Search results for: On-line cooperation
372 Decision Support System Based on Data Warehouse
Authors: Yang Bao, LuJing Zhang
Abstract:
Typical Intelligent Decision Support System is 4-based, its design composes of Data Warehouse, Online Analytical Processing, Data Mining and Decision Supporting based on models, which is called Decision Support System Based on Data Warehouse (DSSBDW). This way takes ETL,OLAP and DM as its implementing means, and integrates traditional model-driving DSS and data-driving DSS into a whole. For this kind of problem, this paper analyzes the DSSBDW architecture and DW model, and discusses the following key issues: ETL designing and Realization; metadata managing technology using XML; SQL implementing, optimizing performance, data mapping in OLAP; lastly, it illustrates the designing principle and method of DW in DSSBDW.
Keywords: Decision Support System, Data Warehouse, Data Mining.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3863371 Facebook Lessons for E-Business Startups
Authors: Linda, Sau-ling LAI
Abstract:
This paper addresses the fundamental requirements for starting an online business. It covers the process of ideation, conceptualization, formulation, and implementation of new venture ideas on the Web. Using Facebook as an illustrative example, we learn how to turn an idea into a successful electronic business and to execute a business plan with IT skills, management expertise, a good entrepreneurial attitude, and an understanding of Internet culture. The personality traits and characteristics of a successful e-commerce entrepreneur are discussed with reference to Facebook-s founder, Mark Zuckerberg. Facebook is a social and e-commerce success. It provides a trusted environment of which participants can conduct business with social experience. People are able to discuss products before, during the after the sale within the Facebook environment. The paper also highlights the challenges and opportunities for e-commerce entrepreneurial startups to go public and of entering the China market.Keywords: F-Commerce, Entrepreneur, Startup, E-Commerce
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2609370 A Comparative Analysis of Solid Waste Treatment Technologies on Cost and Environmental Basis
Authors: Nesli Aydin
Abstract:
Waste management decision making in developing countries has moved towards being more pragmatic, transparent, sustainable and comprehensive. Turkey is required to make its waste related legislation compatible with European Legislation as it is a candidate country of the European Union. Improper Turkish practices such as open burning and open dumping practices must be abandoned urgently, and robust waste management systems have to be structured. The determination of an optimum waste management system in any region requires a comprehensive analysis in which many criteria are taken into account by stakeholders. In conducting this sort of analysis, there are two main criteria which are evaluated by waste management analysts; economic viability and environmentally friendliness. From an analytical point of view, a central characteristic of sustainable development is an economic-ecological integration. It is predicted that building a robust waste management system will need significant effort and cooperation between the stakeholders in developing countries such as Turkey. In this regard, this study aims to provide data regarding the cost and environmental burdens of waste treatment technologies such as an incinerator, an autoclave (with different capacities), a hydroclave and a microwave coupled with updated information on calculation methods, and a framework for comparing any proposed scenario performances on a cost and environmental basis.
Keywords: Decision making, economic viability, environmentally friendliness, stakeholder, waste management systems.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1290369 e-Plagiarism Detection at Glamorgan
Authors: Esyin Chew, Haydn Blackey
Abstract:
There are increasingly plagiarism offences for students in higher education in the digital educational world. On the other hand, various and competitive online assessment and plagiarism detection tools are available in the market. Taking the University of Glamorgan as a case study, this paper describes and introduces an institutional journey on electronic plagiarism detection to inform the initial experience of an innovative tool and method which could be further explored in the future research. The comparative study and system workflow for e-plagiarism detection tool are discussed. Benefits for both academics and students are also presented. Electronic plagiarism detection tools brought great benefits to both academics and students in Glamorgan. On the other hand, the debates raised in such initial experience are discussed.Keywords: Educational Technology, Plagiarism detection, Turnitin
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1845368 Impact of Grade Sensitivity on Learning Motivation and Academic Performance
Authors: Salwa Aftab, Sehrish Riaz
Abstract:
The objective of this study was to check the impact of grade sensitivity on learning motivation and academic performance of students and to remove the degree of difference that exists among students regarding the cause of their learning motivation and also to gain knowledge about this matter since it has not been adequately researched. Data collection was primarily done through the academic sector of Pakistan and was depended upon the responses given by students solely. A sample size of 208 university students was selected. Both paper and online surveys were used to collect data from respondents. The results of the study revealed that grade sensitivity has a positive relationship with the learning motivation of students and their academic performance. These findings were carried out through systematic correlation and regression analysis.Keywords: Academic performance, correlation, grade sensitivity, learning motivation, regression.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2781367 Characterization of Lactose Consumption during the Biogas Production from Acid Whey by FT-IR Spectroscopy
Authors: K. Rugele, M. Gavare, M. Grube, K. Tihomirova, E. Skripsts, S. Larsson, J. Rubulis
Abstract:
The consumption of lactose in acid cheese whey anaerobic fermentation process under fed-batch conditions was studied. During fermentation for 100 hours the biogas production (CO2 and CH4) was analyzed online. Among the standard analyses FT-IR spectroscopy was used to follow the consumption of lactose by bacteria. The absorption bands at 990, 894 and 787 cm-1 in the 2nd derivative spectra were shown to be characteristic for lactose and were used to follow the lactose conversion. It was shown that acid cheese whey lactose was converted by bacteria in first 7 hours. In the spectra of 17, 18 and 95 hour fermentation samples lactose was not identified and these results correlated with the HPLC data.Keywords: Acid whey, anaerobic digestion, biogas, FT-IR spectroscopy, lactose consumption.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2496366 A Redesigned Pedagogy in Introductory Programming Reduces Failure and Withdrawal Rates by Half
Authors: Said C. Fares, Mary A. Fares
Abstract:
It is well documented that introductory computer programming courses are difficult and that failure rates are high. The aim of this project was to reduce the high failure and withdrawal rates in learning to program. This paper presents a number of changes in module organization and instructional delivery system in teaching CS1. Daily out of class help sessions and tutoring services were applied, interactive lectures and laboratories, online resources, and timely feedback were introduced. Five years of data of 563 students in 21 sections was collected and analyzed. The primary results show that the failure and withdrawal rates were cut by more than half. Student surveys indicate a positive evaluation of the modified instructional approach, overall satisfaction with the course and consequently, higher success and retention rates.
Keywords: Failure Rate, Interactive Learning, Student engagement, CS1.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1778365 Cooperative Learning: A Case Study on Teamwork through Community Service Project
Authors: Priyadharshini Ahrumugam
Abstract:
Cooperative groups through much research have been recognized to churn remarkable achievements instead of solitary or individualistic efforts. Based on Johnson and Johnson’s model of cooperative learning, the five key components of cooperation are positive interdependence, face-to-face promotive interaction, individual accountability, social skills, and group processing. In 2011, the Malaysian Ministry of Higher Education (MOHE) introduced the Holistic Student Development policy with the aim to develop morally sound individuals equipped with lifelong learning skills. The Community Service project was included in the improvement initiative. The purpose of this study is to assess the relationship of team-based learning in facilitating particularly students’ positive interdependence and face-to-face promotive interaction. The research methods involve in-depth interviews with the team leaders and selected team members, and a content analysis of the undergraduate students’ reflective journals. A significant positive relationship was found between students’ progressive outlook towards teamwork and the highlighted two components. The key findings show that students have gained in their individual learning and work results through teamwork and interaction with other students. The inclusion of Community Service as a MOHE subject resonates with cooperative learning methods that enhances supportive relationships and develops students’ social skills together with their professional skills.Keywords: Community service, cooperative learning, positive interdependence, teamwork.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2202364 Application of Cite Space Software in Visual Analysis of Land Use Coupling Research Progress
Authors: Jing Zhou, Weiqun Su, Naying Luo, Min Shang, Li Wu
Abstract:
The coupling of land use system in geographical research is mainly the coupling of pattern and process, which is essentially the human-land coupling, and is an important part of the research and discussion of human-land relationship. Based on the Web of Science database, the paper titles, authors, keywords, and references from 1997-2020 related to land use coupling were used as data sources to explore the research progress of land use coupling. Cite Space bibliometric tool was used for co-occurrence analysis of the issuing country, issuing institution, co-cited author, disciplinary institution, and keywords. The results are shown as follows: (1) From 1997 to 2020, the United States, China, and Germany rank the top, with more than 250 published papers. Although China ranks second in the number of published papers on foreign literature, it has less centrality and less influence. (2) The top 10 institutions (universities) in the number of published papers (more than 300 articles) are mainly from the United States and China, and the University of Chinese Academy of Sciences has the highest output of papers. At the same time, the phenomenon of multi-institutional cooperation has increased in the field of land use coupling research. (3) From 1997 to 2020, land sensitivity research and the impact of climate change on land use patterns are the main directions of land use coupling research. However, in the past five years, scholars have mainly focused on the coupling research methods of land use and the coupling relationship between ecological and environmental factors and land use.
Keywords: Land use coupling, cite space, knowledge graph, visual analysis, research progress.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 391363 Understanding Europe’s Role in the Area of Liberty, Security and Justice as an International Actor
Authors: Sarah Barrere
Abstract:
The area of liberty, security and justice within the European Union is still a work in progress. No one can deny that the EU struggles between a monistic and a dualist approach. The aim of our essay is to first review how the European law is perceived by the rest of the international scene. It will then discuss two main mechanisms at play: the interpretation of larger international treaties and the penal mechanisms of European law. Finally, it will help us understand the role of a penal Europe on the international scene with concrete examples. Special attention will be paid to cases that deal with fundamental rights as they represent an interesting case study in Europe and in the rest of the World. It could illustrate the aforementioned duality currently present in the Union’s interpretation of international public law. On the other hand, it will explore some specific European penal mechanism through mutual recognition and the European arrest warrant in the transnational criminality frame. Concerning the interpretation of the treaties, it will first, underline the ambiguity and the general nature of some treaties that leave the EU exposed to tension and misunderstanding then it will review the validity of an EU act (whether or not it is compatible with the rules of International law). Finally, it will focus on the most complete manifestation of liberty, security and justice through the principle of mutual recognition. Used initially in commercial matters, it has become “the cornerstone” of European construction. It will see how it is applied in judicial decisions (its main event and achieving success is via the European arrest warrant) and how European member states have managed to develop this cooperation.Keywords: European penal law, International scene, Liberty security and justice area, mutual recognition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1594362 An Improved QRS Complex Detection for Online Medical Diagnosis
Authors: I. L. Ahmad, M. Mohamed, N. A. Ab. Ghani
Abstract:
This paper presents the work of signal discrimination specifically for Electrocardiogram (ECG) waveform. ECG signal is comprised of P, QRS, and T waves in each normal heart beat to describe the pattern of heart rhythms corresponds to a specific individual. Further medical diagnosis could be done to determine any heart related disease using ECG information. The emphasis on QRS Complex classification is further discussed to illustrate the importance of it. Pan-Tompkins Algorithm, a widely known technique has been adapted to realize the QRS Complex classification process. There are eight steps involved namely sampling, normalization, low pass filter, high pass filter (build a band pass filter), derivation, squaring, averaging and lastly is the QRS detection. The simulation results obtained is represented in a Graphical User Interface (GUI) developed using MATLAB.Keywords: ECG, Pan Tompkins Algorithm, QRS Complex, Simulation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2575361 LumaCert: Conception and Creation of New Digital Certificate for Online User Authentication in e-Banking Systems
Authors: Artan Luma, Betim Prevalla, Besart Qoku, Bujar Raufi
Abstract:
Electronic banking must be secure and easy to use and many banks heavily advertise an apparent of 100% secure system which is contestable in many points. In this work, an alternative approach to the design of e-banking system, through a new solution for user authentication and security with digital certificate called LumaCert is introduced. The certificate applies new algorithm for asymmetric encryption by utilizing two mathematical operators called Pentors and UltraPentors. The public and private key in this algorithm represent a quadruple of parameters which are directly dependent from the above mentioned operators. The strength of the algorithm resides in the inability to find the respective Pentor and UltraPentor operator from the mentioned parameters.Keywords: Security, Digital Certificate, Cryptography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2215360 Performance Comparison of Resource Allocation without Feedback in Wireless Body Area Networks by Various Pseudo Orthogonal Sequences
Authors: Ojin Kwon, Yong-Jin Yoon, Liu Xin, Zhang Hongbao
Abstract:
Wireless Body Area Network (WBAN) is a short-range wireless communication around human body for various applications such as wearable devices, entertainment, military, and especially medical devices. WBAN attracts the attention of continuous health monitoring system including diagnostic procedure, early detection of abnormal conditions, and prevention of emergency situations. Compared to cellular network, WBAN system is more difficult to control inter- and inner-cell interference due to the limited power, limited calculation capability, mobility of patient, and non-cooperation among WBANs. In this paper, we compare the performance of resource allocation scheme based on several Pseudo Orthogonal Codewords (POCs) to mitigate inter-WBAN interference. Previously, the POCs are widely exploited for a protocol sequence and optical orthogonal code. Each POCs have different properties of auto- and cross-correlation and spectral efficiency according to its construction of POCs. To identify different WBANs, several different pseudo orthogonal patterns based on POCs exploits for resource allocation of WBANs. By simulating these pseudo orthogonal resource allocations of WBANs on MATLAB, we obtain the performance of WBANs according to different POCs and can analyze and evaluate the suitability of POCs for the resource allocation in the WBANs system.Keywords: Wireless body area network, body sensor network, resource allocation without feedback, interference mitigation, pseudo orthogonal pattern.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1343359 Simultaneous Segmentation and Recognition of Arabic Characters in an Unconstrained On-Line Cursive Handwritten Document
Authors: Randa I. Elanwar, Mohsen A. Rashwan, Samia A. Mashali
Abstract:
The last two decades witnessed some advances in the development of an Arabic character recognition (CR) system. Arabic CR faces technical problems not encountered in any other language that make Arabic CR systems achieve relatively low accuracy and retards establishing them as market products. We propose the basic stages towards a system that attacks the problem of recognizing online Arabic cursive handwriting. Rule-based methods are used to perform simultaneous segmentation and recognition of word portions in an unconstrained cursively handwritten document using dynamic programming. The output of these stages is in the form of a ranked list of the possible decisions. A new technique for text line separation is also used.
Keywords: Arabic handwriting, character recognition, cursive handwriting, on-line recognition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1901358 Grounded Theory of Consumer Loyalty, a Perspective through Video Game Addiction
Authors: Bassam Shaikh, R. S. A. Jumain
Abstract:
Game addiction has become an extremely important topic in psychology researchers, particularly in understanding and explaining why individuals become addicted (to video games). In previous studies, effect of online game addiction on social responsibilities, health problems, government action, and the behaviors of individuals to purchase and the causes of making individuals addicted on the video games has been discussed. Extending these concepts in marketing, it could be argued than the phenomenon could enlighten and extending our understanding on consumer loyalty. This study took the Grounded Theory approach, and found that motivation, satisfaction, fulfillments, exploration and achievements to be part of the important elements that builds consumer loyalty.
Keywords: Consumer Loyalty, Video Games Addiction, Video Games, Grounded Theory.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2689357 Sensorless Commutation Control of Switched Reluctance Motor
Authors: N.H. Mvungi
Abstract:
This paper addresses control of commutation of switched reluctance (SR) motor without the use of a physical position detector. Rotor position detection schemes for SR motor based on magnetisation characteristics of the motor use normal excitation or applied current /voltage pulses. The resulting schemes are referred to as passive or active methods respectively. The research effort is in realizing an economical sensorless SR rotor position detector that is accurate, reliable and robust to suit a particular application. An effective and reliable means of generating commutation signals of an SR motor based on inductance profile of its stator windings determined using active probing technique is presented. The scheme has been validated online using a 4-phase 8/6 SR motor and an 8-bit processor.Keywords: Position detection, rotor position, sensorless, switched reluctance, SR.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2867356 Causes of Construction Delays in Qatar Construction Projects
Authors: Murat Gunduz, Mohanad H. A. AbuHassan
Abstract:
Construction industry mainly focuses on the superstructure, infrastructure, and oil and gas industry. The development of infrastructure projects in developing countries attracted a lot of foreign construction contractors, consultants, suppliers and diversified workforce to interfere and to be evolved in such huge investment. Reducing worksite delays in such projects require knowledge and attention. Therefore, it is important to identify the influencing delay attributes affecting construction projects. The significant project factors affecting construction delays were investigated. Data collection was carried out through an online web survey system to capture significant factors. Significant factors were determined with importance index and relevant recommendations are made. The output of the data analysis would lead the industry experts better assess the impact of construction delays on construction projects.
Keywords: Construction industry, delays, importance index.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2675355 Behavioral Analysis of Team Members in Virtual Organization based on Trust Dimension and Learning
Authors: Indiramma M., K. R. Anandakumar
Abstract:
Trust management and Reputation models are becoming integral part of Internet based applications such as CSCW, E-commerce and Grid Computing. Also the trust dimension is a significant social structure and key to social relations within a collaborative community. Collaborative Decision Making (CDM) is a difficult task in the context of distributed environment (information across different geographical locations) and multidisciplinary decisions are involved such as Virtual Organization (VO). To aid team decision making in VO, Decision Support System and social network analysis approaches are integrated. In such situations social learning helps an organization in terms of relationship, team formation, partner selection etc. In this paper we focus on trust learning. Trust learning is an important activity in terms of information exchange, negotiation, collaboration and trust assessment for cooperation among virtual team members. In this paper we have proposed a reinforcement learning which enhances the trust decision making capability of interacting agents during collaboration in problem solving activity. Trust computational model with learning that we present is adapted for best alternate selection of new project in the organization. We verify our model in a multi-agent simulation where the agents in the community learn to identify trustworthy members, inconsistent behavior and conflicting behavior of agents.Keywords: Collaborative Decision making, Trust, Multi Agent System (MAS), Bayesian Network, Reinforcement Learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1894354 The Techno-Pedagogical Pivot: Designing and Implementing a Digital Writing Tool
Authors: Justin D. Olmanson, Katrina S. Kennett, Bill Cope
Abstract:
In educational technology, the idea of innovation is usually tethered to contemporary technological inventions and emerging technologies. Yet, using long-known technologies in ways that are pedagogically or experimentially new can reposition them as emerging educational technologies. In this study we explore how a subtle pivot in pedagogical thinking led to an innovative education technology. We describe the design and implementation of an online writing tool that scaffolds students in the evaluation of their own informational texts. We think about how pathways to innovation can emerge from pivots, namely a leveraging of longstanding practices in novel ways has the potential to cultivate new opportunities for learning. We first unpack Infowriter in terms of its design, then we describe some results of a study in which we implemented an intervention which included our designed application.Keywords: Design, innovation, learning, technology, writing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1694353 Evaluation of State of the Art IDS Message Exchange Protocols
Authors: Robert Koch, Mario Golling, Gabi Dreo
Abstract:
During the last couple of years, the degree of dependence on IT systems has reached a dimension nobody imagined to be possible 10 years ago. The increased usage of mobile devices (e.g., smart phones), wireless sensor networks and embedded devices (Internet of Things) are only some examples of the dependency of modern societies on cyber space. At the same time, the complexity of IT applications, e.g., because of the increasing use of cloud computing, is rising continuously. Along with this, the threats to IT security have increased both quantitatively and qualitatively, as recent examples like STUXNET or the supposed cyber attack on Illinois water system are proofing impressively. Once isolated control systems are nowadays often publicly available - a fact that has never been intended by the developers. Threats to IT systems don’t care about areas of responsibility. Especially with regard to Cyber Warfare, IT threats are no longer limited to company or industry boundaries, administrative jurisdictions or state boundaries. One of the important countermeasures is increased cooperation among the participants especially in the field of Cyber Defence. Besides political and legal challenges, there are technical ones as well. A better, at least partially automated exchange of information is essential to (i) enable sophisticated situational awareness and to (ii) counter the attacker in a coordinated way. Therefore, this publication performs an evaluation of state of the art Intrusion Detection Message Exchange protocols in order to guarantee a secure information exchange between different entities.
Keywords: Cyber Defence, Cyber Warfare, Intrusion Detection Information Exchange, Early Warning Systems, Joint Intrusion Detection, Cyber Conflict
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2293352 Haptics Enabled of ine AFM Image Analysis
Authors: Bhatti A., Nahavandi S., Hossny M.
Abstract:
Current advancements in nanotechnology are dependent on the capabilities that can enable nano-scientists to extend their eyes and hands into the nano-world. For this purpose, a haptics (devices capable of recreating tactile or force sensations) based system for AFM (Atomic Force Microscope) is proposed. The system enables the nano-scientists to touch and feel the sample surfaces, viewed through AFM, in order to provide them with better understanding of the physical properties of the surface, such as roughness, stiffness and shape of molecular architecture. At this stage, the proposed work uses of ine images produced using AFM and perform image analysis to create virtual surfaces suitable for haptics force analysis. The research work is in the process of extension from of ine to online process where interaction will be done directly on the material surface for realistic analysis.
Keywords: Haptics, AFM, force feedback, image analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1573351 A Tool for Audio Quality Evaluation Under Hostile Environment
Authors: Akhil Kumar Arya, Jagdeep Singh Lather, Lillie Dewan
Abstract:
In this paper is to evaluate audio and speech quality with the help of Digital Audio Watermarking Technique under the different types of attacks (signal impairments) like Gaussian Noise, Compression Error and Jittering Effect. Further attacks are considered as Hostile Environment. Audio and Speech Quality Evaluation is an important research topic. The traditional way for speech quality evaluation is using subjective tests. They are reliable, but very expensive, time consuming, and cannot be used in certain applications such as online monitoring. Objective models, based on human perception, were developed to predict the results of subjective tests. The existing objective methods require either the original speech or complicated computation model, which makes some applications of quality evaluation impossible.Keywords: Digital Watermarking, DCT, Speech Quality, Attacks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1624350 Digital Forensics for Electronic Commerce on the Web
Authors: Ryuya Uda
Abstract:
On existing online shopping on the web, SSL and password are usually used to achieve the secure trades. SSL shields communication from the third party who is not related with the trade, and indicates that the trader's web site is authenticated by one of the certification authority. Password certifies a customer as the same person who has visited the trader's web site before, and protects the customer's privacy such as what the customer has bought on the site. However, there is no forensics for the trades in those cased above. With existing methods, no one can prove what is ordered by customers, how many products are ordered and even whether customers have ordered or not. The reason is that the third party has to guess what were traded with logs that are held by traders and by customers. The logs can easily be created, deleted and forged since they are electronically stored. To enhance security with digital forensics for electronic commerce on the web, I indicate a secure method with cellular phones.Keywords: Cellular Phone, Digital Forensics, ElectronicCommerce, Information Security
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1841349 Development of a Catalogs System for Augmented Reality Applications
Authors: J. Ierache, N. A. Mangiarua, S. A. Bevacqua, N. N. Verdicchio, M. E. Becerra, D. R. Sanz, M. E. Sena, F. M. Ortiz, N. D. Duarte, S. Igarza
Abstract:
Augmented Reality is a technology that involves the overlay of virtual content, which is context or environment sensitive, on images of the physical world in real time. This paper presents the development of a catalog system that facilitates and allows the creation, publishing, management and exploitation of augmented multimedia contents and Augmented Reality applications, creating an own space for anyone that wants to provide information to real objects in order to edit and share it then online with others. These spaces would be built for different domains without the initial need of expert users. Its operation focuses on the context of Web 2.0 or Social Web, with its various applications, developing contents to enrich the real context in which human beings act permitting the evolution of catalog’s contents in an emerging way.
Keywords: Augmented Reality, Catalog System, Computer Graphics, Mobile Application.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2477348 Haptics Enabled Offline AFM Image Analysis
Authors: Bhatti A., Nahavandi S., Hossny M.
Abstract:
Current advancements in nanotechnology are dependent on the capabilities that can enable nano-scientists to extend their eyes and hands into the nano-world. For this purpose, a haptics (devices capable of recreating tactile or force sensations) based system for AFM (Atomic Force Microscope) is proposed. The system enables the nano-scientists to touch and feel the sample surfaces, viewed through AFM, in order to provide them with better understanding of the physical properties of the surface, such as roughness, stiffness and shape of molecular architecture. At this stage, the proposed work uses of ine images produced using AFM and perform image analysis to create virtual surfaces suitable for haptics force analysis. The research work is in the process of extension from of ine to online process where interaction will be done directly on the material surface for realistic analysis.Keywords: Haptics, AFM, force feedback, image analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1509347 Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.
Keywords: Image security, random LSB, steganography, visual cryptography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1387346 Hybrid Authentication Scheme for Graphical Password Using QR Code and Integrated Sound Signature
Authors: Salim Istyaq, Mohammad Sarosh Umar
Abstract:
Today, the mankind is in the stage of development, every day comes with new proposal of technology, in order to secure these types of technology, we also prepare high yielding security modules to conserve these resources. The capacity of human brain to recognize anything is far more than any species; this is all due to our developing cycle of curiosity. In this paper, we proposed a scheme based on graphical password using QR Code which provides more security to the recent online system. It also contains a supportive sound signature. In this system, authentication is done using sequence of images in QR code form. Users select one click-point per image with the help of QR scanner or recognizer. The encoded phrase in a QR code emphasizes the minimum probability of attacking via shoulder surfing or other attacks.
Keywords: Graphical password, QR code, sound signature, image authentication, cued click point.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 773345 Toward a Model for Knowledge Development in Virtual Environments: Strategies for Student Ownership
Authors: N.B. Adams
Abstract:
This article discusses the concept of student ownership of knowledge and seeks to determine how to move students from knowledge acquisition to knowledge application and ultimately to knowledge generation in a virtual setting. Instructional strategies for fostering student engagement in a virtual environment are critical to the learner-s strategic ownership of the knowledge. A number of relevant theories that focus on learning, affect, needs and adult concerns are presented to provide a basis for exploring the transfer of knowledge from teacher to learner. A model under development is presented that combines the dimensions of knowledge approach, the teacher-student relationship with regards to knowledge authority and teaching approach to demonstrate the recursive and scaffolded design for creation of virtual learning environments.
Keywords: Virtual learning environments, learning theory, teaching model, online learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1869344 The Role of Food Labeling on Consumers’ Buying Decision: Georgian Case
Authors: Nugzar Todua
Abstract:
The paper studies the role of food labeling in order to promote healthy eating issue in Georgia. The main focus of the research is directed to consumer attitudes regarding food labeling. The methodology of the paper is based on the focus group work, as well as online and face to face surveys. The data analysis has been provided through ANOVA. The study proves that the impact of variables such as the interest, awareness, reliability, assurance and satisfaction of consumers' on buying decision, is statistically important. The study reveals that consumers’ perception regarding to food labeling is positive, but their level of knowledge and ability is rather low. It is urgent to strengthen marketing promotions strategies in the process of implementations of food security policy in Georgia.Keywords: Food labeling, buying decision, Georgian consumers, marketing research.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1065343 Factors Influencing B2c eCommerce Diffusion
Authors: R. Mangiaracina, A. Perego, F. Campari
Abstract:
Despite the fact that B2c eCommerce has become important in numerous economies, its adoption varies from country to country. This paper aims to identify the factors affecting (enabling or inhibiting) B2c eCommerce and to determine their quantitative impact on the diffusion of online sales across countries. A dynamic panel model analyzing the relationship between 13 factors (Macroeconomic, Demographic, Socio-Cultural, Infrastructural and Offer related) stemming from a complete literature analysis and the B2c eCommerce value in 45 countries over 9 years has been developed. Having a positive correlation coefficient, GDP, mobile penetration, Internet user penetration and credit card penetration resulted as enabling drivers of the B2c eCommerce value across countries, whereas, having a negative correlation coefficient,equal distribution of income and the development of traditional retailing network act as inhibiting factors.Keywords: B2c eCommerce diffusion, influencing factors, dynamic panel model
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3568