Search results for: secure online algorithm
6485 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey
Authors: Tolga Yazıcı
Abstract:
As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey
Procedia PDF Downloads 3366484 A Fast Silhouette Detection Algorithm for Shadow Volumes in Augmented Reality
Authors: Hoshang Kolivand, Mahyar Kolivand, Mohd Shahrizal Sunar, Mohd Azhar M. Arsad
Abstract:
Real-time shadow generation in virtual environments and Augmented Reality (AR) was always a hot topic in the last three decades. Lots of calculation for shadow generation among AR needs a fast algorithm to overcome this issue and to be capable of implementing in any real-time rendering. In this paper, a silhouette detection algorithm is presented to generate shadows for AR systems. Δ+ algorithm is presented based on extending edges of occluders to recognize which edges are silhouettes in the case of real-time rendering. An accurate comparison between the proposed algorithm and current algorithms in silhouette detection is done to show the reduction calculation by presented algorithm. The algorithm is tested in both virtual environments and AR systems. We think that this algorithm has the potential to be a fundamental algorithm for shadow generation in all complex environments.Keywords: silhouette detection, shadow volumes, real-time shadows, rendering, augmented reality
Procedia PDF Downloads 4356483 An Enhanced Harmony Search (ENHS) Algorithm for Solving Optimization Problems
Authors: Talha A. Taj, Talha A. Khan, M. Imran Khalid
Abstract:
Optimization techniques attract researchers to formulate a problem and determine its optimum solution. This paper presents an Enhanced Harmony Search (ENHS) algorithm for solving optimization problems. The proposed algorithm increases the convergence and is more efficient than the standard Harmony Search (HS) algorithm. The paper discusses the novel techniques in detail and also provides the strategy for tuning the decisive parameters that affects the efficiency of the ENHS algorithm. The algorithm is tested on various benchmark functions, a real world optimization problem and a constrained objective function. Also, the results of ENHS are compared to standard HS, and various other optimization algorithms. The ENHS algorithms prove to be significantly better and more efficient than other algorithms. The simulation and testing of the algorithms is performed in MATLAB.Keywords: optimization, harmony search algorithm, MATLAB, electronic
Procedia PDF Downloads 4576482 A Novel Algorithm for Production Scheduling
Authors: Ali Mohammadi Bolban Abad, Fariborz Ahmadi
Abstract:
Optimization in manufacture is a method to use limited resources to obtain the best performance and reduce waste. In this paper a new algorithm based on eurygaster life is introduced to obtain a plane in which task order and completion time of resources are defined. Evaluation results show our approach has less make span when the resources are allocated with some products in comparison to genetic algorithm.Keywords: evolutionary computation, genetic algorithm, particle swarm optimization, NP-Hard problems, production scheduling
Procedia PDF Downloads 3736481 Downscaling Daily Temperature with Neuroevolutionary Algorithm
Authors: Min Shi
Abstract:
State of the art research with Artificial Neural Networks for the downscaling of General Circulation Models (GCMs) mainly uses back-propagation algorithm as a training approach. This paper introduces another training approach of ANNs, Evolutionary Algorithm. The combined algorithm names neuroevolutionary (NE) algorithm. We investigate and evaluate the use of the NE algorithms in statistical downscaling by generating temperature estimates at interior points given information from a lattice of surrounding locations. The results of our experiments indicate that NE algorithms can be efficient alternative downscaling methods for daily temperatures.Keywords: temperature, downscaling, artificial neural networks, evolutionary algorithms
Procedia PDF Downloads 3476480 Students’ Perception and Patterns of Listening Behaviour in an Online Forum Discussion
Authors: K. L. Wong, I. N. Umar
Abstract:
Online forum is part of a Learning Management System (LMS) environment in which students share opinions. This study attempts to investigate the perceptions of students towards online forum and their patterns of listening behaviour during the forum interaction. The students’ perceptions were measured using a questionnaire, in which seven dimensions were used including online experience, benefits of forum participation, cost of participation, perceived ease of use, usefulness, attitude and intention. Meanwhile, their patterns of listening behaviours were obtained using the log file extracted from the LMS. A total of 25 postgraduate students undertaking a course were involved in this study, and their activities in the forum session were recorded by the LMS and used as a log file. The results from the questionnaire analysis indicated that the students perceived that the forum is easy to use, useful, and bring benefits to them. Also, they showed positive attitude towards online forum, and they have the intention to use it in future. Based on the log data, the participants were also divided into six clusters of listening behaviour, in which they are different in terms of temporality, breadth, depth and speaking level. The findings were compared to previous clusters grouping and future recommendations are also discussed.Keywords: e-learning, learning management system, listening behavior, online forum
Procedia PDF Downloads 4266479 Consumer Preferences when Buying Second Hand Luxury Items
Authors: K. A. Schuck, J. K. Perret, A. Mehn, K. Rommel
Abstract:
Consumers increasingly consider sustainability aspects in their consumption behavior. Although, few fashion brands are already active in the second-hand luxury market with their own online platforms. Separating between base and high-end luxury brands, two online discrete choice experiments determine the drivers behind consumers’ willingness-to-pay for platform characteristics like the type of ownership, giving brands the opportunity to elicit a financial scope they can operate within.Keywords: choice experiment, luxury, preferences, second-hand, platform, online
Procedia PDF Downloads 1236478 An Optimization Algorithm Based on Dynamic Schema with Dissimilarities and Similarities of Chromosomes
Authors: Radhwan Yousif Sedik Al-Jawadi
Abstract:
Optimization is necessary for finding appropriate solutions to a range of real-life problems. In particular, genetic (or more generally, evolutionary) algorithms have proved very useful in solving many problems for which analytical solutions are not available. In this paper, we present an optimization algorithm called Dynamic Schema with Dissimilarity and Similarity of Chromosomes (DSDSC) which is a variant of the classical genetic algorithm. This approach constructs new chromosomes from a schema and pairs of existing ones by exploring their dissimilarities and similarities. To show the effectiveness of the algorithm, it is tested and compared with the classical GA, on 15 two-dimensional optimization problems taken from literature. We have found that, in most cases, our method is better than the classical genetic algorithm.Keywords: chromosome injection, dynamic schema, genetic algorithm, similarity and dissimilarity
Procedia PDF Downloads 3386477 Online Classroom Instruction and Collaborative Learning: Problems and Prospects Among Undergraduate Students of Obafemi Awolowo University, Ile-Ife, Nigeria
Authors: Bello Theodora O., Animola Odunayo V., Owoade Johnson T.
Abstract:
With the advent of Covid-19, online classroom instruction became a very important mode of instruction delivery during which learners were engaged in both collaborative and online interactive learning process, but along with it are challenges as well as its deliverables. This study therefore investigated the various online platform used by the students for learning among fresh undergraduate students of Obafemi Awolowo University, Ile-Ife, Osun Sate. It also assessed the student’s perception towards online learning in the university and examined the influence of collaborative learning among the students. Lastly, it examined the problems that are associated with collaborative online learning instruction in the university. These were with a view to providing empirical information on problems and prospects of online classroom instruction among fresh undergraduate physical science students of Obafemi Awolowo University, Ile-Ife. The study employed a descriptive survey research technique. The population comprised all the fresh undergraduates in physical science departments of Obafemi Awolowo University, Ile-Ife. The sample consisted two hundred freshmen in physical science departments of Obafemi Awolowo University, Ile-Ife, who were selected using simple random techniques. During the selection, a questionnaire was used to collect data from the respondents. The data were analyzed using appropriate descriptive of frequency, simple percentage, and mean. Results showed that Google Meet 149(74.5%), Telegram 120(60.0%), and Google Classroom 143(71.5%), are the prominent online classroom instruction used by the students in Obafemi Awolowo University, Ile-Ife. The results also showed that the freshmen’s perception towards online classroom instruction in Obafemi Awolowo University, Ile-Ife is low with cluster mean of 2.97. It further revealed that collaborative learning enhances the learning ability of below average learners more than that of the above average and average students (73.6%). Finally, the result showed that they are affirmative of the problems associated with online classroom instruction in Obafemi Awolowo University, Ile-Ife with cluster mean of 3.01. The result concluded that most Online platform used by the fresher’s students in Obafemi Awolowo University, Ile-Ife are Google Meet, Telegram and Google Classroom. The students have negatives perception towards online classroom instruction and the students are affirmative of the problems associated with online classroom instruction among physical science freshmen in Obafemi Awolowo University, Ile-Ife.Keywords: online, instruction, freshmen, physical science, collaborative
Procedia PDF Downloads 576476 PUF-Based Lightweight Iot Secure Authentication Chip Design
Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He
Abstract:
This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.Keywords: PUF, IoT, authentication, secure communication, encryption, XOR
Procedia PDF Downloads 1376475 Simulation Approach for a Comparison of Linked Cluster Algorithm and Clusterhead Size Algorithm in Ad Hoc Networks
Authors: Ameen Jameel Alawneh
Abstract:
A Mobile ad-hoc network (MANET) is a collection of wireless mobile hosts that dynamically form a temporary network without the aid of a system administrator. It has neither fixed infrastructure nor wireless ad hoc sessions. It inherently reaches several nodes with a single transmission, and each node functions as both a host and a router. The network maybe represented as a set of clusters each managed by clusterhead. The cluster size is not fixed and it depends on the movement of nodes. We proposed a clusterhead size algorithm (CHSize). This clustering algorithm can be used by several routing algorithms for ad hoc networks. An elected clusterhead is assigned for communication with all other clusters. Analysis and simulation of the algorithm has been implemented using GloMoSim networks simulator, MATLAB and MAPL11 proved that the proposed algorithm achieves the goals.Keywords: simulation, MANET, Ad-hoc, cluster head size, linked cluster algorithm, loss and dropped packets
Procedia PDF Downloads 3886474 Hybrid Algorithm for Frequency Channel Selection in Wi-Fi Networks
Authors: Cesar Hernández, Diego Giral, Ingrid Páez
Abstract:
This article proposes a hybrid algorithm for spectrum allocation in cognitive radio networks based on the algorithms Analytical Hierarchical Process (AHP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) to improve the performance of the spectrum mobility of secondary users in cognitive radio networks. To calculate the level of performance of the proposed algorithm a comparative analysis between the proposed AHP-TOPSIS, Grey Relational Analysis (GRA) and Multiplicative Exponent Weighting (MEW) algorithm is performed. Four evaluation metrics is used. These metrics are the accumulative average of failed handoffs, the accumulative average of handoffs performed, the accumulative average of transmission bandwidth, and the accumulative average of the transmission delay. The results of the comparison show that AHP-TOPSIS Algorithm provides 2.4 times better performance compared to a GRA Algorithm and, 1.5 times better than the MEW Algorithm.Keywords: cognitive radio, decision making, hybrid algorithm, spectrum handoff, wireless networks
Procedia PDF Downloads 5356473 Modified Active (MA) Algorithm to Generate Semantic Web Related Clustered Hierarchy for Keyword Search
Authors: G. Leena Giri, Archana Mathur, S. H. Manjula, K. R. Venugopal, L. M. Patnaik
Abstract:
Keyword search in XML documents is based on the notion of lowest common ancestors in the labelled trees model of XML documents and has recently gained a lot of research interest in the database community. In this paper, we propose the Modified Active (MA) algorithm which is an improvement over the active clustering algorithm by taking into consideration the entity aspect of the nodes to find the level of the node pertaining to a particular keyword input by the user. A portion of the bibliography database is used to experimentally evaluate the modified active algorithm and results show that it performs better than the active algorithm. Our modification improves the response time of the system and thereby increases the efficiency of the system.Keywords: keyword matching patterns, MA algorithm, semantic search, knowledge management
Procedia PDF Downloads 4096472 Cuckoo Search (CS) Optimization Algorithm for Solving Constrained Optimization
Authors: Sait Ali Uymaz, Gülay Tezel
Abstract:
This paper presents the comparison results on the performance of the Cuckoo Search (CS) algorithm for constrained optimization problems. For constraint handling, CS algorithm uses penalty method. CS algorithm is tested on thirteen well-known test problems and the results obtained are compared to Particle Swarm Optimization (PSO) algorithm. Mean, best, median and worst values were employed for the analyses of performance.Keywords: cuckoo search, particle swarm optimization, constrained optimization problems, penalty method
Procedia PDF Downloads 5516471 Left to Right-Right Most Parsing Algorithm with Lookahead
Authors: Jamil Ahmed
Abstract:
Left to Right-Right Most (LR) parsing algorithm is a widely used algorithm of syntax analysis. It is contingent on a parsing table, whereas the parsing tables are extracted from the grammar. The parsing table specifies the actions to be taken during parsing. It requires that the parsing table should have no action conflicts for the same input symbol. This requirement imposes a condition on the class of grammars over which the LR algorithms work. However, there are grammars for which the parsing tables hold action conflicts. In such cases, the algorithm needs a capability of scanning (looking-ahead) next input symbols ahead of the current input symbol. In this paper, a ‘Left to Right’-‘Right Most’ parsing algorithm with lookahead capability is introduced. The 'look-ahead' capability in the LR parsing algorithm is the major contribution of this paper. The practicality of the proposed algorithm is substantiated by the parser implementation of the Context Free Grammar (CFG) of an already proposed programming language 'State Controlled Object Oriented Programming' (SCOOP). SCOOP’s Context Free Grammar has 125 productions and 192 item sets. This algorithm parses SCOOP while the grammar requires to ‘look ahead’ the input symbols due to action conflicts in its parsing table. Proposed LR parsing algorithm with lookahead capability can be viewed as an optimization of ‘Simple Left to Right’-‘Right Most’ (SLR) parsing algorithm.Keywords: left to right-right most parsing, syntax analysis, bottom-up parsing algorithm
Procedia PDF Downloads 1226470 Improved Whale Algorithm Based on Information Entropy and Its Application in Truss Structure Optimization Design
Authors: Serges Mendomo Meye, Li Guowei, Shen Zhenzhong, Gan Lei, Xu Liqun
Abstract:
Given the limitations of the original whale optimization algorithm (WAO) in local optimum and low convergence accuracy in truss structure optimization problems, based on the fundamental whale algorithm, an improved whale optimization algorithm (SWAO) based on information entropy is proposed. The information entropy itself is an uncertain measure. It is used to control the range of whale searches in path selection. It can overcome the shortcomings of the basic whale optimization algorithm (WAO) and can improve the global convergence speed of the algorithm. Taking truss structure as the optimization research object, the mathematical model of truss structure optimization is established; the cross-sectional area of truss is taken as the design variable; the objective function is the weight of truss structure; and an improved whale optimization algorithm (SWAO) is used for optimization design, which provides a new idea and means for its application in large and complex engineering structure optimization design.Keywords: information entropy, structural optimization, truss structure, whale algorithm
Procedia PDF Downloads 2446469 Parallel Version of Reinhard’s Color Transfer Algorithm
Authors: Abhishek Bhardwaj, Manish Kumar Bajpai
Abstract:
An image with its content and schema of colors presents an effective mode of information sharing and processing. By changing its color schema different visions and prospect are discovered by the users. This phenomenon of color transfer is being used by Social media and other channel of entertainment. Reinhard et al’s algorithm was the first one to solve this problem of color transfer. In this paper, we make this algorithm efficient by introducing domain parallelism among different processors. We also comment on the factors that affect the speedup of this problem. In the end by analyzing the experimental data we claim to propose a novel and efficient parallel Reinhard’s algorithm.Keywords: Reinhard et al’s algorithm, color transferring, parallelism, speedup
Procedia PDF Downloads 6096468 A Filtering Algorithm for a Nonlinear State-Space Model
Authors: Abdullah Eqal Al Mazrooei
Abstract:
Kalman filter is a famous algorithm that utilizes to estimate the state in the linear systems. It has numerous applications in technology and science. Since of the most of applications in real life can be described by nonlinear systems. So, Kalman filter does not work with the nonlinear systems because it is suitable to linear systems only. In this work, a nonlinear filtering algorithm is presented which is suitable to use with the special kinds of nonlinear systems. This filter generalizes the Kalman filter. This means that this filter also can be used for the linear systems. Our algorithm depends on a special linearization of the second degree. We introduced the nonlinear algorithm with a bilinear state-space model. A simulation example is presented to illustrate the efficiency of the algorithm.Keywords: Kalman filter, filtering algorithm, nonlinear systems, state-space model
Procedia PDF Downloads 3686467 Teaching Translation during Covid-19 Outbreak: Challenges and Discoveries
Authors: Rafat Alwazna
Abstract:
Translation teaching is a particular activity that includes translators and interpreters training either inside or outside institutionalised settings, such as universities. It can also serve as a means of teaching other fields, such as foreign languages. Translation teaching began in the twentieth century. Teachers of translation hold the responsibilities of educating students, developing their translation competence and training them to be professional translators. The activity of translation teaching involves various tasks, including curriculum design, course delivery, material writing as well as application and implementation. The present paper addresses translation teaching during COVID-19 outbreak, seeking to find out the challenges encountered by translation teachers in online translation teaching and the discoveries/solutions arrived at to resolve them. The paper makes use of a comprehensive questionnaire, containing closed-ended and open-ended questions to elicit both quantitative as well as qualitative data from about sixty translation teachers who have been teaching translation at BA and MA levels during COVID-19 outbreak. The data shows that about 40% of the participants evaluate their online translation teaching experience during COVID-19 outbreak as enjoyable and exhilarating. On the contrary, no participant has evaluated his/her online translation teaching experience as being not good, nor has any participant evaluated his/her online translation teaching experience as being terrible. The data also presents that about 23.33% of the participants evaluate their online translation teaching experience as very good, and the same percentage applies to those who evaluate their online translation teaching experience as good to some extent. Moreover, the data indicates that around 13.33% of the participants evaluate their online translation teaching experience as good. The data also demonstrates that the majority of the participants have encountered obstacles in online translation teaching and have concurrently proposed solutions to resolve them.Keywords: online translation teaching, electronic learning platform, COVID-19 outbreak, challenges, solutions
Procedia PDF Downloads 2186466 Chemical Reaction Algorithm for Expectation Maximization Clustering
Authors: Li Ni, Pen ManMan, Li KenLi
Abstract:
Clustering is an intensive research for some years because of its multifaceted applications, such as biology, information retrieval, medicine, business and so on. The expectation maximization (EM) is a kind of algorithm framework in clustering methods, one of the ten algorithms of machine learning. Traditionally, optimization of objective function has been the standard approach in EM. Hence, research has investigated the utility of evolutionary computing and related techniques in the regard. Chemical Reaction Optimization (CRO) is a recently established method. So the property embedded in CRO is used to solve optimization problems. This paper presents an algorithm framework (EM-CRO) with modified CRO operators based on EM cluster problems. The hybrid algorithm is mainly to solve the problem of initial value sensitivity of the objective function optimization clustering algorithm. Our experiments mainly take the EM classic algorithm:k-means and fuzzy k-means as an example, through the CRO algorithm to optimize its initial value, get K-means-CRO and FKM-CRO algorithm. The experimental results of them show that there is improved efficiency for solving objective function optimization clustering problems.Keywords: chemical reaction optimization, expection maimization, initia, objective function clustering
Procedia PDF Downloads 7056465 Perceptions of Higher Education Online Learning Faculty in Lebanon
Authors: Noha Hamie Haidar
Abstract:
The purpose of this case study was to explore faculty attitudes toward online learning in a Lebanese Higher Education Institution (HEI). The research problem addressed the disinterest among faculty at the Arts, Sciences, and Technology University of Lebanon (AUL) in enhancing learning using online technology. The research questions for the study examined the attitudes of the faculty toward applying online learning and the extent of the faculty readiness to adopt this technological change. A qualitative case study design was used that employed multiple sources of information including semi-structured interviews and existing literature. The target population was AUL faculty including full-time instructors and administration (n=25). Data analysis was guided by the lens of Kanter’s theoretical approach, which focused on faculty’s awareness, desire, knowledge, ability, and reinforcement model (ADKAR) for adopting change. Key findings indicated negative impressions concerning online learning such as authority (ministry of education, culture, and rules); and change (increased enrollment and different teaching styles). Yet, within AUL’s academic environment, the opportunity for the adoption of online learning was identified; faculty showed positive elements, such as the competitive advantage to first enter the Lebanese Market, and higher student enrollment. These results may encourage AUL’s faculty to adopt online learning and to achieve a positive social change by expanding the ability of students in HEIs to compete globally.Keywords: faculty, higher education, technology, online learning
Procedia PDF Downloads 4036464 An Improved Genetic Algorithm for Traveling Salesman Problem with Precedence Constraint
Authors: M. F. F. Ab Rashid, A. N. Mohd Rose, N. M. Z. Nik Mohamed, W. S. Wan Harun, S. A. Che Ghani
Abstract:
Traveling salesman problem with precedence constraint (TSPPC) is one of the most complex problems in combinatorial optimization. The existing algorithms to solve TSPPC cost large computational time to find the optimal solution. The purpose of this paper is to present an efficient genetic algorithm that guarantees optimal solution with less number of generations and iterations time. Unlike the existing algorithm that generates priority factor as chromosome, the proposed algorithm directly generates sequence of solution as chromosome. As a result, the proposed algorithm is capable of generating optimal solution with smaller number of generations and iteration time compare to existing algorithm.Keywords: traveling salesman problem, sequencing, genetic algorithm, precedence constraint
Procedia PDF Downloads 5546463 Effect of Social Media on Online Buyer Behavior
Authors: Zebider Asire Munyelet, Yibeltal Chanie Manie
Abstract:
In the modern digital landscape, the increase of social media platforms has become identical to the evolution of online consumer behavior. This study investigates the complicated relationship between social media and the purchasing decisions of online buyers. Through an extensive review of existing literature and empirical research, the aim is to comprehensively analyze the multidimensional impact that social media exerts on the various stages of the online buyer's journey. The investigation encompasses the exploration of how social media platforms serve as influential channels for information dissemination, product discovery, and consumer engagement. Additionally, the study investigates the psychological aspects underlying the role of social media in shaping buyer preferences, perceptions, and trust in online transactions. The methodologies employed include both quantitative and qualitative analyses, incorporating surveys, interviews, and data analytics to derive meaningful insights. Statistical models are applied to distinguish patterns in online buyer behavior concerning product awareness, brand loyalty, and decision-making processes. The expected outcomes of this research contribute not only to the academic understanding of the dynamic interplay between social media and online buyer behavior but also offer practical implications for marketers, e-commerce platforms, and policymakers.Keywords: social platforms, buyer behavior, consumer behavior, digital era
Procedia PDF Downloads 736462 Performance Analysis of the Precise Point Positioning Data Online Processing Service and Using for Monitoring Plate Tectonic of Thailand
Authors: Nateepat Srivarom, Weng Jingnong, Serm Chinnarat
Abstract:
Precise Point Positioning (PPP) technique is use to improve accuracy by using precise satellite orbit and clock correction data, but this technique is complicated methods and high costs. Currently, there are several online processing service providers which offer simplified calculation. In the first part of this research, we compare the efficiency and precision of four software. There are three popular online processing service providers: Australian Online GPS Processing Service (AUSPOS), CSRS-Precise Point Positioning and CenterPoint RTX post processing by Trimble and 1 offline software, RTKLIB, which collected data from 10 the International GNSS Service (IGS) stations for 10 days. The results indicated that AUSPOS has the least distance root mean square (DRMS) value of 0.0029 which is good enough to be calculated for monitoring the movement of tectonic plates. The second, we use AUSPOS to process the data of geodetic network of Thailand. In December 26, 2004, the earthquake occurred a 9.3 MW at the north of Sumatra that highly affected all nearby countries, including Thailand. Earthquake effects have led to errors of the coordinate system of Thailand. The Royal Thai Survey Department (RTSD) is primarily responsible for monitoring of the crustal movement of the country. The difference of the geodetic network movement is not the same network and relatively large. This result is needed for survey to continue to improve GPS coordinates system in every year. Therefore, in this research we chose the AUSPOS to calculate the magnitude and direction of movement, to improve coordinates adjustment of the geodetic network consisting of 19 pins in Thailand during October 2013 to November 2017. Finally, results are displayed on the simulation map by using the ArcMap program with the Inverse Distance Weighting (IDW) method. The pin with the maximum movement is pin no. 3239 (Tak) in the northern part of Thailand. This pin moved in the south-western direction to 11.04 cm. Meanwhile, the directional movement of the other pins in the south gradually changed from south-west to south-east, i.e., in the direction noticed before the earthquake. The magnitude of the movement is in the range of 4 - 7 cm, implying small impact of the earthquake. However, the GPS network should be continuously surveyed in order to secure accuracy of the geodetic network of Thailand.Keywords: precise point positioning, online processing service, geodetic network, inverse distance weighting
Procedia PDF Downloads 1866461 Distributed Key Management With Less Transmitted Messaged In Rekeying Process To Secure Iot Wireless Sensor Networks In Smart-Agro
Authors: Safwan Mawlood Hussien
Abstract:
Internet of Things (IoT) is a promising technology has received considerable attention in different fields such as health, industry, defence, and agro, etc. Due to the limitation capacity of computing, storage, and communication, IoT objects are more vulnerable to attacks. Many solutions have been proposed to solve security issues, such as key management using symmetric-key ciphers. This study provides a scalable group distribution key management based on ECcryptography; with less transmitted messages The method has been validated through simulations in OMNeT++.Keywords: elliptic curves, Diffie–Hellman, discrete logarithm problem, secure key exchange, WSN security, IoT security, smart-agro
Procedia PDF Downloads 1186460 Assessing Online Learning Paths in an Learning Management Systems Using a Data Mining and Machine Learning Approach
Authors: Alvaro Figueira, Bruno Cabral
Abstract:
Nowadays, students are used to be assessed through an online platform. Educators have stepped up from a period in which they endured the transition from paper to digital. The use of a diversified set of question types that range from quizzes to open questions is currently common in most university courses. In many courses, today, the evaluation methodology also fosters the students’ online participation in forums, the download, and upload of modified files, or even the participation in group activities. At the same time, new pedagogy theories that promote the active participation of students in the learning process, and the systematic use of problem-based learning, are being adopted using an eLearning system for that purpose. However, although there can be a lot of feedback from these activities to student’s, usually it is restricted to the assessments of online well-defined tasks. In this article, we propose an automatic system that informs students of abnormal deviations of a 'correct' learning path in the course. Our approach is based on the fact that by obtaining this information earlier in the semester, may provide students and educators an opportunity to resolve an eventual problem regarding the student’s current online actions towards the course. Our goal is to prevent situations that have a significant probability to lead to a poor grade and, eventually, to failing. In the major learning management systems (LMS) currently available, the interaction between the students and the system itself is registered in log files in the form of registers that mark beginning of actions performed by the user. Our proposed system uses that logged information to derive new one: the time each student spends on each activity, the time and order of the resources used by the student and, finally, the online resource usage pattern. Then, using the grades assigned to the students in previous years, we built a learning dataset that is used to feed a machine learning meta classifier. The produced classification model is then used to predict the grades a learning path is heading to, in the current year. Not only this approach serves the teacher, but also the student to receive automatic feedback on her current situation, having past years as a perspective. Our system can be applied to online courses that integrate the use of an online platform that stores user actions in a log file, and that has access to other student’s evaluations. The system is based on a data mining process on the log files and on a self-feedback machine learning algorithm that works paired with the Moodle LMS.Keywords: data mining, e-learning, grade prediction, machine learning, student learning path
Procedia PDF Downloads 1206459 The Impact of Financial Literacy, Perception of Debt, and Perception of Risk Toward Student Willingness to Use Online Student Loan
Authors: Irni Rahmayani Johan, Ira Kamelia
Abstract:
One of the impacts of the rapid advancement of technology is the rise of digital finance, including peer-to-peer lending (P2P). P2P lending has been widely marketed, including an online student loan that used the P2P platform. This study aims to analyze the effect of financial literacy, perception of debt, and perception of risk toward student willingness to use the online student loan (P2P lending). Using a cross-sectional study design, in collecting the data this study employed an online survey method, with a total sample of 280 undergraduate students of IPB university, Indonesia. This study found that financial literacy, perception of debt, perception of risk, and interest in using online student loans are categorized as low level. While the level of knowledge is found to be the lowest, the first-year students showed a higher level in terms of willingness to use the online student loan. In addition, the second year students recorded a positive perception toward debt. This study showed that level of study, attendance in personal finance course, and student’ GPA is positively related to financial knowledge. While debt perception is negatively related to financial attitudes. Similarly, the negative relationship is found between risk perception and the willingness to use the online student loan. The determinant factor of the willingness to use online student loans is the level of study, debt perception, financial risk perception, and time risk perception. Students with a higher level of study are more likely to have a lower interest in using online student loans. Moreover, students who perceived debt as a financial stimulator, as well as those with higher level of financial risk perceptions and time risk perceptions, tend to show more interest to use the loan.Keywords: financial literacy, willingness to use, online student loan, perception of risk, perception of debt
Procedia PDF Downloads 1416458 Feasibility of Online Health Coaching for Canadian Armed Forces Personnel Receiving Treatment for Depression, Anxiety and PTSD
Authors: Noah Wayne, Andrea Tuka, Adrian Norbash, Bryan Garber, Paul Ritvo
Abstract:
Program/Intervention Description: The Canadian Armed Forces(CAF) Mental Health Clinicstreat a full spectrum of mental disorder, addictions, and psychosocial issues that include Major Depressive Disorder, Post-Traumatic Stress Disorder, Generalized Anxiety Disorder, and other diagnoses. We evaluated the feasibility of an online health coach interventiondelivering mindfulness based cognitive behavioral therapy (M-CBT) and behaviour changesupport for individuals receiving treatment at CAF Clinics. Participants were provided accounts on NexJ Connected Wellness, a digital health platform, and 16 weeks of phone-based health coaching,emphasizingmild to moderate aerobic exercise, a healthy diet, and M-CBT content. The primary objective was to assess the feasibility of the online deliverywith CAF members. Evaluation Methods: Feasibility was evaluated in terms of recruitment, engagement, and program satisfaction. Weadditionallyevaluatedhealth behavior change, program completion, and mental health symptoms (i.e. PHQ-9, GAD-7, PCL-5) at three time points. Results: Service members were referred from Vancouver, Esquimalt, and Edmonton CAF bases between August 2020 and January 2021. N=106 CAF personnel were referred, and n=77 consented.N=66 participated, and n=44 completed 4-month and follow-up measures. The platform received a mean rating of76.5 on the System Usability Scale, and health coaching was judged the most helpful program feature (95.2% endorsement), while reminders (53.7%), secure messaging (51.2%), and notifications (51.2%) were also identified. Improvements in mental health status during active interventions were observed on the PHQ-9 (-5.4, p<0.001), GAD-7 (-4.0, p<0.001), and PCL-5 (-4.1, p<0.05). Conclusion: Online health coaching was well-received amidst the COVID-19 pandemic and related lockdowns. Uptake and engagement were positively reported. Participants valuedcontacts and reported strong therapeutic alliances with coaches. Healthy diet, regular exercise, and mindfulness practice are important for physical and mental health. Engagements in these behaviors are associated with reduced symptoms. An online health coach program appears feasible for assisting Canadian Armed Forces personnel.Keywords: coaching, CBT, military, depression, mental health, digital
Procedia PDF Downloads 1556457 E-Immediacy in Saudi Higher Education Context: Female Students’ Perspectives
Authors: Samar Alharbi, Yota Dimitriadi
Abstract:
The literature on educational technology in Saudi Arabia reveals female learners’ unwillingness to study fully online courses in higher education despite the fact that Saudi universities have offered a variety of online degree programmes to undergraduate students in many regions of the country. The root causes keeping female students from successfully learning in online environments are limited social interaction, lack of motivation and difficulty with the use of e-learning platforms. E-immediacy remains an important method of online teaching to enhance students’ interaction and support their online learning. This study explored Saudi female students’ perceptions, as well as the experiences of lecturers’ immediacy behaviours in online environments, who participate in fully online courses using Blackboard at a Saudi university. Data were collected through interviews with focus groups. The three focus groups included five to seven students each. The female participants were asked about lecturers’ e-immediacy behaviours and which e-immediacy behaviours were important for an effective learning environment. A thematic analysis of the data revealed three main themes: the encouragement of student interaction, the incorporation of social media and addressing the needs of students. These findings provide lecturers with insights into instructional designs and strategies that can be adopted in using e-immediacy in effective ways, thus improving female learners’ interactions as well as their online learning experiences.Keywords: e-learning, female students, higher education, immediacy
Procedia PDF Downloads 3416456 Application of PSK Modulation in ADS-B 1090 Extended Squitter Authentication
Authors: A-Q. Nguyen. A. Amrhar, J. Zambrano, G. Brown, O.A. Yeste-Ojeda, R. Jr. Landry
Abstract:
Since the presence of Next Generation Air Transportation System (NextGen), Automatic Dependent Surveillance-Broadcast (ADS-B) has raised specific concerns related to the privacy and security, due to its vulnerable, low-level of security and limited payload. In this paper, the authors introduce and analyze the combination of Pulse Amplitude Modulation (PAM) and Phase Shift Keying (PSK) Modulation in conventional ADS-B, forming Secure ADS-B (SADS-B) avionics. In order to demonstrate the potential of this combination, Hardware-in-the-loop (HIL) simulation was used. The tests' results show that, on the one hand, SADS-B can offer five times the payload as its predecessor. This additional payload of SADS-B can be used in various applications, therefore enhancing the ability and efficiency of the current ADS-B. On the other hand, by using the extra phase modulated bits as a digital signature to authenticate ADS-B messages, SADS-B can increase the security of ADS-B, thus ensure a more secure aviation as well. More importantly, SADS-B is compatible with the current ADS-B In and Out. Hence, no significant modifications will be needed to implement this idea. As a result, SADS-B can be considered the most promising approach to enhance the capability and security of ADS-B.Keywords: ADS-B authentication, ADS-B security, NextGen ADS-B, PSK signature, secure ADS-B
Procedia PDF Downloads 317