This work develops a software-defined mechanism for dynamic bandwidth management, abbreviated to SDBM. This proposed SDBM mechanism was realized using the OpenFlow architecture and the OpenWrt platform. The resource allocation procedures and weighting policy were designed using SDN Controller to perform bandwidth management. This mechanism firstly monitors and analyzes networks and the statuses of applications and then, based on the results of the analysis, dynamically reallocates resource with software-defined discipline. Based on our simulation results, bandwidth utilization is improved and packet loss reduced by 12.4% and 8%, respectively.
{"title":"Software-Defined Dynamic Bandwidth Management","authors":"Yao-Chung Chang, Yung-Chiao Chen, Tsung-Hau Chen, Jiann-Liang Chen, Shih-Ping Chiu, Wei-hsiu Chang","doi":"10.23919/ICACT.2019.8702052","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702052","url":null,"abstract":"This work develops a software-defined mechanism for dynamic bandwidth management, abbreviated to SDBM. This proposed SDBM mechanism was realized using the OpenFlow architecture and the OpenWrt platform. The resource allocation procedures and weighting policy were designed using SDN Controller to perform bandwidth management. This mechanism firstly monitors and analyzes networks and the statuses of applications and then, based on the results of the analysis, dynamically reallocates resource with software-defined discipline. Based on our simulation results, bandwidth utilization is improved and packet loss reduced by 12.4% and 8%, respectively.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124981256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8701979
A. Alimkhan, Adilkhan Makhambayev, Ikechi Augustine Ukaegbu
Large-scale changes in technological advancements will lead to large scale innovations and stimulation of economic growth across the globe. Nowadays, as the leading industrialized economies move to intelligent manufacturing, called industry 4.0, there is a growing impact on the energy sector in any country. The latter may be referred to as Energy 4.0, which incorporates the period of mechanization, the gas and oil era, and the new digital revolution with renewable energy era. Generation, distribution, consumption and smart production of energy - all of these are going to experience an enormous revolutionary changes due to technologies as big data, IoT and cloud computing. This work describes the current state of art of Energy 4.0 in Kazakhstan, its future potential, benefits, challenges and the vision of government to introduce further discussions in the formation of a new technological revolution of Industry 4.0 that will have fundamental and structural nature. The article analyzes the global industrial revolutions and the relevant global energy steps implemented over the past 10 years by illustrating it through Networked Readiness Index (NRI) charts, that show the positions of Kazakhstan by different criteria established of reliable international organizations. Moreover, paper presents the experience of the Energy 4.0 strategy development in technologically advanced countries. In this work, we also offer the approaches and proposals associated with the Industry 4.0 strategy adaptation to the Kazakhstani energy sector, which can be taken as a basis for the new industry development strategy during the upcoming global technological changes.
{"title":"The Fourth Industrial Revolution: Towards Energy 4.0 in Kazakhstan","authors":"A. Alimkhan, Adilkhan Makhambayev, Ikechi Augustine Ukaegbu","doi":"10.23919/ICACT.2019.8701979","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701979","url":null,"abstract":"Large-scale changes in technological advancements will lead to large scale innovations and stimulation of economic growth across the globe. Nowadays, as the leading industrialized economies move to intelligent manufacturing, called industry 4.0, there is a growing impact on the energy sector in any country. The latter may be referred to as Energy 4.0, which incorporates the period of mechanization, the gas and oil era, and the new digital revolution with renewable energy era. Generation, distribution, consumption and smart production of energy - all of these are going to experience an enormous revolutionary changes due to technologies as big data, IoT and cloud computing. This work describes the current state of art of Energy 4.0 in Kazakhstan, its future potential, benefits, challenges and the vision of government to introduce further discussions in the formation of a new technological revolution of Industry 4.0 that will have fundamental and structural nature. The article analyzes the global industrial revolutions and the relevant global energy steps implemented over the past 10 years by illustrating it through Networked Readiness Index (NRI) charts, that show the positions of Kazakhstan by different criteria established of reliable international organizations. Moreover, paper presents the experience of the Energy 4.0 strategy development in technologically advanced countries. In this work, we also offer the approaches and proposals associated with the Industry 4.0 strategy adaptation to the Kazakhstani energy sector, which can be taken as a basis for the new industry development strategy during the upcoming global technological changes.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125132845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8702041
Anh H. Dang, W. Kameyama
Deep reinforcement learning has been successfully used to train artificial intelligent (AI) agents, which outperforms humans in many tasks. The objective of this research is to train an AI agent to draw SVG images by using scalable vector graphic (SVG) editor with deep reinforcement learning, where the AI agent is to draw SVG images that are similar as much as possible to the given target raster images. In this paper, we propose framework to train the AI agent by value-function based Q-learning and policy-gradient based learning methods. With Q-learning based method, we find that it is crucial to distinguish the action space into two sets to apply a different exploration policy on each set during the training process. Evaluations show that our proposed dual ϵ-greedy exploration policy greatly stabilizes the training process and increases the accuracy of the AI agent. On the other hand, policy-gradient based training does not depend on external reward function. However, it is hard to implement especially in the environment with a large action space. To overcome this difficulty, we propose a strategy similar to the dynamic programming method to allow the agent to generate training samples by itself. In our evaluation, the highest score is archived by the agent trained by this proposed method. SVG images produced by the proposed AI agent have also superior quality compared to popular raster-to-SVG conversion softwares.
{"title":"SvgAI – Training Methods Analysis of Artificial Intelligent Agent to use SVG Editor","authors":"Anh H. Dang, W. Kameyama","doi":"10.23919/ICACT.2019.8702041","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702041","url":null,"abstract":"Deep reinforcement learning has been successfully used to train artificial intelligent (AI) agents, which outperforms humans in many tasks. The objective of this research is to train an AI agent to draw SVG images by using scalable vector graphic (SVG) editor with deep reinforcement learning, where the AI agent is to draw SVG images that are similar as much as possible to the given target raster images. In this paper, we propose framework to train the AI agent by value-function based Q-learning and policy-gradient based learning methods. With Q-learning based method, we find that it is crucial to distinguish the action space into two sets to apply a different exploration policy on each set during the training process. Evaluations show that our proposed dual ϵ-greedy exploration policy greatly stabilizes the training process and increases the accuracy of the AI agent. On the other hand, policy-gradient based training does not depend on external reward function. However, it is hard to implement especially in the environment with a large action space. To overcome this difficulty, we propose a strategy similar to the dynamic programming method to allow the agent to generate training samples by itself. In our evaluation, the highest score is archived by the agent trained by this proposed method. SVG images produced by the proposed AI agent have also superior quality compared to popular raster-to-SVG conversion softwares.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8701916
Nishat I. Mowla, Inshil Doh, K. Chae
User authentication in a Medical Cyber Physical Systems (MCPS) can be effectively done using biometric features. Biometric features, widely used for user authentication, are equally important to national and global technology systems. Biometric features, such as face, iris, fingerprint, are commonly used while more recently palm, vein and gait are also getting attention. To fail the traditional biometric detection systems, various spoofing approaches have also been developed over time. Among various methods, image synthesis with play-doh, gelatin, ecoflex etc. are some of the more common ways for spoofing bio-modalities. Success of traditional detection systems are related to custom tailored solutions where feature engineering for each attack type must be developed. However, this is not a feasible process when we consider countless attack possibilities. Also, a slight change in the attack can cause the whole system to be redesigned and therefore becomes a limiting constraint. The recent success of machine learning inspires this paper to explore weak and strong learners with ensemble learning approaches using AdaBoost. In essence, the paper proposes a selective ensemble fuzzy learner approach using Ada Boost, feature selection and combination of weak and strong learners to enhance the detection of bio-modality spoofing for MCPS. Our proposal was experimented on real datasets and verified on the fingerprint and iris benchmark.
{"title":"SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in MCPS","authors":"Nishat I. Mowla, Inshil Doh, K. Chae","doi":"10.23919/ICACT.2019.8701916","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701916","url":null,"abstract":"User authentication in a Medical Cyber Physical Systems (MCPS) can be effectively done using biometric features. Biometric features, widely used for user authentication, are equally important to national and global technology systems. Biometric features, such as face, iris, fingerprint, are commonly used while more recently palm, vein and gait are also getting attention. To fail the traditional biometric detection systems, various spoofing approaches have also been developed over time. Among various methods, image synthesis with play-doh, gelatin, ecoflex etc. are some of the more common ways for spoofing bio-modalities. Success of traditional detection systems are related to custom tailored solutions where feature engineering for each attack type must be developed. However, this is not a feasible process when we consider countless attack possibilities. Also, a slight change in the attack can cause the whole system to be redesigned and therefore becomes a limiting constraint. The recent success of machine learning inspires this paper to explore weak and strong learners with ensemble learning approaches using AdaBoost. In essence, the paper proposes a selective ensemble fuzzy learner approach using Ada Boost, feature selection and combination of weak and strong learners to enhance the detection of bio-modality spoofing for MCPS. Our proposal was experimented on real datasets and verified on the fingerprint and iris benchmark.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130010763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8701949
Heechang Chung, Dongil Kim, Soonghee Lee, SokPal Cho
Smart farming education service focuses on the dissemination of farming information. This farming information is supposed from current activities, farming product and from the experience of farmer on the field. If the information is not available, or if available and not in a form that is amenable to being brought to the end producer then the process stalls at this point. The core component of the automation process is the creation of a data store which will be a repository for this information. The farming sector will benefit immensely from the implementation of farming data in farming contents repository which will serve as the knowledge base for the automation process.
{"title":"Smart Farming Education Service based on u-learning environment","authors":"Heechang Chung, Dongil Kim, Soonghee Lee, SokPal Cho","doi":"10.23919/ICACT.2019.8701949","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701949","url":null,"abstract":"Smart farming education service focuses on the dissemination of farming information. This farming information is supposed from current activities, farming product and from the experience of farmer on the field. If the information is not available, or if available and not in a form that is amenable to being brought to the end producer then the process stalls at this point. The core component of the automation process is the creation of a data store which will be a repository for this information. The farming sector will benefit immensely from the implementation of farming data in farming contents repository which will serve as the knowledge base for the automation process.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128953505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8702009
Kéba Gueye, Bessan Melckior Dégboé, S. Ouya, Ngartabe Kag-Teube
The objective of this article has been emphasized on pediatric TV in order to contribute to the reduction of the infant and child mortality rate in rural areas, which remains high today. To do this, we combine the intelligence of WoT with the power of WebRTC. This platform, based on the WebRTC Kurento multimedia server and the Web of Things (WoT), allows Pediatric Doctors and patients, child accompanied by his mother to perform remote consultations. Kurento Media Server (KMS) allows you to create media processing applications based on the pipeline concept. The Web of Things (WoT), considered a subset of the Internet of Things (IoT), focuses on standards and software frameworks such as REST, HTTP, and URI to create applications and services that combine and interact with a variety of network devices.For good communication, the system relies on the optical fiber network of the State Computer Agency, which interconnects all the structures of the Senegalese state. Nurses and general practitioners and specialists will rely on this network to collaborate effectively for the benefit of patients.
这篇文章的目的是在儿科电视上强调,以便有助于降低农村地区的婴儿和儿童死亡率,这一死亡率今天仍然很高。为了做到这一点,我们将WoT的智能与WebRTC的力量结合起来。该平台基于WebRTC Kurento多媒体服务器和物联网(Web of Things, WoT),可以让儿科医生和患者、孩子在母亲的陪同下进行远程会诊。Kurento Media Server (KMS)允许您基于管道概念创建媒体处理应用程序。物联网(WoT)被认为是物联网(IoT)的一个子集,它关注于REST、HTTP和URI等标准和软件框架,以创建与各种网络设备组合并交互的应用程序和服务。为了实现良好的通信,该系统依赖于国家计算机机构的光纤网络,该网络连接了塞内加尔国家的所有结构。护士和全科医生和专家将依靠这个网络有效地合作,为患者的利益。
{"title":"Proposition of Health Care System Driven by IoT and KMS for Remote Monitoring of Patients in Rural Areas: Pediatric Case","authors":"Kéba Gueye, Bessan Melckior Dégboé, S. Ouya, Ngartabe Kag-Teube","doi":"10.23919/ICACT.2019.8702009","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702009","url":null,"abstract":"The objective of this article has been emphasized on pediatric TV in order to contribute to the reduction of the infant and child mortality rate in rural areas, which remains high today. To do this, we combine the intelligence of WoT with the power of WebRTC. This platform, based on the WebRTC Kurento multimedia server and the Web of Things (WoT), allows Pediatric Doctors and patients, child accompanied by his mother to perform remote consultations. Kurento Media Server (KMS) allows you to create media processing applications based on the pipeline concept. The Web of Things (WoT), considered a subset of the Internet of Things (IoT), focuses on standards and software frameworks such as REST, HTTP, and URI to create applications and services that combine and interact with a variety of network devices.For good communication, the system relies on the optical fiber network of the State Computer Agency, which interconnects all the structures of the Senegalese state. Nurses and general practitioners and specialists will rely on this network to collaborate effectively for the benefit of patients.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131439861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distribution network itself has a different from other network characteristics, the geographical distribution of the vast number of equipment is extremely large, the type of equipment varies, incomplete data and the actual change is not synchronized and other issues makes the distribution network maintenance, management, troubleshooting difficulty straight up, but with the rapid growth of distribution network users in various regions. The current manual maintenance work even more stretched. Under such circumstances, the construction of distribution network automation system becomes an effective way to improve the reliability of distribution network , the maintenance and management efficiency. Based on the analysis of the typical service data model of smart distribution network and its demand for network communication capacity to establish a data model. A network performance evaluation model system is designed to evaluate the effectiveness of the model.
{"title":"Study on the Efficiency Evaluation System of Distribution Communication Collaboration Network","authors":"Weidong Feng, Yong Sun, Zheng Zhou, Peng Zhan, YaoYi Jiao","doi":"10.23919/ICACT.2019.8701998","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701998","url":null,"abstract":"Distribution network itself has a different from other network characteristics, the geographical distribution of the vast number of equipment is extremely large, the type of equipment varies, incomplete data and the actual change is not synchronized and other issues makes the distribution network maintenance, management, troubleshooting difficulty straight up, but with the rapid growth of distribution network users in various regions. The current manual maintenance work even more stretched. Under such circumstances, the construction of distribution network automation system becomes an effective way to improve the reliability of distribution network , the maintenance and management efficiency. Based on the analysis of the typical service data model of smart distribution network and its demand for network communication capacity to establish a data model. A network performance evaluation model system is designed to evaluate the effectiveness of the model.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131039073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8701894
Syed Asad Ali, Gul Shahzad, F. Umrani
Due to uprising of technology, next generations of cellular communication, such as 5G, are expected to provide enhanced data rate, higher capacity & upgraded performance in contrast to existing cellular standards and generations. For this prospect to turn into genuineness, cooperative communication is proposed for the future generation of mobile communication as an optimization technique. It incorporates cooperation in the system using handy devices such as mobile phones, tablets etc. These devices, that are traditionally single antenna devices or nodes are now allowed to use antennas of the other users in the network, logically making an array of antennas which are connected by a logical mean and offering various gains and performance benefits of spatial diversity to a single antenna user at the lower cost as compare to physical arrangement. However, the network latency and data security are seen as primary hindrances involved in the commercial implementation of cooperative communication systems. In this regard, this article presents comparative analysis of end to end latency in cooperative communication in contrast to conventional approach by considering three different positions of relay.
{"title":"End to End Latency incurred in Cooperative Communication System","authors":"Syed Asad Ali, Gul Shahzad, F. Umrani","doi":"10.23919/ICACT.2019.8701894","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701894","url":null,"abstract":"Due to uprising of technology, next generations of cellular communication, such as 5G, are expected to provide enhanced data rate, higher capacity & upgraded performance in contrast to existing cellular standards and generations. For this prospect to turn into genuineness, cooperative communication is proposed for the future generation of mobile communication as an optimization technique. It incorporates cooperation in the system using handy devices such as mobile phones, tablets etc. These devices, that are traditionally single antenna devices or nodes are now allowed to use antennas of the other users in the network, logically making an array of antennas which are connected by a logical mean and offering various gains and performance benefits of spatial diversity to a single antenna user at the lower cost as compare to physical arrangement. However, the network latency and data security are seen as primary hindrances involved in the commercial implementation of cooperative communication systems. In this regard, this article presents comparative analysis of end to end latency in cooperative communication in contrast to conventional approach by considering three different positions of relay.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"120 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131170977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The goal of this research is figuring out AI recommendation effects on consumer’s preference by their types. In this study, two types of consumer’s preference are considered including ‘category preference’ and ‘attribute preference’, and also types of goods are divided into manufactured products and contents by their properties such as tangibility. Two laboratory experiments will be conducted to test four hypotheses. We expect that this study gives an important message for the effective use of AI recommendation system in e-commerce platforms.
{"title":"Effect of AI Recommendation System on the Consumer Preference Structure in e-Commerce: Based on Two types of Preference","authors":"Namjun Cha, Hosoon Cho, Sangman Lee, Junseok Hwang","doi":"10.23919/ICACT.2019.8701967","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701967","url":null,"abstract":"The goal of this research is figuring out AI recommendation effects on consumer’s preference by their types. In this study, two types of consumer’s preference are considered including ‘category preference’ and ‘attribute preference’, and also types of goods are divided into manufactured products and contents by their properties such as tangibility. Two laboratory experiments will be conducted to test four hypotheses. We expect that this study gives an important message for the effective use of AI recommendation system in e-commerce platforms.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116892090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8701897
Li Yan, Namjun Cha, Hosoon Cho, Junseok Hwang
User-generated content emphasis user’ value, and based on the development of Web 2.0, it takes an important position whatever in information diffusion and marketing part. Therefore, it is necessary to identify which factor would give influence to information diffusion in User-generated content website. This research based on video user-generated content website try to find key factors to video diffusion, which provide some basis for web designers and people who use UGC as a marketing tool.
{"title":"Video Diffusion in User-generated Content Website: An empirical analysis of Bilibili","authors":"Li Yan, Namjun Cha, Hosoon Cho, Junseok Hwang","doi":"10.23919/ICACT.2019.8701897","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701897","url":null,"abstract":"User-generated content emphasis user’ value, and based on the development of Web 2.0, it takes an important position whatever in information diffusion and marketing part. Therefore, it is necessary to identify which factor would give influence to information diffusion in User-generated content website. This research based on video user-generated content website try to find key factors to video diffusion, which provide some basis for web designers and people who use UGC as a marketing tool.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114898936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}