23 research outputs found

    Internet of Things: Underwater routing based on user’s health status for smart diving

    Get PDF
    Technological advancements affect everyday life; they benefited our daily routines, habits, and activities. Underwater diving is one of the most interesting and attractive activities for tourists worldwide but could be risky and challenging. When paths are not clear, diving might take additional time and effort leading to some health problems. Thus, providing divers with proper direction information to surf underwater can be useful and helpful. Also, monitoring diverse health statuses and alerting them in case of any undesirable condition can increase their safety. Smart devices such as mobiles, watches, sensor devices, cellular networks along with the Internet of Things (IoT) can all provide location-based services. Such services can help in providing the best path for the divers and monitor their health status during diving. This paper proposes a new underwater routing approach, called Underwater Routing for Smart Diving “URSD”, which provides divers with routing information to visit underwater cultural or natural resources and monitors their health status during the diving period. The URSD approach was simulated and compared with the shortest path. Results showed that the URSD helped divers to route within paths that have a larger number of nodes, furthermore, it could enhance and improve divers experience and help them mitigate underwater risks

    Employing CNN ensemble models in classifying dental caries using oral photographs

    Get PDF
    Dental caries is arguably the most persistent dental condition that affects most people over their lives. Carious lesions are commonly diagnosed by dentists using clinical and visual examination along with oral radiographs. In many circumstances, dental caries is challenging to detect with photography and might be mistaken as shadows for various reasons, including poor photo quality. However, with the introduction of Artificial Intelligence and robotic systems in dentistry, photographs can be a helpful tool in oral epidemiological research for the assessment of dental caries prevalence among the population. It can be used particularly to create a new automated approach to calculate DMF (Decay, Missing, Filled) index score. In this paper, an autonomous diagnostic approach for detecting dental cavities in photos is developed using deep learning algorithms and ensemble methods. The proposed technique employs a set of pretrained models including Xception, VGG16, VGG19, and DenseNet121 to extract essential characteristics from photographs and to classify images as either normal or caries. Then, two ensemble learning methods, E- majority and E-sum, are employed based on majority voting and sum rule to boost the performances of the individual pretrained model. Experiments are conducted on 50 images with data augmentation for normal and caries images, the employed E-majority and E-sum achieved an accuracy score of 96% and 97%, respectively. The obtained results demonstrate the superiority of the proposed ensemble framework in the detection of caries. Furthermore, this framework is a step toward constructing a fully automated, efficient decision support system to be used in the dentistry area

    MyAds : a social adaptive system for online advertisement from hypotheses to implementation

    Get PDF
    Online advertisement is one of the major incomes for many companies; it has a role in the overall business flow and affects the consumer behavior directly. Unfortunately most users tend to block their ads or ignore them. MyAds is a social adaptive hypermedia system for online advertising and its main goal is to explore how to make online ads more acceptable. In order to achieve such a goal, various technologies and techniques are used. This paper presents a theoretical framework as well as the system architecture for MyAds that was designed based on a set of hypotheses and an exploratory study. The system then was implemented and a pilot experiment was conducted to validate it. The main outcomes suggest that the system has provided personalized ads for users. The main implications suggest that the system can be used for further testing and validating

    A New Vision for Evaluating the Quality of E-Commerce Websites

    No full text
    Quality has been established as a key factor in ensuring the success of E-commerce in attracting and retaining customers. To help in this, numerous software metrics and website quality models have been developed, with a correspondingly large literature. We provide a critical review of this literature and the state-of-the-art. Most of the wide ranges of E-commerce website evaluation models give emphasis on the web applications of the system, using techniques like feature inspection and collecting data about end-usersâ?? opinion by questionnaires. However, this is in conflict with two fundamental pragmatic aspects of current websites. Web technologies evolve extremely fast, enabling sophisticated tools to be deployed and complex interactions to take place. Secondly, the life cycle of a website is also extremely fast: maintenance of a website is performed at a rate that is higher than that of other software products because of market pressure and lack of distribution barriers

    A Survey on Improving QoS in Service Level Agreement for Cloud Computing Environment

    No full text
    Cloud computing is considered one of the most important techniques in the field of distributed computing which contributes to maintain increased scalability and flexibility in computer processing. This is achieved because it, using the Internet, provides different resources and shared services with minimum costs. Cloud service providers (CSPs) offer many different services to their customers, where the customers’ needs are met seeking the highest levels of quality at the lowest considerate prices. The relationship between CSPs and customers must be determined in a formal agreement, and to ensure how the QoS between them will be fulfilled, a clear Service Level Agreement (SLA) must be called for. Several previously-proposed models used in the literature to improve the QoS in the SLA for cloud computing and to face many of the challenges in the SLA are reviewed in this paper. We also addressed the challenges that are related to the violations of SLAs, and how overcoming them will enhance customers’ satisfaction. Furthermore, we proposed a model based on Deep Reinforcement Learning (DRL) and an enhanced DRL agent (EDRLA). In this model, and by optimizing the learning process in EDRLA, proposed agents would be able to have optimal CSPs by improving the learning process in EDRLA. This improvement will be reflected in the agent's performance and considerably affect it, especially in identifying cloud computing requirements based on the QoS metrics

    Innovative Secure Mobile Banking Services

    No full text
    Due to the widespread use of computer technologies in almost all aspects of life, organisations that are connected to the Internet started extending their services to their customers to include new applications and services that satisfy their customersâ?? desires to make better businesses. One of these emerging applications is mobile banking. The term mobile banking (or m-banking) describes the banking services that the user can perform via a mobile device ubiquitously at anytime and from anywhere. In order for users to access their accounts, they need a mobile device and network connectivity. Therefore, sitting in front of a computer is not a requirement anymore; accessing accounts can occur while users are waiting their turn at the dentist clinic or relaxing at the beach! This paper explores the opportunities of using mobile technology in the electronic banking (e-banking) sector to enhance existing banking services by moving toward m-banking using mobile devices and wireless media that can provide opportunities for ubiquitous access to the banking services as mobile technologies can be used at anytime and from anywhere. The technical problems encountered while using the mobile devices presents some technical difficulties and challenges for the m-banking. In this paper we introduce a mobile system that demonstrates the flexibility gained out of this technology and covers the major aspects of such kind of applications. The proposed system covers two parts: the customer services (user interface) and the security aspects. In the user interface part, banking facility is provided to the user through the mobile device to implement banking transactions. The model provides customers with the services: billing payments, transferring of funds, viewing of customerâ??s accounts and transactions, allowing the user to change his/her password and request a cheque book. The application takes into consideration security aspects, it satisfies the following security requirements: Authentication, Confidentiality and Authorisation. This paper introduces the advantages and disadvantages of using mobility in the banking sector. Furthermore, this paper also presents the security, suitability and feasibility aspects of using m-banking in terms of technology and usability

    Mobile Information System, How to Build with Case Study

    No full text
    In a distributed computing environment, comprising mobile computers and wireless networks, users change their locations frequently while still expecting “acceptable” levels of performance. This complexity will produce poor performance with no exact answer why? In such an environment, a new method of designing applications will be required. It is claimed that understanding network performance is an art rather than a science because in practice there is little underlying useful theory; so, experience with real world examples are used instead to develop rules of thumb [14]. This paper is fundamentally designed to describe types of mobile applications and the major performance factors needed to be considered when designing such kind of applications. Methods of connectivity: always connected, occasionally connected, and occasionally disconnected will be addressed as well. We are proposing a Mobile Information System (MIS) model. This model will address the needs for monitoring wireless environment where the mobile applications running in this area and how it is monitoring the performance factors. Also provided in the model are the features of the MIS, the pros and cons of the model, and a simulation to show the effectiveness of the model
    corecore