Search results for: multihoming users
1257 Performance Analysis of Multichannel OCDMA-FSO Network under Different Pervasive Conditions
Authors: Saru Arora, Anurag Sharma, Harsukhpreet Singh
Abstract:
To meet the growing need of high data rate and bandwidth, various efforts has been made nowadays for the efficient communication systems. Optical Code Division Multiple Access over Free space optics communication system seems an effective role for providing transmission at high data rate with low bit error rate and low amount of multiple access interference. This paper demonstrates the OCDMA over FSO communication system up to the range of 7000 m at a data rate of 5 Gbps. Initially, the 8 user OCDMA-FSO system is simulated and pseudo orthogonal codes are used for encoding. Also, the simulative analysis of various performance parameters like power and core effective area that are having an effect on the Bit error rate (BER) of the system is carried out. The simulative analysis reveals that the length of the transmission is limited by the multi-access interference (MAI) effect which arises when the number of users increases in the system.Keywords: FSO, PSO, bit error rate (BER), opti system simulation, multiple access interference (MAI), q-factor
Procedia PDF Downloads 3651256 Towards Visual Personality Questionnaires Based on Deep Learning and Social Media
Authors: Pau Rodriguez, Jordi Gonzalez, Josep M. Gonfaus, Xavier Roca
Abstract:
Image sharing in social networks has increased exponentially in the past years. Officially, there are 600 million Instagrammers uploading around 100 million photos and videos per day. Consequently, there is a need for developing new tools to understand the content expressed in shared images, which will greatly benefit social media communication and will enable broad and promising applications in education, advertisement, entertainment, and also psychology. Following these trends, our work aims to take advantage of the existing relationship between text and personality, already demonstrated by multiple researchers, so that we can prove that there exists a relationship between images and personality as well. To achieve this goal, we consider that images posted on social networks are typically conditioned on specific words, or hashtags, therefore any relationship between text and personality can also be observed with those posted images. Our proposal makes use of the most recent image understanding models based on neural networks to process the vast amount of data generated by social users to determine those images most correlated with personality traits. The final aim is to train a weakly-supervised image-based model for personality assessment that can be used even when textual data is not available, which is an increasing trend. The procedure is described next: we explore the images directly publicly shared by users based on those accompanying texts or hashtags most strongly related to personality traits as described by the OCEAN model. These images will be used for personality prediction since they have the potential to convey more complex ideas, concepts, and emotions. As a result, the use of images in personality questionnaires will provide a deeper understanding of respondents than through words alone. In other words, from the images posted with specific tags, we train a deep learning model based on neural networks, that learns to extract a personality representation from a picture and use it to automatically find the personality that best explains such a picture. Subsequently, a deep neural network model is learned from thousands of images associated with hashtags correlated to OCEAN traits. We then analyze the network activations to identify those pictures that maximally activate the neurons: the most characteristic visual features per personality trait will thus emerge since the filters of the convolutional layers of the neural model are learned to be optimally activated depending on each personality trait. For example, among the pictures that maximally activate the high Openness trait, we can see pictures of books, the moon, and the sky. For high Conscientiousness, most of the images are photographs of food, especially healthy food. The high Extraversion output is mostly activated by pictures of a lot of people. In high Agreeableness images, we mostly see flower pictures. Lastly, in the Neuroticism trait, we observe that the high score is maximally activated by animal pets like cats or dogs. In summary, despite the huge intra-class and inter-class variabilities of the images associated to each OCEAN traits, we found that there are consistencies between visual patterns of those images whose hashtags are most correlated to each trait.Keywords: emotions and effects of mood, social impact theory in social psychology, social influence, social structure and social networks
Procedia PDF Downloads 1961255 Published Financial Statement as a Correlate of Investment Decision among Commercial Bank Stakeholders in Nigeria
Authors: C. F. Popoola, K. Akinsanya, S. B. Babarinde, D. A. Farinde
Abstract:
This study investigated published financial statement as correlate of investment decision among commercial bank stakeholders in Nigeria. A correlation research design was used in the study. 180 users of published financial statement were purposively sampled from Lagos and Ibadan. Data generated were analyzed using Pearson correlation and regression. The findings of the study revealed that, balance sheet is negatively related with investment decision (r=-.483; p < .01) while income statement (r= .249; p < .001), notes on the account (r= .230; p < .001), cash flow statement (r= .202; p < .001), value added statement (r= .328; p < .001) and five-year financial summary (r= .191 ;p < .01) are positively related with investment decision. Findings also revealed that components of published financial statement significantly predicted good investment decision (R2= .983; F(5,175)=284.5; p < .05) for commercial bank stakeholders. Therefore, it was suggested that Nigeria banks and professional bodies should instigate programs that will increase the knowledge of stakeholders on published financial statement.Keywords: commercial banks, financial statement, income statement, investment decision, stakeholders
Procedia PDF Downloads 4591254 Design and Implementation of a Bluetooth-Based Misplaced Object Finder Using DFRobot Arduino Interfaced with Led and Buzzer
Authors: Bright Emeni
Abstract:
The project is a system that allows users to locate their misplaced or lost devices by using Bluetooth technology. It utilizes the DFRobot Bettle BLE Arduino microcontroller as its main component for communication and control. By interfacing it with an LED and a buzzer, the system provides visual and auditory signals to assist in locating the target device. The search process can be initiated through an Android application, by which the system creates a Bluetooth connection between the microcontroller and the target device, permitting the exchange of signals for tracking purposes. When the device is within range, the LED indicator illuminates, and the buzzer produces audible alerts, guiding the user to the device's location. The application also provides an estimated distance of the object using Bluetooth signal strength. The project’s goal is to offer a practical and efficient solution for finding misplaced devices, leveraging the capabilities of Bluetooth technology and microcontroller-based control systems.Keywords: Bluetooth finder, object finder, Bluetooth tracking, tracker
Procedia PDF Downloads 651253 The Factors Affecting Customers’ Trust on Electronic Commerce Website of Retail Business in Bangkok
Authors: Supattra Kanchanopast
Abstract:
The purpose of this research was to identify factors that influenced the trust of e-commerce within retail businesses. In order to achieve the objectives of this research, the researcher collected data from random e-commerce users in Bangkok. The data was comprised of the results of 382 questionnaires. The data was analyzed by using descriptive statistics, which included frequency, percentages, and the standard deviation of pertinent factors. Multiple regression analysis was also used. The findings of this research revealed that the majority of the respondents were female, 25-40 years old, and graduated a bachelor degree. The respondents mostly worked in private sectors and had monthly income between 15,000-25,000 baht. The findings also indicate that information quality factors, website design factors, service quality factor, security factor and advertising factors as significant factors effecting customer trust of e-commerce in online retail. The hypotheses testing revealed that these factors in e-commerce had an effect on customer’s trust in the same direction with high level.Keywords: e-commerce, online retail, Retail business, trust, website
Procedia PDF Downloads 1981252 Text Mining of Twitter Data Using a Latent Dirichlet Allocation Topic Model and Sentiment Analysis
Authors: Sidi Yang, Haiyi Zhang
Abstract:
Twitter is a microblogging platform, where millions of users daily share their attitudes, views, and opinions. Using a probabilistic Latent Dirichlet Allocation (LDA) topic model to discern the most popular topics in the Twitter data is an effective way to analyze a large set of tweets to find a set of topics in a computationally efficient manner. Sentiment analysis provides an effective method to show the emotions and sentiments found in each tweet and an efficient way to summarize the results in a manner that is clearly understood. The primary goal of this paper is to explore text mining, extract and analyze useful information from unstructured text using two approaches: LDA topic modelling and sentiment analysis by examining Twitter plain text data in English. These two methods allow people to dig data more effectively and efficiently. LDA topic model and sentiment analysis can also be applied to provide insight views in business and scientific fields.Keywords: text mining, Twitter, topic model, sentiment analysis
Procedia PDF Downloads 1791251 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy
Authors: Andrei Bogdan Stanescu, Robert Stana
Abstract:
Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy
Procedia PDF Downloads 891250 Rapid Design Approach for Electric Long-Range Drones
Authors: Adrian Sauer, Lorenz Einberger, Florian Hilpert
Abstract:
The advancements and technical innovations in the field of electric unmanned aviation over the past years opened the third dimension in areas like surveillance, logistics, and mobility for a wide range of private and commercial users. Researchers and companies are faced with the task of integrating their technology into airborne platforms. Especially start-ups and researchers require unmanned aerial vehicles (UAV), which can be quickly developed for specific use cases without spending significant time and money. This paper shows a design approach for the rapid development of a lightweight automatic separate-lift-thrust (SLT) electric vertical take-off and landing (eVTOL) UAV prototype, which is able to fulfill basic transportation as well as surveillance missions. The design approach does not require expensive or time-consuming design loop software. Thereby developers can easily understand, adapt, and adjust the presented method for their own project. The approach is mainly focused on crucial design aspects such as aerofoil, tuning, and powertrain.Keywords: aerofoil, drones, rapid prototyping, powertrain
Procedia PDF Downloads 711249 Simultaneous Interpreting in the European Parliament: Linguistic Quality of the Political Discourse: An Empirical Analysis
Authors: Alicja Zapolnik-Plachetka
Abstract:
The paper examines the impact of the Members’ of the European Parliament (MEPs) language choice on the linguistic quality of their political discourse as delivered by the interpreters. The study, designed by the author, who is an EU interpreter herself, consisted of three phases. First, a number of speeches of Polish and Spanish MEPs were analyzed to determine whether the incidence of use of certain figures of speech depending on whether the speech had been delivered in English or their respective mother tongue. Then the use of figures of speech was also analyzed based on speeches by some British MEPs, in order to determine what was the incidence for the native users of English. Subsequently, the speeches were compared with their interpretations to find out whether the interpreters managed to convey accurately the means of oratory used by the MEPs. The final result shows that in case of institutional environments dependant on simultaneous interpretation the speakers’ choices can, in fact, influence the linguistic quality of the political communication.Keywords: content accuracy, European Parliament, political discourse, simultaneous interpreting
Procedia PDF Downloads 1301248 A Detailed Study of Two Different Airfoils on Flight Performance of MAV of Same Physical Dimension
Authors: Shoeb A. Adeel, Shashant Anand, Vivek Paul, Dinesh, Suraj, Roshan
Abstract:
The paper presents a study of micro air vehicles (MAVs) with wingspans of 20 Cm with two different airfoil configurations. MAVs have vast potential applications in both military and civilian areas. These MAVs are fully autonomous and supply real-time data. The paper focuses on two different designs of the MAVs one being N22 airfoil and the other a flat plate with similar dimension. As designed, the MAV would fly in a low Reynolds-number regime at airspeeds of 15 & 20 m/sec. Propulsion would be provided by an electric motor with an advanced lithium. Because of the close coupling between vehicle elements, system integration would be a significant challenge, requiring tight packaging and multifunction components to meet mass limitations and Centre of Gravity (C.G) balancing. These MAVs are feasible and within a couple of years of technology development in key areas including sensors, propulsion, Aerodynamics, and packaging these would be easily available to the users at affordable prices. The paper finally compares the flight performance of the two configurations.Keywords: airfoil, CFD, MAV, flight performance, endurance, climb, lift, drag
Procedia PDF Downloads 4961247 Sustainable Design Criteria for Beach Resorts to Enhance Physical Activity That Helps Improve Health and Well-being for Adults in Saudi Arabia
Authors: Noorh Albadi, Salha Khayyat
Abstract:
People's moods and well-being are affected by their environment. The built environment impacts one's level of activity and health. In order to enhance users' physical health, sustainable design strategies have been developed for the physical environment to improve users' health. This study aimed to determine whether adult resorts in Saudi Arabia meet standards that ensure physical wellness to identify the needed requirements. It will be significant to the Ministry of Tourism, Sports, developers, and designers. Physical activity affects human health physically and mentally. In Saudi Arabia, the percentage of people who practiced sports in the Kingdom in 2019 was 20.04% - males and females older than 15. On the other hand, there is a lack of physical activity in Saudi Arabia; 90% of the Kingdom's population spends more than two hours sitting down without moving, which puts them at risk of contracting a non-communicable disease. The lack of physical activity and movement led to an increase in the rate of obesity among Saudis by 59% in 2020 and consequently could cause chronic diseases or death. The literature generally endorses that leading an active lifestyle improves physical health and affects mental health. Therefore, the United Nations has set 17 sustainable development goals (SDGs) to ensure healthy lives and promote well-being for all ages. One of SDG3's targets is reducing mortality, which can be achieved by raising physical activity. In order to support sustainable design, many rating systems and strategies have been developed, such as WELL building, Leadership in Energy and Environmental Design, (LEED), Active design strategies, and RIPA plan of work. The survey was used to gather qualitative and quantitative information. It was designed based on the Active Design and WELL building theories targeting beach resorts visitors, professional and beginner athletes, and non-athletics to ask them about the beach resorts they visited in the Kingdom and whether they met the criteria of sports resorts and healthy and active design theories, in addition to gathering information about the preferences of physical activities in the Saudi society in terms of the type of activities that young people prefer, where they prefer to engage in and under any thermal and light conditions. The final section asks about the design of residential units in beach sports resorts, the data collected from 127 participants. Findings revealed that participants prefer outdoor activities in moderate weather and sunlight or the evening with moderate and sufficient lighting and that no beach sports resorts in the country are constructed to support sustainable design criteria for physical activity. Participants agreed that several measures that lessen tension at beach resorts and enhance movement and activity are needed by Saudi society. The study recommends designing resorts that meet the sustainable design criteria regarding physical activity in Saudi Arabia to increase physical activity to achieve psychological and physical benefits and avoid psychological and physical diseases related to physical inactivity.Keywords: sustainable design, SDGs, active design strategies, well building, beach resort design
Procedia PDF Downloads 1201246 Designing User Interfaces for Just in Time Enterprise Solution
Authors: Romi Dey
Abstract:
Introduction: One of the most important criteria for technology to sustain and grow is through it’s elaborate and intuitive design methodology and design thinking. Designing for enterprise applications that cater to Just in Time Technology is one of the most challenging and detailed processes any User Experience Designer would come across. Description: The basic principles of Design, when applied to tailor to these technologies, creates an immense challenge and that’s how a set of redefined and revised design principles that can be applied to designing any Just In Time manufacturing solution. Findings: The thorough process of understanding the end user, their existing pain points which they’ve faced in the real world, their responsibilities and expectations, the core needs and last but not the least the demands, creates havoc nurturing of the design methodologies for the Just in Time solutions. With respect to the business aspect, design and design principles play a strong role in any form of innovation. Conclusion: Innovation and knowledge about the latest technologies are the keywords in the manufacturing industry. It becomes crucial for the product development team to be precise in their understanding of the technology and being sure of end users expectation.Keywords: design thinking, enterprise application, Just in Time, user experience design
Procedia PDF Downloads 1701245 Using Emerging Hot Spot Analysis to Analyze Overall Effectiveness of Policing Policy and Strategy in Chicago
Authors: Tyler Gill, Sophia Daniels
Abstract:
The paper examines how accessing the spatial-temporal constrains of data will help inform policymakers and law enforcement officials. The authors utilize Chicago crime data from 2006-2016 to demonstrate how the Emerging Hot Spot Tool is an ideal hot spot clustering approach to analyze crime data. Traditional approaches include density maps or creating a spatial weights matrix to include the spatial-temporal constrains. This new approach utilizes a space-time implementation of the Getis-Ord Gi* statistic to visualize the data more quickly to make better decisions. The research will help complement socio-cultural research to find key patterns to help frame future policies and evaluate the implementation of prior strategies. Through this analysis, homicide trends and patterns are found more effectively and recommendations for use by non-traditional users of GIS are offered for real life implementation.Keywords: crime mapping, emerging hot spot analysis, Getis-Ord Gi*, spatial-temporal analysis
Procedia PDF Downloads 2441244 Using Business Simulations and Game-Based Learning for Enterprise Resource Planning Implementation Training
Authors: Carin Chuang, Kuan-Chou Chen
Abstract:
An Enterprise Resource Planning (ERP) system is an integrated information system that supports the seamless integration of all the business processes of a company. Implementing an ERP system can increase efficiencies and decrease the costs while helping improve productivity. Many organizations including large, medium and small-sized companies have already adopted an ERP system for decades. Although ERP system can bring competitive advantages to organizations, the lack of proper training approach in ERP implementation is still a major concern. Organizations understand the importance of ERP training to adequately prepare managers and users. The low return on investment, however, for the ERP training makes the training difficult for knowledgeable workers to transfer what is learned in training to the jobs at workplace. Inadequate and inefficient ERP training limits the value realization and success of an ERP system. That is the need to call for a profound change and innovation for ERP training in both workplace at industry and the Information Systems (IS) education in academia. The innovated ERP training approach can improve the users’ knowledge in business processes and hands-on skills in mastering ERP system. It also can be instructed as educational material for IS students in universities. The purpose of the study is to examine the use of ERP simulation games via the ERPsim system to train the IS students in learning ERP implementation. The ERPsim is the business simulation game developed by ERPsim Lab at HEC Montréal, and the game is a real-life SAP (Systems Applications and Products) ERP system. The training uses the ERPsim system as the tool for the Internet-based simulation games and is designed as online student competitions during the class. The competitions involve student teams with the facilitation of instructor and put the students’ business skills to the test via intensive simulation games on a real-world SAP ERP system. The teams run the full business cycle of a manufacturing company while interacting with suppliers, vendors, and customers through sending and receiving orders, delivering products and completing the entire cash-to-cash cycle. To learn a range of business skills, student needs to adopt individual business role and make business decisions around the products and business processes. Based on the training experiences learned from rounds of business simulations, the findings show that learners have reduced risk in making mistakes that help learners build self-confidence in problem-solving. In addition, the learners’ reflections from their mistakes can speculate the root causes of the problems and further improve the efficiency of the training. ERP instructors teaching with the innovative approach report significant improvements in student evaluation, learner motivation, attendance, engagement as well as increased learner technology competency. The findings of the study can provide ERP instructors with guidelines to create an effective learning environment and can be transferred to a variety of other educational fields in which trainers are migrating towards a more active learning approach.Keywords: business simulations, ERP implementation training, ERPsim, game-based learning, instructional strategy, training innovation
Procedia PDF Downloads 1391243 A Case Study of Assessing the Impact of Electronic Payment System on the Service Delivery of Banks in Nigeria
Authors: Idris Lawal
Abstract:
Electronic payment system is simply a payment or monetary transaction made over the internet or a network of computers. This study was carried out in order to assess how electronic payment system has impacted on banks service delivery, to examine the efficiency of electronic payment system in Nigeria and to determine the level of customer's satisfaction as a direct result of the deployment of electronic payment systems. It is an empirical study conducted using structured questionnaire distributed to officials and customers of Access Bank plc. Chi-square(x2) was adopted for the purpose of data analysis. The result of the study showed that the development of electronic payment system offer great benefit to bank customers including improved services, reduced turn-around time, ease of banking transaction, significant cost saving etc. The study recommends that customer protection laws should be properly put in place to safeguard the interest of end users of e-payment instruments.Keywords: bank, electronic payment systems, service delivery, customer's satisfaction
Procedia PDF Downloads 3991242 Effects of Video Games and Online Chat on Mathematics Performance in High School: An Approach of Multivariate Data Analysis
Authors: Lina Wu, Wenyi Lu, Ye Li
Abstract:
Regarding heavy video game players for boys and super online chat lovers for girls as a symbolic phrase in the current adolescent culture, this project of data analysis verifies the displacement effect on deteriorating mathematics performance. To evaluate correlation or regression coefficients between a factor of playing video games or chatting online and mathematics performance compared with other factors, we use multivariate analysis technique and take gender difference into account. We find the most important reason for the negative sign of the displacement effect on mathematics performance due to students’ poor academic background. Statistical analysis methods in this project could be applied to study internet users’ academic performance from the high school education to the college education.Keywords: correlation coefficients, displacement effect, multivariate analysis technique, regression coefficients
Procedia PDF Downloads 3641241 The Sound of Getting Closer: A Phenomenological Research of the Senses of Proximity and Touch
Authors: Marcello Lussana
Abstract:
Closer is a wireless system developed by the “Design Research Lab” of the UdK Berlin that is able to detect the proximity and touch between two (or more) persons. We have been using this system for one performance and one installation: in both cases, the proximity and touch events of the two participants have been sonified using the software Supercollider. In this paper, we are going to focus on the actual experience of the participants involved, especially related to the awareness of their body, their level of proprioception and how they felt in their body and in connection with the other person. In order to give value to the lived experience of the participant, a phenomenological method described and developed by Professor Claire Petitmengin has been used. This strategy allowed the interviewees to become aware of their subjective experience, and describe it with great precision. This is essential in order to understand the actual state of consciousness of the users. Our aim is to research the senses of proprioception, touch, and proximity: as they all involve a pre-reflective state of consciousness, they are central for the understanding of human perception. The interviews revealed how this experience could improve and increase proprioception and awareness of your body.Keywords: interactive sound, phenomenology, pre-reflective, proprioception, subjective experience
Procedia PDF Downloads 2471240 Reframing Service Sector Privatisation Quality Conception with the Theory of Deferred Action
Authors: Mukunda Bastola, Frank Nyame-Asiamah
Abstract:
Economics explanation for privatisation, drawing on neo-liberal market structures and technical efficiency principles has failed to address social imbalance and, distribute the efficiency benefits accrued from privatisation equitably among service users and different classes of people in society. Stakeholders’ interest, which cover ethical values and changing human needs are ignored due to shareholders’ profit maximising strategy with higher service charges. The consequence of these is that, the existing justifications for privatisation have fallen short of customer quality expectations because the underlying plan-based models fail to account for the nuances of customer expectations. We draw on the theory of deferred action to develop a context-based privatisation model, the deferred-based privatisation model, to explain how privatisation could be strategised for the emergent reality of the wider stakeholders’ interests and everyday quality demands of customers which are unpredictable.Keywords: privatisation, service quality, shareholders, deferred action, deferred-based privatisation model
Procedia PDF Downloads 2741239 Knowledge Engineering Based Smart Healthcare Solution
Authors: Rhaed Khiati, Muhammad Hanif
Abstract:
In the past decade, smart healthcare systems have been on an ascendant drift, especially with the evolution of hospitals and their increasing reliance on bioinformatics and software specializing in healthcare. Doctors have become reliant on technology more than ever, something that in the past would have been looked down upon, as technology has become imperative in reducing overall costs and improving the quality of patient care. With patient-doctor interactions becoming more necessary and more complicated than ever, systems must be developed while taking into account costs, patient comfort, and patient data, among other things. In this work, we proposed a smart hospital bed, which mixes the complexity and big data usage of traditional healthcare systems with the comfort found in soft beds while taking certain concerns like data confidentiality, security, and maintaining SLA agreements, etc. into account. This research work potentially provides users, namely patients and doctors, with a seamless interaction with to their respective nurses, as well as faster access to up-to-date personal data, including prescriptions and severity of the condition in contrast to the previous research in the area where there is lack of consideration of such provisions.Keywords: big data, smart healthcare, distributed systems, bioinformatics
Procedia PDF Downloads 1981238 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.Keywords: authentication, gesture-based passwords, shoulder-surfing attacks, usability
Procedia PDF Downloads 1391237 Deployed Confidence: The Testing in Production
Authors: Shreya Asthana
Abstract:
Testers know that the feature they tested on stage is working perfectly in production only after release went live. Sometimes something breaks in production and testers get to know through the end user’s bug raised. The panic mode starts when your staging test results do not reflect current production behavior. And you started doubting your testing skills when finally the user reported a bug to you. Testers can deploy their confidence on release day by testing on production. Once you start doing testing in production, you will see test result accuracy because it will be running on real time data and execution will be a little faster as compared to staging one due to elimination of bad data. Feature flagging, canary releases, and data cleanup can help to achieve this technique of testing. By this paper it will be easier to understand the steps to achieve production testing before making your feature live, and to modify IT company’s testing procedure, so testers can provide the bug free experience to the end users. This study is beneficial because too many people think that testing should be done in staging but not in production and now this is high time to pull out people from their old mindset of testing into a new testing world. At the end of the day, it all just matters if the features are working in production or not.Keywords: bug free production, new testing mindset, testing strategy, testing approach
Procedia PDF Downloads 771236 Automatic Lead Qualification with Opinion Mining in Customer Relationship Management Projects
Authors: Victor Radich, Tania Basso, Regina Moraes
Abstract:
Lead qualification is one of the main procedures in Customer Relationship Management (CRM) projects. Its main goal is to identify potential consumers who have the ideal characteristics to establish a profitable and long-term relationship with a certain organization. Social networks can be an important source of data for identifying and qualifying leads since interest in specific products or services can be identified from the users’ expressed feelings of (dis)satisfaction. In this context, this work proposes the use of machine learning techniques and sentiment analysis as an extra step in the lead qualification process in order to improve it. In addition to machine learning models, sentiment analysis or opinion mining can be used to understand the evaluation that the user makes of a particular service, product, or brand. The results obtained so far have shown that it is possible to extract data from social networks and combine the techniques for a more complete classification.Keywords: lead qualification, sentiment analysis, opinion mining, machine learning, CRM, lead scoring
Procedia PDF Downloads 851235 Large-Scale Electroencephalogram Biometrics through Contrastive Learning
Authors: Mostafa ‘Neo’ Mohsenvand, Mohammad Rasool Izadi, Pattie Maes
Abstract:
EEG-based biometrics (user identification) has been explored on small datasets of no more than 157 subjects. Here we show that the accuracy of modern supervised methods falls rapidly as the number of users increases to a few thousand. Moreover, supervised methods require a large amount of labeled data for training which limits their applications in real-world scenarios where acquiring data for training should not take more than a few minutes. We show that using contrastive learning for pre-training, it is possible to maintain high accuracy on a dataset of 2130 subjects while only using a fraction of labels. We compare 5 different self-supervised tasks for pre-training of the encoder where our proposed method achieves the accuracy of 96.4%, improving the baseline supervised models by 22.75% and the competing self-supervised model by 3.93%. We also study the effects of the length of the signal and the number of channels on the accuracy of the user-identification models. Our results reveal that signals from temporal and frontal channels contain more identifying features compared to other channels.Keywords: brainprint, contrastive learning, electroencephalo-gram, self-supervised learning, user identification
Procedia PDF Downloads 1571234 Annotation Ontology for Semantic Web Development
Authors: Hadeel Al Obaidy, Amani Al Heela
Abstract:
The main purpose of this paper is to examine the concept of semantic web and the role that ontology and semantic annotation plays in the development of semantic web services. The paper focuses on semantic web infrastructure illustrating how ontology and annotation work to provide the learning capabilities for building content semantically. To improve productivity and quality of software, the paper applies approaches, notations and techniques offered by software engineering. It proposes a conceptual model to develop semantic web services for the infrastructure of web information retrieval system of digital libraries. The developed system uses ontology and annotation to build a knowledge based system to define and link the meaning of a web content to retrieve information for users’ queries. The results are more relevant through keywords and ontology rule expansion that will be more accurate to satisfy the requested information. The level of results accuracy would be enhanced since the query semantically analyzed work with the conceptual architecture of the proposed system.Keywords: semantic web services, software engineering, semantic library, knowledge representation, ontology
Procedia PDF Downloads 1731233 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System
Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji
Abstract:
Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.Keywords: Biba model, break the glass, context, cross-domain, fine-grained
Procedia PDF Downloads 5411232 What the Future Holds for Social Media Data Analysis
Authors: P. Wlodarczak, J. Soar, M. Ally
Abstract:
The dramatic rise in the use of Social Media (SM) platforms such as Facebook and Twitter provide access to an unprecedented amount of user data. Users may post reviews on products and services they bought, write about their interests, share ideas or give their opinions and views on political issues. There is a growing interest in the analysis of SM data from organisations for detecting new trends, obtaining user opinions on their products and services or finding out about their online reputations. A recent research trend in SM analysis is making predictions based on sentiment analysis of SM. Often indicators of historic SM data are represented as time series and correlated with a variety of real world phenomena like the outcome of elections, the development of financial indicators, box office revenue and disease outbreaks. This paper examines the current state of research in the area of SM mining and predictive analysis and gives an overview of the analysis methods using opinion mining and machine learning techniques.Keywords: social media, text mining, knowledge discovery, predictive analysis, machine learning
Procedia PDF Downloads 4231231 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 1131230 Environmental Impact Assessment of Electromagnetic Fields Emitted from Mobile Base Station in Central Area of KSA
Authors: Mohammed Abdullah Alrajhi
Abstract:
The rapid growth in the number of mobile phone subscribers has resulted in an increased number of mobile base stations all over the world. Generally, mobile base stations are existing in huge numbers in populated areas than in non-populated ones to serve the largest number of users. The total number of mobile subscriptions in the Kingdom of Saudi Arabia reached around 50 million at the end of 2014, with a penetration rate of 165.1% according to the quarterly electronic newsletter issued by the Communications and Information Technology Commission. The current investigation was conducted primarily to measure the level of electromagnetic fields emitted from 400 mobile base stations for the purpose of environmental safety and radiation protection in light of national guidelines for public exposure as well as the International Commission on Non-Ionizing Radiation Protection (ICNIRP). The outcomes of this investigation provide valuable comments and recommendation for safety and protection of electromagnetic fields emitted from mobile base stations.Keywords: electromagnetic fields, mobile, safety, protection, ICNIRP
Procedia PDF Downloads 4221229 UWB Open Spectrum Access for a Smart Software Radio
Authors: Hemalatha Rallapalli, K. Lal Kishore
Abstract:
In comparison to systems that are typically designed to provide capabilities over a narrow frequency range through hardware elements, the next generation cognitive radios are intended to implement a broader range of capabilities through efficient spectrum exploitation. This offers the user the promise of greater flexibility, seamless roaming possible on different networks, countries, frequencies, etc. It requires true paradigm shift i.e., liberalization over a wide band of spectrum as well as a growth path to more and greater capability. This work contributes towards the design and implementation of an open spectrum access (OSA) feature to unlicensed users thus offering a frequency agile radio platform that is capable of performing spectrum sensing over a wideband. Thus, an ultra-wideband (UWB) radio, which has the intelligence of spectrum sensing only, unlike the cognitive radio with complete intelligence, is named as a Smart Software Radio (SSR). The spectrum sensing mechanism is implemented based on energy detection. Simulation results show the accuracy and validity of this method.Keywords: cognitive radio, energy detection, software radio, spectrum sensing
Procedia PDF Downloads 4281228 Biometric Identification with Latitude and Longitude Fingerprint Verification for Attendance
Authors: Muhammad Fezan Afzal, Imran Khan, Salma Imtiaz
Abstract:
The need for human verification and identification requires from centuries for authentication. Since it is being used in big institutes like financial, government and crime departments, a continued struggle is important to make this system more efficient to prevent security breaches. Therefore, multiple devices are used to authenticate the biometric for each individual. A large number of devices are required to cover a large number of users. As the number of devices increases, cost will automatically increase. Furthermore, it is time-consuming for biometrics due to the devices being insufficient and are not available at every door. In this paper, we propose the framework and algorithm where the mobile of each individual can also perform the biometric authentication of attendance and security. Every mobile has a biometric authentication system that is used in different mobile applications for security purposes. Therefore, each individual can use the biometric system mobile without moving from one place to another. Moreover, by using the biometrics mobile, the cost of biometric systems can be removed that are mostly deployed in different organizations for the attendance of students, employees and for other security purposes.Keywords: fingerprint, fingerprint authentication, mobile verification, mobile biometric verification, mobile fingerprint sensor
Procedia PDF Downloads 69