Search results for: internet of things (IOT)
1897 A Cognitive Behavioural Therapy (CBT) Intervention Programme for Excessive Internet Use among Young Adults
Authors: Ke Guek Nee, Wong Siew Fan, Nigel V. Marsh
Abstract:
Excessive use of the Internet has become a cause for concern in many countries, including Malaysia. Such behaviour is reported to be more prevalent amongst young adults who are reported to be spending large amount of time on the Internet. The present study has three objectives. First one is designing a manual-based Cognitive Behavioural Therapy (CBT) programme to reduce problematic Internet use among young adults in Malaysia. Second one is examining the effectiveness of a manual-based CBT programme at the pilot study stage. Thirdly, the programme focuses on reducing the level of stress and anxiety in problematic Internet users. We adopted CBT with single subject experimental design method. A total of six participants completed the entire program. They were asked to report their daily Internet use and software was installed on their devices to record actual use. The data collection involved three time frame measurements: T1 (baseline), T2 (immediately during the last session of the intervention sessions), and T3 (follow-up). Three scales were used to measure the effectiveness of the program: Depression, Anxiety, Stress Scales (DASS), Social Interaction Anxiety Scale (SIAS), and Problematic Internet Use Questionnaire (PIUQ). The results revealed that the intervention programme has significantly improved two dimensions of problematic Internet use which were obsession and control disorder. The participants’ mental health also showed a deduction in means scores for depression, anxiety and stress with depression showing the greatest improvement after the intervention programme. The participants’ social anxiety showed a slight deduction in means scores. We concluded that the intervention programme designed was effective. However, its limitations need to be addressed in future research.Keywords: excessive internet use, cognitive behavioral thearapy (CBT), psychological well-being, young adults
Procedia PDF Downloads 4541896 Regulation and Transparency: The Case of Corporate Governance Disclosure on the Internet in the United Arab Emirates
Authors: Peter Oyelere, Fernando Zanella
Abstract:
Corporate governance is one of the most discussed and researched issues in recent times in countries around the world, with different countries developing and adopting different governance structures, models and mechanisms. While the Codes of corporate governance have been weaved into the regulatory fabrics of most countries, it is equally critically important that their mechanisms, procedures and practices be transparent, and be transparently communicated to all stakeholders. The Internet can be a very useful and cost-effective tool for the timely and voluntary communication of corporate governance matters to stakeholders. The current paper details the results of an investigation on the extent of which companies listed in the UAE are using the Internet for communicating corporate governance issues, matters and procedures. We surveyed the websites of companies listed on the two UAE Stock Exchanges – the Abu Dhabi Stock Exchange (ADX) and the Dubai Financial Market (DFM) – to find out their level and nature of usage of the Internet for corporate governance disclosures. Regulatory and policy implications of the results of our investigation, as well as other areas for further studies, are also presented in the paper.Keywords: corporate governance, internet financial reporting, regulation, transparency, United Arab Emirates
Procedia PDF Downloads 3651895 Relationships between Screen Time, Internet Addiction and Other Lifestyle Behaviors with Obesity among Secondary School Students in the Turkish Republic of Northern Cyprus
Authors: Ozen Asut, Gulifeiya Abuduxike, Imge Begendi, Mustafa O. Canatan, Merve Colak, Gizem Ozturk, Lara Tasan, Ahmed Waraiet, Songul A. Vaizoglu, Sanda Cali
Abstract:
Obesity among children and adolescents is one of the critical public health problems worldwide. Internet addiction is one of the sedentary behaviors that cause obesity due to the excessive screen time and reduced physical activities. We aimed to examine the relationships between the screen time, internet addiction and other lifestyle behaviors with obesity among high school students in the Near East College in Nicosia, Northern Cyprus. A cross-sectional study conducted among 469 secondary school students, mean age 11.95 (SD, 0.81) years. A self-administrated questionnaire was applied to assess the screen time and lifestyle behaviors. The Turkish adopted version of short-form of internet addiction test was used to assess internet addiction problems. Height and weight were measured to calculate BMI and classified based on the BMI percentiles for sex and age. Descriptive analysis, Chi-Square test, and multivariate regression analysis were done. Of all, 17.2% of the participants were overweight and obese, and 18.1% had internet addictions, while 40.7% of them reported having screen time more than two hours. After adjusting the analysis for age and sex, eating snacks while watching television (OR, 3.04; 95% CI, 1.28-7.21), self- perceived body weight (OR, 24.9; 95% CI, 9.64-64.25) and having a play station in the room (OR, 4.6; 95% CI, 1.85 - 11.42) were significantly associated with obesity. Screen time (OR, 4.68; 95% CI, 2.61-8.38; p=0.000) and having a computer in bedroom (OR, 1.7; 95% CI, 1.01- 2.87; p=0.046) were significantly associated with internet addiction, whereas parent’s compliant regarding the lengthy technology use (OR, 0.23; 95% CI, 0.11-0.46; p=0.000) was found to be a protective factor against internet addiction. Prolonged screen time, internet addiction, sedentary lifestyles, and reduced physical and social activities are interrelated, multi-dimensional factors that lead to obesity among children and adolescents. A family - school-based integrated approach should be implemented to tackle obesity problems.Keywords: adolescents, internet addiction, lifestyle, Northern Cyprus, obesity, screen time
Procedia PDF Downloads 1421894 Top Management Characteristics and Adoption of Internet Banking: Case Study of the Tunisian Banking Sector
Authors: Dorra Gherib
Abstract:
This article explores in depth the technological innovations by the Top Managements of banks in the Tunisian banking sector. The framework of this research is based on an amalgamation of four theories related to the decision of adopting technological innovations: The Theory of Reasoned Action (TRA), the Theory of Planned Behaviour (TPB), Technology Acceptance Model (TAM), and Diffusion of Innovation (DI). The result of our qualitative study highlights four variables which influence the attitude of the Top Managements towards the adoption of internet banking: Relative advantage, Perceived Ease of Use, compatibility and Perceived risk.Keywords: top management, attitude, internet banking, TRA, TAM, TPB, DI
Procedia PDF Downloads 4711893 Internet of Things-Based Electric Vehicle Charging Notification
Authors: Nagarjuna Pitty
Abstract:
It is believed invention “Advanced Method and Process Quick Electric Vehicle Charging” is an Electric Vehicles (EVs) are quickly turning into the heralds of vehicle innovation. This study endeavors to address the inquiries of how module charging process correspondence has been performed between the EV and Electric Vehicle Supply Equipment (EVSE). The energy utilization of gas-powered motors is higher than that of electric engines. An invention is related to an Advanced Method and Process Quick Electric Vehicle Charging. In this research paper, readings on the electric vehicle charging approaches will be checked, and the module charging phases will be described comprehensively.Keywords: electric, vehicle, charging, notification, IoT, supply, equipment
Procedia PDF Downloads 711892 Intelligent Cooperative Integrated System for Road Safety and Road Infrastructure Maintenance
Authors: Panagiotis Gkekas, Christos Sougles, Dionysios Kehagias, Dimitrios Tzovaras
Abstract:
This paper presents the architecture of the “Intelligent cooperative integrated system for road safety and road infrastructure maintenance towards 2020” (ODOS2020) advanced infrastructure, which implements a number of cooperative ITS applications based on Internet of Things and Infrastructure-to-Vehicle (V2I) technologies with the purpose to enhance the active road safety level of vehicles through the provision of a fully automated V2I environment. The primary objective of the ODOS2020 project is to contribute to increased road safety but also to the optimization of time for maintenance of road infrastructure. The integrated technological solution presented in this paper addresses all types of vehicles and requires minimum vehicle equipment. Thus, the ODOS2020 comprises a low-cost solution, which is one of its main benefits. The system architecture includes an integrated notification system to transmit personalized information on road, traffic, and environmental conditions, in order for the drivers to receive real-time and reliable alerts concerning upcoming critical situations. The latter include potential dangers on the road, such as obstacles or road works ahead, extreme environmental conditions, etc., but also informative messages, such as information on upcoming tolls and their charging policies. At the core of the system architecture lies an integrated sensorial network embedded in special road infrastructures (strips) that constantly collect and transmit wirelessly information about passing vehicles’ identification, type, speed, moving direction and other traffic information in combination with environmental conditions and road wear monitoring and predictive maintenance data. Data collected from sensors is transmitted by roadside infrastructure, which supports a variety of communication technologies such as ITS-G5 (IEEE-802.11p) wireless network and Internet connectivity through cellular networks (3G, LTE). All information could be forwarded to both vehicles and Traffic Management Centers (TMC) operators, either directly through the ITS-G5 network, or to smart devices with Internet connectivity, through cloud-based services. Therefore, through its functionality, the system could send personalized notifications/information/warnings and recommendations for upcoming events to both road users and TMC operators. In the course of the ODOS2020 project pilot operation has been conducted to allow drivers of both C-ITS equipped and non-equipped vehicles to experience the provided added value services. For non-equipped vehicles, the provided information is transmitted to a smartphone application. Finally, the ODOS2020 system and infrastructure is appropriate for installation on both urban, rural, and highway environments. The paper presents the various parts of the system architecture and concludes by outlining the various challenges that had to be overcome during its design, development, and deployment in a real operational environment. Acknowledgments: Work presented in this paper was co-financed by the European Regional Development Fund of the European Union and Greek national funds through the Operational Program Competitiveness, Entrepreneurship and Innovation (call RESEARCH–CREATE–INNOVATE) under contract no. Τ1EDK-03081 (project ODOS2020).Keywords: infrastructure to vehicle, intelligent transportation systems, internet of things, road safety
Procedia PDF Downloads 1241891 Design of a Rectifier with Enhanced Efficiency and a High-gain Antenna for Integrated and Compact-size Rectenna Circuit
Authors: Rawaa Maher, Ahmed Allam, Haruichi Kanaya, Adel B. Abdelrahman
Abstract:
In this paper, a compact, high-efficiency integrated rectenna is presented to operate in the 2.45 GHz band. A comparison between two rectifier topologies is performed to verify the benefits of removing the matching network from the rectifier. A rectifier high conversion efficiency of 74.1% is achieved. To complete the rectenna system, a novel omnidirectional antenna with high gain (3.72 dB) and compact size (25 mm * 29 mm) is designed and fabricated. The same antenna is used with a reflector for raising the gain to nearly 8.3 dB. The simulation and measurement results of the antenna are in good agreement.Keywords: internet of things, integrated rectenna, rectenna, RF energy harvesting, wireless sensor networks(WSN)
Procedia PDF Downloads 1821890 Anti-Fables and Their Linguo Cultural Characteristics
Authors: Tamila Dilaverova
Abstract:
In our era of globalization, the unhindered intercultural communication represents an essential element of development. To be proficient in a language one needs to get acquainted with cultural and national peculiarities of the language of native speakers. Cultural peculiarities are explicitly reflected in the nation’s cultural heritage, monuments, literary works, tales, even in clothes. A specific role in the evaluation of cultural performances, establishment, broadcasting, and preservation of behavior norms belongs to the folk texts, among which the fables occupy one of the most important places. A fable, as a genre has existed since ancient times. Fables are universal because they are absolutely appropriate for any century and for any society. Even in the era of the internet, fables turned out to be actual. Internet offers a wide range of re-made fables. Generally, they are new interpretations of Aesop’s fables, but in some cases they are original. These fables became the subject of our research because they contain some modern slangs and jargons and their language is not that much literary. But, besides the changes in the language, there are some changes in the fields of their occupation, everyday activities and the ways of moneymaking. Because of the numerous changes, these new fables can be called 'anti-fables.' Anti-fables are the very new kinds of fables, that can be absolutely suitable for internet generation and perfectly reflects modern reality. All these changes are the reflections of thoughts and actions of new generation and these anti-fables can become a new internet literary genre.Keywords: intercultural, fable, language, internet
Procedia PDF Downloads 2221889 Product Placement and Advertising in Chinese Internet Dramas
Authors: Patricia Portugal Marques de Carvalho Lourenco
Abstract:
This paper presents the richness of product placement usage in Chinese IP dramas. It shows the artistry of storytellers in craftily intertwining the drama’s storyline with the items promoted, resulting in a flawless Chinese tapestry that perfectly blends internet visual entertainment with advertising, significantly enhancing the production’s worth. Successful IQIYI drama We are all alone, is a flawless example of that, attracting collaborative interest from products and brands across a spectrum of market segments, motivated to showcase their utility, value, benefits, and appeal to viewers.Keywords: product placement, band-aid ads, post ads, barrage advertising, China, internet drama series, Latin Europe
Procedia PDF Downloads 821888 Development and Range Testing of a LoRaWAN System in an Urban Environment
Authors: N. R. Harris, J. Curry
Abstract:
This paper describes the construction and operation of an experimental LoRaWAN network surrounding the University of Southampton in the United Kingdom. Following successful installation, an experimental node design is built and characterised, with particular emphasis on radio range. Several configurations are investigated, including different data rates, and varying heights of node. It is concluded that although range can be great (over 8 km in this case), environmental topology is critical. However, shorter range implementations, up to about 2 km in an urban environment, are relatively insensitive although care is still needed. The example node and the relatively simple base station reported demonstrate that LoraWan can be a very low cost and practical solution to Internet of Things type applications for distributed monitoring systems with sensors spread over distances of several km.Keywords: long-range, wireless, sensor, network
Procedia PDF Downloads 1371887 Kuehne + Nagel's PharmaChain: IoT-Enabled Product Monitoring Using Radio Frequency Identification
Authors: Rebecca Angeles
Abstract:
This case study features the Kuehne + Nagel PharmaChain solution for ‘cold chain’ pharmaceutical and biologic product shipments with IOT-enabled features for shipment temperature and location tracking. Using the case study method and content analysis, this research project investigates the application of the structurational model of technology theory introduced by Orlikowski in order to interpret the firm’s entry and participation in the IOT-impelled marketplace.Keywords: Internet of Things (IOT), radio frequency identification (RFID), structurational model of technology (Orlikowski), supply chain management
Procedia PDF Downloads 2321886 Development and Evaluation of an Internet-Based Transdiagnostic Therapy Intervention in the Arab World
Authors: Mariam Fishere
Abstract:
The proposed research study aims at developing an Internet-based transdiagnostic treatment and evaluating its efficacy. Based on the Common Elements Treatment Approach (CETA), a combined low-intensity and technology supported transdiagnostic treatment protocol will be culturally adapted for usage by nonprofessional therapists in Arabic-speaking countries. This Internet-based CETA intervention will target individuals suffering from one or more of the following disorders: depression, anxiety and posttraumatic stress disorder (PTSD), which are all major contributors to the global burden of mental illness. The growing body of research in the area of transdiagnostic treatment has proven to be effective in high-income countries (HICs), but there remain questions about its efficacy, cultural appropriateness, and validity for low- to middle-income countries (LMICs). The aim of this dissertation project is to investigate the efficacy of a newly developed Internet-delivery of an evidence-based transdiagnostic treatment – CETA – for a sample of Arabic-speaking individuals suffering from at least one of the following disorders; depression, anxiety, and PTSD.Keywords: transdiagnostic, internet-based interventions, mental health, Arab world
Procedia PDF Downloads 2281885 Internet Media and Public: A Report of a Mutual Deception
Authors: Safet Zejnullahu
Abstract:
The relationship between the public and media is more than meaningful. It has been a topic of discussion as early as the birth of the media. The 'magic box' called radio adapted and transformed by following the tastes and interests of the public. Television went a step further by complementing the magic sound of the magic box with photos/images. Newspapers informed the reader, but from time to time, they also provided them the room to express their opinions. The media-public report in the traditional media is a report of a mutual respect. Today, the report between media and public should be well defined. The goal of this paper is to analyze the history of the media-public relationship, with a special emphasis on the analysis of this relationship in media of the internet time. This paper seeks to prove that the internet media has created a completely new and thus far unknown relationship between the media and public. Through research, which includes an analysis of the media in Kosovo and Albania, it will be proven that the media of the internet time has elevated this relationship to a new level, with many unknowns in terms of the functioning and role of the media. The results and findings of the paper are related to the conclusion that from the relationship in which the roles of the media and the public are known, nowadays, this relationship goes beyond the known principle and rules and is more defined as a relationship of mutual deception. The media goes beyond the line of the humility of the public, and the public seeks to direct the content of the media. The media-public report in the internet-media is a report based on mutual attempt for fraud.Keywords: media, public, report, humility, direction
Procedia PDF Downloads 1751884 Quantum Dots with Microwave Propagation in Future Quantum Internet Protocol for Mobile Telephony
Authors: A. B. R. Hazarika
Abstract:
In the present paper, Quantum dots of ZnS are used to study the faster microwave propagation in space and on earth which will be difficult to bypass as quantum key encryption-decryption is difficult to decode. The present study deals with Quantum internet protocol which is much faster, safer and secure in microwave propagation than the present Internet Protocol v6, which forms the aspect of our study. Assimilation of hardware, Quantum dots with Quantum protocol theory beautifies the aspect of the study. So far to author’s best knowledge, the study on mobile telephony with Quantum dots long-term evolution (QDLTE) has not been studied earlier, which forms the aspect of the study found that the Bitrate comes out to be 102.4 Gbps.Keywords: encryption, decryption, internet protocol, microwave, mobile telephony, quantum key encryption, quantum dots
Procedia PDF Downloads 1731883 Influence of Computer and Internet on Student’s Attitude and Academic Achievements in Chemistry at Undergraduate Level in Federal College of Education (FCE) Kano, Nigeria
Authors: Abubakar Yusha’U Zubairu
Abstract:
The study aimed to investigate the influence of computers and the internet on attitudes and academic achievements among undergraduate chemistry students. It also focused on examining gender differences. 120 students were selected, comprising 80 males and 40 females, and divided into three groups, experimental groups E1 and E2 and a control C group comprising 40 students each. The Chemistry Attitude Scale (CAS) and the Chemistry Achievement Test (CAT) were used to collect data. Two different CAT methods – ChemDraw and ChemSketch learning software were used and applied to E1 and E2, respectively, whereas C was taught by the traditional method. For the gender difference, two groups were formed: group 1 (G1) and Group 2 (G2), comprising 40 males and 40 females. Significant differences between C and both E1 and E2 were found. Furthermore, CAT in E1&E2 was significantly higher than C. The findings showed that Undergraduate chemistry students in FCE have a positive attitude toward the use of computers and the internet, and gender varies in opposite directions. It is recommended that schools should provide computers and internet facilities with a regular supply of electricity. This will enhance attitudes towards the use of computer and internet resources and improve academic achievement.Keywords: chemdraw, chemsketch, attitude, academic achievement.
Procedia PDF Downloads 421882 Neo-Filipino: A Study on the Impact of Internet and Mobile Technology on the Identity Formation of Selected Filipino Third Culture Kids (TCKs)
Authors: Erika Mae L. Valencia
Abstract:
Third Culture Kids (TCKs) are children who experienced a cross-cultural upbringing – being raised and lived outside their parents’ culture. As a result, TCKs experience the difficulty of building and attaining a concrete cultural identity. However, in the context of globalization and the emergence of ICTs, the internet, and mobile technology creates better ways of constructing cultural identities. This study investigates the social and cultural impacts of the internet and mobile technology on the multi-cultural identity development among selected Filipino TCKs. Moreover, this research seeks to understand how the Filipino TCKs form their identity and address their complex issue of belonging with the use of different internet platforms and mobile technology. To explore the lived experiences of Filipino TCKs, this research employs a transcendental phenomenological design. Also, this study uses purposive and snowball sampling and conduct in-depth interviews through Skype, phone call, or face-to-face. This study utilizes Pierre Bourdieu’s social capital as a theoretical lens to gain understanding of the TCKs’ identity formation process in relation to the said ICTs. This research argues that the internet and mobile technology play a significant role in facilitating multi-cultural identity formation of Filipino TCKs, as well as potentially broadening their social network through its various technological platforms.Keywords: identity, internet, third culture kids, mobile technology
Procedia PDF Downloads 2951881 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection
Authors: Muhammad Ali
Abstract:
Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection
Procedia PDF Downloads 1251880 Effects of Health Information Websites on Health Care Facility Visits
Authors: M. Aljumaan, F. Alkhadra, A. Aldajani, M. Alarfaj, A. Alawami, Y. Aljamaan
Abstract:
Introduction: The internet has been widely available with 18 million users in Saudi Arabia alone. It was shown that 58% of Saudis are using the internet as a source of health-related information which may contribute to overcrowding of the Emergency Room (ER). Not many studies have been conducted to show the effect of online searching for health related information (HRI) and its role in influencing internet users to visit various health care facilities. So the main objective is to determine a correlation between HRI website use and health care facility visits in Saudi Arabia. Methodology: By conducting a cross sectional study and distributing a questionnaire, a total number of 1095 people were included in the study. Demographic data was collected as well as questions including the use of HRI websites, type of websites used, the reason behind the internet search, which health care facility it lead them to visit and whether seeking health information on the internet influenced their attitude towards visiting health care facilities. The survey was distributed using an internet survey applications. The data was then put on an excel sheet and analyzed with the help of a biostatician for making a correlation. Results: We found 91.4% of our population have used the internet for medical information using mainly General medical websites (77.8%), Forums (34.2%), Social Media (21.6%), and government websites (21.6%). We also found that 66.9% have used the internet for medical information to diagnose and treat their medical conditions on their own while 34.7% did so due to the inability to have a close referral and 29.5% due to their lack of time. Searching for health related information online caused 62.5% of people to visit health care facilities. Outpatient clinics were most visited at 77.9% followed by the ER (27.9%). The remaining 37.5% do not visit because using HRI websites reassure them of their condition. Conclusion: In conclusion, there may be a correlation between health information website use and health care facility visits. However, to avoid potentially inaccurate medical information, we believe doctors have an important role in educating their patients and the public on where to obtain the correct information & advertise the sites that are regulated by health care officials.Keywords: ER visits, health related information, internet, medical websites
Procedia PDF Downloads 1911879 Revolutionizing Healthcare Facility Maintenance: A Groundbreaking AI, BIM, and IoT Integration Framework
Authors: Mina Sadat Orooje, Mohammad Mehdi Latifi, Behnam Fereydooni Eftekhari
Abstract:
The integration of cutting-edge Internet of Things (IoT) technologies with advanced Artificial Intelligence (AI) systems is revolutionizing healthcare facility management. However, the current landscape of hospital building maintenance suffers from slow, repetitive, and disjointed processes, leading to significant financial, resource, and time losses. Additionally, the potential of Building Information Modeling (BIM) in facility maintenance is hindered by a lack of data within digital models of built environments, necessitating a more streamlined data collection process. This paper presents a robust framework that harmonizes AI with BIM-IoT technology to elevate healthcare Facility Maintenance Management (FMM) and address these pressing challenges. The methodology begins with a thorough literature review and requirements analysis, providing insights into existing technological landscapes and associated obstacles. Extensive data collection and analysis efforts follow to deepen understanding of hospital infrastructure and maintenance records. Critical AI algorithms are identified to address predictive maintenance, anomaly detection, and optimization needs alongside integration strategies for BIM and IoT technologies, enabling real-time data collection and analysis. The framework outlines protocols for data processing, analysis, and decision-making. A prototype implementation is executed to showcase the framework's functionality, followed by a rigorous validation process to evaluate its efficacy and gather user feedback. Refinement and optimization steps are then undertaken based on evaluation outcomes. Emphasis is placed on the scalability of the framework in real-world scenarios and its potential applications across diverse healthcare facility contexts. Finally, the findings are meticulously documented and shared within the healthcare and facility management communities. This framework aims to significantly boost maintenance efficiency, cut costs, provide decision support, enable real-time monitoring, offer data-driven insights, and ultimately enhance patient safety and satisfaction. By tackling current challenges in healthcare facility maintenance management it paves the way for the adoption of smarter and more efficient maintenance practices in healthcare facilities.Keywords: artificial intelligence, building information modeling, healthcare facility maintenance, internet of things integration, maintenance efficiency
Procedia PDF Downloads 591878 The Development of Communication and Mobile Phones in Iran: The Role of Internet in Smart Mobile Phones in Social and Human Development and Social Mobility of Different Classes of Iranian Women
Authors: Zahra Tork
Abstract:
Before the spread of the Internet and the use of mobile phones, women were generally far from society and many restrictions were applied to them, but after the spread of the Internet and the cultural and social changes brought about by it, women in society got a new one and many restrictions regarding them disappeared; As we can see today, many women, like men, have a high social base, they earn for themselves, they can travel alone, stay out late at night, take personal and family photos or videos on virtual pages. Publish themselves (while before this, showing or publishing photos of women was considered dishonorable or indecent). In this article, an attempt is made to examine the effect of the internet on mobile phones and virtual social networks in changing beliefs, norms and social values and their relationship with the social mobility of women and the effect of these factors on social and human development be paid. For this reason, social and human development is discussed first, and then the role of the media in development is explained, and finally, the social mobility of women is discussed. Since the purpose of this study is to better understand the social mobility of Iranian women through the development of the Internet in mobile phones, a qualitative study using focus groups has been adopted. The results of this research indicated that the Internet has caused changes in the value and cultural system of the Iranian people, and women have also redefined their roles and identity. In this new definition, many of the past restrictions have disappeared and women have gained the same freedoms as men. Finally, these factors (change in values and norms and redefinition of the role of women) joined hands and caused the social mobility of women in Iran.Keywords: development of communication in Iran, development of mobile phones, development of the Internet, women's social group, social mobility
Procedia PDF Downloads 731877 Impact of Web 2.0 on Digital Divide in Azad Jammu and Kashmir
Authors: Sana Shokat, Rabia Riaz, Raja Shoaib Hussain, Saba Shabir
Abstract:
Digital divide is usually measured in terms of gap between those who can efficiently use new technological tools, such as Internet, and those who cannot. It is also hypothesized that web 2.0 tools motivate people to use technology i.e. Social networking sites can play an important role in bridging digital gap. This study was to determine the presence of digital divide in urban and rural areas of district Muzaffrabad, Azad Jammu & Kashmir taking internet usage as the key element. A cross-sectional community based survey was conducted involving 384 respondents from city Muzaffrabad and village Garhi Doppta. The existence of digital divide was accessed on the basis of the questionnaires given. Chi- square test was used to find the association of different demographic and ICT related factors with internet usage. Age based and area based divide still exist among the targeted population but gender based digital divide is vanishing from the intended area of study. Outcomes of the survey also revealed that web 2.0-based web sites are also becoming popular and attracting people to use internet. Trend of using internet and communication technologies can be increased by solving the highlighted problems.Keywords: Azad Jammu and Kashmir, digital divide, ICT, information and communication technology, Web2.0
Procedia PDF Downloads 3671876 On Multiobjective Optimization to Improve the Scalability of Fog Application Deployments Using Fogtorch
Authors: Suleiman Aliyu
Abstract:
Integrating IoT applications with Fog systems presents challenges in optimization due to diverse environments and conflicting objectives. This study explores achieving Pareto optimal deployments for Fog-based IoT systems to address growing QoS demands. We introduce Pareto optimality to balance competing performance metrics. Using the FogTorch optimization framework, we propose a hybrid approach (Backtracking search with branch and bound) for scalable IoT deployments. Our research highlights the advantages of Pareto optimality over single-objective methods and emphasizes the role of FogTorch in this context. Initial results show improvements in IoT deployment cost in Fog systems, promoting resource-efficient strategies.Keywords: pareto optimality, fog application deployment, resource allocation, internet of things
Procedia PDF Downloads 881875 IEEE802.15.4e Based Scheduling Mechanisms and Systems for Industrial Internet of Things
Authors: Ho-Ting Wu, Kai-Wei Ke, Bo-Yu Huang, Liang-Lin Yan, Chun-Ting Lin
Abstract:
With the advances in advanced technology, wireless sensor network (WSN) has become one of the most promising candidates to implement the wireless industrial internet of things (IIOT) architecture. However, the legacy IEEE 802.15.4 based WSN technology such as Zigbee system cannot meet the stringent QoS requirement of low powered, real-time, and highly reliable transmission imposed by the IIOT environment. Recently, the IEEE society developed IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) access mode to serve this purpose. Furthermore, the IETF 6TiSCH working group has proposed standards to integrate IEEE 802.15.4e with IPv6 protocol smoothly to form a complete protocol stack for IIOT. In this work, we develop key network technologies for IEEE 802.15.4e based wireless IIoT architecture, focusing on practical design and system implementation. We realize the OpenWSN-based wireless IIOT system. The system architecture is divided into three main parts: web server, network manager, and sensor nodes. The web server provides user interface, allowing the user to view the status of sensor nodes and instruct sensor nodes to follow commands via user-friendly browser. The network manager is responsible for the establishment, maintenance, and management of scheduling and topology information. It executes centralized scheduling algorithm, sends the scheduling table to each node, as well as manages the sensing tasks of each device. Sensor nodes complete the assigned tasks and sends the sensed data. Furthermore, to prevent scheduling error due to packet loss, a schedule inspection mechanism is implemented to verify the correctness of the schedule table. In addition, when network topology changes, the system will act to generate a new schedule table based on the changed topology for ensuring the proper operation of the system. To enhance the system performance of such system, we further propose dynamic bandwidth allocation and distributed scheduling mechanisms. The developed distributed scheduling mechanism enables each individual sensor node to build, maintain and manage the dedicated link bandwidth with its parent and children nodes based on locally observed information by exchanging the Add/Delete commands via two processes. The first process, termed as the schedule initialization process, allows each sensor node pair to identify the available idle slots to allocate the basic dedicated transmission bandwidth. The second process, termed as the schedule adjustment process, enables each sensor node pair to adjust their allocated bandwidth dynamically according to the measured traffic loading. Such technology can sufficiently satisfy the dynamic bandwidth requirement in the frequently changing environments. Last but not least, we propose a packet retransmission scheme to enhance the system performance of the centralized scheduling algorithm when the packet delivery rate (PDR) is low. We propose a multi-frame retransmission mechanism to allow every single network node to resend each packet for at least the predefined number of times. The multi frame architecture is built according to the number of layers of the network topology. Performance results via simulation reveal that such retransmission scheme is able to provide sufficient high transmission reliability while maintaining low packet transmission latency. Therefore, the QoS requirement of IIoT can be achieved.Keywords: IEEE 802.15.4e, industrial internet of things (IIOT), scheduling mechanisms, wireless sensor networks (WSN)
Procedia PDF Downloads 1601874 Analysing Competitive Advantage of IoT and Data Analytics in Smart City Context
Authors: Petra Hofmann, Dana Koniel, Jussi Luukkanen, Walter Nieminen, Lea Hannola, Ilkka Donoghue
Abstract:
The Covid-19 pandemic forced people to isolate and become physically less connected. The pandemic has not only reshaped people’s behaviours and needs but also accelerated digital transformation (DT). DT of cities has become an imperative with the outlook of converting them into smart cities in the future. Embedding digital infrastructure and smart city initiatives as part of normal design, construction, and operation of cities provides a unique opportunity to improve the connection between people. The Internet of Things (IoT) is an emerging technology and one of the drivers in DT. It has disrupted many industries by introducing different services and business models, and IoT solutions are being applied in multiple fields, including smart cities. As IoT and data are fundamentally linked together, IoT solutions can only create value if the data generated by the IoT devices is analysed properly. Extracting relevant conclusions and actionable insights by using established techniques, data analytics contributes significantly to the growth and success of IoT applications and investments. Companies must grasp DT and be prepared to redesign their offerings and business models to remain competitive in today’s marketplace. As there are many IoT solutions available today, the amount of data is tremendous. The challenge for companies is to understand what solutions to focus on and how to prioritise and which data to differentiate from the competition. This paper explains how IoT and data analytics can impact competitive advantage and how companies should approach IoT and data analytics to translate them into concrete offerings and solutions in the smart city context. The study was carried out as a qualitative, literature-based research. A case study is provided to validate the preservation of company’s competitive advantage through smart city solutions. The results of the research contribution provide insights into the different factors and considerations related to creating competitive advantage through IoT and data analytics deployment in the smart city context. Furthermore, this paper proposes a framework that merges the factors and considerations with examples of offerings and solutions in smart cities. The data collected through IoT devices, and the intelligent use of it, can create competitive advantage to companies operating in smart city business. Companies should take into consideration the five forces of competition that shape industries and pay attention to the technological, organisational, and external contexts which define factors for consideration of competitive advantages in the field of IoT and data analytics. Companies that can utilise these key assets in their businesses will most likely conquer the markets and have a strong foothold in the smart city business.Keywords: data analytics, smart cities, competitive advantage, internet of things
Procedia PDF Downloads 1331873 Residential and Care Model for Elderly People Based on “Internet Plus”
Authors: Haoyi Sheng
Abstract:
China's aging tendency is becoming increasingly severe, which leads to the embarrassing situation of "getting old before getting wealthy". The traditional pension model does not comply with the need of today. Relying on "Internet Plus", it can efficiently integrate information and resources and meet the personalized needs of elderly care. It can reduce the operating cost of community elderly care facilities and lay a technical foundation for providing better services for the elderly. The key for providing help for the elderly in the future is to effectively integrate technology, make good use of technology, and improve the efficiency of elderly care services. The effective integration of traditional home care, community care, intelligent elderly care equipment and medical resources to create the "Internet Plus" community intelligent pension service mode has become the future development trend of aging care. The research method of this paper is to collect literature and conduct theoretical research on community pension firstly. Secondly, the combination of suitable aging design and "Internet Plus" is elaborated through research. Finally, this paper states the current level of intelligent technology in old-age care and looks into the future by understanding multiple levels of "Internet Plus". The development of community intelligent pension mode and content under "Internet Plus" has enormous development potential. In addition to the characteristics and functions of ordinary houses, residential design of endowment housing has higher requirements for comfort and personalization, and the people-oriented is the principle of design.Keywords: ageing tendency, 'Internet Plus', community intelligent elderly care, elderly care service model, technology
Procedia PDF Downloads 1371872 The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia
Authors: Aulia Dwi Nastiti
Abstract:
A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet.Keywords: communication pattern, counterterrorism, darknet, extremist groups, terrorism
Procedia PDF Downloads 2931871 Complex Event Processing System Based on the Extended ECA Rule
Authors: Kwan Hee Han, Jun Woo Lee, Sung Moon Bae, Twae Kyung Park
Abstract:
ECA (Event-Condition-Action) languages are largely adopted for event processing since they are an intuitive and powerful paradigm for programming reactive systems. However, there are some limitations about ECA rules for processing of complex events such as coupling of event producer and consumer. The objective of this paper is to propose an ECA rule pattern to improve the current limitations of ECA rule, and to develop a prototype system. In this paper, conventional ECA rule is separated into 3 parts and each part is extended to meet the requirements of CEP. Finally, event processing logic is established by combining the relevant elements of 3 parts. The usability of proposed extended ECA rule is validated by a test scenario in this study.Keywords: complex event processing, ECA rule, Event processing system, event-driven architecture, internet of things
Procedia PDF Downloads 5301870 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children
Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani
Abstract:
Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.Keywords: access control, cyber security, kids, parental monitoring
Procedia PDF Downloads 1371869 Awareness about Authenticity of Health Care Information from Internet Sources among Health Care Students in Malaysia: A Teaching Hospital Study
Authors: Renjith George, Preethy Mary Donald
Abstract:
Use of internet sources to retrieve health care related information among health care professionals has increased tremendously as the accessibility to internet is made easier through smart phones and tablets. Though there are huge data available at a finger touch, it is doubtful whether all the sources providing health care information adhere to evidence based practice. The objective of this survey was to study the prevalence of use of internet sources to get health care information, to assess the mind-set towards the authenticity of health care information available via internet sources and to study the awareness about evidence based practice in health care among medical and dental students in Melaka-Manipal Medical College. The survey was proposed as there is limited number of studies reported in the literature and this is the first of its kind in Malaysia. A cross sectional survey was conducted among the medical and dental students of Melaka-Manipal Medical College. A total of 521 students including medical and dental students in their clinical years of undergraduate study participated in the survey. A questionnaire consisting of 14 questions were constructed based on data available from the published literature and focused group discussion and was pre-tested for validation. Data analysis was done using SPSS. The statistical analysis of the results of the survey proved that the use of internet resources for health care information are equally preferred over the conventional resources among health care students. Though majority of the participants verify the authenticity of information from internet sources, there was considerable percentage of candidates who feels that all the information from the internet can be utilised for clinical decision making or were not aware about the need of verification of authenticity of such information. 63.7 % of the participants rely on evidence based practice in health care for clinical decision making while 34.2 % were not aware about it. A minority of 2.1% did not agree with the concept of evidence based practice. The observations of the survey reveals the increasing use of internet resources for health care information among health care students. The results warrants the need to move towards evidence based practice in health care as all health care information available online may not be reliable. The health care person should be judicious while utilising the information from such resources for clinical decision making.Keywords: authenticity, evidence based practice, health care information, internet
Procedia PDF Downloads 4461868 Thai Teenage Prostitution Online
Authors: Somdech Rungsrisawat
Abstract:
The purposes of this research are to investigate Thai teens’ attitude toward prostitution on the internet, to discover the causes of teenage prostitution and to study the relationship between teenage promiscuity and the causes of teenage prostitution. This study is a mixed research which utilized both qualitative and quantitative approach. The population of this study included teenagers and early adults between 14-21 years old who were studying in high schools, colleges, or universities. A total of 600 respondents was sampled for interviews using a questionnaire, and 48 samples were chosen for an in-depth interview. The findings revealed that the majority of respondents recognized that teenage prostitution on line was real. The reasons for choosing the internet to contact with customers included easy, convenient, safe, and anonymous. Moreover, the internet allowed teen prostitutes to contact customers anywhere and anytime. The correlation showed that promiscuity was related to the trend of teen prostitution. Other factors that contributed to increasing widespread teen prostitution online included their need for quick money to buy luxurious products and to support their extravagant behavior.Keywords: internet, prostitutes, online, Thai teens
Procedia PDF Downloads 309