C-IoT Cloud-Based Services and C-IoT User Device Diversity

Keyword(s):  

Facial emotion analysis is the basic idea to train the system to understand the different facial expressions of human beings. The Facial expressions are recorded by the use of camera which is attached to user device. Additionally this project will be helpful for the online marketing of the products as it can detect the facial expressions and sentiment of the person. It is the study of people sentiment, opinions and emotions. Sentiment analysis is the method by which information is taken from the facial expressions of people in regard to different situations. The main aim is to read the facial expressions of the human beings using a good resolution camera so that the machine can identify the human sentiments. Convolutional neural network is used as an existing system which is unsupervised neural network to replace that with a supervised mechanism which is called supervised neural network. It can be used in gaming sector, unlock smart phones, automated facial language translation etc.


2018 ◽  
Vol 7 (2.12) ◽  
pp. 174
Author(s):  
Yong Ho Kim ◽  
Hui IL Chang

Background/Objectives: It is a common for existing golf courses to manage all lighting facilities in batches because it is hard to controllighting individually. That is very much part of the golf courses and forces the whole golf course to light on even though play was finished due to the difficulty of real time checking situationMethods/Statistical analysis: Lighting control device and method in this study are provided not only to control remotely individual lighting installed each hole in golf course but to inspect failure of lighting. There is no longer to stay golf course in person to control lighting system.Findings:Lighting control device and method to be able to control individual lighting installed each hole in golf course is provided to response for the problem in a waste of electricity after playing. User device makes it possible to remotely control lighting and inspect failure of itImprovements/Applications: It can expect to reduce golf course operation management cost by building a smart tower remote control system  


2018 ◽  
Vol 40 (2) ◽  
pp. 193-207 ◽  
Author(s):  
Elena Obushenkova ◽  
Barbara Plester ◽  
Nigel Haworth

Purpose The purpose of this paper is to investigate how company-provided smartphones and user-device attachment influence the psychological contract between employees and managers in terms of connectivity expectations and outcomes. Design/methodology/approach Data were collected using qualitative semi-structured interviews with 28 participants from four organizations. Findings The study showed that when organizations provide smartphones to their employees, the smartphones become a part of the manager-employee relationship through user-device attachment and this can change connectivity expectations for both employees and managers. Research limitations/implications Due to participant numbers, these findings may not be generalizable to all employees and managers who receive company smartphones. However, the authors have important implications for theory. The smartphone influence on the psychological climate and its role as a signal for workplace expectations suggest that mobile information and communication technology devices must be considered in psychological contract formation, development, change and breach. Practical implications The perceived expectations can lead to hyper-connectivity which can have a number of negative performance and health outcomes such as technostress, burnout, absenteeism and work-life conflict. Social implications Smartphone usage and user-device attachment have the potential to redefine human relations by encouraging and normalizing hyper-connected relationships. Originality/value This study makes an original contribution to psychological contract theory by showing that smartphones and attachment to these devices create perceived expectations to stay connected to work and create negative outcomes, especially for managers.


2018 ◽  
Vol 1 (4) ◽  
pp. 37
Author(s):  
Gazmend Krasniqi ◽  
Petrit Rama ◽  
Blerim Rexha

Today, we are witnessing increased demand for more speed and capacity in the Internet, and more processing power and storage in every end user device. Demand for greater performance is present in every system. Electronic devices and their hosted applications need to be fast, but not to lose their main security features. Authentication and encryption are the main processes in the security aspect, and are required for a secure communication. These processes can be executed in different devices, among them PCs, microprocessors, microcontrollers, biometric cards or mobile devices. Biometric identity cards are becoming increasingly popular, challenging traditional PC devices. This paper compares two processing systems, the efficiency of encryption and signatures on the data executed in national identity biometric card versus PC, known also as the match-on-card versus the match-off-card. It considers how different parameters impact the process and the role they play on the overall process. The results, executed with a predefined set of test vectors, determine which processing system to use in a certain situation. Final conclusions and recommendations are given taking into consideration the efficiency and security of the data.


2019 ◽  
Vol 9 (11) ◽  
pp. 2308 ◽  
Author(s):  
Juyong Lee ◽  
Daeyoub Kim ◽  
Jihoon Lee

Recently, new mobile applications and services have appeared thanks to the rapid development of mobile devices and mobile network technology. Cloud computing has played an important role over the past decades, providing powerful computing capabilities and high-capacity storage space to efficiently deliver these mobile services to mobile users. Nevertheless, existing cloud computing delegates computing to a cloud server located at a relatively long distance, resulting in significant delays due to additional time to return processing results from a cloud server. These unnecessary delays are inconvenient for mobile users because they are not suitable for applications that require a real-time service environment. To cope with these problems, a new computing concept called Multi-Access Edge Computing (MEC) has emerged. Instead of sending all requests to the central cloud to handle mobile users’ requests, the MEC brings computing power and storage resources to the edge of the mobile network. It enables the mobile user device to run the real-time applications that are sensitive to latency to meet the strict requirements. However, there is a lack of research on the efficient utilization of computing resources and mobility support when mobile users move in the MEC environment. In this paper, we propose the MEC-based mobility management scheme that arranges MEC server (MECS) as the concept of Zone so that mobile users can continue to receive content and use server resources efficiently even when they move. The results show that the proposed scheme reduce the average service delay compared to the existing MEC scheme. In addition, the proposed scheme outperforms the existing MEC scheme because mobile users can continuously receive services, even when they move frequently.


Sign in / Sign up

Export Citation Format

Share Document