On Ambient Information Systems

Author(s):  
William R. Hazlewood ◽  
Lorcan Coyle

The rise of the Internet, the ever increasing ubiquity of data, and its low signal-to-noise ratio have contributed to the problem of information overload, whereby individuals have access to more data than they can assimilate into meaningful and actionable information. Much of the success of Web 2.0 has been achieved after an effective tackling of this problem. Ambient Information Systems take the battle into the physical world by integrating information into the physical environment in a non-intimidating and non-overloading fashion. After two international workshops on Ambient Information Systems, we outline our vision for the field, consolidate a new definition, identify the key concerns of the research community, and issue a call to arms for future research.

Author(s):  
William R. Hazlewood ◽  
Lorcan Coyle

The rise of the Internet, the ever increasing ubiquity of data, and its low signal-to-noise ratio have contributed to the problem of information overload, whereby individuals have access to more data than they can assimilate into meaningful and actionable information. Much of the success of Web 2.0 has been achieved after an effective tackling of this problem. Ambient Information Systems take the battle into the physical world by integrating information into the physical environment in a non-intimidating and non-overloading fashion. After two international workshops on Ambient Information Systems, we outline our vision for the field, consolidate a new definition, identify the key concerns of the research community, and issue a call to arms for future research.


2020 ◽  
Vol 64 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Sarah M. Meeßen ◽  
Meinald T. Thielsch ◽  
Guido Hertel

Abstract. Digitalization, enhanced storage capacities, and the Internet of Things increase the volume of data in modern organizations. To process and make use of these data and to avoid information overload, management information systems (MIS) are introduced that collect, process, and analyze relevant data. However, a precondition for the application of MIS is that users trust them. Extending accounts of trust in automation and trust in technology, we introduce a new model of trust in MIS that addresses the conceptual ambiguities of existing conceptualizations of trust and integrates initial empirical work in this field. In doing so, we differentiate between perceived trustworthiness of an MIS, experienced trust in an MIS, intentions to use an MIS, and actual use of an MIS. Moreover, we consider users’ perceived risks and contextual factors (e. g., autonomy at work) as moderators. The introduced model offers guidelines for future research and initial suggestions to foster trust-based MIS use.


Author(s):  
Ikponmwosa Oghogho

This chapter seeks to present the dependence of throughput on signal to noise ratio (SNR) in IEEE802.11 WLAN systems. High throughput and low delays are presented as the requirements for indicating good performance of WLAN systems. The multiple communication data rates specified by the physical layer of IEEE802.11 WLANs which vary depending on the SNR observed is shown to appreciably influence the throughput experienced by the users. Cross-layer modelling principles which simplifies the process of estimating the dependence of throughput on SNR is presented. Recent research findings which apply cross-layer modelling principles to model the dependence of throughput on SNR only is presented along with future research directions.


Author(s):  
Sushruta Mishra ◽  
Hrudaya Kumar Tripathy ◽  
Brojo Kishore Mishra ◽  
Sunil Kumar Mohapatra

The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and their surroundings. This will give immediate access to information about the physical world and the objects in it leading to innovative services and increase in efficiency and productivity. In general, it may be beneficial to incorporate a number of the technologies of IoT with the use of services that can act as the bridge between each technology and the applications that developers wish to implement in IoT. This chapter studies the state-of-the-art of IoT and presents the key potential applications, challenges and future research areas in the domain of IoT. This chapter presents four main categories of services according to technical features. Some major issues of future research in IoT are identified and discussed briefly.


2015 ◽  
Author(s):  
Kiev Gama ◽  
Rafael Wanderley ◽  
Daniel Maranhão ◽  
Vinicius Garcia

The “Internet of Things” (IoT) brings the notion of heterogeneous objects using ubiquitous technologies to interact among them and with the physical environment through technologies such as Bluetooth, ZigBee, GPRS, NFC, QR code, among others. Based on the possibility of linking ordinary objects from the physical world to the Internet, this paper proposes and details a platform called TagHunt, for creating and playing scavenger hunt games. This platform leverages on smartphones’ capability to interact with ordinary objects using IoT-based technologies such as NFC and QR Code, stimulating the player to interact with physical environments looking for “clues” in the game.


Author(s):  
A. A. Abdelmgeid ◽  
A. A. Bahgat ◽  
Al-Hussien Seddik Saad ◽  
Maha Mohamed Gomaa

Steganography is the art and science of writing hidden messages in such a way that no one suspects the existence of the message, a form of security through obscurity. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. In this paper explains the PIGPEN image steganography technique which modifies the secret message itself not the technique of embedding. This technique represents the secret message characters by two decimal digits only not three decimal digits as ASCII encoding. So, it can save one third of the required space for embedding the message in an image. The PIGPEN technique will be enhanced by using the zigzag scanning to increase the security and achieves higher visual quality as indicated by the high peak signal-to-noise ratio (PSNR) in spite of hiding a large number of secret bits in the image.


2020 ◽  
Vol 148 (9-10) ◽  
pp. 560-564
Author(s):  
Sanja Djokovic ◽  
Vladan Plecevic ◽  
Tamara Kovacevic ◽  
Sinisa Solaja ◽  
Bojana Vukovic

Introduction/Objective. Tonsillitis is a very common condition found in the pediatric population but also in adult patients. One of the consequences of such conditions is poor voice quality. Hoarseness, poor voice impostation, interruption, and hypernazalization are just some of the differences in patient voice quality. The objective of this paper was to examine the effects of tonsillectomy on the voice quality. Methods. The sample included 37 patients, 17 female and 20 male, ranging in age 3?39 years. The method involved recording patients one month before and one month after tonsillectomy with a digital sound recorder, with recordings analyzed in the Praat program. The variables monitored in the basic voice were as follows: voice pitch, standard deviation of voice, degree of voice interruption, jitter, shimmer, and signal-to-noise ratio. In the statistical analysis, in addition to standard descriptive analyzes, t-test and ACNOVA were also used. Results. The results showed that there are effects of tonsillectomy on standard deviation of baseline voice (p = 0.002), shimmer (p = 0.002), baseline voice interruption rate (p = 0.023), signal to noise ratio (p = 0.003). There were no differences in the effects of tonsillectomy with respect to the sex of the subjects. Conclusion. Based on the conducted research, there were some methodological conclusions that could be considered as a recommendation for future research: increase the number of persons in the sample, introduce a variable of chronological age, type of surgical intervention, and gradation of size of the tonsil and adenoid tissue.


Author(s):  
Michelle Sofo ◽  
Francesco Sofo

This chapter aims to explore the real and perceived barriers that exist for older Australians when engaging with informal eLearning. The chapter has two main areas of focus: first, an examination of some of the challenges faced by older Australians engaging in informal eLearning, and second, an overview of two Australian initiatives designed to break down the barriers between older Australians and technology. The chapter commences with a review of the international literature to define informal learning before considering the intersection that exists between informal learning and online learning. The emerging social issues of the ageing Australian population are then presented to provide context to the main exploration within this chapter – the real and perceived barriers that exist for older Australians as they attempt to engage in eLearning. After discussing two community initiatives and introducing a model for surmounting the identified obstacles, the chapter discusses possible solutions making relevant recommendations and suggesting directions for future research.


2009 ◽  
Vol 38 (4) ◽  
pp. 280-283 ◽  
Author(s):  
Christine Greenhow ◽  
Beth Robelia ◽  
Joan E. Hughes

In the past decade, significant shifts have occurred in the nature of the Internet and the conceptualization of classrooms. Such shifts have affected constructs of learning and instruction and paths for future research. In this article, the authors build on three ideas set forth in comments on their article “Web 2.0 and Classroom Research: What Path Should We Take Now?” The authors believe that these comments, which extend ideas from their initial article, make important contributions to the vision for transformative scholarship and practice they outlined. Specifically, the authors discuss the professional development of teachers, considerations for building research capacity and social scholarship, and the importance of bridging divides to advance a common research agenda on learning and teaching with Web 2.0.


Sign in / Sign up

Export Citation Format

Share Document