Search results for: Internet.
233 Fast Fourier Transform-Based Steganalysis of Covert Communications over Streaming Media
Authors: Jinghui Peng, Shanyu Tang, Jia Li
Abstract:
Steganalysis seeks to detect the presence of secret data embedded in cover objects, and there is an imminent demand to detect hidden messages in streaming media. This paper shows how a steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media. The proposed algorithm uses machine parameter characteristics and a network sniffer to determine whether the Internet traffic contains streaming channels. The detected streaming data is then transferred from the time domain to the frequency domain through FFT. The distributions of power spectra in the frequency domain between original VoIP streams and stego VoIP streams are compared in turn using t-test, achieving the p-value of 7.5686E-176 which is below the threshold. The results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media.Keywords: Steganalysis, security, fast Fourier transform, streaming media.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 782232 GPU Based High Speed Error Protection for Watermarked Medical Image Transmission
Authors: Md Shohidul Islam, Jongmyon Kim, Ui-pil Chong
Abstract:
Medical image is an integral part of e-health care and e-diagnosis system. Medical image watermarking is widely used to protect patients’ information from malicious alteration and manipulation. The watermarked medical images are transmitted over the internet among patients, primary and referred physicians. The images are highly prone to corruption in the wireless transmission medium due to various noises, deflection, and refractions. Distortion in the received images leads to faulty watermark detection and inappropriate disease diagnosis. To address the issue, this paper utilizes error correction code (ECC) with (8, 4) Hamming code in an existing watermarking system. In addition, we implement the high complex ECC on a graphics processing units (GPU) to accelerate and support real-time requirement. Experimental results show that GPU achieves considerable speedup over the sequential CPU implementation, while maintaining 100% ECC efficiency.
Keywords: Medical Image Watermarking (MIW), e-health system, error correction, Hamming code, GPU.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1743231 Automatic Enhanced Update Summary Generation System for News Documents
Authors: S. V. Kogilavani, C. S. Kanimozhiselvi, S. Malliga
Abstract:
Fast changing knowledge systems on the Internet can be accessed more efficiently with the help of automatic document summarization and updating techniques. The aim of multi-document update summary generation is to construct a summary unfolding the mainstream of data from a collection of documents based on the hypothesis that the user has already read a set of previous documents. In order to provide a lot of semantic information from the documents, deeper linguistic or semantic analysis of the source documents were used instead of relying only on document word frequencies to select important concepts. In order to produce a responsive summary, meaning oriented structural analysis is needed. To address this issue, the proposed system presents a document summarization approach based on sentence annotation with aspects, prepositions and named entities. Semantic element extraction strategy is used to select important concepts from documents which are used to generate enhanced semantic summary.
Keywords: Aspects, named entities, prepositions, update summary.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2134230 Domestic Tourist Behaviours of the Tourism Place in Bangkok and Greater Area
Authors: Tanit P ruktara
Abstract:
This research aims to study the preferable tourism and the elements of choosing tourist destination from domestic tourist in Bangkok and the nearby areas in Thailand.The data were collected by using 1249 set of questionnaires, in mid-August 2012. The result illustrates that religious destinations are the most preferable places for the tourist. The average expense per travel is approximately 47 USD a time. Travellers travel based on the advertisement in the television and internet and their decisions is based on the reputation of the destinations. The result on a place dimension demonstrates the neatness and well managed location play a crucial role on tourist destination. Gender, age, marriage status and their origins are affecting their spending and travelling behaviour. The researcher reckon that providing the area of arcade, selling the souvenir and promoting tourism among a young professional group would be an important key follow the income distribution policy, including managing the destination to welcome the family group, which the result is to identified as the highest spending.
Keywords: Domestic Tourist, Tourism, Tourist Behaviours, Tourism Place.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2185229 Preparation a Study on the Use of the Resident Registration Number and Alternatives for RRN
Authors: Hyejin Pak, Changsoo Kim, Healahng Choi
Abstract:
The resident registration number was adopted for the purposes of enhanced services for resident convenience and effective performance of governmental administrative affairs. However, it has been used for identification purposes customarily and irrationally in line with the development and spread of the Internet. In response to the growing concern about the leakage of collected RRNs and possible abuses of stolen RRNs, e.g. identity theft, for crimes, the Korean Communications Commission began to take legal/regulatory actions in 2011 to minimize the online collection and use of resident registration numbers. As the use of the RRN was limited after the revision of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc., online business providers were required to have alternatives to the RRN for the purpose of identifying the user's identity and age, in compliance with the law, and settling disputes with customers. This paper presents means of verifying the personal identity by taking advantage of the commonly used infrastructure and simply replacing personal information entered and stored, without requiring users to enter their RRNs.
Keywords: Resident Registration Numbers(RRNs), Alternative identification for RRNs.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1909228 The Perception of Omani E-consumers on the Importance and Performance of Dubai SMHs' Website Dimensions and Attributes
Authors: Mohammed G. Montasser, Rehab Y. Zoweil
Abstract:
There is no doubt that Internet technology is widely used by hotels and its demand is constantly booming. Hotels have largely adopted website information services through using different interactive tools, dimensions and attributes to achieve excellence in functionality and usability but these do not necessary equate with website effectiveness. One way to investigate the effectiveness of hotel website is from the perspective ofe-consumers. This exploratory research is to investigate the perceived importance of websites effectiveness of some selected independent small and medium-sized hotels (SMHs) located in Dubai, United Arab Emirates, from the perspective of Omanie-consumers by using non-random sampling method. From 400 questionnaire addressed to respondents in 27 organizations in Muscat the capital city of Oman, 173 are valid. Findings of this study assist SMHs management in Dubai with the reallocation of their resources and efforts in order to supportebusiness development and to sustain a competitive advantage.
Keywords: Dubai's SMHs, Hotel websites, Omani e-consumer perception, weight and performance evaluation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1785227 Bandwidth Estimation Algorithms for the Dynamic Adaptation of Voice Codec
Authors: Davide Pierattoni, Ivan Macor, Pier Luca Montessoro
Abstract:
In the recent years multimedia traffic and in particular VoIP services are growing dramatically. We present a new algorithm to control the resource utilization and to optimize the voice codec selection during SIP call setup on behalf of the traffic condition estimated on the network path. The most suitable methodologies and the tools that perform realtime evaluation of the available bandwidth on a network path have been integrated with our proposed algorithm: this selects the best codec for a VoIP call in function of the instantaneous available bandwidth on the path. The algorithm does not require any explicit feedback from the network, and this makes it easily deployable over the Internet. We have also performed intensive tests on real network scenarios with a software prototype, verifying the algorithm efficiency with different network topologies and traffic patterns between two SIP PBXs. The promising results obtained during the experimental validation of the algorithm are now the basis for the extension towards a larger set of multimedia services and the integration of our methodology with existing PBX appliances.Keywords: Integrated voice-data communication, computernetwork performance, resource optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1692226 Determining the Online Purchasing Loyalty for Thai Herbal Products
Authors: Chummanond Natchaya, Rotchanakitumnuai Siriluck
Abstract:
The objective of this study is to identify the factors that influence the online purchasing loyalty for Thai herbal products. Survey research is used to gather data from Thai herb online merchants to assess factors that have impacts on enhancing loyalty. Data were collected from 300 online customers who had experience in online purchasing of Thai Herbal products. Prior experience consists of data from previous usage of online herbs, herb purchase and internet usage. E-Quality data consists of information quality, system quality, service quality and the product quality of Thai herbal products sold online. The results suggest that prior experience, Equality, attitude toward purchase and trust in online merchant have major impacts on loyalty. The good attitude and E-Quality of purchasing Thai herbal product online are the most significant determinants affecting loyalty.Keywords: e-Commerce, Thai herb, E-Quality, satisfaction, loyalty.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1892225 Architecture of Speech-based Registration System
Authors: Mayank Kumar, D B Mahesh Kumar, Ashwin S Kumar, N K Srinath
Abstract:
In this era of technology, fueled by the pervasive usage of the internet, security is a prime concern. The number of new attacks by the so-called “bots", which are automated programs, is increasing at an alarming rate. They are most likely to attack online registration systems. Technology, called “CAPTCHA" (Completely Automated Public Turing test to tell Computers and Humans Apart) do exist, which can differentiate between automated programs and humans and prevent replay attacks. Traditionally CAPTCHA-s have been implemented with the challenge involved in recognizing textual images and reproducing the same. We propose an approach where the visual challenge has to be read out from which randomly selected keywords are used to verify the correctness of spoken text and in turn detect the presence of human. This is supplemented with a speaker recognition system which can identify the speaker also. Thus, this framework fulfills both the objectives – it can determine whether the user is a human or not and if it is a human, it can verify its identity.
Keywords: CAPTCHA, automatic speech recognition, keyword spotting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1546224 On-Line Consumer Comments (E-Wom): A Case Qualitative Analysis on Resort Hotel Consumers
Authors: Yasin Bilim, Alaaddin Başoda
Abstract:
The recent growth of internet applications on hospitality and tourism provokes on-line consumer comments and reviews. Many researchers and practitioners have named this enormous potential as “e-WOM (electronic word of mouth)”. Travel comments are important experiential information for the potential travellers. Many researches have been conducted to analyse the effects of e-WOM on hotel consumers. Broadly quantitative methods have been used for analysing online comments. But, a few studies have mentioned about the positive practical aspects of the comments for hotel marketers. The study aims to show different usage and effects of hotel consumers’ comments. As qualitative analysis method, grounded theory, content and discourse analysis, were used. The data based on the 10 resort hotel consumers’ on-line comments. Results show that consumers tend to write comments about service person, rooms, food services and pool in their online space. These indicators can be used by hotel marketers as a marketing information tool.
Keywords: Comments, E-WOM, hotel consumer, qualitative.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2106223 Bias Optimization of Mach-Zehnder Modulator Considering RF Gain on OFDM Radio-Over-Fiber System
Authors: Ghazi Al Sukkar, Yazid Khattabi, Shifen Zhong
Abstract:
Most of the recent wireless LANs, broadband access networks, and digital broadcasting use Orthogonal Frequency Division Multiplexing techniques. In addition, the increasing demand of Data and Internet makes fiber optics an important technology, as fiber optics has many characteristics that make it the best solution for transferring huge frames of Data from a point to another. Radio over fiber is the place where high quality RF is converted to optical signals over single mode fiber. Optimum values for the bias level and the switching voltage for Mach-Zehnder modulator are important for the performance of radio over fiber links. In this paper, we propose a method to optimize the two parameters simultaneously; the bias and the switching voltage point of the external modulator of a radio over fiber system considering RF gain. Simulation results show the optimum gain value under these two parameters.
Keywords: OFDM, Mach Zehnder Bias Voltage, switching voltage, radio-over-fiber, RF gain.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1573222 Reference Model for the Implementation of an E-Commerce Solution in Peruvian SMEs in the Retail Sector
Authors: Julio Kauss, Miguel Cadillo, David Mauricio
Abstract:
E-commerce is a business model that allows companies to optimize the processes of buying, selling, transferring goods and exchanging services through computer networks or the Internet. In Peru, the electronic commerce is used infrequently. This situation is due, in part to the fact that there is no model that allows companies to implement an e-commerce solution, which means that most SMEs do not have adequate knowledge to adapt to electronic commerce. In this work, a reference model is proposed for the implementation of an e-commerce solution in Peruvian SMEs in the retail sector. It consists of five phases: Business Analysis, Business Modeling, Implementation, Post Implementation and Results. The present model was validated in a SME of the Peruvian retail sector through the implementation of an electronic commerce platform, through which the company increased its sales through the delivery channel by 10% in the first month of deployment. This result showed that the model is easy to implement, is economical and agile. In addition, it allowed the company to increase its business offer, adapt to e-commerce and improve customer loyalty.
Keywords: E-commerce, retail, SMEs, reference model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1050221 Enhancement Throughput of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC)
Authors: Ahmed K. Hasan, A. A. Zaidan, Anas Majeed, B. B. Zaidan, Rosli Salleh, Omar Zakaria, Ali Zuheir
Abstract:
Wireless mesh networks based on IEEE 802.11 technology are a scalable and efficient solution for next generation wireless networking to provide wide-area wideband internet access to a significant number of users. The deployment of these wireless mesh networks may be within different authorities and without any planning, they are potentially overlapped partially or completely in the same service area. The aim of the proposed model is design a new model to Enhancement Throughput of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC), the unplanned deployment of WMNs are determinates there performance. We use throughput optimization approach to model the unplanned WMNs deployment problem based on partitioning hierarchical cluster (PHC) based architecture, in this paper the researcher used bridge node by allowing interworking traffic between these WMNs as solution for performance degradation.Keywords: Wireless Mesh Networks, 802.11s Internetworking, partitioning Hierarchical Cluste.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1532220 Improving Location Management in Mobile IPv4 Networks
Authors: Haidar Safa, Hassan Artail, Ahmad Mehio, Hicham Zahr, Ziad Matragi
Abstract:
The Mobile IP Standard has been developed to support mobility over the Internet. This standard contains several drawbacks as in the cases where packets are routed via sub-optimal paths and significant amount of signaling messages is generated due to the home registration procedure which keeps the network aware of the current location of the mobile nodes. Recently, a dynamic hierarchical mobility management strategy for mobile IP networks (DHMIP) has been proposed to reduce home registrations costs. However, this strategy induces a packet delivery delay and increases the risk of packet loss. In this paper, we propose an enhanced version of the dynamic hierarchical strategy that reduces the packet delivery delay and minimizes the risk of packet loss. Preliminary results obtained from simulations are promising. They show that the enhanced version outperforms the original dynamic hierarchical mobility management strategy version.
Keywords: Location management, Mobile IP (MIP), Home Agent, Foreign Agent.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1445219 Investigating the Possible use of Session Initiation Protocol for Extending Mobility Service to the Biomedical Engineers
Authors: Anwar Sadat
Abstract:
Today, the Internet based communication has widen the opportunity of event monitoring system in the medical field. There is always a need of analyzing and designing secure and reliable mobile communication between the hospital and biomedical engineers mobile units. This study has been carried out to find possible solution using SIP-based event notification for alerting the technical staff about the Biomedical Device (BMD) status and Patients treatment session. The Session Initiation Protocol (SIP) can be used to create a medical event notification system. SIP can work on a variety of devices. Its adoption as the protocol of choice for third generation wireless networks allows for a robust and scalable environment. One of the advantages of SIP is that it supports personal mobility through the separation of user addressing and device addressing. The solution for Telemed alert notification system is based on SIP - Specific Event Notification. The aim of this project is to extend mobility service to the hospital technicians who are using Telemedicine system.Keywords: Biomedical, Mobility Service, Notify, Proxy Server, SIP, Subscribe, Telemedicine.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1799218 Research on the Teaching Quality Evaluation of China’s Network Music Education APP
Authors: Guangzhuang Yu, Chun-Chu Liu
Abstract:
With the advent of the Internet era in recent years, social music education has gradually shifted from the original entity education mode to the mode of entity plus network teaching. No matter for school music education, professional music education or social music education, the teaching quality is the most important evaluation index. Regarding the research on teaching quality evaluation, scholars at home and abroad have contributed a lot of research results on the basis of multiple methods and evaluation subjects. However, to our best knowledge the complete evaluation model for the virtual teaching interaction mode of the emerging network music education Application (APP) has not been established. This research firstly found out the basic dimensions that accord with the teaching quality required by the three parties, constructing the quality evaluation index system; and then, on the basis of expounding the connotation of each index, it determined the weight of each index by using method of fuzzy analytic hierarchy process, providing ideas and methods for scientific, objective and comprehensive evaluation of the teaching quality of network education APP.
Keywords: Network music education APP, teaching quality evaluation, index, connotation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 844217 Using Knowledge Management for Creating Knowledge Society through e-Government Services in Montenegro
Authors: Tamara Djurickovic
Abstract:
The waves of eGovernment are rising very fast through almost all public administration, or at least most of the public administrations around the world, and not only the public administration, but also the entire government and all of their organization as a whole. The government uses information technology, and above all the internet or web network, to facilitate the exchange of services between government agencies and citizens, businesses, employees and other non-governmental agencies. With efficient and transparent information exchange, the information becomes accessible to the society (citizens, business, employees etc.), and as a result of these processes the society itself becomes the information society or knowledge society. This paper discusses the knowledge management for eGovernment development in significance and role. Also, the paper reviews the role of virtual communities as a knowledge management mechanism to support eGovernment in Montenegro. It explores the need for knowledge management in eGovernment, identifies knowledge management technologies, and highlights the challenges for developing countries, such as Montenegro in the implementation of eGovernment. The paper suggests that knowledge management is needed to facilitate information exchange and transaction processing with citizens, as well as to enable creation of knowledge society.Keywords: information, eGovernment, knowledge management, knowledge society
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1556216 Niksic in the Context of Visual Urban Culture
Authors: Svetlana Perović
Abstract:
Out of all visual arts including: painting, sculpture, graphics, photography, architecture, and others, architecture is by far the most complex one, because the art category is only one of its determinants. Architecture, to some extent includes other arts which can significantly influence the shaping of an urban space (artistic interventions). These arts largely shape the visual culture in combination with other categories: film, TV, Internet, information technologies that are "changing the world" etc. In the area of architecture and urbanism, visual culture is achieved through the aspects of visual spatial effects. In this context, a complex visual deliberation about designing urban areas in order to contribute to the urban visual culture, and with it restore the cultural identity of the city, is becoming almost the primary concept of contemporary urban and architectural practice. Research in this paper relate to the city of Niksic and its place in the visual urban culture. We are looking at the city’s existing visual effects and determining the directions of transformability of its physical structure in order to achieve the visual realization of an urban area and the renewal of cultural identity of a modern city.
Keywords: Nikšić, transformability, visual culture, visual realization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1679215 Client Server System for e-Services Access Using Mobile Communications Networks
Authors: Eugen Pop, Mihai Barbos, Razvan Lupu
Abstract:
The client server systems using mobile communications networks for data transmission became very attractive for many economic agents, in the purpose of promoting and offering electronic services to their clients. E-services are suitable for business developing and financial benefits increasing. The products or services can be efficiently delivered to a large number of clients, using mobile Internet access technologies. The clients can have access to e-services, anywhere and anytime, with the support of 3G, GPRS, WLAN, etc., channels bandwidth, data services and protocols. Based on the mobile communications networks evolution and development, a convergence of technological and financial interests of mobile operators, software developers, mobile terminals producers and e-content providers is established. These will lead to a high level of integration of IT&C resources and will facilitate the value added services delivery through the mobile communications networks. In this paper it is presented a client server system, for e-services access, with Smartphones and PDA-s mobile software applications, installed on Symbian and Windows Mobile operating systems.Keywords: Client server system, e-services access, mobile communications, PDA, Smartphone.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2664214 NGN and WiMAX: Putting the Pieces Together
Authors: Mohamed K. Watfa, Khaled Abdel Naby, Chetan Govind Bhatia
Abstract:
With the exponential rise in the number of multimedia applications available, the best-effort service provided by the Internet today is insufficient. Researchers have been working on new architectures like the Next Generation Network (NGN) which, by definition, will ensure Quality of Service (QoS) in an all-IP based network [1]. For this approach to become a reality, reservation of bandwidth is required per application per user. WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communication technology which has predefined levels of QoS which can be provided to the user [4]. IPv6 has been created as the successor for IPv4 and resolves issues like the availability of IP addresses and QoS. This paper provides a design to use the power of WiMAX as an NSP (Network Service Provider) for NGN using IPv6. The use of the Traffic Class (TC) field and the Flow Label (FL) field of IPv6 has been explained for making QoS requests and grants [6], [7]. Using these fields, the processing time is reduced and routing is simplified. Also, we define the functioning of the ASN gateway and the NGN gateway (NGNG) which are edge node interfaces in the NGNWiMAX design. These gateways ensure QoS management through built in functions and by certain physical resources and networking capabilities.Keywords: WiMAX, NGN, QoS, IPv6, Flow Label, ASNGateway
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1672213 Exploiting Query Feedback for Efficient Query Routing in Unstructured Peer-to-peer Networks
Authors: Iskandar Ishak, Naomie Salim
Abstract:
Unstructured peer-to-peer networks are popular due to its robustness and scalability. Query schemes that are being used in unstructured peer-to-peer such as the flooding and interest-based shortcuts suffer various problems such as using large communication overhead long delay response. The use of routing indices has been a popular approach for peer-to-peer query routing. It helps the query routing processes to learn the routing based on the feedbacks collected. In an unstructured network where there is no global information available, efficient and low cost routing approach is needed for routing efficiency. In this paper, we propose a novel mechanism for query-feedback oriented routing indices to achieve routing efficiency in unstructured network at a minimal cost. The approach also applied information retrieval technique to make sure the content of the query is understandable and will make the routing process not just based to the query hits but also related to the query content. Experiments have shown that the proposed mechanism performs more efficient than flood-based routing.Keywords: Unstructured peer-to-peer, Searching, Retrieval, Internet.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1534212 Small Businesses' Decision to have a Website Saudi Arabia Case Study
Authors: M. Al-hawari, H. AL–Yamani, B. Izwawa
Abstract:
Recognizing the increasing importance of using the Internet to conduct business, this paper looks at some related matters associated with small businesses making a decision of whether or not to have a Website and go online. Small businesses in Saudi Arabia struggle to have this decision. For organizations, to fully go online, conduct business and provide online information services, they need to connect their database to the Web. Some issues related to doing that might be beyond the capabilities of most small businesses in Saudi Arabia, such as Website management, technical issues and security concerns. Here we focus on a small business firm in Saudi Arabia (Case Study), discussing the issues related to going online decision and the firm's options of what to do and how to do it. The paper suggested some valuable solutions of connecting databases to the Web. It also discusses some of the important issues related to online information services and e-commerce, mainly Web hosting options and security issues.Keywords: E-Commerce, Saudi Arabia, Small business, Webdatabase connection, Web hosting, World Wide Web (Web).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1968211 Key Performance Indicators and the Model for Achieving Digital Inclusion for Smart Cities
Authors: Khalid Obaed Mahmod, Mesut Cevik
Abstract:
The term smart city has appeared recently and was accompanied by many definitions and concepts, but as a simplified and clear definition, it can be said that the smart city is a geographical location that has gained efficiency and flexibility in providing public services to citizens through its use of technological and communication technologies, and this is what distinguishes it from other cities. Smart cities connect the various components of the city through the main and sub networks in addition to a set of applications, and thus are able to collect data that is the basis for providing technological solutions to manage resources and provide services. The basis of the work of the smart city is the use of artificial intelligence (AI) and the technology of the Internet of Things (IoT). The work presents the concept of smart cities, the pillars, standards and evaluation indicators on which smart cities depend, and the reasons that prompted the world to move towards its establishment. It also provides a simplified hypothetical way to measure the ideal smart city model by defining some indicators and key pillars, simulating them with logic circuits and testing them to determine if the city can be considered an ideal smart city or not.
Keywords: Evaluation indicators, logic gates, performance factors, pillars, smart city.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 349210 Usage-based Traffic Control for P2P Content Delivery
Authors: Megumi Shibuya, Tomohiko Ogishi
Abstract:
Recently, content delivery services have grown rapidly over the Internet. For ASPs (Application Service Provider) providing content delivery services, P2P architecture is beneficial to reduce outgoing traffic from content servers. On the other hand, ISPs are suffering from the increase in P2P traffic. The P2P traffic is unnecessarily redundant because the same content or the same fractions of content are transferred through an inter-ISP link several times. Subscriber ISPs have to pay a transit fee to upstream ISPs based on the volume of inter-ISP traffic. In order to solve such problems, several works have been done for the purpose of P2P traffic reduction. However, these existing works cannot control the traffic volume of a certain link. In order to solve such an ISP-s operational requirement, we propose a method to control traffic volume for a link within a preconfigured upper bound value. We evaluated that the proposed method works well by conducting a simulation on a 1,000-user scale. We confirm that the traffic volume could be controlled at a lower level than the upper bound for all evaluated conditions. Moreover, our method could control the traffic volume at 98.95% link usage against the target value.Keywords: P2P, traffic control, traffic localization, ALTO.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1563209 Combinatorial Optimisation of Worm Propagationon an Unknown Network
Authors: Eric Filiol, Edouard Franc, Alessandro Gubbioli, Benoit Moquet, Guillaume Roblot
Abstract:
Worm propagation profiles have significantly changed since 2003-2004: sudden world outbreaks like Blaster or Slammer have progressively disappeared and slower but stealthier worms appeared since, most of them for botnets dissemination. Decreased worm virulence results in more difficult detection. In this paper, we describe a stealth worm propagation model which has been extensively simulated and analysed on a huge virtual network. The main features of this model is its ability to infect any Internet-like network in a few seconds, whatever may be its size while greatly limiting the reinfection attempt overhead of already infected hosts. The main simulation results shows that the combinatorial topology of routing may have a huge impact on the worm propagation and thus some servers play a more essential and significant role than others. The real-time capability to identify them may be essential to greatly hinder worm propagation.Keywords: Combinatorial worm, worm spreading, worm virulence, stealth worm, spreading simulation, vertex cover, networktopology, WAST simulator, SuWAST simulator.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2202208 Investigation into the Role of Leadership in the Management of Digital Transformation for Small and Medium Enterprises
Authors: Francesco Coraci, Abdul-Hadi G. Abulrub
Abstract:
Digital technology is transforming the landscape of the industrial sector at a precedential level by connecting people, processes, and machines in real-time. It represents the means for a new pathway to achieve innovative, dynamic competitive advantages, deliver unique customers’ values, and sustain critical relationships. Thus, success in a constantly changing environment is governed by the ability of an organization to revolutionize their business models, deliver innovative solutions, and capture values from big data analytics and insights. Businesses need to re-strategize operations and develop extra capabilities to cope with the necessity for additional flexibility and agility. The traditional “command and control” leadership style is structurally and operationally incompatible with the digital era. In this paper, the authors discuss how transformational leaders can act as a glue in the social, organizational context, which is crucial to enable the workforce and develop a psychological attachment to the digital vision.Keywords: Internet of things, strategy, change leadership, dynamic competitive advantage, digital transformation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 679207 Effects of Video Games and Online Chat on Mathematics Performance in High School: An Approach of Multivariate Data Analysis
Authors: Lina Wu, Wenyi Lu, Ye Li
Abstract:
Regarding heavy video game players for boys and super online chat lovers for girls as a symbolic phrase in the current adolescent culture, this project of data analysis verifies the displacement effect on deteriorating mathematics performance. To evaluate correlation or regression coefficients between a factor of playing video games or chatting online and mathematics performance compared with other factors, we use multivariate analysis technique and take gender difference into account. We find the most important reason for the negative sign of the displacement effect on mathematics performance due to students’ poor academic background. Statistical analysis methods in this project could be applied to study internet users’ academic performance from the high school education to the college education.
Keywords: Correlation coefficients, displacement effect, gender difference, multivariate analysis technique, regression coefficients.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2170206 Model to Support Synchronous and Asynchronous in the Learning Process with An Adaptive Hypermedia System
Authors: Francisca Grimón, Marylin Giugni, Josep Monguet F., Joaquín Fernández, Luis León G.
Abstract:
In blended learning environments, the Internet can be combined with other technologies. The aim of this research was to design, introduce and validate a model to support synchronous and asynchronous activities by managing content domains in an Adaptive Hypermedia System (AHS). The application is based on information recovery techniques, clustering algorithms and adaptation rules to adjust the user's model to contents and objects of study. This system was applied to blended learning in higher education. The research strategy used was the case study method. Empirical studies were carried out on courses at two universities to validate the model. The results of this research show that the model had a positive effect on the learning process. The students indicated that the synchronous and asynchronous scenario is a good option, as it involves a combination of work with the lecturer and the AHS. In addition, they gave positive ratings to the system and stated that the contents were adapted to each user profile.
Keywords: Blended Learning, System Adaptive, Model, Clustering Algorithms.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1851205 Establishing a Change Management Model for Precision Machinery Industry in Taiwan
Authors: Feng-Tsung Cheng, Shu-Li Wang, Mei-Fang Wu, Hui-Yu Chuang
Abstract:
The rapid development technology and widespread Internet make business environment changing a lot. In order to stand in the global market and to keep subsistence, “changing” is unspoken rule for the company’s survival. The purpose of this paper is building up change model by using SWOT, strategy map, KPI and change management theory. The research findings indicate that the company needs to deal with employee’s resistance emotion firstly before building up change model. The ways of providing performance appraisal reward, consulting and counseling mechanisms that will great help to achieve reducing staff negative emotions and motivate staff’s efficiencies also. To revise strategy map, modify corporate culture, and improve internal operational processes which is based on change model. Through the change model, the increasing growth rate of net income helps company to achieve the goals and be a leading brand of precision machinery industry.
Keywords: Organizational change, SWOT analysis, strategy maps, performance indicators.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1798204 Assessing Students’ Attitudinal Response towards the Use of Virtual Reality in a Mandatory English Class at a Women’s University in Japan
Authors: Felix David
Abstract:
The use of virtual reality (VR) technology is still in its infancy. This is especially true in a Japanese educational context with very little to no exposition of VR technology inside classrooms. Technology is growing and changing rapidly in America, but Japan seems to be lagging behind in integrating VR into its curriculum. The aim of this research was to expose 111 students from Hiroshima Jogakuin University (HJU) to seven classes that involved VR content and assess students’ attitudinal responses toward this new technology. The students are all female, and they are taking the “Kiso Eigo/基礎英語” or Foundation English course, which is mandatory for all first- and second-year students. Two surveys were given, one before the treatment and a second survey after the treatment, which in this case means the seven VR classes. These surveys first established that the technical environment could accommodate VR activities in terms of internet connection, VR headsets, and the quality of the smartphone’s screen. Based on the attitudinal responses gathered in this research, VR is perceived by students as “fun,” useful to “learn about the world,” as well as being useful to “learn about English.” This research validates VR as a worthy educational tool and it should therefore continue being an integral part of the mandatory English course curriculum at HJU.
Keywords: Virtual Reality, smartphone, English Learning, curriculum.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 173