Search results for: excessive internet use
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2368

Search results for: excessive internet use

1288 Radical Web Text Classification Using a Composite-Based Approach

Authors: Kolade Olawande Owoeye, George R. S. Weir

Abstract:

The widespread of terrorism and extremism activities on the internet has become a major threat to the government and national securities due to their potential dangers which have necessitated the need for intelligence gathering via web and real-time monitoring of potential websites for extremist activities. However, the manual classification for such contents is practically difficult or time-consuming. In response to this challenge, an automated classification system called composite technique was developed. This is a computational framework that explores the combination of both semantics and syntactic features of textual contents of a web. We implemented the framework on a set of extremist webpages dataset that has been subjected to the manual classification process. Therein, we developed a classification model on the data using J48 decision algorithm, this is to generate a measure of how well each page can be classified into their appropriate classes. The classification result obtained from our method when compared with other states of arts, indicated a 96% success rate in classifying overall webpages when matched against the manual classification.

Keywords: extremist, web pages, classification, semantics, posit

Procedia PDF Downloads 146
1287 Parental Monitoring of Learners’ Cell Phone Use in the Eastern Cape, South Africa

Authors: Melikhaya Skhephe, Robert Mawuli Kwasi Boadzo, Zanoxolo Berington Gobingca

Abstract:

This research study sought to examine parental monitoring of learners’ cell phone use in the Eastern Cape, South Africa. To this end, the researchers employed a quantitative approach. Data were obtained through questionnaires, with a sample of 15 parents having been purposively selected. The findings revealed that parents are unaware that they have to monitor the learner’s cell phone. Another finding was that parents in the 21-century did not support the use of mobile phones in education. The researchers recommend that parent’s discussion forums be created to educate parents on how a cell phone can be used in education. Cellphone companies need to be encouraged to educate parents on how they monitor cell phones used by learners. Another recommendation was that network providers need to restrict access to searching on the internet according to age.

Keywords: parental monitoring, app blocking services, learner’s cell phone use, cell phone

Procedia PDF Downloads 162
1286 Language Inequalities in the Algerian Public Space: A Semiotic Landscape Analysis

Authors: Sarah Smail

Abstract:

Algeria has been subject to countless conquests and invasions that resulted in having a diverse linguistic repertoire. The sociolinguistic situation of the country made linguistic landscape analysis pertinent. This in fact, has led to the growth of diverse linguistic landscape studies that mainly focused on identifying the sociolinguistic situation of the country through shop names analysis. The present research adds to the existing literature by offering another perspective to the analysis of signs by combining the physical and digital semiotic landscape. The powerful oil, gas and agri-food industries in Algeria make it interesting to focus on the commodification of natural resources for the sake of identifying the language and semiotic resources deployed in the Algerian public scene in addition to the identification of the visibility of linguistic inequalities and minorities in the business domain. The study discusses the semiotic landscape of three trade cities: Bejaia, Setif and Hassi-Messaoud. In addition to interviews conducted with business owners and graphic designers and questionnaires with business employees. Withal, the study relies on Gorter’s multilingual inequalities in public space (MIPS) model (2021) and Irvine and Gal’s language ideology and linguistic differentiation (2000). The preliminary results demonstrate the sociolinguistic injustice existing in the business domain, e.g., the exclusion of the official languages, the dominance of foreign languages, and the excessive use of the roman script.

Keywords: semiotic landscaping, digital scapes, language commodification, linguistic inequalities, business signage

Procedia PDF Downloads 110
1285 Justyna Skrzyńska, Zdzisław Kobos, Zbigniew Wochyński

Authors: Vahid Bairami Rad

Abstract:

Due to the tremendous progress in computer technology in the last decades, the capabilities of computers increased enormously and working with a computer became a normal activity for nearly everybody. With all the possibilities a computer can offer, humans and their interaction with computers are now a limiting factor. This gave rise to a lot of research in the field of HCI (human computer interaction) aiming to make interaction easier, more intuitive, and more efficient. To research eye gaze based interfaces it is necessary to understand both sides of the interaction–the human eye and the eye tracker. The first section gives an overview on the anatomy of the eye. The second section accuracy and calibration issue. The subsequent section presents data from a user study where eye movements have been recorded while watching a video and while surfing the Internet. Statistics on the eye movement during these tasks for several individuals provide typical values and ranges for fixation times and saccade lengths and are the foundation for discussions in later chapters. The data also reveal typical limitations of eye trackers.

Keywords: human computer interaction, gaze tracking, calibration, eye movement

Procedia PDF Downloads 537
1284 Jurisprudential Terms of Istiḥālah (Transformation) in Cosmetic Products (An Analytical Study)

Authors: Hassan Sher

Abstract:

God has made this world with all of his essences and beautified it with his countless blessings. In Islam, no doubt, beauty is a very important characteristic but also an aspect of the body and the heart. In a world where the standards of beauty seem to change from year to year according to trends and norms. Moreover, in this world, many people want to look good and feel satisfied and will be willing to go through many ways for their ideal look. likewise, several products came into use for beautifying, cleansing, and promoting attractiveness. These products include components of cosmetics, they are utilized for health and beauty purposes. There are concerns regarding the existence of harmful or ḥarām chemicals, but With the advancement in (technology), it results in the transformation of unlawful and forbidden cosmetic products into permissible several new ingredients and products. The process of transforming certain items or products from one form to another, Muslim jurists tend to use terms like Istiḥālah (transformation).Istiḥālah is an Islamic principle unknown to many Muslims. LinguisticallyIstiḥālah carries the meaning of a transformation or a change in the nature of a thing into something else.According to the religious contact, Istiḥālah signifies a turning of a matter from a state of impurity or inedibility into a matter of different nature, name, properties, and characteristics (colour, taste, and smell) (Zuhayli, 1997). This principle, which is unanimously accepted by Muslim scholars, are breaths of fresh air to Muslims suffering from the suffocation of excessive prohibition. This will allow the invention to be utilized fully. This research tends to highlight the different ideological concepts of Istiḥālah from the perspective of Islamic Shariah and jurisprudence and its application in cosmetic products. However, the study focuses on the issues related to alcohol and pig ingredients in beauty products.

Keywords: istiḥālah. harām, jurisprudence, cosmetic, pig

Procedia PDF Downloads 133
1283 Electronic Government Services Adoption from Multi-Nationalities Perspectives

Authors: Isaac Kofi Mensah, Jianing Mi, Cheng Feng

Abstract:

Electronic government is the application of Information and Communication Technologies (ICTs) by the government to improve public service delivery to citizens and businesses. The purpose of this study is to investigate factors influencing the adoption and use of e-government services from different nationalities perspectives. The Technology Acceptance Model (TAM) will be used as the theoretical framework for the study. A questionnaire would be developed and administered to 500 potential respondents who are students from different nationalities in China. Predictors such as perceived usefulness, perceived ease of use, computer self-efficacy, trust in both the internet and government, social influence and perceived service quality would be examined with regard to their impact on the intention to use e-government services. This research is currently at the design and implementation stage. The completion of this study will provide useful insights into understanding factors impacting the decision to use e-government services from a cross and multi nationalities perspectives.

Keywords: different nationalities, e-government, e-government services, technology acceptance model (TAM)

Procedia PDF Downloads 431
1282 Contamination with Heavy Metals of Frozen Fish Sold in Open Markets in Ondo City, Southwest Nigeria

Authors: Adebisi M. Tiamiyu, Adewale F. Adeyemi, Olu-Ayobamikale V. Irewunmi

Abstract:

Fish consumption has increased in recent years in both developing and advanced countries, owing to increased awareness of its nutritional and therapeutic benefits and its availability and affordability relative to other animal protein sources. Fish and fish products, however, are extremely prone to contamination by a wide range of hazardous organic and inorganic substances. This study assessed the levels of three heavy metals, copper (Cu), iron (Fe), and zinc (Zn), in frozen fish imported into Nigeria and sold in Ondo City for their safety for human consumption as recommended by WHO and FEPA. Three species of frozen fish (Scombrus scombrus, Merluccius merluccius, and Clupea harengus) were purchased, and the wet tissues (gills, muscles, and liver) were digested using a 3:1 mixture of nitric acid (HNO3) and hydrochloric acid (HCL). An atomic absorption spectrophotometer (AAS) was used to detect the amount of metal in the tissues. The levels of heavy metals in different fish species' organs varied. The fish had Zn > Fe > Cu heavy metal concentrations in that order. While the concentration of Cu and Fe in the tissues of all three fish species studied were within the WHO and FEPA prescribed limits for food fish, the concentration of Zn in the muscles of M. merluccius (0.262±0.052), C. harengus harengus (0.327±0.099), and S. scombrus (0.362±0.119) was above the prescribed limit (0.075 ppm) set by FEPA. An excessive amount of zinc in the body can cause nausea, headaches, decreased immunity, and appetite loss.

Keywords: heavy metal, atomic absorption spectrophotometer, fish, agencies

Procedia PDF Downloads 73
1281 Effectiveness of Lowering the Water Table as a Mitigation Measure for Foundation Settlement in Liquefiable Soils Using 1-g Scale Shake Table Test

Authors: Kausar Alam, Mohammad Yazdi, Peiman Zogh, Ramin Motamed

Abstract:

An earthquake is an unpredictable natural disaster. It induces liquefaction, which causes considerable damage to the structure, life support, and piping systems because of ground settlement. As a result, people are incredibly concerned about how to resolve the situation. Previous researchers adopted different ground improvement techniques to reduce the settlement of the structure during earthquakes. This study evaluates the effectiveness of lowering the water table as a technique to mitigate foundation settlement in liquefiable soil. The performance will be evaluated based on foundation settlement and the reduction of excessive pore water pressure. In this study, a scaled model was prepared based on a full-scale shale table experiment conducted at the University of California, San Diego (UCSD). The model ground consists of three soil layers having a relative density of 55%, 45%, and 90%, respectively. A shallow foundation is seated over an unsaturated crust layer. After preparation of the model ground, the water table was measured to be at 45, 40, and 35 cm (from the bottom). Then, the input motions were applied for 10 seconds, with a peak acceleration of 0.25g and a constant frequency of 2.73 Hz. Based on the experimental results, the effectiveness of the lowering water table in reducing the foundation settlement and excess pore water pressure was evident. The foundation settlement was reduced from 50 mm to 5 mm. In addition, lowering the water table as a mitigation measure is a cost-effective way to decrease liquefaction-induced building settlement.

Keywords: foundation settlement, ground water table, liquefaction, hake table test

Procedia PDF Downloads 114
1280 Portable Water Treatment for Flood Resilience

Authors: Alireza Abbassi Monjezi, Mohammad Hasan Shaheed

Abstract:

Flood, caused by excessive rainfall, monsoon, cyclone and tsunami is a common disaster in many countries of the world especially sea connected low-lying countries. A stand-alone self-powered water filtration module for decontamination of floodwater has been designed and modeled. A combination forward osmosis – low pressure reverse osmosis (FO-LPRO) system powered by solar photovoltaic-thermal (PVT) energy is investigated which could overcome the main barriers to water supply for remote areas and ensure off-grid filtration. The proposed system is designed to be small scale and portable to provide on-site potable water to communities that are no longer themselves mobile nor can be reached quickly by the aid agencies. FO is an osmotically driven process that uses osmotic pressure gradients to drive water across a controlled pore membrane from a feed solution (low osmotic pressure) to a draw solution (high osmotic pressure). This drops the demand for high hydraulic pressures and therefore the energy demand. There is also a tendency for lower fouling, easier fouling layer removal and higher water recovery. In addition, the efficiency of the PVT unit will be maximized through freshwater cooling which is integrated into the system. A filtration module with the capacity of 5 m3/day is modeled to treat floodwater and provide drinking water. The module can be used as a tool for disaster relief, particularly in the aftermath of flood and tsunami events.

Keywords: flood resilience, membrane desalination, portable water treatment, solar energy

Procedia PDF Downloads 289
1279 Information Overload, Information Literacy and Use of Technology by Students

Authors: Elena Krelja Kurelović, Jasminka Tomljanović, Vlatka Davidović

Abstract:

The development of web technologies and mobile devices makes creating, accessing, using and sharing information or communicating with each other simpler every day. However, while the amount of information constantly increasing it is becoming harder to effectively organize and find quality information despite the availability of web search engines, filtering and indexing tools. Although digital technologies have overall positive impact on students’ lives, frequent use of these technologies and digital media enriched with dynamic hypertext and hypermedia content, as well as multitasking, distractions caused by notifications, calls or messages; can decrease the attention span, make thinking, memorizing and learning more difficult, which can lead to stress and mental exhaustion. This is referred to as “information overload”, “information glut” or “information anxiety”. Objective of this study is to determine whether students show signs of information overload and to identify the possible predictors. Research was conducted using a questionnaire developed for the purpose of this study. The results show that students frequently use technology (computers, gadgets and digital media), while they show moderate level of information literacy. They have sometimes experienced symptoms of information overload. According to the statistical analysis, higher frequency of technology use and lower level of information literacy are correlated with larger information overload. The multiple regression analysis has confirmed that the combination of these two independent variables has statistically significant predictive capacity for information overload. Therefore, the information science teachers should pay attention to improving the level of students’ information literacy and educate them about the risks of excessive technology use.

Keywords: information overload, computers, mobile devices, digital media, information literacy, students

Procedia PDF Downloads 280
1278 The Immediate Effects of Thrust Manipulation for Thoracic Hyperkyphosis

Authors: Betul Taspinar, Eda O. Okur, Ismail Saracoglu, Ismail Okur, Ferruh Taspinar

Abstract:

Thoracic hyperkyphosis, is a well-known spinal phenomenon, refers to an excessive curvature (> 40 degrees) of the thoracic spine. The aim of this study was to explore the effectiveness of thrust manipulation on thoracic spine alignment. 31 young adults with hyperkyphosis diagnosed with Spinal Mouse® device were randomly assigned either thrust manipulation group (n=16, 11 female, 5 male) or sham manipulation group (n=15, 8 female, 7 male). Thrust and sham manipulations were performed by a blinded physiotherapist who is a certificated expert in musculoskeletal physiotherapy. Thoracic kyphosis degree was measured after the interventions via Spinal Mouse®. Wilcoxon test was used to analyse the data obtained before and after the manipulation for each group, whereas Mann-Whitney U test was used to compare the groups. The mean of baseline thoracic kyphosis degrees in thrust and sham groups were 50.69 o ± 7.73 and 48.27o ± 6.43, respectively. There was no statistically significant difference between groups in terms of initial thoracic kyphosis degrees (p=0.51). After the interventions, the mean of thoracic kyphosis degree in thrust and sham groups were measured as 44.06o ± 6.99 and 48.93o ± 6.57 respectively (p=0.03). There was no statistically significant difference between before and after interventions in sham group (p=0.33), while the mean of thoracic kyphosis degree in thrust group decreased significantly (p=0.00). Thrust manipulation can attenuate thoracic hyperkyphosis immediately in young adults by not using placebo effect. Manipulation might provide accurate proprioceptive (sensory) input to the spine joints and reduce kyphosis by restoring normal segment mobility. Therefore thoracic manipulation might be included in the physiotherapy programs to treat hyperkyphosis.

Keywords: hyperkyphosis, manual therapy, spinal mouse, physiotherapy

Procedia PDF Downloads 346
1277 Omni: Data Science Platform for Evaluate Performance of a LoRaWAN Network

Authors: Emanuele A. Solagna, Ricardo S, Tozetto, Roberto dos S. Rabello

Abstract:

Nowadays, physical processes are becoming digitized by the evolution of communication, sensing and storage technologies which promote the development of smart cities. The evolution of this technology has generated multiple challenges related to the generation of big data and the active participation of electronic devices in society. Thus, devices can send information that is captured and processed over large areas, but there is no guarantee that all the obtained data amount will be effectively stored and correctly persisted. Because, depending on the technology which is used, there are parameters that has huge influence on the full delivery of information. This article aims to characterize the project, currently under development, of a platform that based on data science will perform a performance and effectiveness evaluation of an industrial network that implements LoRaWAN technology considering its main parameters configuration relating these parameters to the information loss.

Keywords: Internet of Things, LoRa, LoRaWAN, smart cities

Procedia PDF Downloads 148
1276 Public Awareness of Aphasia in Taiwan: A Pilot Study

Authors: Ching-Yu Lin

Abstract:

The number of patients with aphasia has been gradually increasing; however, public awareness of aphasia is still limited. Moreover, surveys about public awareness of aphasia have been conducted in several countries, but there is no research about public awareness of aphasia in Taiwan so far. Therefore, this study aims at the investigation of public awareness of aphasia in Taiwan. In this pilot study, the original English-version questionnaire will be translated into Mandarin Chinese by a speech therapist (the author), and 100 Taiwanese over 18 years old will be recruited to finish the questionnaire. People with an occupation about health or medical will be excluded. In order to reach more people, the questionnaire will be an Internet survey by Google Forms, and the URL of the survey will be distributed by messaging, i.e. e-mail, Facebook Messenger, Instagram DM, or Line. Data will be analyzed via PASW Statistic 18. Descriptive statistics will be used to summarize what proportion of the public have heard of aphasia and what proportion of the public have basic knowledge of aphasia in Taiwan. The sources of information about aphasia will also be investigated. Further, differences in awareness of aphasia due to age, gender, and education level will be discussed.

Keywords: aphasia, public awareness, public knowledge, taiwan

Procedia PDF Downloads 106
1275 Tinder, Image Merchandise and Desire: The Configuration of Social Ties in Today's Neoliberalism

Authors: Daniel Alvarado Valencia

Abstract:

Nowadays, the market offers us solutions for everything, creating the idea of an immediate availability of anything we could desire, and the Internet is the mean through which to obtain all this. The proposal of this conference is that this logic puts the subjects in a situation of self-exploitation, and considers the psyche as a productive force by configuring affection and desire from a neoliberal value perspective. It uses Tinder, starting from ethnographical data from Mexico City users, as an example for this. Tinder is an application created to get dates, have sexual encounters and find a partner. It works from the creation and management of a digital profile. It is an example of how futuristic and lonely the current era can be since we got used to interact with other people through screens and images. However, at the same time, it provides solutions to loneliness, since technology transgresses, invades and alters social practices in different ways. Tinder fits into this contemporary context, it is a concrete example of the processes of technification in which social bonds develop through certain devices offered by neoliberalism, through consumption, and where the search of love and courtship are possible through images and their consumption.

Keywords: desire, image, merchandise, neoliberalism

Procedia PDF Downloads 122
1274 The Effect of Artificial Intelligence on Real Estate and Construction Marketing

Authors: Michael Saad Thabet Azrek

Abstract:

Experiential advertising method is an unforgettable revel that remains deeply anchored within the customer's memory. Furthermore, client pleasure is defined as the emotional reaction to the stories provided that relate to precise products or services bought. Consequently, experiential advertising sports can influence the extent of consumer pleasure and loyalty. In this context, they have a look at pursuits to observe the connection between experiential advertising, purchaser satisfaction and loyalty to splendor merchandise in Konya. The outcomes of this examination confirmed that experiential marketing is an important indicator of consumer pride and loyalty, and that experiential advertising and marketing have a large positive impact on patron satisfaction and loyalty.

Keywords: sponsorship, marketing communication theories, marketing communication tools internet, marketing, tourism, tourism management corporate responsibility, employee organizational performance, internal marketing, internal customer experiential marketing, customer satisfaction, customer loyalty, social sciences.

Procedia PDF Downloads 38
1273 Thermal and Mechanical Properties of Polycaprolactone-Soy Lecithin Modified Bentonite Nanocomposites

Authors: Danila Merino, Leandro N. Ludueña, Vera A. Alvarez

Abstract:

Clays are commonly used to reinforce polymeric materials. In order to modify them, long-chain quaternary-alkylammonium salts have been widely employed. However, the application of these clays in biological fields is limited by the toxicity and poor biocompatibility presented by these modifiers. Meanwhile, soy lecithin, acts as a natural biosurfactant and environment-friendly biomodifier. In this report, we analyse the effect of content of soy lecithin-modified bentonite on the properties of polycaprolactone (PCL) nanocomposites. Commercial grade PCL (CAPA FB 100) was supplied by Perstorp, with Mw = 100000 g/mol. Minarmco S.A. and Melar S.A supplied bentonite and soy lecithin, respectively. Clays with 18, 30 and 45 wt% of organic content were prepared by exchanging 4 g of Na-Bent with 1, 2 and 4 g of soy lecithin aqueous and acid solution (pH=1, with HCl) at 75ºC for 2 h. Then, they were washed and lyophilized for 72 h. Samples were labeled A, B and C. Nanocomposites with 1 and 2 wt.% of each clay were prepared by melt-intercalation followed by compression-moulding. An intensive Brabender type mixer with two counter-rotating roller rotors was used. Mixing temperature was 100 ºC; speed of rotation was 100 rpm. and mixing time was 10 min. Compression moulding was carried out in a hydraulic press under 75 Kg/mm2 for 10 minutes at 100 ºC. The thickness of the samples was about 1 mm. Thermal and mechanical properties were analysed. PCL nanocomposites with 1 and 2% of B presented the best mechanical properties. It was observed that an excessive organic content produced an increment on the rigidity of PCL, but caused a detrimental effect on the tensile strength and elongation at break of the nanocomposites. Thermogravimetrical analyses suggest that all reinforced samples have higher resistance to degradation than neat PCL.

Keywords: chemical modification, clay, nanocomposite, characterization

Procedia PDF Downloads 201
1272 The Design of the Blended Learning System via E-Media and Online Learning for the Asynchronous Learning: Case Study of Process Management Subject

Authors: Pimploi Tirastittam, Suppara Charoenpoom

Abstract:

Nowadays the asynchronous learning has granted the permission to the anywhere and anything learning via the technology and E-media which give the learner more convenient. This research is about the design of the blended and online learning for the asynchronous learning of the process management subject in order to create the prototype of this subject asynchronous learning which will create the easiness and increase capability in the learning. The pattern of learning is the integration between the in-class learning and online learning via the internet. This research is mainly focused on the online learning and the online learning can be divided into 5 parts which are virtual classroom, online content, collaboration, assessment and reference material. After the system design was finished, it was evaluated and tested by 5 experts in blended learning design and 10 students which the user’s satisfaction level is good. The result is as good as the assumption so the system can be used in the process management subject for a real usage.

Keywords: blended learning, asynchronous learning, design, process management

Procedia PDF Downloads 409
1271 Privacy Paradox and the Internet of Medical Things

Authors: Isabell Koinig, Sandra Diehl

Abstract:

In recent years, the health-care context has not been left unaffected by technological developments. In recent years, the Internet of Medical Things (IoMT)has not only led to a collaboration between disease management and advanced care coordination but also to more personalized health care and patient empowerment. With more than 40 % of all health technology being IoMT-related by 2020, questions regarding privacy become more prevalent, even more so during COVID-19when apps allowing for an intensive tracking of people’s whereabouts and their personal contacts cause privacy advocates to protest and revolt. There is a widespread tendency that even though users may express concerns and fears about their privacy, they behave in a manner that appears to contradict their statements by disclosing personal data. In literature, this phenomenon is discussed as a privacy paradox. While there are some studies investigating the privacy paradox in general, there is only scarce research related to the privacy paradox in the health sector and, to the authors’ knowledge, no empirical study investigating young people’s attitudes toward data security when using wearables and health apps. The empirical study presented in this paper tries to reduce this research gap by focusing on the area of digital and mobile health. It sets out to investigate the degree of importance individuals attribute to protecting their privacy and individual privacy protection strategies. Moreover, the question to which degree individuals between the ages of 20 and 30 years are willing to grant commercial parties access to their private data to use digital health services and apps are put to the test. To answer this research question, results from 6 focus groups with 40 participants will be presented. The focus was put on this age segment that has grown up in a digitally immersed environment. Moreover, it is particularly the young generation who is not only interested in health and fitness but also already uses health-supporting apps or gadgets. Approximately one-third of the study participants were students. Subjects were recruited in August and September 2019 by two trained researchers via email and were offered an incentive for their participation. Overall, results indicate that the young generation is well informed about the growing data collection and is quite critical of it; moreover, they possess knowledge of the potential side effects associated with this data collection. Most respondents indicated to cautiously handle their data and consider privacy as highly relevant, utilizing a number of protective strategies to ensure the confidentiality of their information. Their willingness to share information in exchange for services was only moderately pronounced, particularly in the health context, since health data was seen as valuable and sensitive. The majority of respondents indicated to rather miss out on using digital and mobile health offerings in order to maintain their privacy. While this behavior might be an unintended consequence, it is an important piece of information for app developers and medical providers, who have to find a way to find a user base for their products against the background of rising user privacy concerns.

Keywords: digital health, privacy, privacy paradox, IoMT

Procedia PDF Downloads 138
1270 Hybrid Reliability-Similarity-Based Approach for Supervised Machine Learning

Authors: Walid Cherif

Abstract:

Data mining has, over recent years, seen big advances because of the spread of internet, which generates everyday a tremendous volume of data, and also the immense advances in technologies which facilitate the analysis of these data. In particular, classification techniques are a subdomain of Data Mining which determines in which group each data instance is related within a given dataset. It is used to classify data into different classes according to desired criteria. Generally, a classification technique is either statistical or machine learning. Each type of these techniques has its own limits. Nowadays, current data are becoming increasingly heterogeneous; consequently, current classification techniques are encountering many difficulties. This paper defines new measure functions to quantify the resemblance between instances and then combines them in a new approach which is different from actual algorithms by its reliability computations. Results of the proposed approach exceeded most common classification techniques with an f-measure exceeding 97% on the IRIS Dataset.

Keywords: data mining, knowledge discovery, machine learning, similarity measurement, supervised classification

Procedia PDF Downloads 465
1269 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 107
1268 A Recent Investigation into College Freshmen's Foreign Language Classroom Anxiety in the Context of AI

Authors: Xiao Yu Yang

Abstract:

In the current era of AI and the Internet, students' access to AI has increased significantly, and it is no longer surprising that young generations can effectively utilize resources to learn foreign languages. This study aims to investigate the foreign language classroom anxiety of college students who just entered university in 2024 and understand the current anxiety levels of students. Meanwhile, this study conducts the investigation by using a scale tool based on the FLCAS (Foreign Language Classroom Anxiety Scale), which consists of 21 items that were adjusted and re-tested for validity in 2019. A total of three classes taught by the researcher participated in this study. Further interview comparisons are conducted, particularly with students from rural areas and urban cities. Considering the prevalence of AI in modern education, the relationship between the investigated foreign language classroom anxiety and the adopted AI-assisted teaching and learning will be further explored to discuss potential implications.

Keywords: FLCAS in China, freshman, AI, English teaching

Procedia PDF Downloads 3
1267 The Web Site Development for E-Commerce Trading in Thailand Customers View

Authors: Ladaporn Pithuk

Abstract:

The purposes of the study were to ascertain the customer requirement, to identify the factors related to online business in Thailand. The sample of this study consisted of 400 customers who are purchasing product and service on E-commerce. To get primary sources, a questionnaire consisting of 31 questions was designed and adapted from previous studies. The data from the questionnaires were collected and analyzed in descriptive forms and (ONE-WAY ANOVA) was conducted. The majority of the respondents showed customer requirement by stating “moderately agree” for questions asking them about customization, connection, content, commerce, context, communication and community, however, they also displayed negative attitudes by identifying “moderately disagree” for security concerns and after-sales services. These important issues need to be improved immediately since it can encourage customers to buy goods and services through the Internet or discourage them, and businesses should offer more channels of payment methods for customers for instance, e-payment.

Keywords: customer requirement, customization, connection, online business

Procedia PDF Downloads 201
1266 A Bibliographical Research on the Use of Social Media Websites by the Deaf in Brazil

Authors: Juliana Guimarães Faria

Abstract:

The article focus on social networks and deaf people. It aims to analyze the studies done about this topic published in journals, as well as the ones done through dissertations and theses. It also aims to identify the thematic focus of the studies produced and to identify how the deaf relates to social networks, more specifically, trying to identify, starting with those productions, what are the benefits, or not, of social networks for the deaf and if there is some reflection about the way the deaf community has been organizing politically in search of bilingual education and inclusion, making use of the softwares of social networks. After reading, description and analysis of the eleven works identified about social networks and the deaf, we detected three thematic groups: four studies presented discussions about social networks and the socialization of the deaf; four works presented discussions about the contribution of social networks to the linguistic and cognitive development of the deaf; and three works presented discussions about the political bias of the use of social networks in favor of the deaf. We also identified that the works presented an optimistic view of social networks.

Keywords: social networks, deaf, internet, Brazil

Procedia PDF Downloads 410
1265 Factors Associated with Self-Rated Health among Persons with Disabilities: A Korean National Survey

Authors: Won-Seok Kim, Hyung-Ik Shin

Abstract:

Self-rated health (SRH) is a subjective assessment of individual health and has been identified as a strong predictor for mortality and morbidity. However few studies have been directed to the factors associated with SRH in persons with disabilities (PWD). We used data of 7th Korean national survey for 5307 PWD in 2008. Multiple logistic regression analysis was performed to find out independent risk factors for poor SRH in PWD. As a result, indicators of physical condition (poor instrumental ADL), socioeconomic disadvantages (poor education, economically inactive, low self-rated social class, medicaid in health insurance, presence of unmet need for hospital use) and social participation and networks (no use of internet service) were selected as independent risk factors for poor SRH in final model. Findings in the present study would be helpful in making a program to promote the health and narrow the gap of health status between the PWD.

Keywords: disabilities, risk factors, self-rated health, socioeconomic disadvantages, social networks

Procedia PDF Downloads 397
1264 Evaluating Electronic Service Quality in Banking Iran

Authors: Vahid Bairami Rad

Abstract:

With the rapid growth of the Internet and the globalization of the market, most enterprises are trying to attract and win customers in the highly competitive electronic market. Better e-service quality will enhance the relationship with customers and their satisfaction. So the measurement of eservice quality is very important but it is a complex process due to the complex nature of services. Literature predicts that there is a lack of universal definition of e-service quality. The e-service quality measures in banking have great importance in achieving high customer base. This paper proposes a conceptual model for measuring e-service quality in Iranian Banking Iran. Nine dimensions reliability, ease of use, personalization, security and trust, website aesthetic, responsiveness, contact and speed of delivery had been identified. The results of this paper may help to develop a proper scale to measure the e-service quality in Iranian Banking Industry, which may assist to maintain and improve the performance and effectiveness of e-service quality to retain customers.

Keywords: electronic banking, Dimensions, customer service quality, electronic, communication

Procedia PDF Downloads 500
1263 Marketing Research and Analysis Improvement Effect on Production

Authors: Mina Zaky Sarofim Zaky

Abstract:

Experiential marketing is a form of marketing that offers a unique integration of experiential and entertainment elements into a product or service. Experiential marketing is defined as an unforgettable experience that penetrates the customer's mind. Customer satisfaction is also defined as the emotional response to the experience provided with the purchased product or service. Experiential marketing activities can, therefore, affect the level of customer satisfaction and loyalty. In this context, the study aims to determine the relationship between experiential marketing, customer satisfaction and customer loyalty in cosmetic products in Konya. The least squares method (PLS) was used to analyze the research data. Existing research has shown that experiential marketing is a significant predictor of customer satisfaction and customer loyalty, and that experiential marketing has a positive impact on customer satisfaction and customer loyalty.

Keywords: internet, marketing, tourism, tourism management corporate responsibility, employee organizational performance, internal marketing, internal customer experiential marketing, customer satisfaction, customer loyalty, social sciences

Procedia PDF Downloads 49
1262 Russian Law Enforcement Moonlighting Enterprise and Corruption after 2009 Police reform

Authors: Serguei Cheloukhine

Abstract:

This study examines corrupting and moonlighting enterprise among Russian law enforcement (Police) since the 2009 Police Reform (hereto forward referred to as Reform). This research is based on the survey of about two dozen police officers in Russia’s regions. In addition, we analyzed statistics on crime, policing and socio-economic situation in Russian regions. Congruently, some data on the police officer’s off-duty activities was collected from the Internet sites. These Reforms sought to curb corruption at all levels of the Russian civil service and among uniformed law enforcement (Police) personnel. Many thought that the rebranding of the Militsiya as ‘Politsiya’ (Police) would have a transformational effect, both within the organization as well as how others perceived it. Ultimately, the rebranding effort failed; the only actual changes were the organization’s name and its personnel's uniforms. In fact, the Reforms seems to have contributed to even more corruption and abuse of power, as well an expansion of Law Enforcement’s ties to Corrupt Networks.

Keywords: bribery, corruption, moonlighting, police reform, Russia

Procedia PDF Downloads 11
1261 Usage of Biosorbent Material for the Removal of Nitrate from Wastewater

Authors: M. Abouleish, R. Umer, Z. Sara

Abstract:

Nitrate can cause serious environmental and human health problems. Effluent from different industries and excessive use of fertilizers have increased the level of nitrate in ground and surface water. Nitrate can convert to nitrite in the body, and as a result, can lead to Methemoglobinemia and cancer. Therefore, different organizations have set standard limits for nitrate and nitrite. The United States Environmental Protection Agency (USEPA) has set a Maximum Contaminant Level Goal (MCLG) of 10 mg N/L for nitrate and 1 mg N/L for nitrite. The removal of nitrate from water and wastewater is very important to ensure the availability of clean water. Different plant materials such as banana peel, rice hull, coconut and bamboo shells, have been studied as biosorbents for the removal of nitrates from water. The use of abundantly existing plant material as an adsorbent material and the lack of energy requirement for the adsorption process makes biosorption a sustainable approach. Therefore, in this research, the fruit of the plant was investigated for its ability to act as a biosorbent to remove the nitrate from wastewater. The effect of pH on nitrate removal was studied using both the raw and chemically activated fruit (adsorbent). Results demonstrated that the adsorbent needs to be chemically activated before usage to remove the nitrate from wastewater. pH did not have a significant effect on the adsorption process, with maximum adsorption of nitrate occurring at pH 4. SEM/EDX results demonstrated that there is no change in the surface of the adsorbent as a result of the chemical activation. Chemical activation of the adsorbent using NaOH increased the removal of nitrate by 6%; therefore, various methods of activation of the adsorbent will be investigated to increase the removal of nitrate.

Keywords: biosorption, nitrates, plant material, water, and wastewater treatment

Procedia PDF Downloads 155
1260 A Smart Sensor Network Approach Using Affordable River Water Level Sensors

Authors: Dian Zhang, Brendan Heery, Maria O’Neill, Ciprian Briciu-Burghina, Noel E. O’Connor, Fiona Regan

Abstract:

Recent developments in sensors, wireless data communication and the cloud computing have brought the sensor web to a whole new generation. The introduction of the concept of ‘Internet of Thing (IoT)’ has brought the sensor research into a new level, which involves the developing of long lasting, low cost, environment friendly and smart sensors; new wireless data communication technologies; big data analytics algorithms and cloud based solutions that are tailored to large scale smart sensor network. The next generation of smart sensor network consists of several layers: physical layer, where all the smart sensors resident and data pre-processes occur, either on the sensor itself or field gateway; data transmission layer, where data and instructions exchanges happen; the data process layer, where meaningful information is extracted and organized from the pre-process data stream. There are many definitions of smart sensor, however, to summarize all these definitions, a smart sensor must be Intelligent and Adaptable. In future large scale sensor network, collected data are far too large for traditional applications to send, store or process. The sensor unit must be intelligent that pre-processes collected data locally on board (this process may occur on field gateway depends on the sensor network structure). In this case study, three smart sensing methods, corresponding to simple thresholding, statistical model and machine learning based MoPBAS method, are introduced and their strength and weakness are discussed as an introduction to the smart sensing concept. Data fusion, the integration of data and knowledge from multiple sources, are key components of the next generation smart sensor network. For example, in the water level monitoring system, weather forecast can be extracted from external sources and if a heavy rainfall is expected, the server can send instructions to the sensor notes to, for instance, increase the sampling rate or switch on the sleeping mode vice versa. In this paper, we describe the deployment of 11 affordable water level sensors in the Dublin catchment. The objective of this paper is to use the deployed river level sensor network at the Dodder catchment in Dublin, Ireland as a case study to give a vision of the next generation of a smart sensor network for flood monitoring to assist agencies in making decisions about deploying resources in the case of a severe flood event. Some of the deployed sensors are located alongside traditional water level sensors for validation purposes. Using the 11 deployed river level sensors in a network as a case study, a vision of the next generation of smart sensor network is proposed. Each key component of the smart sensor network is discussed, which hopefully inspires the researchers who are working in the sensor research domain.

Keywords: smart sensing, internet of things, water level sensor, flooding

Procedia PDF Downloads 383
1259 A Taxonomy of Routing Protocols in Wireless Sensor Networks

Authors: A. Kardi, R. Zagrouba, M. Alqahtani

Abstract:

The Internet of Everything (IoE) presents today a very attractive and motivating field of research. It is basically based on Wireless Sensor Networks (WSNs) in which the routing task is the major analysis topic. In fact, it directly affects the effectiveness and the lifetime of the network. This paper, developed from recent works and based on extensive researches, proposes a taxonomy of routing protocols in WSNs. Our main contribution is that we propose a classification model based on nine classes namely application type, delivery mode, initiator of communication, network architecture, path establishment (route discovery), network topology (structure), protocol operation, next hop selection and latency-awareness and energy-efficient routing protocols. In order to provide a total classification pattern to serve as reference for network designers, each class is subdivided into possible subclasses, presented, and discussed using different parameters such as purposes and characteristics.

Keywords: routing, sensor, survey, wireless sensor networks, WSNs

Procedia PDF Downloads 183