Search results for: Broadband internet
329 Modelling Insider Attacks in Public Cloud
Authors: Roman Kulikov, Svetlana Kolesnikova
Abstract:
Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.Keywords: insider attack, public cloud, cloud computing, hypervisor
Procedia PDF Downloads 361328 An Assessment of Airport Collaborative Decision-Making System Using Predictive Maintenance
Authors: Faruk Aras, Melih Inal, Tansel Cinar
Abstract:
The coordination of airport staff especially in the operations and maintenance departments is important for the airport operation. As a result, this coordination will increase the efficiency in all operation. Therefore, a Collaborative Decision-Making (CDM) system targets on improving the overall productivity of all operations by optimizing the use of resources and improving the predictability of actions. Enlarged productivity can be of major benefit for all airport operations. It also increases cost-efficiency. This study explains how predictive maintenance using IoT (Internet of Things), predictive operations and the statistical data such as Mean Time To Failure (MTTF) improves airport terminal operations and utilize airport terminal equipment in collaboration with collaborative decision making system/Airport Operation Control Center (AOCC). Data generated by the predictive maintenance methods is retrieved and analyzed by maintenance managers to predict when a problem is about to occur. With that information, maintenance can be scheduled when needed. As an example, AOCC operator would have chance to assign a new gate that towards to this gate all the equipment such as travellator, elevator, escalator etc. are operational if the maintenance team is in collaboration with AOCC since maintenance team is aware of the health of the equipment because of predictive maintenance methods. Applying predictive maintenance methods based on analyzing the health of airport terminal equipment dramatically reduces the risk of downtime by on time repairs. We can classify the categories as high priority calls for urgent repair action, as medium priority requires repair at the earliest opportunity, and low priority allows maintenance to be scheduled when convenient. In all cases, identifying potential problems early resulted in better allocation airport terminal resources by AOCC.Keywords: airport, predictive maintenance, collaborative decision-making system, Airport Operation Control Center (AOCC)
Procedia PDF Downloads 365327 IOT Based Automated Production and Control System for Clean Water Filtration Through Solar Energy Operated by Submersible Water Pump
Authors: Musse Mohamud Ahmed, Tina Linda Achilles, Mohammad Kamrul Hasan
Abstract:
Deterioration of the mother nature is evident these day with clear danger of human catastrophe emanating from greenhouses (GHG) with increasing CO2 emissions to the environment. PV technology can help to reduce the dependency on fossil fuel, decreasing air pollution and slowing down the rate of global warming. The objective of this paper is to propose, develop and design the production of clean water supply to rural communities using an appropriate technology such as Internet of Things (IOT) that does not create any CO2 emissions. Additionally, maximization of solar energy power output and reciprocally minimizing the natural characteristics of solar sources intermittences during less presence of the sun itself is another goal to achieve in this work. The paper presents the development of critical automated control system for solar energy power output optimization using several new techniques. water pumping system is developed to supply clean water with the application of IOT-renewable energy. This system is effective to provide clean water supply to remote and off-grid areas using Photovoltaics (PV) technology that collects energy generated from the sunlight. The focus of this work is to design and develop a submersible solar water pumping system that applies an IOT implementation. Thus, this system has been executed and programmed using Arduino Software (IDE), proteus, Maltab and C++ programming language. The mechanism of this system is that it pumps water from water reservoir that is powered up by solar energy and clean water production was also incorporated using filtration system through the submersible solar water pumping system. The filtering system is an additional application platform which is intended to provide a clean water supply to any households in Sarawak State, Malaysia.Keywords: IOT, automated production and control system, water filtration, automated submersible water pump, solar energy
Procedia PDF Downloads 88326 Usability Evaluation of a Self-Report Mobile App for COVID-19 Symptoms: Supporting Health Monitoring in the Work Context
Authors: Kevin Montanez, Patricia Garcia
Abstract:
The confinement and restrictions adopted to avoid an exponential spread of the COVID-19 have negatively impacted the Peruvian economy. In this context, Industries offering essential products could continue operating, but they have to follow safety protocols and implement strategies to ensure employee health. In view of the increasing internet access and mobile phone ownership, “Alerta Temprana”, a mobile app, was developed to self-report COVID-19 symptoms in the work context. In this study, the usability of the mobile app “Alerta Temprana” was evaluated from the perspective of health monitors and workers. In addition to reporting the metrics related to the usability of the application, the utility of the system is also evaluated from the monitors' perspective. In this descriptive study, the participants used the mobile app for two months. Afterwards, System Usability Scale (SUS) questionnaire was answered by the workers and monitors. A Usefulness questionnaire with open questions was also used for the monitors. The data related to the use of the application was collected during one month. Furthermore, descriptive statistics and bivariate analysis were used. The workers rated the application as good (70.39). In the case of the monitors, usability was excellent (83.0). The most important feature for the monitors were the emails generated by the application. The average interaction per user was 30 seconds and a total of 6172 self-reports were sent. Finally, a statistically significant association was found between the acceptability scale and the work area. The results of this study suggest that Alerta Temprana has the potential to be used for surveillance and health monitoring in any context of face-to-face modality. Participants reported a high degree of ease of use. However, from the perspective of workers, SUS cannot diagnose usability issues and we suggest we use another standard usability questionnaire to improve "Alerta Temprana" for future use.Keywords: public health in informatics, mobile app, usability, self-report
Procedia PDF Downloads 117325 Developing Digital Skills in Museum Professionals through Digital Education: International Good Practices and Effective Learning Experiences
Authors: Antonella Poce, Deborah Seid Howes, Maria Rosaria Re, Mara Valente
Abstract:
The Creative Industries education contexts, Museum Education in particular, generally presents a low emphasis on the use of new digital technologies, digital abilities and transversal skills development. The spread of the Covid-19 pandemic has underlined the importance of these abilities and skills in cultural heritage education contexts: gaining digital skills, museum professionals will improve their career opportunities with access to new distribution markets through internet access and e-commerce, new entrepreneurial tools, or adding new forms of digital expression to their work. However, the use of web, mobile, social, and analytical tools is becoming more and more essential in the Heritage field, and museums, in particular, to face the challenges posed by the current worldwide health emergency. Recent studies highlight the need for stronger partnerships between the cultural and creative sectors, social partners and education and training providers in order to provide these sectors with the combination of skills needed for creative entrepreneurship in a rapidly changing environment. Considering the above conditions, the paper presents different examples of digital learning experiences carried out in Italian and USA contexts with the aim of promoting digital skills in museum professionals. In particular, a quali-quantitative research study has been conducted on two international Postgraduate courses, “Advanced Studies in Museum Education” (2 years) and “Museum Education” (1 year), in order to identify the educational effectiveness of the online learning strategies used (e.g., OBL, Digital Storytelling, peer evaluation) for the development of digital skills and the acquisition of specific content. More than 50 museum professionals participating in the mentioned educational pathways took part in the learning activity, providing evaluation data useful for research purposes.Keywords: digital skills, museum professionals, technology, education
Procedia PDF Downloads 177324 Adapting Tools for Text Monitoring and for Scenario Analysis Related to the Field of Social Disasters
Authors: Svetlana Cojocaru, Mircea Petic, Inga Titchiev
Abstract:
Humanity faces more and more often with different social disasters, which in turn can generate new accidents and catastrophes. To mitigate their consequences, it is important to obtain early possible signals about the events which are or can occur and to prepare the corresponding scenarios that could be applied. Our research is focused on solving two problems in this domain: identifying signals related that an accident occurred or may occur and mitigation of some consequences of disasters. To solve the first problem, methods of selecting and processing texts from global network Internet are developed. Information in Romanian is of special interest for us. In order to obtain the mentioned tools, we should follow several steps, divided into preparatory stage and processing stage. Throughout the first stage, we manually collected over 724 news articles and classified them into 10 categories of social disasters. It constitutes more than 150 thousand words. Using this information, a controlled vocabulary of more than 300 keywords was elaborated, that will help in the process of classification and identification of the texts related to the field of social disasters. To solve the second problem, the formalism of Petri net has been used. We deal with the problem of inhabitants’ evacuation in useful time. The analysis methods such as reachability or coverability tree and invariants technique to determine dynamic properties of the modeled systems will be used. To perform a case study of properties of extended evacuation system by adding time, the analysis modules of PIPE such as Generalized Stochastic Petri Nets (GSPN) Analysis, Simulation, State Space Analysis, and Invariant Analysis have been used. These modules helped us to obtain the average number of persons situated in the rooms and the other quantitative properties and characteristics related to its dynamics.Keywords: lexicon of disasters, modelling, Petri nets, text annotation, social disasters
Procedia PDF Downloads 197323 An Exploration of Promoting EFL Students’ Language Learning Autonomy Using Multimodal Teaching - A Case Study of an Art University in Western China
Authors: Dian Guan
Abstract:
With the wide application of multimedia and the Internet, the development of teaching theories, and the implementation of teaching reforms, many different university English classroom teaching modes have emerged. The university English teaching mode is changing from the traditional teaching mode based on conversation and text to the multimodal English teaching mode containing discussion, pictures, audio, film, etc. Applying university English teaching models is conducive to cultivating lifelong learning skills. In addition, lifelong learning skills can also be called learners' autonomous learning skills. Learners' independent learning ability has a significant impact on English learning. However, many university students, especially art and design students, don't know how to learn individually. When they become university students, their English foundation is a relative deficiency because they always remember the language in a traditional way, which, to a certain extent, neglects the cultivation of English learners' independent ability. As a result, the autonomous learning ability of most university students is not satisfactory. The participants in this study were 60 students and one teacher in their first year at a university in western China. Two observations and interviews were conducted inside and outside the classroom to understand the impact of a multimodal teaching model of university English on students' autonomous learning ability. The results were analyzed, and it was found that the multimodal teaching model of university English significantly affected learners' autonomy. Incorporating classroom presentations and poster exhibitions into multimodal teaching can increase learners' interest in learning and enhance their learning ability outside the classroom. However, further exploration is needed to develop multimodal teaching materials and evaluate multimodal teaching outcomes. Despite the limitations of this study, the study adopts a scientific research method to analyze the impact of the multimodal teaching mode of university English on students' independent learning ability. It puts forward a different outlook for further research on this topic.Keywords: art university, EFL education, learner autonomy, multimodal pedagogy
Procedia PDF Downloads 101322 Factors Affecting M-Government Deployment and Adoption
Authors: Saif Obaid Alkaabi, Nabil Ayad
Abstract:
Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.Keywords: e-government, m-government, system dependability, system security, trust
Procedia PDF Downloads 381321 Development the Potential of Parking Tax and Parking Retribution Revenues: Case Study in Bekasi City
Authors: Ivan Yudianto
Abstract:
The research objectives are to analyze the factors that impede the Parking Tax and Parking Retribution collection in Bekasi City Government, analyzing the factors that can increase local own revenue from the tax sector of parking tax and parking retribution, analyze monitoring the parking retribution collection by the Bekasi City Government, analyze strategies Bekasi City Government through the preparation of a roadmap and action plan to increase parking tax and parking retribution revenues. The approach used in this research is a qualitative approach. Qualitative research is used because the problem is not yet clear and the object to be studied will be holistic, complex, and dynamic, and the relationship will be interactive symptoms. Methods of data collection and technical analysis of the data was in-depth interviews, participant observation, documentary materials, literature, and triangulation, as well as new methods such as the methods of visual materials and internet browsing. The results showed that there are several factors that become an obstacle such as the parking taxpayer does not disclose the actual parking revenue, the parking taxpayer are late or do not pay Parking Tax, many parking locations controlled by illegal organizations, shortage of human resources in charge levy and supervise the parking tax and parking retribution collection in the Bekasi City Government, surveillance parking tax and parking retribution are not scheduled on a regular basis. Several strategic priorities in order to develop the potential of the Parking Tax and Parking Retribution in the Bekasi City Government, namely through increased controling and monitoring of the Parking Taxpayer, forming a team of auditors to audit the Parking Taxpayer, seek law enforcement persuasive and educative to reduce Parking Taxpayer wayward, providing strict sanctions against the Parking Taxpayer disobedient, revised regulations mayors about locations of parking in Bekasi City, rationalize revenues target of Parking Retribution, conducting takeover attempts parking location on the roadside of the individual or specific group, and drafting regional regulations on parking subscribe.Keywords: local own revenue, parking retribution, parking tax, parking taxpayer
Procedia PDF Downloads 326320 Cybersecurity for Digital Twins in the Built Environment: Research Landscape, Industry Attitudes and Future Direction
Authors: Kaznah Alshammari, Thomas Beach, Yacine Rezgui
Abstract:
Technological advances in the construction sector are helping to make smart cities a reality by means of cyber-physical systems (CPS). CPS integrate information and the physical world through the use of information communication technologies (ICT). An increasingly common goal in the built environment is to integrate building information models (BIM) with the Internet of Things (IoT) and sensor technologies using CPS. Future advances could see the adoption of digital twins, creating new opportunities for CPS using monitoring, simulation, and optimisation technologies. However, researchers often fail to fully consider the security implications. To date, it is not widely possible to assimilate BIM data and cybersecurity concepts, and, therefore, security has thus far been overlooked. This paper reviews the empirical literature concerning IoT applications in the built environment and discusses real-world applications of the IoT intended to enhance construction practices, people’s lives and bolster cybersecurity. Specifically, this research addresses two research questions: (a) how suitable are the current IoT and CPS security stacks to address the cybersecurity threats facing digital twins in the context of smart buildings and districts? and (b) what are the current obstacles to tackling cybersecurity threats to the built environment CPS? To answer these questions, this paper reviews the current state-of-the-art research concerning digital twins in the built environment, the IoT, BIM, urban cities, and cybersecurity. The results of these findings of this study confirmed the importance of using digital twins in both IoT and BIM. Also, eight reference zones across Europe have gained special recognition for their contributions to the advancement of IoT science. Therefore, this paper evaluates the use of digital twins in CPS to arrive at recommendations for expanding BIM specifications to facilitate IoT compliance, bolster cybersecurity and integrate digital twin and city standards in the smart cities of the future.Keywords: BIM, cybersecurity, digital twins, IoT, urban cities
Procedia PDF Downloads 169319 The Role of Social Media for the Movement of Modest Fashion in Indonesia
Authors: Siti Dewi Aisyah
Abstract:
Islamic Modest Fashion has become one of the emerging industries. It is said that social media has making a role in its development. From designers, hijabi bloggers and then instagrammers, they are often seen posting their everyday outfits. They want to combine their faith with cutting-edge fashion trend. Muslim consumers has become a potential targeted market due to the increasing of people wearing hijab. Muslim consumers are projected to spend $327 bilion on clothing by 2020. Indonesia, as the biggest Muslim majority country, has targeted to be The World’s Center for Muslim Fashion in the world as its national branding by 2020. This study will examine how social media especially Blog and Instagram can lead the movement of Islamic Modest Fashion in Indonesia, how it also brings consumer culture to hijabi and as the result it triggers Indonesia to brand itself and how all the elements in Indonesia including the designers, bloggers or instagrammers and also Indonesian Agency for Creative Economy together work to make its dream come true. This research will be conducted through interviews with several elements mentioned, and internet, blog, Instagram and Youtube analysis through visual analysis that also examine the semiotic meaning behind the picture that are posted by the people on the social media especially about the Islamic Modest Fashion trend. This research also contains a literature review of a diverse group of works on topics related to the study. This research will be examined through several theoretical frameworks including the study of social media, fashion culture and consumer culture. Fashion and consumer culture are also two main topics because fashion furthermore leads to consumer culture. The possible benefit of this research is to be a reference literature of Islamic Modest Fashion and social media’s role especially in an Indonesian context.Keywords: blog, instagram, consumer culture, modest fashion, social media, visual analysis
Procedia PDF Downloads 366318 Soft Infrastructure in Tourism Development
Authors: Seetanah Boopen, Padachi Kesseven, R. Juwaheer , R. V. Sannassee, M. L. Lamport
Abstract:
This study aims primarily at investigating the importance of soft infrastructure in tourism development for the case of an island economy namely Mauritius. The study in the first place assesses the level of perceived and actual satisfaction of the present state of the different types of soft tourism infrastructure and the allied services provided by tourism stakeholders in Mauritius and address the identified gaps. In order to address the study objectives, a rigorous survey analysis among 1741 international tourists at the departure lounge of the Sir Seewoosagur International Airport of Mauritius was carried out. The respondents placed significant emphasis on the different elements of the soft infrastructure dimension, where many of the elements falling under this dimension were rated with a high mean score. In particular the visitors rated communication, both internet and telephone services, and security to be most important. Significant gap has been found in the categories of ‘Health’ and ‘Security’. This indicates that the tourists ascribe high importance to the soft infrastructure dimension. The link between the respondent profile and the key variables which influence the tourist choice of the island as a destination are found to be equally important for most of the international tourists. However, these were deemed to be more critical for tourists travelling with family members. Although the survey instrument attempted to measure any gap between on the one hand, the importance of the infrastructure dimension and on the other hand, the level of satisfaction with the infrastructure dimension, overall the results do not show any statistically significant gap among the different elements of the infrastructural dimension. The study dwells into further analysis by engaging into an econometric framework related to a Probit Model, using the data collected, to gauge the effect of soft infrastructure on tourist intention to repeat or recommend the destination. The results confirm that soft infrastructure is found to be sensible to tourists, although relatively less sensitive as compared to tourism and transport and hotel infrastructure.Keywords: tourism development, soft infrastructure, Mauritius, hotel infrastructure
Procedia PDF Downloads 487317 Drivers and Barriers to the Acceptability of a Human Milk Bank Among Malaysians: A Cross Sectional Study
Authors: Kalaashini Ramachandran, Maznah Dahlui, Nik Daliana Nik Farid
Abstract:
WHO recommends all babies to be exclusively breastfed and donor milk is the next best alternative in the absence of mother’s own milk. The establishment of a human milk bank (HMB) is still being debated due to religious concerns in Malaysia leading to informal milk sharing practices, but little is known on the knowledge, attitude and perception of women towards HMB and its benefits. This study hypothesizes that there is no association between knowledge and attitude and the acceptance towards the establishment of human milk bank among Malaysian women and healthcare providers. The aim of this study is to determine the drivers and barriers among Malaysian towards the acceptance of an HMB. A cross-sectional study with 367 participants was enrolled within a period of 3 months to answer an online self-administered questionnaire. Data on sociodemographic, knowledge on breastfeeding benefits, knowledge and attitude on HMB and its specific issues were analyzed in terms of frequency and then proceed to multiple logistic regression. Majority of the respondents are of Islamis religion (73.3%), have succeesfully completed their tertiary education (82.8%), and are employed (70.8%). Only 55.9% of respondents have heard of an HMB stating internet as their main source of information but a higher prevalence is agreeable to the establishment of a human milk bank (67.8%). Most respondents have a good score on knowledge of breastfeeding benefits and on HMB specific issues (70% and 54.2% respectively) while 63.8% of them have a positive attitude towards HMB. In the multivariate analysis, mothers with a good score on general knowledge of breastfeeding (AOR: 1.715) were more likely to accept the establishment of an HMB while Islamic religion was negatively associated with its establishment (AOR:0.113). This study has found a high prevalence rate of mothers who are willing to accept the establishment of an HMB. This action can be potentially shaped by educating mothers on the benefits of breastfeeding as well as addressing their religious concerns so the establishment of a religiously abiding HMB in Malaysia may be accepted without compromising their belief or the health benefit of donor milk.Keywords: acceptability, attitude, human milk bank, knowledge
Procedia PDF Downloads 102316 How Message Framing and Temporal Distance Affect Word of Mouth
Authors: Camille Lacan, Pierre Desmet
Abstract:
In the crowdfunding model, a campaign succeeds by collecting the funds required over a predefined duration. The success of a CF campaign depends both on the capacity to attract members of the online communities concerned, and on the community members’ involvement in online word-of-mouth recommendations. To maximize the campaign's success probability, project creators (i.e., an organization appealing for financial resources) send messages to contributors to ask them to issue word of mouth. Internet users relay information about projects through Word of Mouth which is defined as “a critical tool for facilitating information diffusion throughout online communities”. The effectiveness of these messages depends on the message framing and the time at which they are sent to contributors (i.e., at the start of the campaign or close to the deadline). This article addresses the following question: What are the effect of message framing and temporal distance on the willingness to share word of mouth? Drawing on Perspectives Theory and Construal Level Theory, this study examines the interplay between message framing (Gains vs. Losses) and temporal distance (message while the deadline is coming vs. far) on intention to share word of mouth. A between-subject experimental design is conducted to test the research model. Results show significant differences between a loss-framed message (lack of benefits if the campaign fails) associated with a short deadline (ending tomorrow) compared to a gain-framed message (benefits if the campaign succeeds) associated with a distant deadline (ending in three months). However, this effect is moderated by the anticipated regret of a campaign failure and the temporal orientation. These moderating effects contribute to specifying the boundary condition of the framing effect. Handling the message framing and the temporal distance are thus the key decisions to influence the willingness to share word of mouth.Keywords: construal levels, crowdfunding, message framing, word of mouth
Procedia PDF Downloads 252315 Influence of Esports Marketing Strategies on Consumer Behavior: A Case Study of Valorant
Authors: Alex Arghya Adhikari
Abstract:
Gaming and esports industry is one of the biggest and fastest growing industries in the world. Globally people have started investing more in this industry since now people believe just like traditional sports, esports can also sustain their future. Last year in the month of December, the Indian government also recognised esports as an official sport but there has not been any positive initiative by the government in encouraging people to enter esports. This is a problem which cannot be overlooked since we are already in the digital age and gaming and esports is the future industry. There is a need for multiple effective marketing strategies by the game publishers to stabilize the esports in the country. Purpose: To observe the marketing-communication strategies that are implemented by Riot Games’ Valorant and how those strategies influence the consumer behavior and the esports of the game. Methodology: Activities over the internet related to the game like livestreams, discord chats, Instagram posts and YouTube videos over a period of two months have been collected through the Digital Ethnography. To support and validate the observations of the data collected, in-depth online interviews have been conducted which includes streamers, journalists, LAN experienced players and casual players. Findings: The game publisher through its Dynamic Competitive Gaming Experience and Community-Engaged Ecosystem succeeded in making the game a Recreational activity and a Community which goes beyond the In-game experiences which helped in understanding the impact of audience engagement on esports and the loopholes and setbacks of Indian esports. Conclusion: The study provides a comprehensive analysis of how Valorant's successful marketing and community engagement strategies have contributed to its global popularity and competitive esports environment. It highlights the various strategies employed by Riot Games to keep players engaged and connected, and also the challenges in the Indian esports landscape which differentiates it from the global competition.Keywords: esports, valorant, marketing, consumer behaviour
Procedia PDF Downloads 69314 Savinglife®: An Educational Technology for Basic and Advanced Cardiovascular Life Support
Authors: Naz Najma, Grace T. M. Dal Sasso, Maria de Lourdes de Souza
Abstract:
The development of information and communication technologies and the accessibility of mobile devices has increased the possibilities of the teaching and learning process anywhere and anytime. Mobile and web application allows the production of constructive teaching and learning models in various educational settings, showing the potential for active learning in nursing. The objective of this study was to present the development of an educational technology (Savinglife®, an app) for learning cardiopulmonary resuscitation and advanced cardiovascular life support training. Savinglife® is a technological production, based on the concept of virtual learning and problem-based learning approach. The study was developed from January 2016 to November 2016, using five phases (analyze, design, develop, implement, evaluate) of the instructional systems development process. The technology presented 10 scenarios and 12 simulations, covering different aspects of basic and advanced cardiac life support. The contents can be accessed in a non-linear way leaving the students free to build their knowledge based on their previous experience. Each scenario is presented through interactive tools such as scenario description, assessment, diagnose, intervention and reevaluation. Animated ECG rhythms, text documents, images and videos are provided to support procedural and active learning considering real life situation. Accessible equally on small to large devices with or without an internet connection, Savinglife® offers a dynamic, interactive and flexible tool, placing students at the center of the learning process. Savinglife® can contribute to the student’s learning in the assessment and management of basic and advanced cardiac life support in a safe and ethical way.Keywords: problem-based learning, cardiopulmonary resuscitation, nursing education, advanced cardiac life support, educational technology
Procedia PDF Downloads 304313 Social Change and Cultural Sustainability in the Wake of Digital Media Revolution in South Asia
Authors: Binod C. Agrawal
Abstract:
In modern history, industrial and media merchandising in South Asia from East Asia, Europe, United States and other countries of the West is over 200 years old. Hence, continued external technology and media exposure is not a new experience in multi-lingual and multi religious South Asia which evolved cultural means to withstand structural change. In the post-World War II phase, media exposure especially of telecommunication, film, Internet, radio, print media and television have increased manifold. South Asia did not lose any time in acquiring and adopting digital media accelerated by chip revolution, computer and satellite communication. The penetration of digital media and utilization are exceptionally high though the spread has an unequal intensity, use and effects. The author argues that industrial and media products are “cultural products” apart from being “technological products”; hence their influences are most felt in the cultural domain which may lead to blunting of unique cultural specifics in the multi-cultural, multi-lingual and multi religious South Asia. Social scientists, political leaders and parents have voiced concern of “Cultural domination”, “Digital media colonization” and “Westernization”. Increased digital media access has also opened up doors of pornography and other harmful information that have sparked fresh debates and discussions about serious negative, harmful, and undesirable social effects especially among youth. Within ‘techno-social’ perspective, based on recent research studies, the paper aims to describe and analyse possible socio-economic change due to digital media penetration. Further, analysis supports the view that the ancient multi-lingual and multi-religious cultures of South Asia due to inner cultural strength may sustain without setting in a process of irreversible structural changes in South Asia.Keywords: cultural sustainability, digital media effects, digital media impact in South Asia, social change in South Asia
Procedia PDF Downloads 355312 Automatic Lexicon Generation for Domain Specific Dataset for Mining Public Opinion on China Pakistan Economic Corridor
Authors: Tayyaba Azim, Bibi Amina
Abstract:
The increase in the popularity of opinion mining with the rapid growth in the availability of social networks has attracted a lot of opportunities for research in the various domains of Sentiment Analysis and Natural Language Processing (NLP) using Artificial Intelligence approaches. The latest trend allows the public to actively use the internet for analyzing an individual’s opinion and explore the effectiveness of published facts. The main theme of this research is to account the public opinion on the most crucial and extensively discussed development projects, China Pakistan Economic Corridor (CPEC), considered as a game changer due to its promise of bringing economic prosperity to the region. So far, to the best of our knowledge, the theme of CPEC has not been analyzed for sentiment determination through the ML approach. This research aims to demonstrate the use of ML approaches to spontaneously analyze the public sentiment on Twitter tweets particularly about CPEC. Support Vector Machine SVM is used for classification task classifying tweets into positive, negative and neutral classes. Word2vec and TF-IDF features are used with the SVM model, a comparison of the trained model on manually labelled tweets and automatically generated lexicon is performed. The contributions of this work are: Development of a sentiment analysis system for public tweets on CPEC subject, construction of an automatic generation of the lexicon of public tweets on CPEC, different themes are identified among tweets and sentiments are assigned to each theme. It is worth noting that the applications of web mining that empower e-democracy by improving political transparency and public participation in decision making via social media have not been explored and practised in Pakistan region on CPEC yet.Keywords: machine learning, natural language processing, sentiment analysis, support vector machine, Word2vec
Procedia PDF Downloads 148311 Social Networks in a Communication Strategy of a Large Company
Authors: Kherbache Mehdi
Abstract:
Within the framework of the validation of the Master in business administration marketing and sales in INSIM institute international in management Blida, we get the opportunity to do a professional internship in Sonelgaz Enterprise and a thesis. The thesis deals with the integration of social networking in the communication strategy of a company. The problematic is: How communicate with social network can be a solution for companies? The challenges stressed by this thesis were to suggest limits and recommendations to Sonelgaz Enterprise concerning social networks. The whole social networks represent more than a billion people as a potential target for the companies. Thanks to research and a qualitative approach, we have identified tree valid hypothesis. The first hypothesis allows confirming that using social networks cannot be ignored by any company in its communication strategy. However, the second hypothesis demonstrates that it’s necessary to prepare a strategy that integrates social networks in the communication plan of the company. The risk of this strategy is very limited because failure on social networks is not a restraint for the enterprise, social networking is not expensive and, a bad image which could result from it is not as important in the long-term. Furthermore, the return on investment is difficult to evaluate. Finally, the last hypothesis shows that firms establish a new relation between consumers and brands thanks to the proximity allowed by social networks. After the validation of the hypothesis, we suggested some recommendations to Sonelgaz Enterprise regarding the communication through social networks. Firstly, the company must use the interactivity of social network in order to have fruitful exchanges with the community. We also recommended having a strategy to treat negative comments. The company must also suggest delivering resources to the community thanks to a community manager, in order to have a good relation with the community. Furthermore, we advised using social networks to do business intelligence. Sonelgaz Enterprise can have some creative and interactive contents with some amazing applications on Facebook for example. Finally, we recommended to the company to be not intrusive with “fans” or “followers” and to be open to all the platforms: Twitter, Facebook, Linked-In for example.Keywords: social network, buzz, communication, consumer, return on investment, internet users, web 2.0, Facebook, Twitter, interaction
Procedia PDF Downloads 422310 Save Lives: The Application of Geolocation-Awareness Service in Iranian Pre-hospital EMS Information Management System
Authors: Somayeh Abedian, Pirhossein Kolivand, Hamid Reza Lornejad, Amin Karampour, Ebrahim Keshavarz Safari
Abstract:
For emergency and relief service providers such as pre-hospital emergencies, quick arrival at the scene of an accident or any EMS mission is one of the most important requirements of effective service delivery. Response time (the interval between the time of the call and the time of arrival on scene) is a critical factor in determining the quality of pre-hospital Emergency Medical Services (EMS). This is especially important for heart attack, stroke, or accident patients. Location-based e-services can be broadly defined as any service that provides information pertinent to the current location of an active mobile handset or precise address of landline phone call at a specific time window, regardless of the underlying delivery technology used to convey the information. According to research, one of the effective methods of meeting this goal is determining the location of the caller via the cooperation of landline and mobile phone operators in the country. The follow-up of the Communications Regulatory Authority (CRA) organization has resulted in the receipt of two separate secured electronic web services. Thus, to ensure human privacy, a secure technical architecture was required for launching the services in the pre-hospital EMS information management system. In addition, to quicken medics’ arrival at the patient's bedside, rescue vehicles should make use of an intelligent transportation system to estimate road traffic using a GPS-based mobile navigation system independent of the Internet. This paper seeks to illustrate the architecture of the practical national model used by the Iranian EMS organization.Keywords: response time, geographic location inquiry service (GLIS), location-based service (LBS), emergency medical services information system (EMSIS)
Procedia PDF Downloads 170309 Review on Implementation of Artificial Intelligence and Machine Learning for Controlling Traffic and Avoiding Accidents
Authors: Neha Singh, Shristi Singh
Abstract:
Accidents involving motor vehicles are more likely to cause serious injuries and fatalities. It also has a host of other perpetual issues, such as the regular loss of life and goods in accidents. To solve these issues, appropriate measures must be implemented, such as establishing an autonomous incident detection system that makes use of machine learning and artificial intelligence. In order to reduce traffic accidents, this article examines the overview of artificial intelligence and machine learning in autonomous event detection systems. The paper explores the major issues, prospective solutions, and use of artificial intelligence and machine learning in road transportation systems for minimising traffic accidents. There is a lot of discussion on additional, fresh, and developing approaches that less frequent accidents in the transportation industry. The study structured the following subtopics specifically: traffic management using machine learning and artificial intelligence and an incident detector with these two technologies. The internet of vehicles and vehicle ad hoc networks, as well as the use of wireless communication technologies like 5G wireless networks and the use of machine learning and artificial intelligence for the planning of road transportation systems, are elaborated. In addition, safety is the primary concern of road transportation. Route optimization, cargo volume forecasting, predictive fleet maintenance, real-time vehicle tracking, and traffic management, according to the review's key conclusions, are essential for ensuring the safety of road transportation networks. In addition to highlighting research trends, unanswered problems, and key research conclusions, the study also discusses the difficulties in applying artificial intelligence to road transport systems. Planning and managing the road transportation system might use the work as a resource.Keywords: artificial intelligence, machine learning, incident detector, road transport systems, traffic management, automatic incident detection, deep learning
Procedia PDF Downloads 113308 Improving Fingerprinting-Based Localization System Using Generative AI
Authors: Getaneh Berie Tarekegn
Abstract:
A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. It also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine
Procedia PDF Downloads 59307 Partnering with Stakeholders to Secure Digitization of Water
Authors: Sindhu Govardhan, Kenneth G. Crowther
Abstract:
Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.Keywords: cyber security, shared responsibility, IIOT, threat modelling
Procedia PDF Downloads 77306 The Causality between Corruption and Economic Growth in MENA Countries: A Dynamic Panel-Data Analysis
Authors: Nour Mohamad Fayad
Abstract:
Complex and extensively researched, the impact of corruption on economic growth seems to be intricate. Many experts believe that corruption reduces economic development. However, counterarguments have suggested that corruption either promotes growth and development or has no significant impact on economic performance. Clearly, there is no consensus in the economics literature regarding the possible relationship between corruption and economic development. Corruption's complex and clandestine nature, which makes it difficult to define and measure, is one of the obstacles that must be overcome when investigating its effect on an economy. In an attempt to contribute to the ongoing debate, this study examines the impact of corruption on economic growth in the Middle East and North Africa (MENA) region between 2000 and 2021 using a Customized Corruption Index-CCI and panel data on MENA countries. These countries were selected because they are understudied in the economic literature, and despite the World Bank's recent emphasis on corruption in the developing world, the MENA countries have received little attention. The researcher used Cobb-Douglas functional form to test corruption in MENA using a customized index known as Customized Corruption Index-CCI to track corruption over almost 20 years, then used the dynamic panel data. The findings indicate that there is a positive correlation between corruption and economic growth, but this is not consistent across all MENA nations. First, the relatively recent lack of data from MENA nations. This issue is related to the inaccessibility of data for many MENA countries, particularly regarding the returns on resources, private malfeasance, and other variables in Gulf countries. In addition, the researcher encountered several restrictions, such as electricity and internet outages, due to the fact that he is from Lebanon, a country whose citizens have endured difficult living conditions since the Lebanese crisis began in 2019. Demonstrating a customized index known as Customized Corruption Index-CCI that suits the characteristics of MENA countries to peculiarly measure corruption in this region, the outcome of the Customized Corruption Index-CCI is then compared to the Corruption Perception Index-CPI and Control of Corruption from World Governance Indicator-CC from WGI.Keywords: corruption, economic growth, corruption measurements, empirical review, impact of corruption
Procedia PDF Downloads 74305 Red Herring Innovation: Twelve Paradoxes of Innovation Ecosystem in a Closed Society
Authors: Mohammad Hossein Badamchi
Abstract:
In Iran as well as other developing countries instituting innovation and entrepreneurship ecosystems by government around the universities is the new imported fashion of modernization and development in the 21st century. In recent decade various statesmen, policy makers, university administrations, economists and development theorists are emphasizing excitingly about the new “start-ups” which are going to solve all economic problems and backwardness of the country. However, critical study of modernization practices in Iran implies that this new trend is suffering from conventional deficiency of modernization planning in 20th century. This article is going to depict the misunderstandings of a situation which we can name “Pseudo-innovation in a closed society” by presenting these 12 paradoxes of this new system, actually happening in Iran: (1) Innovation without freedom? Fiction of innovation in a patriarchal state (2) Entrepreneurship without free market? Fiction of entrepreneurship in a rentier-state. (3) Ecosystem or a state-glasshouse? Is it possible to make and plan an innovation? (4) Innovation; epistemic or practical? How academic innovation could happen abstractly out of context? (5) Risk and Lucre: innovation to protect power and property?! (6) Silicon-valley mirage: what is in common between American-Iranian polity? (7) Information or Communication? ICT startups to restrict the internet (8) The elite paradox: new proletariat of private sector, new governmental clerk or a new path of brain drain? (9) Innovation or commercialization? Revisiting Schumpeterian creative destruction (10) The friendship of Jungle and fire: paradox of public science and market (11) Innovation and revolution: top-down or bottom-up paradox in an Iranian experience (12) Technology instead of civil society: ultimate result of innovation in a closed society. Through explaining these paradoxes we can gradually penetrate the real rationality of Pseudo-innovation ecosystem in a closed society, which can be understood as new-Neopatriarchy reconstruction of traditional patriarchal politics, economy and culture in Iran.Keywords: innovation, critical sociology, modernisation, Iran, closed society
Procedia PDF Downloads 75304 Connected Female Sufi Disciples: The Workings of Social Online Communities in a Transnational Sufi Order
Authors: Sarah Hebbouch
Abstract:
Two decades ago, research on diasporic women’s participation within Sufi circles would have been inconceivable, not only because of a general lack of recognition of their contribution to Sufism but due to the intimacy of the rituals, often taking place in confined spaces, like zawiyas (Sufi lodges). Recent scholarly attention to female spiritual experience owes to a digital awareness and interest in exploring diasporic community reproduction of those experiences. Within a context where female disciples of a Sufi convent undergo a physical separation from the saint’s sanctuary -because of immigration from the homeland to the host country- technology becomes a social hub accounting for Sufis’ ritual commitment and preservation of cultural capital in the diaspora. This paper elucidates how female Sufi immigrants affiliating with the Boudchichi brotherhood (Morocco-based) maintain ‘a relational network’ and strong social online relationships with their female compatriots in Morocco through the use of online platforms. Sufi communities living in the diaspora find the internet an open interactive space that serves to kindle their distance of spiritual participation and corroborate their transnational belonging. The current paper explores the implications of the use of a digital baseline named “Tariqa Info,” the convent’s digital online platform, and how it mediates everyday ritual performance, the promotion of digital connection, and the communication of ideas and discourses. Such a platform serves the bolstering emotional bonds for transnational female disciples and inclusion within online communities in the homeland. Assisted by an ethnographic lens, this paper discusses the research findings of participatory field observation of Sufi women’s online communities, informed by the need to trace the many ostensible aspects of interconnectedness and divergences.Keywords: digital connection, Sufi convent, social online relationship, transnational female disciples
Procedia PDF Downloads 86303 Analyzing Middle Actors' Influence on Land Use Policy: A Case Study in Central Kalimantan, Indonesia
Authors: Kevin Soubly, Kaysara Khatun
Abstract:
This study applies the existing Middle-Out Perspective (MOP) as a complementing analytical alternative to the customary dichotomous options of top-down vs. bottom-up strategies of international development and commons governance. It expands the framework by applying it to a new context of land management and environmental change, enabling fresh understandings of decision making around land use. Using a case study approach in Central Kalimantan, Indonesia among a village of indigenous Dayak, this study explores influences from both internal and external middle actors, utilizing qualitative empirical evidence and incorporating responses across 25 village households and 11 key stakeholders. Applying the factors of 'agency' and 'capacity' specific to the MOP, this study demonstrates middle actors’ unique capabilities and criticality to change due to their influence across various levels of decision-making. Study results indicate that middle actors play a large role, both passively and actively, both directly and indirectly, across various levels of decision-making, perception-shaping, and commons governance. In addition, the prominence of novel 'passive' middle actors, such as the internet, can provide communities themselves with a level of agency beyond that provided by other middle actors such as NGOs and palm oil industry entities – which often operate at the behest of the 'top' or out of self-interest. Further, the study posits that existing development and decision-making frameworks may misidentify the 'bottom' as the 'middle,' raising questions about traditional development and livelihood discourse, strategies, and support, from agricultural production to forest management. In conclusion, this study provides recommendations including that current policy preconceptions be reevaluated to engage middle actors in locally-adapted, integrative manners in order to improve governance and rural development efforts more broadly.Keywords: environmental management, governance, Indonesia, land use, middle actors, middle-out perspective
Procedia PDF Downloads 115302 An Attentional Bi-Stream Sequence Learner (AttBiSeL) for Credit Card Fraud Detection
Authors: Amir Shahab Shahabi, Mohsen Hasirian
Abstract:
Modern societies, marked by expansive Internet connectivity and the rise of e-commerce, are now integrated with digital platforms at an unprecedented level. The efficiency, speed, and accessibility of e-commerce have garnered a substantial consumer base. Against this backdrop, electronic banking has undergone rapid proliferation within the realm of online activities. However, this growth has inadvertently given rise to an environment conducive to illicit activities, notably electronic payment fraud, posing a formidable challenge to the domain of electronic banking. A pivotal role in upholding the integrity of electronic commerce and business transactions is played by electronic fraud detection, particularly in the context of credit cards which underscores the imperative of comprehensive research in this field. To this end, our study introduces an Attentional Bi-Stream Sequence Learner (AttBiSeL) framework that leverages attention mechanisms and recurrent networks. By incorporating bidirectional recurrent layers, specifically bidirectional Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) layers, the proposed model adeptly extracts past and future transaction sequences while accounting for the temporal flow of information in both directions. Moreover, the integration of an attention mechanism accentuates specific transactions to varying degrees, as manifested in the output of the recurrent networks. The effectiveness of the proposed approach in automatic credit card fraud classification is evaluated on the European Cardholders' Fraud Dataset. Empirical results validate that the hybrid architectural paradigm presented in this study yields enhanced accuracy compared to previous studies.Keywords: credit card fraud, deep learning, attention mechanism, recurrent neural networks
Procedia PDF Downloads 13301 Students’ Academic and Personal Needs: Basis for a Guidance Program
Authors: Susan Marie R. De La Cruz, Bernadette F. De La Cruz, Georgia D. Demavibas
Abstract:
This study determined the top 10 perceived students’ academic needs, personal needs, personal obstacles in achieving their academic goals, are as they need assistance, and their perceived feelings in math, reading and writing. The North Carolina State College, Student Support Services needs assessment survey was used. The respondents were the randomly chosen122Graduate school students. The top 10 academic needs are as follows: need to improve memory, communication skills, study habits, time management skills, career decisions, vocabulary, math skills, test taking skills, reading comprehension, and the need to reduce math anxiety. Top 10 personal needs are as follows: difficulty meeting deadline, difficulty managing money, inadequate computer skills, afraid of failing graduate school, difficulty participating in class/group discussions, absence from school, anxiety during exams, little or no experience with internet, personal counseling needs, and unsure of university academic procedures. Students’ top 10 perceived personal obstacles were as follows: issues surrounding sickness in family, lack of time management, lack of money, feeling tired, fears to speak in class, poor study habits, problems at home, late in class, too shy, and always feeling sick and easily distracted. Students felt need assistance in areas surrounding personal budget, stress management, motivation, anxiety, depressions, leadership development and goals/decision making. It is recommended that enrichment activities be provided to respond to students’ academic and personal needs. Also, Graduate School Guidance Counselor collaborates with other licensed Guidance Counselors in other colleges to have a well-coordinated and effective delivery of services responsive to students’ needs.Keywords: academic needs, guidance counsellors, guidance service, needs assessment survey, personal needs, student services
Procedia PDF Downloads 337300 Low-Cost Wireless Power Transfer System for Smart Recycling Containers
Authors: Juan Luis Leal, Rafael Maestre, Ovidio López
Abstract:
As innovation progresses, more possibilities are made available to increase the efficiency and reach of solutions for Smart Cities, most of which require the data provided by the Internet of Things (IoT) devices and may even have higher power requirements such as motors or actuators. A reliable power supply with the lowest maintenance is a requirement for the success of these solutions in the long term. Energy harvesting, mainly solar, becomes the solution of choice in most cases, but only if there is enough power to be harvested, which may depend on the device location (e.g., outdoors vs. indoor). This is the case of Smart Waste Containers with compaction systems, which have moderately high-power requirements, and may be installed in places with little sunlight for solar generation. It should be noted that waste is unloaded from the containers with cranes, so sudden and irregular movements may happen, making wired power unviable. In these cases, a wireless power supply may be a great alternative. This paper proposes a cost-effective two coil resonant wireless power transfer (WPT) system and describes its implementation, which has been carried out within an R&D project and validated in real settings with smart containers. Experimental results prove that the developed system achieves wireless power transmission up to 35W in the range of 5 cm to 1 m with a peak efficiency of 78%. The circuit is operated at relatively low resonant frequencies, which combined with enough wire-to-wire separation between the coil windings, reduce the losses caused by the proximity effect and, therefore, allow the use of common stranded wire instead of Litz wire, this without reducing the efficiency significantly. All these design considerations led to a final system that achieves a high efficiency for the desired charging range, simplifying the energy supply for Smart Containers as well as other devices that may benefit from a cost-effective wireless charging system.Keywords: electromagnetic coupling, resonant wireless charging, smart recycling containers, wireless power transfer
Procedia PDF Downloads 93