Search results for: Physical Internet
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7455

Search results for: Physical Internet

7275 A Systematic Review on Lifelong Learning Programs for Community-Dwelling Older Adults

Authors: Xi Vivien Wu, Emily Neo Kim Ang, Yi Jung Tung, Wenru Wang

Abstract:

Background and Objective: The increase in life expectancy and emphasis on self-reliance for the older adults are global phenomena. As such, lifelong learning in the community is considered a viable means of promoting successful and active aging. This systematic review aims to examine various lifelong learning programs for community-dwelling older adults and to synthesize the contents and outcomes of these lifelong learning programs. Methods: A systematic search was conducted in July to December 2016. Two reviewers were engaged in the process to ensure creditability of the selection process. Narrative description and analysis were applied with the support of a tabulation of key data including study design, interventions, and outcomes. Results: Eleven articles, which consisted of five randomized controlled trials and six quasi-experimental studies, were included in this review. Interventions included e-health literacy programs with the aid of computers and the Internet (n=4), computer and Internet training (n=3), physical fitness programs (n=2), music program (n=1), and intergenerational program (n=1). All studies used objective measurement tools to evaluate the outcomes of the study. Conclusion: The systematic review indicated lifelong learning programs resulted in positive outcomes in terms of physical health, mental health, social behavior, social support, self-efficacy and confidence in computer usage, and increased e-health literacy efficacy. However, the lifelong learning programs face challenges such as funding shortages, program cuts, and increasing costs. A comprehensive lifelong learning program could be developed to enhance the well-being of the older adults at a more holistic level. Empirical research can be done to explore the effectiveness of this comprehensive lifelong learning program.

Keywords: community-dwelling older adults, e-health literacy program, lifelong learning program, the wellbeing of the older adults

Procedia PDF Downloads 162
7274 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 147
7273 Agent-Base Modeling of IoT Applications by Using Software Product Line

Authors: Asad Abbas, Muhammad Fezan Afzal, Muhammad Latif Anjum, Muhammad Azmat

Abstract:

The Internet of Things (IoT) is used to link up real objects that use the internet to interact. IoT applications allow handling and operating the equipment in accordance with environmental needs, such as transportation and healthcare. IoT devices are linked together via a number of agents that act as a middleman for communications. The operation of a heat sensor differs indoors and outside because agent applications work with environmental variables. In this article, we suggest using Software Product Line (SPL) to model IoT agents and applications' features on an XML-based basis. The contextual diversity within the same domain of application can be handled, and the reusability of features is increased by XML-based feature modelling. For the purpose of managing contextual variability, we have embraced XML for modelling IoT applications, agents, and internet-connected devices.

Keywords: IoT agents, IoT applications, software product line, feature model, XML

Procedia PDF Downloads 92
7272 Analysis on the Copyright Protection Dilemma of Webcast in 'Internet Plus' Era

Authors: Yi Yang

Abstract:

In the era of 'Internet plus', the rapid development of webcast has posed new challenges to the intellectual property law. Meanwhile, traditional copyright protection has also exposed the existing theoretical imbalance in webcast. Through the analysis of the outstanding problems in the copyright protection of the network live broadcast, this paper points out that the main causes of the problems are the unclear nature of the copyright of the network live broadcast, the copyright protection system of the game network live broadcast has not yet been constructed, and the copyright infringement of the pan entertainment live broadcast is mostly, and so on. Based on the current practice, this paper puts forward the specific thinking of the protection path of online live broadcast copyright. First of all, to provide a reasonable judicial solution for a large number of online live copyright cases, we need to integrate the right scope and regulatory behavior of broadcasting right and information network communication right. Secondly, in order to protect the rights of network anchors, the webcast should be regarded as works. Thirdly, in order to protect the copyright of webcast and prevent the infringement of copyright by webcast, the webcast platform will be used as an intermediary to provide solutions for solving the judicial dilemma. In the era of 'Internet plus', it is a theoretical attempt to explore the protection and method of copyright protection on webcast, which has positive guiding significance for judicial practice.

Keywords: 'Internet Plus' era, webcast, copyright, protection dilemma

Procedia PDF Downloads 111
7271 A Model-Driven Approach of User Interface for MVP Rich Internet Application

Authors: Sarra Roubi, Mohammed Erramdani, Samir Mbarki

Abstract:

This paper presents an approach for the model-driven generating of Rich Internet Application (RIA) focusing on the graphical aspect. We used well known Model-Driven Engineering (MDE) frameworks and technologies, such as Eclipse Modeling Framework (EMF), Graphical Modeling Framework (GMF), Query View Transformation (QVTo) and Acceleo to enable the design and the code automatic generation of the RIA. During the development of the approach, we focused on the graphical aspect of the application in terms of interfaces while opting for the Model View Presenter pattern that is designed for graphics interfaces. The paper describes the process followed to define the approach, the supporting tool and presents the results from a case study.

Keywords: metamodel, model-driven engineering, MVP, rich internet application, transformation, user interface

Procedia PDF Downloads 350
7270 Needs and Expectations of Digital Support among Parents of Children in Child Healthcare

Authors: Lotha Valan, Åsa Hörnsten, Ulf Isaksson

Abstract:

Introduction: Sweden has a national child health care program (CHCP) where all parents are offered support to raise their children and support them for lifelong health. A systematic review concludes that there is a request for guidance in using the internet effectively for the health purposes of their children. However, a study about internet use among young mothers means that the internet is not always easy to navigate for parents, and they may need support. To fill this gap and develop a digital channel to complement the child health care (CHC) for the support of parents of children within CHC, there is a demand to investigate parents' needs in relation to this purpose. Methods: The study had a qualitative approach using focus group interviews with parents. The interview data were analyzed using qualitative content analysis. Results: The main theme highlights that parents expected that a digital support channel would be something that might strengthen them toward independence concerning the care of their children in a positive way. However, they also felt that they needed personal support and that relationships with other parents and the child health care nurse were significant and meaningful. Another parental desire that emerged was that a future digital channel would facilitate and simplify access to care, and they suggested having both planned and urgent times available for parents to book. The digital channel was expected to make this possible and be a good complement to the physical contacts the traditional child healthcare currently offers. Discussion/conclusions: The parents in this study believed that digital solutions could increase their parental power in relation to the care of their children. Examples were given as nurse-led parent groups where parents with similar problems and experiences around their children could support each other and were expected to strengthen them over time. The parents stressed that a planned digital support channel also needs satisfactory solutions for both contact and response. It was suggested that there should be bookable times for both planned and urgent needs and also the possibility of rescheduling visits.

Keywords: child healthcare, parents, digital support, nursing

Procedia PDF Downloads 74
7269 New Model of Immersive Experiential Branding for International Universities

Authors: Kakhaber Djakeli

Abstract:

For market leadership, iconic brands already start to establish their unique digital avatars into Metaverse and offer Non Fungible Tokens to their fans. Metaverse can be defined as an evolutionary step of Internet development. So if companies and brands use the internet, logically, they can find new solutions for them and their customers in Metaverse. Marketing and Management today must learn how to combine physical world activities with those either entitled as digital, virtual, and immersive. A “Phygital” Solution uniting physical and digital competitive activities of the company covering the questions about how to use virtual worlds for Brand Development and Non Fungible Tokens for more attractiveness soon will be most relevant question for Branding. Thinking comprehensively, we can entitle this type of branding as an Immersive one. As we see, the Immersive Brands give customers more mesmerizing feelings than traditional ones. Accordingly, the Branding can be divided by the company in its own understanding into two models: traditional and immersive. Immersive Branding being more directed to Sensorial challenges of Humans will be big job for International Universities in near future because they target the Generation - Z. To try to help those International Universities opening the door to the mesmerizing, immersive branding, the Marketing Research have been undertaken. The main goal of the study was to establish the model for Immersive Branding at International Universities and answer on many questions what logically arises in university life. The type of Delphi Surveys entitled as an Expert Studies was undertaken for one great mission, to help International Universities to open the opportunities to Phygital activities with reliable knowledge with Model of Immersive Branding. The Questionnaire sent to Experts of Education were covering professional type of questions from education to segmentation of customers, branding, attitude to students, and knowledge to Immersive Marketing. The research results being very interesting and encouraging enough to make author to establish the New Model of Immersive Experiential Branding for International Universities.

Keywords: branding, immersive marketing, students, university

Procedia PDF Downloads 80
7268 Internet, Fake News, and Democracy: The Case of Kosovo

Authors: Agrinë Baraku

Abstract:

This paper focuses on the convergence of the internet, fake news, and democracy. This paper will examine the convergence of these concepts, the tenets of democracy which are affected by the ever-increasing exposure to fake news, and whether the impact strengthens or can further weaken countries with fragile democracies. To demonstrate the convergence and the impact and to further the discussion about this topic, the case of Kosovo is explored. Its position in the Western Balkans makes it even more susceptible to the pressure stemming from geopolitical interests, which intersect with the generation of fake news by different international actors. Domestically, through data generated by Kantar (Index) Kosova Longitudinal Study on Media Measurement Survey (MMS), which focused on media viewership, the trend among Kosovar citizens is traced and then inserted into a bigger landscape, which is compounded by tenuous circumstances and challenges that Kosovo faces. Attention will be paid to what this can tell about where Kosovo currently is and the possibilities of what can be done regarding the phenomenon that is taking place.

Keywords: democracy, disinformation, internet, social media, fake news

Procedia PDF Downloads 88
7267 Personalized Social Resource Recommender Systems on Interest-Based Social Networks

Authors: C. L. Huang, J. J. Sia

Abstract:

The interest-based social networks, also known as social bookmark sharing systems, are useful platforms for people to conveniently read and collect internet resources. These platforms also providing function of social networks, and users can share and explore internet resources from the social networks. Providing personalized internet resources to users is an important issue on these platforms. This study uses two types of relationship on the social networks—following and follower and proposes a collaborative recommender system, consisting of two main steps. First, this study calculates the relationship strength between the target user and the target user's followings and followers to find top-N similar neighbors. Second, from the top-N similar neighbors, the articles (internet resources) that may interest the target user are recommended to the target user. In this system, users can efficiently obtain recent, related and diverse internet resources (knowledge) from the interest-based social network. This study collected the experimental dataset from Diigo, which is a famous bookmark sharing system. The experimental results show that the proposed recommendation model is more accurate than two traditional baseline recommendation models but slightly lower than the cosine model in accuracy. However, in the metrics of the diversity and executing time, our proposed model outperforms the cosine model.

Keywords: recommender systems, social networks, tagging, bookmark sharing systems, collaborative recommender systems, knowledge management

Procedia PDF Downloads 172
7266 Physical Fitness Evaluation of Physical Education Teachers in Maktab Rendah Sains MARA (MRSM)

Authors: Mohamad Nizam Asmuni, Ahmad Naszeri Salleh, Yunus Adam, Azhar Yaacob, Mohd Hafiz Rosli, Muhamad Nazrul Hakim Abdullah

Abstract:

Physical Education teacher at the school should have good physical fitness to educate and guide students in the school. Currently, there are no standards for the level of physical fitness for teachers who teaches physical education at the school. Therefore, this research is to determine the level of physical fitness of teacher of Physical Education at Maktab Rendah Sains MARA (MRSM). A total of 28 samples (18 men and 10 women, age 33 ± 4.91), teachers of physical education at MRSM, were randomly selected to participate in this study. Height, weight, body fat percentage, body mass index (BMI) and other physical testing are measured and recorded. The results showed that the average of body mass index (BMI) for teachers of Physical Education is 25.9 ± 4:57. Body mass index (BMI) of teachers can be categorized as pre-obese based on World Health Organization (WHO) guidelines. Body fat percentage for male (age; 34.3 ± 5.13) and female (age; 30.9 ± 3.81) teachers is 24.7% ± 6.54 and 30.6% ± 6.28, respectively. Male teachers were categorized as overfat, however, female teachers were categorized as healthy based on body fat ranges for standard adults at NY Obesity Research Center. Bleep test results show that the average Bleep test is level 4 and shuttle 2; average VO2max was 27.5 ± 5.94 L/min. Physical fitness and performance of physical education teachers at MRSM is much lower compared to the rugby junior athlete in University Putra Malaysia (UPM). Therefore, physical fitness of teachers must be improved to ensure the physical education classes at MRSM could be done better.

Keywords: physical fitness, BMI, bleep test, obesity

Procedia PDF Downloads 367
7265 The Influence of Advertising Captions on the Internet through the Consumer Purchasing Decision

Authors: Suwimol Apapol, Punrapha Praditpong

Abstract:

The objectives of the study were to find out the frequencies of figures of speech in fragrance advertising captions as well as the types of figures of speech most commonly applied in captions. The relation between figures of speech and fragrance was also examined in order to analyze how figures of speech were used to represent fragrance. Thirty-five fragrance advertisements were randomly selected from the Internet. Content analysis was applied in order to consider the relation between figures of speech and fragrance. The results showed that figures of speech were found in almost every fragrance advertisement except one advertisement of several Goods service. Thirty-four fragrance advertising captions used at least one kind of figure of speech. Metaphor was most frequently found and also most frequently applied in fragrance advertising captions, followed by alliteration, rhyme, simile and personification, and hyperbole respectively which is in harmony with the research hypotheses as well.

Keywords: advertising captions, captions on internet, consumer purchasing decision, e-commerce

Procedia PDF Downloads 269
7264 Competition as an Appropriate Instructional Practice in the Physical Education Environment: Reflective Experiences

Authors: David Barney, Francis Pleban, Muna Muday

Abstract:

The purpose of this study was to explore gender differences of former physical education students related to reflective experiences of competition in physical education learning environment. In the school environment, students are positioned in competitive situations, including in the physical education context. Therefore it is important to prepare future physical educators to address the role of competition in physical education. Participants for this study were 304 college-aged students and young adults (M = 1.53, SD = .500), from a private university and local community located in the western United States. When comparing gender, significant differences (p < .05) were reported for four (questions 5, 7, 12, and 14) of the nine scaling questions. Follow-up quantitative findings reported that males (41%) more than females (27%) witnessed fights in physical education environment during competitive games. Qualitative findings reported fighting were along the lines of verbal confrontation. Female participants tended to experience being excluded from games, when compared to male participants. Both male and female participants (total population; 95%, males; 98%; and females 92%) were in favor of including competition in physical education for students. Findings suggest that physical education teachers and physical education teacher education programs have a responsibility to develop gender neutral learning experiences that help students better appreciate the role competition plays, both in and out of the physical education classroom.

Keywords: competition, physical education, physical education teacher education, gender

Procedia PDF Downloads 496
7263 Social Media Resignation the Only Way to Protect User Data and Restore Cognitive Balance, a Literature Review

Authors: Rajarshi Motilal

Abstract:

The birth of the Internet and the rise of social media marked an important chapter in the history of humankind. Often termed the fourth scientific revolution, the Internet has changed human lives and cognisance. The birth of Web 2.0, followed by the launch of social media and social networking sites, added another milestone to these technological advancements where connectivity and influx of information became dominant. With billions of individuals using the internet and social media sites in the 21st century, “users” became “consumers”, and orthodox marketing reshaped itself to digital marketing. Furthermore, organisations started using sophisticated algorithms to predict consumer purchase behaviour and manipulate it to sustain themselves in such a competitive environment. The rampant storage and analysis of individual data became the new normal, raising many questions about data privacy. The excessive usage of the Internet among individuals brought in other problems of them becoming addicted to it, scavenging for societal approval and instant gratification, subsequently leading to a collective dualism, isolation, and finally, depression. This study aims to determine the relationship between social media usage in the modern age and the rise of psychological and cognitive imbalances in human minds. The literature review is positioned timely as an addition to the existing work at a time when the world is constantly debating on whether social media resignation is the only way to protect user data and restore the decaying cognitive balance.

Keywords: social media, digital marketing, consumer behaviour, internet addiction, data privacy

Procedia PDF Downloads 75
7262 Remote Monitoring and Control System of Potentiostat Based on the Internet of Things

Authors: Liang Zhao, Guangwen Wang, Guichang Liu

Abstract:

Constant potometer is an important component of pipeline anti-corrosion systems in the chemical industry. Based on Internet of Things (IoT) technology, Programmable Logic Controller (PLC) technology and database technology, this paper developed a set of a constant potometer remote monitoring management system. The remote monitoring and remote adjustment of the working status of the constant potometer are realized. The system has real-time data display, historical data query, alarm push management, user permission management, and supporting Web access and mobile client application (APP) access. The actual engineering project test results show the stability of the system, which can be widely used in cathodic protection systems.

Keywords: internet of things, pipe corrosion protection, potentiostat, remote monitoring

Procedia PDF Downloads 145
7261 The Online Advertising Speech that Effect to the Thailand Internet User Decision Making

Authors: Panprae Bunyapukkna

Abstract:

This study investigated figures of speech used in fragrance advertising captions on the Internet. The objectives of the study were to find out the frequencies of figures of speech in fragrance advertising captions and the types of figures of speech most commonly applied in captions. The relation between figures of speech and fragrance was also examined in order to analyze how figures of speech were used to represent fragrance. Thirty-five fragrance advertisements were randomly selected from the Internet. Content analysis was applied in order to consider the relation between figures of speech and fragrance. The results showed that figures of speech were found in almost every fragrance advertisement except one advertisement of Lancôme. Thirty-four fragrance advertising captions used at least one kind of figure of speech. Metaphor was most frequently found and also most frequently applied in fragrance advertising captions, followed by alliteration, rhyme, simile and personification, and hyperbole respectively.

Keywords: advertising speech, fragrance advertisements, figures of speech, metaphor

Procedia PDF Downloads 239
7260 Current Global Education Trends: Issues and Challenges of Physical and Health Education Teaching and Learning in Nigerian Schools

Authors: Bichi Muktar Sani

Abstract:

The philosophy of Physical and Health Education is to develop academic and professional competency which will enable individuals earn a living and render unique services to the society and also provide good basis of knowledge and experience that characterize an educated and fully developed person through physical activities. With the increase of sedentary activities such as watching television, playing videogames, increased computer technology, automation and reduction of high school Physical and Health Education schedules, young people are most likely to become overweight, and less fit. Physical Education is a systematic instruction in sports, training, practice, gymnastics, exercises, and hygiene given as part of a school or college program. Physical and Health Education is the study, practice, and appreciation of the art and science of human movement. Physical and Health Education is course in the curricula that utilizes the learning in the cognitive, affective, and psychomotor domains in a lay or movement exploration setting. The paper made some recommendations on the way forward.

Keywords: issues, challenges, physical education, school

Procedia PDF Downloads 38
7259 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 163
7258 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying

Authors: Sultan Alanazi, Adwan Alanazi

Abstract:

Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.

Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes

Procedia PDF Downloads 136
7257 Research on Internet Attention of Tourism and Marketing Strategy in Northeast Sichuan Economic Zone in China Based on Baidu Index

Authors: Chuanqiao Zheng, Wei Zeng, Haozhen Lin

Abstract:

As of March 2020, the number of Chinese netizens has reached 904 million. The proportion of Internet users accessing the Internet through mobile phones is as high as 99.3%. Under the background of 'Internet +', tourists have a stronger sense of independence in the choice of tourism destinations and tourism products. Tourists are more inclined to learn about the relevant information on tourism destinations and other tourists' evaluations of tourist products through the Internet. The search engine, as an integrated platform that contains a wealth of information, is highly valuable to the analysis of the characteristics of the Internet attention given to various tourism destinations, through big data mining and analysis. This article uses the Baidu Index as the data source, which is one of the products of Baidu Search. The Baidu Index is based on big data, which collects and shares the search results of a large number of Internet users on the Baidu search engine. The big data used in this article includes search index, demand map, population profile, etc. The main research methods used are: (1) based on the search index, analyzing the Internet attention given to the tourism in five cities in Northeast Sichuan at different times, so as to obtain the overall trend and individual characteristics of tourism development in the region; (2) based on the demand map and the population profile, analyzing the demographic characteristics and market positioning of the tourist groups in these cities to understand the characteristics and needs of the target groups; (3) correlating the Internet attention data with the permanent population of each province in China in the corresponding to construct the Boston matrix of the Internet attention rate of the Northeast Sichuan tourism, obtain the tourism target markets, and then propose development strategies for different markets. The study has found that: a) the Internet attention given to the tourism in the region can be categorized into tourist off-season and peak season; the Internet attention given to tourism in different cities is quite different. b) tourists look for information including tour guide information, ticket information, traffic information, weather information, and information on the competing tourism cities; with regard to the population profile, the main group of potential tourists searching for the keywords of tourism in the five prefecture-level cities in Northeast Sichuan are youth. The male to female ratio is about 6 to 4, with males being predominant. c) through the construction of the Boston matrix, it is concluded that the star market for tourism in the Northeast Sichuan Economic Zone includes Sichuan and Shaanxi; the cash cows market includes Hainan and Ningxia; the question market includes Jiangsu and Shanghai; the dog market includes Hubei and Jiangxi. The study concludes with the following planning strategies and recommendations: i) creating a diversified business format that integrates cultural and tourism; ii) creating a brand image of niche tourism; iii) focusing on the development of tourism products; iv) innovating composite three-dimensional marketing channels.

Keywords: Baidu Index, big data, internet attention, tourism

Procedia PDF Downloads 122
7256 Marketing and Commercial Activities Offered on Websites of European Union Banks

Authors: Mario Spremić, Natalija Kokolek, Božidar Jaković, Jurica Šimurina

Abstract:

This paper deals with various questions related to functionality and providing banking services in the European union on the Internet. Due to the fact that we live in the information technologies era, the Internet become a new space for doing economic and business activities in all areas, and especially important in banking. Accepting the busy tempo of life, in the past several years electronic banking has become necessity and a must for most users of banking services. On a sample of 300 web sites of the banks operating in European union (EU) we conduct the research on the functionality of e-banking services offered through banks web sites with the key objective to reveal to what extent the information technologies are used in their business operations. Characteristics of EU banks websites will be examined and compared to the basic groups of business activities on the web. Also some recommendations for the successful bank web sites will be provided.

Keywords: electronic banking, electronic business, European union banks, internet

Procedia PDF Downloads 473
7255 Image Recognition Performance Benchmarking for Edge Computing Using Small Visual Processing Unit

Authors: Kasidis Chomrat, Nopasit Chakpitak, Anukul Tamprasirt, Annop Thananchana

Abstract:

Internet of Things devices or IoT and Edge Computing has become one of the biggest things happening in innovations and one of the most discussed of the potential to improve and disrupt traditional business and industry alike. With rises of new hang cliff challenges like COVID-19 pandemic that posed a danger to workforce and business process of the system. Along with drastically changing landscape in business that left ruined aftermath of global COVID-19 pandemic, looming with the threat of global energy crisis, global warming, more heating global politic that posed a threat to become new Cold War. How emerging technology like edge computing and usage of specialized design visual processing units will be great opportunities for business. The literature reviewed on how the internet of things and disruptive wave will affect business, which explains is how all these new events is an effect on the current business and how would the business need to be adapting to change in the market and world, and example test benchmarking for consumer marketed of newer devices like the internet of things devices equipped with new edge computing devices will be increase efficiency and reducing posing a risk from a current and looming crisis. Throughout the whole paper, we will explain the technologies that lead the present technologies and the current situation why these technologies will be innovations that change the traditional practice through brief introductions to the technologies such as cloud computing, edge computing, Internet of Things and how it will be leading into future.

Keywords: internet of things, edge computing, machine learning, pattern recognition, image classification

Procedia PDF Downloads 153
7254 Impacts and Implications: Exploring the Long-Term Health Benefits of Regular Physical Activity

Authors: Muhammad Wahb

Abstract:

Physical activity is increasingly recognized as a significant factor in maintaining optimal health and preventing chronic diseases. This research scrutinizes the long-term health benefits of sustained physical activity, employing a systematic review of epidemiological studies and randomized control trials conducted over the past decade. The study illuminates the protective effects of regular physical activity against cardiovascular disease, obesity, diabetes, and mental health disorders, with a special focus on the mechanisms involved. Furthermore, the paper provides insights into how public health initiatives can effectively promote physical activity among diverse populations, contributing to improved community health outcomes.

Keywords: physical activity, long-term health benefits, chronic disease prevention, public health

Procedia PDF Downloads 94
7253 Review of the Legislative and Policy Issues in Promoting Infrastructure Development to Promote Automation in Telecom Industry

Authors: Marvin Ricardo Awarab

Abstract:

There has never been a greater need for telecom services. The Internet of Things (IoT), 5G networking, and edge computing are the driving forces behind this increased demand. The fierce demand offers communications service providers significant income opportunities. The telecom sector is centered on automation, and realizing a digital operation that functions as a real-time business will be crucial for the industry as a whole. Automation in telecom refers to the application of technology to create a more effective, quick, and scalable alternative to the conventional method of operating the telecom industry. With the promotion of 5G and the Internet of Things (IoT), telecom companies will continue to invest extensively in telecom automation technology. Automation offers benefits in the telecom industry; developing countries such as Namibia may not fully tap into such benefits because of the lack of funds and infrastructural resources to invest in automation. This paper fully investigates the benefits of automation in the telecom industry. Furthermore, the paper identifies hiccups that developing countries such as Namibia face in their quest to fully introduce automation in the telecom industry. Additionally, the paper proposes possible avenues that Namibia, as a developing country, adopt investing in automation infrastructural resources with the aim of reaping the full benefits of automation in the telecom industry.

Keywords: automation, development, internet, internet of things, network, telecom, telecommunications policy, 5G

Procedia PDF Downloads 61
7252 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 353
7251 The Study of Information Uses Behaviour of Tourists in Songkhla Province, Thailand

Authors: Patraporn Kaewkhanitarak, Suchada Srichuar, Narawat Kanjanapan

Abstract:

This research is the survey research. The purpose of this research is to study information uses behavior and problem of tourists in Songkhla Province. The tool used in this study include structure questioner standardize in 5 levels rating scale. The 400 participants selected by convenience sampling (allowable error 5%) by Taro Yamane method. The collecting data period is 6 months from January-June 2014. The result of this study found that the type of information that the tourists often use to plan their trip is internet (x̅ = 3.81) and the most popular text is restaurant (x̅ = 3.77). The tourists found that booking or buying service from internet provided more affordable price and they could select appropriate plan by themselves. The most convenience source of information that the tourists often use is internet and website (x̅ = 3.69). Nevertheless, they explained that most of tourist information source in Songkhla province are lack and insufficient of tourist organization that provide information and service related to tourism.

Keywords: information, behavior, tourists, Thailand

Procedia PDF Downloads 251
7250 Domestic Led Lighting Designs Using Internet of Things

Authors: Gouresh Singhal, Rajib Kumar Panigrahi

Abstract:

In this paper, we try to examine historical and technological changes in lighting industry. We propose a (proto) technical solution at block diagram and circuit level. Untapped and upcoming technologies such as Cloud and 6LoWPAN are further explored. The paper presents a robust hardware realistic design. A mobile application is also provided to provide last mile user interface. The paper highlights the current challenges to be faced and concludes with a pragmatic view of lighting industry.

Keywords: 6lowpan, internet of things, mobile application, led

Procedia PDF Downloads 570
7249 Examination of Relationship between Internet Addiction and Cyber Bullying in Adolescents

Authors: Adem Peker, Yüksel Eroğlu, İsmail Ay

Abstract:

As the information and communication technologies have become embedded in everyday life of adolescents, both their possible benefits and risks to adolescents are being identified. The information and communication technologies provide opportunities for adolescents to connect with peers and to access to information. However, as with other social connections, users of information and communication devices have the potential to meet and interact with in harmful ways. One emerging example of such interaction is cyber bullying. Cyber bullying occurs when someone uses the information and communication technologies to harass or embarrass another person. Cyber bullying can take the form of malicious text messages and e-mails, spreading rumours, and excluding people from online groups. Cyber bullying has been linked to psychological problems for cyber bullies and victims. Therefore, it is important to determine how internet addiction contributes to cyber bullying. Building on this question, this study takes a closer look at the relationship between internet addiction and cyber bullying. For this purpose, in this study, based on descriptive relational model, it was hypothesized that loss of control, excessive desire to stay online, and negativity in social relationships, which are dimensions of internet addiction, would be associated positively with cyber bullying and victimization. Participants were 383 high school students (176 girls and 207 boys; mean age, 15.7 years). Internet addiction was measured by using Internet Addiction Scale. The Cyber Victim and Bullying Scale was utilized to measure cyber bullying and victimization. The scales were administered to the students in groups in the classrooms. In this study, stepwise regression analyses were utilized to examine the relationships between dimensions of internet addiction and cyber bullying and victimization. Before applying stepwise regression analysis, assumptions of regression were verified. According to stepwise regression analysis, cyber bullying was predicted by loss of control (β=.26, p<.001) and negativity in social relationships (β=.13, p<.001). These variables accounted for 9 % of the total variance, with the loss of control explaining the higher percentage (8 %). On the other hand, cyber victimization was predicted by loss of control (β=.19, p<.001) and negativity in social relationships (β=.12, p<.001). These variables altogether accounted for 8 % of the variance in cyber victimization, with the best predictor loss of control (7 % of the total variance). The results of this study demonstrated that, as expected, loss of control and negativity in social relationships predicted cyber bullying and victimization positively. However, excessive desire to stay online did not emerge a significant predictor of both cyberbullying and victimization. Consequently, this study would enhance our understanding of the predictors of cyber bullying and victimization since the results proposed that internet addiction is related with cyber bullying and victimization.

Keywords: cyber bullying, internet addiction, adolescents, regression

Procedia PDF Downloads 309
7248 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain

Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani

Abstract:

The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.

Keywords: blockchain, hyperledger fabric, internet of things, security, traceability

Procedia PDF Downloads 147
7247 Effectiveness of Internet Psychological Counseling in Reducing Social Shyness Symptoms among Students of University of Tabuk

Authors: Khawla Saad Albalawi

Abstract:

The aim of this research was to explore the effectiveness of the internet counseling in reducing social shyness among the university's students. The sample consisted of 40 students and was divided into two groups: an experimental group and a control group. The social shyness scale (SSS) was administered to both groups before applying the counseling to the experimental group (as a pre-test). After that, the internet counseling was applied to the experimental group. Next, the SSS was administered to both groups (as a post-test). Finally, the SSS was administered to the experimental group (as an iterative application). Results suggest that: 1. There is a significant difference between the two groups in the post-test in all dimensions and the total score of the (SSS) in favor of the experimental group in all cases. 2. There is a significant difference between the pre- and the post-test of the experimental group in all dimensions and the total score of the (SSS) in favor of the post-test in all cases. 3. There is no significant difference between the post-test and the iterative application of the experimental group in all dimensions and the total score of the (SSS). The above results were discussed in light of previous research. Recommendations and future researches were suggested.

Keywords: internet psychological clinics, social interaction disorders, shyness, Twitter, Facebook

Procedia PDF Downloads 497
7246 Comparison between Mental Toughness and Level of Physical Activity between Staff and Students in University of Tabriz

Authors: Mahta Eskandarnejad

Abstract:

The aim of this paper was to compare physical activity and mental toughness in the staff and students of the University of Tabriz. 615 people participated in this study and filled demographic questionnaire, mental thoughness48 (MTQ48) questionnaire and habitual physical activity questionnaire (Baecke physical activity questionnaire). The research sample included 355 students and 260 staff (615 questionnaires). For analyzing hypotheses MANOVA, correlation and independent t-test were used. Based on the result; some subscales of mental toughness and physical activity were significantly related. The result showed the significant correlation between mental toughness and physical activity in student and no significant correlation in staff. Students were significantly physically more active than staff, and mental toughness was higher in staff. There was no difference in mental toughness variable between active participants (active staff and student). The results of this study showed that mental toughness could influence the way a person cope with living conditions. It is expected that mental toughness changes can lead to changing in levels of physical activity. It should be noted that the other variables should not be ignored.

Keywords: Baecke physical activity questionnaire, mental toughness, physical activity, university staff, university student

Procedia PDF Downloads 387