Search results for: virtual service network
8816 A Study of Social Media Users’ Switching Behavior
Authors: Chiao-Chen Chang, Yang-Chieh Chin
Abstract:
Social media has created a change in the way the network community is clustered, especially from the location of the community, from the original virtual space to the intertwined network, and thus the communication between people will change from face to face communication to social media-based communication model. However, social media users who have had a fixed engagement may have an intention to switch to another service provider because of the emergence of new forms of social media. For example, some of Facebook or Twitter users switched to Instagram in 2014 because of social media messages or image overloads, and users may seek simpler and instant social media to become their main social networking tool. This study explores the impact of system features overload, information overload, social monitoring concerns, problematic use and privacy concerns as the antecedents on social media fatigue, dissatisfaction, and alternative attractiveness; further influence social media switching. This study also uses the online questionnaire survey method to recover the sample data, and then confirm the factor analysis, path analysis, model fit analysis and mediating analysis with the structural equation model (SEM). Research findings demonstrated that there were significant effects on multiple paths. Based on the research findings, this study puts forward the implications of theory and practice.Keywords: social media, switching, social media fatigue, alternative attractiveness
Procedia PDF Downloads 1428815 Evaluating and Reflecting on Virtual Exercise Programs during the COVID-19 Pandemic
Authors: Teng Minnie Y., Jarus Tal, Wong Anita
Abstract:
Introduction: The COVID-19 pandemic has altered the lifestyle of all Canadians. While "stay-at-home" public health directives have been implemented to mitigate the spread of COVID-19, they may also lead to or worsen physical and social health challenges for older adults. In particular, older adults with disabilities are especially vulnerable. In response, we quickly adapted to virtual rehabilitation exercise intervention for older adults. Objectives: First, to identify the factors that influenced the acceptability and feasibility of virtual exercise implementation, and second, to evaluate whether the virtual delivery was effective for health promotion in older adults with disabilities. Methods: We carried out weekly virtual exercise programs from January 2021 to June 2021. We conducted semi-structured focus groups and interviews to explore the perspectives of participants who are older adults. The focus group and interview data are transcribed and coded thematically. Conclusions: The acceptability and feasibility of delivering exercises virtually were influenced by the provision of a safe and supportive environment for social connection, the availability of the necessary technology, and the role of the support system.Keywords: physical activity, virtual exercises, older adults, people with disabilities
Procedia PDF Downloads 888814 The Relationship Between The Two-spatial World And The Decrease In The Area Of Commercial Properties
Authors: Syedhossein Vakili
Abstract:
According to the opinion of some experts, the world's two-spatialization means the establishment of a new virtual space and placing this new space next to the physical space. This dualization of space has left various effects, one of which is reducing the need for buildings and making the area of business premises economical through the use of virtual space instead of a part of physical space. In such a way that before the virtual space was known, a commercial or educational institution had to block a large part of its capital to acquire physical spaces and buildings in order to provide physical space and places needed for daily activities, but today, Thanks to the addition of the virtual space to the physical space, it has been possible to carry out its activities more widely in a limited environment with a minimum of physical space and drastically reduce costs. In order to understand the impact of virtual space on the reduction of physical space, the researcher used the official reports of the countries regarding the average area mentioned in the permits for the construction of commercial and educational units in the period from 2014 to 2023 and compared the average capital required for the absolute physical period with The period of two-spatialization of the world in the mentioned ten-year period, while using the analytical and comparative method, has proven that virtual space has greatly reduced the amount of investment of business owners to provide the required place for their activities by reducing the need for physical space. And economically, it has made commercial activities more profitable.Keywords: two spatialization, building area, cyberspace, physical space, virtual place
Procedia PDF Downloads 628813 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case
Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan
Abstract:
The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.Keywords: cloud computing, protocols, UDP multicast, virtualization
Procedia PDF Downloads 5928812 Examining Audiology Students: Clinical Reasoning Skills When Using Virtual Audiology Cases Aided With no Collaboration, Live Collaboration, and Virtual Collaboration
Authors: Ramy Shaaban
Abstract:
The purpose of this study was to examine the difference in clinical reasoning skills of students when using virtual audiology cases with and without collaborative assistance from major learning approaches important to clinical reasoning skills and computer-based learning models: Situated Learning Theory, Social Development Theory, Scaffolding, and Collaborative Learning. A quasi-experimental design was conducted at two United States universities to examine whether there is a significant difference in clinical reasoning skills between three treatment groups using IUP Audiosim software. Two computer-based audiology case simulations were developed, and participants were randomly placed into the three groups: no collaboration, virtual collaboration, and live collaboration. The clinical reasoning data were analyzed using One-Way ANOVA and Tukey posthoc analyses. The results show that there was a significant difference in clinical reasoning skills between the three treatment groups. The score obtained by the no collaboration group was significantly less than the scores obtained by the virtual and live collaboration groups. Collaboration, whether virtual or in person, has a positive effect on students’ clinical reasoning. These results with audiology students indicate that combining collaboration models with scaffolding and embedding situated learning and social development theories into the design of future virtual patients has the potential to improve students’ clinical reasoning skills.Keywords: clinical reasoning, virtual patients, collaborative learning, scaffolding
Procedia PDF Downloads 2158811 Improving Library Service Quality in Local City of Indonesia
Authors: Prima Fithri, Afri Adnan, Verra Syahmer
Abstract:
Library as a public service should be able to provide excellent and quality service. The criteria that should be available in the library is having the collection which relevant, actual and reliable, qualified and professional employee, delivery system that prompt and appropriate as well as supported by proper infrastructure. The aim of this study is to show the performance as an effort to provide quality of services that appropriate with the needs and desires of user. Then, in this research has been carried out the calculation of the gap between the perceptions and expectations of user about the services of the library. The Sevqual and QFD methods are used in this study. Servqual method for measuring the value of the gap that occurs in the dimensions of service quality and QFD method for determine priority repairment that need to be done to improve the quality of services that occur in the dimensions of service quality. From 97 questionaires, shows that value of the gap that occurs in the dimensions of service quality using by Servqual is 27.7% dimensions of responsiveness. It show how much user expectations are not met by the quality of existing services. Construction of the library and standard library becomes priority improvements that need to be done to improve the quality of service that occurs in the dimensions of service quality using the QFD.Keywords: library, service quality, service quality, QFD
Procedia PDF Downloads 5798810 Using Artificial Intelligence Method to Explore the Important Factors in the Reuse of Telecare by the Elderly
Authors: Jui-Chen Huang
Abstract:
This research used artificial intelligence method to explore elderly’s opinions on the reuse of telecare, its effect on their service quality, satisfaction and the relationship between customer perceived value and intention to reuse. This study conducted a questionnaire survey on the elderly. A total of 124 valid copies of a questionnaire were obtained. It adopted Backpropagation Network (BPN) to propose an effective and feasible analysis method, which is different from the traditional method. Two third of the total samples (82 samples) were taken as the training data, and the one third of the samples (42 samples) were taken as the testing data. The training and testing data RMSE (root mean square error) are 0.022 and 0.009 in the BPN, respectively. As shown, the errors are acceptable. On the other hand, the training and testing data RMSE are 0.100 and 0.099 in the regression model, respectively. In addition, the results showed the service quality has the greatest effects on the intention to reuse, followed by the satisfaction, and perceived value. This result of the Backpropagation Network method is better than the regression analysis. This result can be used as a reference for future research.Keywords: artificial intelligence, backpropagation network (BPN), elderly, reuse, telecare
Procedia PDF Downloads 2138809 Network Security Attacks and Defences
Authors: Ranbir Singh, Deepinder Kaur
Abstract:
Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.Keywords: network security, attacks, denial, authenticating
Procedia PDF Downloads 4058808 Maximizing Customer Service through Logistics Service Support in the Automobile Industry in Ghana
Authors: John M. Frimpong, Matilda K. Owusu-Bio, Caleb Annan
Abstract:
Business today is highly competitive, and the automobile industry is no exception. Therefore, it is necessary to determine the customer value and service quality measures that lead to customer satisfaction which in turn lead to customer loyalty. However, in the automobile industry, the role of logistics service support in these relationships cannot be undermined. It could be inferred that logistics service supports and its management has a direct correlation with customer service and or service quality. But this is not always the same for all industries. Therefore, this study was to investigate how automobile companies implement the concept of customer service through logistics service supports. In order to ascertain this, two automobile companies in Ghana were selected, and these are Toyota Ghana Limited and Mechanical Lloyd Company Ltd. The study developed a conceptual model to depict the study’s objectives from which questionnaires were developed from for data collection. Respondents were made up of customers and staff of the two companies. The findings of the study revealed that the automobile industry partly attributes their customer satisfaction to the customer value, service quality or customer value. It shows a positive relationship between logistics service supports and service quality and customer value. However, the results indicate that customer satisfaction is not predicted by logistics services. This implies that in the automobile industry, it is not always the case that when customer service is implemented through logistics service supports, it leads to customer satisfaction. Therefore, there is the need for all players and stakeholders in the automobile industry investigate other factors which help to increase customer satisfaction in addition to logistics service supports. It is recommended that logistics service supports should be geared towards meeting customer expectations and not just based on the organization’s standards and procedures. It is necessary to listen to the voice of the customer to tailor the service package to suit the needs and expectations of the customer.Keywords: customer loyalty, customer satisfaction, customer service, customer value, logistics service supports
Procedia PDF Downloads 4968807 ‘Nature Will Slow You Down for a Reason’: Virtual Elder-Led Support Services during COVID-19
Authors: Grandmother Roberta Oshkawbewisens, Elder Isabelle Meawasige, Lynne Groulx, Chloë Hamilton, Lee Allison Clark, Dana Hickey, Wansu Qiu, Jared Leedham, Nishanthini Mahendran, Cameron Maclaine
Abstract:
In March of 2020, the world suddenly shifted with the onset of the COVID-19 pandemic; in-person programs and services were unavailable and a scramble to shift to virtual service delivery began. The Native Women’s Association of Canada (NWAC) established virtual programming through the Resiliency Lodge model and connected with Indigenous women, girls, Two-Spirit, transgender, and gender-diverse people across Turtle Island and Inuit Nunangat through programs that provide a safe space to slow down and reflect on their lives, environment, and well-being. To continue to grow the virtual Resiliency Lodge model, NWAC needed to develop an understanding of three questions: how COVID-19 affects Elder-led support services, how Elder-led support services have adapted during the pandemic, and what Wise Practices need to be implemented to continue to develop, refine, and evaluate virtual Elder-led support services specifically for Indigenous women, girls, two-Spirit, transgender, and gender-diverse people. Through funding from the Canadian Institute of Health Research (CIHR), NWAC gained deeper insight into these questions and developed a series of key findings and recommendations that are outlined throughout this report. The goals of this project are to contribute to a more robust participatory analysis that reflects the complexities of Elder-led virtual cultural responses and the impacts of COVID-19 on Elder-led support services; develop culturally and contextually meaningful virtual protocols and wise practices for virtual Indigenous-led support; and develop an Evaluation Strategy to improve the capacity of the Resiliency Lodge model. Significant findings from the project include Resiliency Lodge programs, especially crafting and business sessions, have provided participants with a sense of community and contributed to healing and wellness; Elder-led support services need greater and more stable funding to offer more workshops to more Indigenous women, girls, Two-Spirit, transgender, and gender-diverse people; and Elder- and Indigenous-led programs play a significant role in healing and building a sense of purpose and belonging among Indigenous people. Ultimately, the findings and recommendations outlined in this research project help to guide future Elder-led virtual support services and emphasize the critical need to increase access to Elder-led programming for Indigenous women, girls, Two-Spirit, transgender, and gender-diverse people.Keywords: indigenous women, traditional healing, virtual programs, covid-19
Procedia PDF Downloads 1408806 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes
Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv
Abstract:
As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment
Procedia PDF Downloads 2108805 On a Single Server Queue with Arrivals in Batches of Variable Size, Generalized Coxian-2 Service and Compulsory Server Vacations
Authors: Kailash C. Madan
Abstract:
We study the steady state behaviour of a batch arrival single server queue in which the first service with general service times is compulsory and the second service with general service times is optional. We term such a two phase service as generalized Coxian-2 service. Just after completion of a service the server must take a vacation of random length of time with general vacation times. We obtain steady state probability generating functions for the queue size as well as the steady state mean queue size at a random epoch of time in explicit and closed forms. Some particular cases of interest including some known results have been derived.Keywords: batch arrivals, compound Poisson process, generalized Coxian-2 service, steady state
Procedia PDF Downloads 4578804 Cortex-M3 Based Virtual Platform Implementation for Software Development
Authors: Jun Young Moon, Hyeonggeon Lee, Jong Tae Kim
Abstract:
In this paper, we present Cortex-M3 based virtual platform which can virtualize wearable hardware platform and evaluate hardware performance. Cortex-M3 is very popular microcontroller in wearable devices, hardware sensors and display devices. This platform can be used to implement software layer for specific hardware architecture. By using the proposed platform the software development process can be parallelized with hardware development process. We present internal mechanism to implement the proposed virtual platform and describe how to use the proposed platform to develop software by using case study which is low cost wearable device that uses Cortex-M3.Keywords: electronic system level design, software development, virtual platform, wearable device
Procedia PDF Downloads 3758803 Flexible 3D Virtual Desktop Using Handles for Cloud Environments
Abstract:
Due to the improvement in performance of computer hardware and the development of operating systems, a multi-tasking for several programs has become one of the basic functions to computer users. It is natural for computer users to want more functional, convenient, and visual GUI functions (Graphic User Interface). In this paper, a 3D virtual desktop system was proposed to meet users’ requirements for cloud environments such as a virtual desktop function in the Windows environment. The proposed system uses the handles of the windows to hide or restore several windows. It connects the list of task spaces using the circular double linked list to manage the handles. Each handle list is registered in the corresponding task space being executed. The 3D virtual desktop is efficient and flexible in handling the numbers of task spaces and can help users to work under more comfortable environments. Acknowledgment: This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Korea government (MSIP) (NRF-2015R1D1A1A01057680).Keywords: virtual desktop, GUI, cloud, virtualization
Procedia PDF Downloads 2108802 Quality Management and Service Organization
Authors: Fatemeh Khalili Varnamkhasti
Abstract:
In recent times, there has been a notable shift in the application of Total Quality Management (TQM) from manufacturing to service organizations, prompting numerous studies on the subject. TQM has firmly established itself across various sectors, emerging as an approach to process improvement, waste reduction, business optimization, and quality performance. Many researchers and academics have recognized the relevance of TQM for sustainable competitive advantage, particularly in service organizations. In light of this, the purpose of this research study is to explore the applicability of TQM within the service framework. The study delves into existing literature on TQM in service organizations and examines the reasons for its occasional shortcomings. Ultimately, the paper provides systematic guidelines for the effective implementation of TQM in service organizations. The findings of this study offer a much-improved understanding of TQM and its practices, shedding light on the evolution of service organizations. Additionally, the study highlights key insights from recent research on TQM in service organizations and proposes a ten-step approach for the successful implementation of TQM in the service sector. This framework aims to provide service managers and professionals with a comprehensive understanding of TQM fundamentals and encourages a deeper exploration of TQM theory.Keywords: quality, control, service, management, teamwork
Procedia PDF Downloads 578801 A Blockchain-Based Protection Strategy against Social Network Phishing
Authors: Francesco Buccafurri, Celeste Romolo
Abstract:
Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.Keywords: phishing, social networks, information sharing, blockchain
Procedia PDF Downloads 3308800 Qualitative Study of Pre-Service Teachers' Imagined Professional World vs. Real Experiences of In-Service Teachers
Authors: Masood Monjezi
Abstract:
The English teachers’ pedagogical identity construction is the way teachers go through the process of becoming teachers and how they maintain their teaching selves. The pedagogical identity of teachers is influenced by several factors within the individual and the society. The purpose of this study was to compare the imagined social world of the pre-service teachers with the real experiences the in-service teachers had in the context of Iran to see how prepared the pre-service teachers are with a view to their identity being. This study used a qualitative approach to collection and analysis of the data. Structured and semi-structured interviews, focus groups and process logs were used to collect the data. Then, using open coding, the data were analyzed. The findings showed that the imagined world of the pre-service teachers partly corresponded with the real world experiences of the in-service teachers leaving the pre-service teachers unprepared for their real world teaching profession. The findings suggest that the current approaches to English teacher training are in need of modification to better prepare the pre-service teachers for the future that expects them.Keywords: imagined professional world, in-service teachers, pre-service teachers, real experiences, community of practice, identity
Procedia PDF Downloads 3378799 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System
Authors: Farheen Tabassum, Shoab Ahmed Khan
Abstract:
The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS
Procedia PDF Downloads 3558798 Customer Service Marketing Mix: A Survey of Small Business around Campus, Suan Sunandha Rajabhat University
Authors: Chonlada Choovanichchanon
Abstract:
This research paper was aimed to investigate a relationship between the customer service marketing mix and the level of customers’ satisfaction from purchasing goods and service from small business around campus, Suan Sunandha Rajabhat University, Bangkok, Thailand. Based on the survey of 200 customers who frequently purchased goods and service around campus, the level of satisfaction for each factor of marketing mix was reached. An accidental random sampling was applied by using questionnaire in collecting the data. The findings revealed that the means values can help to rank these variables from high to low mean as follows: 1) forms and system of service, 2) physical environment of service center, 3) service from staff and employee, 4) product quality and service, 5) market channel and distribution, 6) market price, and 7) market promotion and distribution.Keywords: service marketing mix, satisfaction, small business, survey
Procedia PDF Downloads 4948797 Multi-Level Clustering Based Congestion Control Protocol for Cyber Physical Systems
Authors: Manpreet Kaur, Amita Rani, Sanjay Kumar
Abstract:
The Internet of Things (IoT), a cyber-physical paradigm, allows a large number of devices to connect and send the sensory data in the network simultaneously. This tremendous amount of data generated leads to very high network load consequently resulting in network congestion. It further amounts to frequent loss of useful information and depletion of significant amount of nodes’ energy. Therefore, there is a need to control congestion in IoT so as to prolong network lifetime and improve the quality of service (QoS). Hence, we propose a two-level clustering based routing algorithm considering congestion score and packet priority metrics that focus on minimizing the network congestion. In the proposed Priority based Congestion Control (PBCC) protocol the sensor nodes in IoT network form clusters that reduces the amount of traffic and the nodes are prioritized to emphasize important data. Simultaneously, a congestion score determines the occurrence of congestion at a particular node. The proposed protocol outperforms the existing Packet Discard Network Clustering (PDNC) protocol in terms of buffer size, packet transmission range, network region and number of nodes, under various simulation scenarios.Keywords: internet of things, cyber-physical systems, congestion control, priority, transmission rate
Procedia PDF Downloads 3088796 HD-WSComp: Hypergraph Decomposition for Web Services Composition Based on QoS
Authors: Samah Benmerbi, Kamal Amroun, Abdelkamel Tari
Abstract:
The increasing number of Web service (WS)providers throughout the globe, have produced numerous Web services providing the same or similar functionality. Therefore, there is a need of tools developing the best answer of queries by selecting and composing services with total transparency. This paper reviews various QoS based Web service selection mechanisms and architectures which facilitate qualitatively optimal selection, in other fact Web service composition is required when a request cannot be fulfilled by a single web service. In such cases, it is preferable to integrate existing web services to satisfy user’s request. We introduce an automatic Web service composition method based on hypergraph decomposition using hypertree decomposition method. The problem of selection and the composition of the web services is transformed into a resolution in a hypertree by exploring the relations of dependency between web services to get composite web service via employing an execution order of WS satisfying global request.Keywords: web service, web service selection, web service composition, QoS, hypergraph decomposition, BE hypergraph decomposition, hypertree resolution
Procedia PDF Downloads 5108795 The Morphing Avatar of Startup Sales - Destination Virtual Reality
Authors: Sruthi Kannan
Abstract:
The ongoing covid pandemic has accelerated digital transformation like never before. The physical barriers brought in as a result of the pandemic are being bridged by digital alternatives. While basic collaborative activities like voice, video calling, screen sharing have been replicated in these alternatives, there are several others that require a more intimate setup. Pitching, showcasing, and providing demonstrations are an integral part of selling strategies for startups. Traditionally these have been in-person engagements, enabling a depth of understanding of the startups’ offerings. In the new normal scenario of virtual-only connects, startups are feeling the brunt of the lack of in-person connections with potential customers and investors. This poster demonstrates how a virtual reality platform has been conceptualized and custom-built for startups to engage with their stakeholders and redefine their selling strategies. This virtual reality platform is intended to provide an immersive experience for startup showcases and offers the nearest possible alternative to physical meetings for the startup ecosystem, thereby opening newer frontiers for entrepreneurial collaborations.Keywords: collaboration, sales, startups, strategy, virtual reality
Procedia PDF Downloads 3068794 Modern Pedagogy Techniques for DC Motor Speed Control
Authors: Rajesh Kumar, Roopali Dogra, Puneet Aggarwal
Abstract:
Based on a survey conducted for second and third year students of the electrical engineering department at Maharishi Markandeshwar University, India, it was found that around 92% of students felt that it would be better to introduce a virtual environment for laboratory experiments. Hence, a need was felt to perform modern pedagogy techniques for students which consist of a virtual environment using MATLAB/Simulink. In this paper, a virtual environment for the speed control of a DC motor is performed using MATLAB/Simulink. The various speed control methods for the DC motor include the field resistance control method and armature voltage control method. The performance analysis of the DC motor is hence analyzed.Keywords: DC Motor, field control, pedagogy techniques, speed control, virtual environment, voltage control
Procedia PDF Downloads 4428793 Towards a Security Model against Denial of Service Attacks for SIP Traffic
Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla
Abstract:
Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities
Procedia PDF Downloads 2048792 Students’ Opinions Related to Virtual Classrooms within the Online Distance Education Graduate Program
Authors: Secil Kaya Gulen
Abstract:
Face to face and virtual classrooms that came up with different conditions and environments, but similar purposes have different characteristics. Although virtual classrooms have some similar facilities with face-to-face classes such as program, students, and administrators, they have no walls and corridors. Therefore, students can attend the courses from a distance and can control their own learning spaces. Virtual classrooms defined as simultaneous online environments where students in different places come together at the same time with the guidance of a teacher. Distance education and virtual classes require different intellectual and managerial skills and models. Therefore, for effective use of virtual classrooms, the virtual property should be taken into consideration. One of the most important factors that affect the spread and effective use of the virtual classrooms is the perceptions and opinions of students -as one the main participants-. Student opinions and recommendations are important in terms of providing information about the fulfillment of expectation. This will help to improve the applications and contribute to the more efficient implementations. In this context, ideas and perceptions of the students related to the virtual classrooms, in general, were determined in this study. Advantages and disadvantages of virtual classrooms expected contributions to the educational system and expected characteristics of virtual classrooms have examined in this study. Students of an online distance education graduate program in which all the courses offered by virtual classrooms have asked for their opinions. Online Distance Education Graduate Program has totally 19 students. The questionnaire that consists of open-ended and multiple choice questions sent to these 19 students and finally 12 of them answered the questionnaire. Analysis of the data presented as frequencies and percentages for each item. SPSS for multiple-choice questions and Nvivo for open-ended questions were used for analyses. According to the results obtained by the analysis, participants stated that they did not get any training on virtual classes before the courses; but they emphasize that newly enrolled students should be educated about the virtual classrooms. In addition, all participants mentioned that virtual classroom contribute their personal development and they want to improve their skills by gaining more experience. The participants, who mainly emphasize the advantages of virtual classrooms, express that the dissemination of virtual classrooms will contribute to the Turkish Education System. Within the advantages of virtual classrooms, ‘recordable and repeatable lessons’ and ‘eliminating the access and transportation costs’ are most common advantages according to the participants. On the other hand, they mentioned ‘technological features and keyboard usage skills affect the attendance’ is the most common disadvantage. Participants' most obvious problem during virtual lectures is ‘lack of technical support’. Finally ‘easy to use’, ‘support possibilities’, ‘communication level’ and ‘flexibility’ come to the forefront in the scope of expected features of virtual classrooms. Last of all, students' opinions about the virtual classrooms seems to be generally positive. Designing and managing virtual classrooms according to the prioritized features will increase the students’ satisfaction and will contribute to improve applications that are more effective.Keywords: distance education, virtual classrooms, higher education, e-learning
Procedia PDF Downloads 2698791 Sensory Ethnography and Interaction Design in Immersive Higher Education
Authors: Anna-Kaisa Sjolund
Abstract:
The doctoral thesis examines interaction design and sensory ethnography as tools to create immersive education environments. In recent years, there has been increasing interest and discussions among researchers and educators on immersive education like augmented reality tools, virtual glasses and the possibilities to utilize them in education at all levels. Using virtual devices as learning environments it is possible to create multisensory learning environments. Sensory ethnography in this study refers to the way of the senses consider the impact on the information dynamics in immersive learning environments. The past decade has seen the rapid development of virtual world research and virtual ethnography. Christine Hine's Virtual Ethnography offers an anthropological explanation of net behavior and communication change. Despite her groundbreaking work, time has changed the users’ communication style and brought new solutions to do ethnographical research. The virtual reality with all its new potential has come to the fore and considering all the senses. Movie and image have played an important role in cultural research for centuries, only the focus has changed in different times and in a different field of research. According to Karin Becker, the role of image in our society is information flow and she found two meanings what the research of visual culture is. The images and pictures are the artifacts of visual culture. Images can be viewed as a symbolic language that allows digital storytelling. Combining the sense of sight, but also the other senses, such as hear, touch, taste, smell, balance, the use of a virtual learning environment offers students a way to more easily absorb large amounts of information. It offers also for teachers’ different ways to produce study material. In this article using sensory ethnography as research tool approaches the core question. Sensory ethnography is used to describe information dynamics in immersive environment through interaction design. Immersive education environment is understood as three-dimensional, interactive learning environment, where the audiovisual aspects are central, but all senses can be taken into consideration. When designing learning environments or any digital service, interaction design is always needed. The question what is interaction design is justified, because there is no simple or consistent idea of what is the interaction design or how it can be used as a research method or whether it is only a description of practical actions. When discussing immersive learning environments or their construction, consideration should be given to interaction design and sensory ethnography.Keywords: immersive education, sensory ethnography, interaction design, information dynamics
Procedia PDF Downloads 1388790 Virtual Science Laboratory (ViSLab): The Effects of Visual Signalling Principles towards Students with Different Spatial Ability
Authors: Ai Chin Wong, Wan Ahmad Jaafar Wan Yahaya, Balakrishnan Muniandy
Abstract:
This study aims to explore the impact of Virtual Reality (VR) using visual signaling principles in learning about the science laboratory safety guide; this study involves students with different spatial ability. There are two types of science laboratory safety lessons, which are Virtual Reality with Signaling (VRS) and Virtual Reality Non Signaling (VRNS). This research has adopted a 2 x 2 quasi-experimental factorial design. There are two types of variables involved in this research. The two modes of courseware form the independent variables with the spatial ability as the moderator variable. The dependent variable is the students’ performance. This study sample consisted of 141 students. Descriptive and inferential statistics were conducted to analyze the collected data. The major effects and the interaction effects of the independent variables on the independent variable were explored using the Analyses of Covariance (ANCOVA). Based on the findings of this research, the results exhibited low spatial ability students in VRS outperformed their counterparts in VRNS. However, there was no significant difference in students with high spatial ability using VRS and VRNS. Effective learning in students with different spatial ability can be boosted by implementing the Virtual Reality with Signaling (VRS) in the design as well as the development of Virtual Science Laboratory (ViSLab).Keywords: spatial ability, science laboratory safety, visual signaling principles, virtual reality
Procedia PDF Downloads 2598789 Hacking the Spatial Limitations in Bridging Virtual and Traditional Teaching Methodologies in Sri Lanka
Authors: Manuela Nayantara Jeyaraj
Abstract:
Having moved into the 21st century, it is way past being arguable that innovative technology needs to be incorporated into conventional classroom teaching. Though the Western world has found presumable success in achieving this, it is still a concept under battle in developing countries such as Sri Lanka. Reaching the acme of implementing interactive virtual learning within classrooms is a struggling idealistic fascination within the island. In order to overcome this problem, this study is set to reveal facts that limit the implementation of virtual, interactive learning within the school classrooms and provide hacks that could prove the augmented use of the Virtual World to enhance teaching and learning experiences. As each classroom moves along with the usage of technology to fulfill its functionalities, a few intense hacks provided will build the administrative onuses on a virtual system. These hacks may divulge barriers based on social conventions, financial boundaries, digital literacy, intellectual capacity of the staff, and highlight the impediments in introducing students to an interactive virtual learning environment and thereby provide the necessary actions or changes to be made to succeed and march along in creating an intellectual society built on virtual learning and lifestyle. This digital learning environment will be composed of multimedia presentations, trivia and pop quizzes conducted on a GUI, assessments conducted via a virtual system, records maintained on a database, etc. The ultimate objective of this study could enhance every child's basic learning environment; hence, diminishing the digital divide that exists in certain communities.Keywords: digital divide, digital learning, digitization, Sri Lanka, teaching methodologies
Procedia PDF Downloads 3568788 Empirical Investigation of Antecedents of Perceived Recovery Service Quality: Evidence from Retail Banking in United Arab Emirates
Authors: Vimi Jham
Abstract:
The banking sector has undergone tremendous change in all forms of service it provides to its customers. The efforts of the banks is to avoid customer defection and lead to customer satisfaction. The purpose of the study was to examine the linkages among the constructs such as customer perceived service quality, perceived service recovery quality and customer satisfaction in the banking industry. The moderating effect of negative brand perception due to service failure on recovery satisfaction were investigated. Random sampling methods are used to draw the sample from the population. Data was collected from 262 banking customers and were analyzed with the help of structural equation modelling approach using Smart PLS to understand the relationship among variables being studied. The results of the study contribute to the research by proving that customer service recovery satisfaction is dependent on customer perceived service quality and the moderating effect of negative brand perception due to service failure was insignificant.Keywords: service recovery satisfaction, perceived service recovery quality, perceived service quality, structural equation modelling
Procedia PDF Downloads 2858787 Artificial Neural Network Approach for GIS-Based Soil Macro-Nutrients Mapping
Authors: Shahrzad Zolfagharnassab, Abdul Rashid Mohamed Shariff, Siti Khairunniza Bejo
Abstract:
Conventional methods for nutrient soil mapping are based on laboratory tests of samples that are obtained from surveys. The time and cost involved in gathering and analyzing soil samples are the reasons that researchers use Predictive Soil Mapping (PSM). PSM can be defined as the development of a numerical or statistical model of the relationship among environmental variables and soil properties, which is then applied to a geographic database to create a predictive map. Kriging is a group of geostatistical techniques to spatially interpolate point values at an unobserved location from observations of values at nearby locations. The main problem with using kriging as an interpolator is that it is excessively data-dependent and requires a large number of closely spaced data points. Hence, there is a need to minimize the number of data points without sacrificing the accuracy of the results. In this paper, an Artificial Neural Networks (ANN) scheme was used to predict macronutrient values at un-sampled points. ANN has become a popular tool for prediction as it eliminates certain difficulties in soil property prediction, such as non-linear relationships and non-normality. Back-propagation multilayer feed-forward network structures were used to predict nitrogen, phosphorous and potassium values in the soil of the study area. A limited number of samples were used in the training, validation and testing phases of ANN (pattern reconstruction structures) to classify soil properties and the trained network was used for prediction. The soil analysis results of samples collected from the soil survey of block C of Sawah Sempadan, Tanjung Karang rice irrigation project at Selangor of Malaysia were used. Soil maps were produced by the Kriging method using 236 samples (or values) that were a combination of actual values (obtained from real samples) and virtual values (neural network predicted values). For each macronutrient element, three types of maps were generated with 118 actual and 118 virtual values, 59 actual and 177 virtual values, and 30 actual and 206 virtual values, respectively. To evaluate the performance of the proposed method, for each macronutrient element, a base map using 236 actual samples and test maps using 118, 59 and 30 actual samples respectively produced by the Kriging method. A set of parameters was defined to measure the similarity of the maps that were generated with the proposed method, termed the sample reduction method. The results show that the maps that were generated through the sample reduction method were more accurate than the corresponding base maps produced through a smaller number of real samples. For example, nitrogen maps that were produced from 118, 59 and 30 real samples have 78%, 62%, 41% similarity, respectively with the base map (236 samples) and the sample reduction method increased similarity to 87%, 77%, 71%, respectively. Hence, this method can reduce the number of real samples and substitute ANN predictive samples to achieve the specified level of accuracy.Keywords: artificial neural network, kriging, macro nutrient, pattern recognition, precision farming, soil mapping
Procedia PDF Downloads 71