during Transportation

Authors: Philip J. Purnell

Abstract:

Innovators propose to use the Internet of Things to solve the problem of maintaining the cold chain during the transport of biopharmaceutical products. Sending a data logger with refrigerated goods is only useful to inform the recipient of the goods that they have either breached the cold chain and are therefore potentially spoiled or that they have not breached it and are therefore assumed to be in good condition. Connecting the data logger to the Internet of Things means that the supply chain manager will be informed in real-time of the exact location and the precise temperature of the material at any point on earth. Readable using a simple online interface, the supply chain manager will watch the progress of their material on a Google map together with accurate and crucially real-time temperature readings. The data logger will also send alarms to the supply chain manager if a cold chain breach becomes imminent allowing them time to contact the transporter and restore the cold chain before the material is affected. This development is expected to save billions of dollars in wasted biologics that currently arrive either spoiled or in an unreliable condition.

Keywords: internet of things, cold chain, data logger, transportation

Procedia PDF Downloads 432
25833 The Application of Internet of Things in Healthcare: Building an Interconnected Health Environment

Authors: Quinn Au, Amedeo Carmine, Tauheed Khan Mohd

Abstract:

The Internet of Things (IoT) is emerging as a new development in information technology in recent years, with the potential to improve convenience and efficiency in life. Following the rise of IoT, the Social Internet of Things (SIoT) is another new development in which the benefits of connectivity and user-friendliness from social network services (SNS) are its main features. With the introduction of IoT, the world will be much more modernized, convenient, and industrialized. This paper will discuss the applications of IoT in different sectors such as healthcare services, education, and lifestyle. The privacy challenges that IoT still poses to user data will also be discussed. Finally, an empirical study to evaluate the number of active installed IoT connections in recent years demonstrates the increase in usage of IoT regardless of the privacy challenges. The study also examines some types of IoT devices that are being preferred in the market and predictions from researchers about IoT in the upcoming years.

Keywords: IoT, health care, robotics, social Internet of Things

Procedia PDF Downloads 138
25832 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 248
25831 IoT Based Agriculture Monitoring Framework for Sustainable Rice Production

Authors: Armanul Hoque Shaon, Md Baizid Mahmud, Askander Nobi, Md. Raju Ahmed, Md. Jiabul Hoque

Abstract:

In the Internet of Things (IoT), devices are linked to the internet through a wireless network, allowing them to collect and transmit data without the need for a human operator. Agriculture relies heavily on wireless sensors, which are a vital component of the Internet of Things (IoT). This kind of wireless sensor network monitors physical or environmental variables like temperatures, sound, vibration, pressure, or motion without relying on a central location or sink and collaboratively passes its data across the network to be analyzed. As the primary source of plant nutrients, the soil is critical to the agricultural industry's continued growth. We're excited about the prospect of developing an Internet of Things (IoT) solution. To arrange the network, the sink node collects groundwater levels and sends them to the Gateway, which centralizes the data and forwards it to the sensor nodes. The sink node gathers soil moisture data, transmits the mean to the Gateways, and then forwards it to the website for dissemination. The web server is in charge of storing and presenting the moisture in the soil data to the web application's users. Soil characteristics may be collected using a networked method that we developed to improve rice production. Paddy land is running out as the population of our nation grows. The success of this project will be dependent on the appropriate use of the existing land base.

Keywords: IoT based agriculture monitoring, intelligent irrigation, communicating network, rice production

Procedia PDF Downloads 140
25830 Internet of Things Applications on Supply Chain Management

Authors: Beatriz Cortés, Andrés Boza, David Pérez, Llanos Cuenca

Abstract:

The Internet of Things (IoT) field is been applied in industries with different purposes. Sensing Enterprise (SE) is an attribute of an enterprise or a network that allows it to react to business stimuli originating on the internet. These fields have come into focus recently on the enterprises and there is some evidence of the use and implications in supply chain management while finding it as an interesting aspect to work on. This paper presents a revision and proposals of IoT applications in supply chain management.

Keywords: industrial, internet of things, production systems, sensing enterprises, sensor, supply chain management

Procedia PDF Downloads 406
25829 Impacts of Online Behaviors on Empathy in Medical Students

Authors: Ling-Lang Huang, Yih-Jer Wu

Abstract:

Empathy is crucial for a patient-physician relationship and medical professionalism. Internet activity, gaming, or even addiction, have been more and more common among medical students. However, there’s been no report showing whether internet behavior has a substantial impact on empathy in medical students to our best knowledge. All year-2 medical students taking the optional course 'Narrative, Comprehension, and Communication' were enrolled. Internet behaviors are divided into two groups, 'internet users without online gaming (IU)' and 'internet users with online gaming (IG)', each group was further divided into 3 groups according to their average online retention time each day (< 2, 2 - 6, > 6 hours). Empathy was evaluated by the scores of the reports and humanities reflection after watching indicated movies, and by self-measured empathy questionnaire. All students taking the year-2 optional course 'Narrative, Comprehension, and Communication' were enrolled. As compared with students in the IU group, those in the IG group had significantly lower scores for the reports (81.3 ± 3.7 vs. 86.4 ± 5.1, P = 0.014). If further dividing the students into 5 groups (IU < 2, IU 2-6, IG < 2, IG 2 - 6, and IG > 6 hours), the scores were significantly and negatively correlated to online gaming with longer hours (r = -0.556, P = 0.006). However, there was no significant difference between IU and IG groups (33.0 ± 5.4 vs. 34.8 ± 3.2, P = n.s.), in terms of scores in the self-measured empathy questionnaire, neither was there any significant trend of scores along with longer online hours across the 5 groups (r = -0.164, P = n.s.). To date, there has been no evidence showing whether different internet behaviors (with or without online gaming) have distinct impacts on empathy. Although all of the medical students had a similarly good self-perception for empathy, our data suggested that online gaming did have a negative impact on their actual expression of empathy. Our observation has brought up an important issue for pondering: May IT- or gaming-assisted medical learning actually harm students’ empathy? In conclusion, this data suggests that long hours of online gaming harms expression of empathy, though all medics think themselves a person of high empathy.

Keywords: empathy. Internet, medical students, online gaming

Procedia PDF Downloads 123
25828 A Survey of Domain Name System Tunneling Attacks: Detection and Prevention

Authors: Lawrence Williams

Abstract:

As the mechanism which converts domains to internet protocol (IP) addresses, Domain Name System (DNS) is an essential part of internet usage. It was not designed securely and can be subject to attacks. DNS attacks have become more frequent and sophisticated and the need for detecting and preventing them becomes more important for the modern network. DNS tunnelling attacks are one type of attack that are primarily used for distributed denial-of-service (DDoS) attacks and data exfiltration. Discussion of different techniques to detect and prevent DNS tunneling attacks is done. The methods, models, experiments, and data for each technique are discussed. A proposal about feasibility is made. Future research on these topics is proposed.

Keywords: DNS, tunneling, exfiltration, botnet

Procedia PDF Downloads 64
25827 Scheduling of Cross-Docking Center: An Auction-Based Algorithm

Authors: Eldho Paul, Brijesh Paul

Abstract:

This work proposes an auction mechanism based solution methodology for the optimum scheduling of trucks in a cross-docking centre. The cross-docking centre is an important element of lean supply chain. It reduces the amount of storage and transportation costs in the distribution system compared to an ordinary warehouse. Better scheduling of trucks in a cross-docking center is the best way to reduce storage and transportation costs. Auction mechanism is commonly used for allocation of limited resources in different real-life applications. Here, we try to schedule inbound trucks by integrating auction mechanism with the functioning of a cross-docking centre. A mathematical model is developed for the optimal scheduling of inbound trucks based on the auction methodology. The determination of exact solution for problems involving large number of trucks was found to be computationally difficult, and hence a genetic algorithm based heuristic methodology is proposed in this work. A comparative study of exact and heuristic solutions is done using five classes of data sets. It is observed from the study that the auction-based mechanism is capable of providing good solutions to scheduling problem in cross-docking centres.

Keywords: auction mechanism, cross-docking centre, genetic algorithm, scheduling of trucks

Procedia PDF Downloads 399
25826 Data Privacy: Stakeholders’ Conflicts in Medical Internet of Things

Authors: Benny Sand, Yotam Lurie, Shlomo Mark

Abstract:

Medical Internet of Things (MIoT), AI, and data privacy are linked forever in a gordian knot. This paper explores the conflicts of interests between the stakeholders regarding data privacy in the MIoT arena. While patients are at home during healthcare hospitalization, MIoT can play a significant role in improving the health of large parts of the population by providing medical teams with tools for collecting data, monitoring patients’ health parameters, and even enabling remote treatment. While the amount of data handled by MIoT devices grows exponentially, different stakeholders have conflicting understandings and concerns regarding this data. The findings of the research indicate that medical teams are not concerned by the violation of data privacy rights of the patients' in-home healthcare, while patients are more troubled and, in many cases, are unaware that their data is being used without their consent. MIoT technology is in its early phases, and hence a mixed qualitative and quantitative research approach will be used, which will include case studies and questionnaires in order to explore this issue and provide alternative solutions.

Keywords: MIoT, data privacy, stakeholders, home healthcare, information privacy, AI

Procedia PDF Downloads 90
25825 Remote Monitoring and Control System of Potentiostat Based on the Internet of Things

Authors: Liang Zhao, Guangwen Wang, Guichang Liu

Abstract:

Constant potometer is an important component of pipeline anti-corrosion systems in the chemical industry. Based on Internet of Things (IoT) technology, Programmable Logic Controller (PLC) technology and database technology, this paper developed a set of a constant potometer remote monitoring management system. The remote monitoring and remote adjustment of the working status of the constant potometer are realized. The system has real-time data display, historical data query, alarm push management, user permission management, and supporting Web access and mobile client application (APP) access. The actual engineering project test results show the stability of the system, which can be widely used in cathodic protection systems.

Keywords: internet of things, pipe corrosion protection, potentiostat, remote monitoring

Procedia PDF Downloads 132