Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Zero-Touch Management.

Статті в журналах з теми "Zero-Touch Management"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Zero-Touch Management".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Somayya Madakam, Shlomo Mark, and Yotam Lurie. "360° View on Zero-Touch (Zero-Touch) Networks." ITU Journal on Future and Evolving Technologies 4, no. 3 (September 1, 2023): 397–406. http://dx.doi.org/10.52953/cikx9337.

Повний текст джерела
Анотація:
In modern telecommunication sectors, zero touch (Zero-Touch) networks are a novel idea. A combination of quick, context-aware network and service configuration, adaptable new service development, and dynamic, effective resource allocation are required for everyone. An innovative telecommunication management software, Zero-Touch Networks (ZTNs), were released to address these complicated conditions. The primary objective of the zero-touch network is autonomous operation, which is governed by higher layers of policies and regulations and allows for self-configuration, self-monitoring, self-healing and self-optimization without the need for human interaction. This conceptual study document is based on white and grey literature in the Google and Web of Science databases. Text, image, audio and video formats all existed for the data. The manuscripts examined the theories, enabling technologies, problems and difficulties associated with zero touch networks. The primary goal of this manuscript is to provide an overview of ZTN so that aspiring academics, researchers, students and businesspeople can profit from it.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ma, Jiali, Yuanbo Guo, Chen Fang, and Qi Zhang. "Digital Twin-Based Zero-Touch Management for IoT." Electronics 11, no. 24 (December 9, 2022): 4104. http://dx.doi.org/10.3390/electronics11244104.

Повний текст джерела
Анотація:
The rapid development of the Internet of Things (IoT) requires network automation, to improve management efficiency and reduce manual operations. Zero-touch network is a promising technology for empowering network management automation by creating virtualized networks for software-based solutions. However, the traditional software-defined network (SDN) technology is not suitable for IoT devices, due to its massive, heterogeneous, and distributed characteristics. In this paper, we introduce digital twin technology (DT) into the IoT, and propose a DT modeling method through ontology and knowledge graph technologies, which maps IoT elements in the digital space and provides the advantages of centralized control, device abstraction, and flexible control of management. Then, referring to the conceptual architecture of a zero-touch network, a DT-based zero-touch management framework suitable for IoT is established. Finally, aiming at specific device management and network optimization problems in the IoT, a zero-touch management scheme with digital twin technology as the core and intention as the driver is proposed, and the effectiveness of the proposed method is demonstrated using an example.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Rizwan, Ali, Mona Jaber, Fethi Filali, Ali Imran, and Adnan Abu-Dayya. "A Zero-Touch Network Service Management Approach Using AI-Enabled CDR Analysis." IEEE Access 9 (2021): 157699–714. http://dx.doi.org/10.1109/access.2021.3129281.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Chergui, Hatim, Luis Blanco, Luis A. Garrido, Kostas Ramantas, Slawomir Kuklinski, Adlen Ksentini, and Christos Verikoukis. "Zero-Touch AI-Driven Distributed Management for Energy-Efficient 6G Massive Network Slicing." IEEE Network 35, no. 6 (November 2021): 43–49. http://dx.doi.org/10.1109/mnet.111.2100322.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Khan, Urooj Yousuf, and Tariq Rahim Soomro. "Design of federated learning-based resource management algorithm in fog computing for zero-touch network." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 2 (February 2024): 195–205. http://dx.doi.org/10.21833/ijaas.2024.02.020.

Повний текст джерела
Анотація:
The concept of zero-touch networking involves creating networks that are fully autonomous and require minimal human intervention. This approach is increasingly relevant due to the rapid growth of current cloud architectures, which are beginning to reach their limits due to continuous expansion demands from users and within the network core itself. In response, Fog computing, acting as a smart, localized data center closer to network nodes, emerges as a practical solution to the challenges of expansion and upgrading in existing architectures. Fog computing complements cloud technology. However, the realization of zero-touch networks is still in its early stages, and numerous challenges hinder its implementation. One significant challenge is the NP-hard problem related to resource management. This paper introduces an optimal resource management algorithm based on Federated Learning. The effectiveness of this algorithm is evaluated using the iFogSim simulator within the existing cloud-fog architecture. The results demonstrate that the proposed architecture outperforms the current infrastructure in several key aspects of resource management, including system latency, number of resources processed, energy consumption, and bandwidth utilization.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Khan, Urooj Yousuf, Tariq Rahim Soomro, and Zheng Kougen. "FedFog - A federated learning based resource management framework in fog computing for zero touch networks." Mehran University Research Journal of Engineering and Technology 42, no. 3 (July 21, 2023): 67. http://dx.doi.org/10.22581/muet1982.2303.08.

Повний текст джерела
Анотація:
Fog computing offers an optimal answer to the expansion challenge of today’s networks. It boasts scaling and reduced latency. Since the concept is still nascent, many research questions remain unanswered. One of these is the challenge of Resource Management. There is a pressing need for a reliable and scalable architecture that meets the Resource Management challenge without compromising the Quality of Service. Among the proposed solutions, Artificial Intelligence based path selection techniques and automated link detection methods can provide lasting and reliable answer. An optimal approach for introducing intelligence in the networks is the infusion of Machine learning methods. Such futuristic, intelligent networks form the backbone of the next generation of Internet. These self-learning and self-healing networks are termed as the Zero-Touch networks. This paper proposes FedFog, a Federated Learning based optimal, automated Resource Management framework in Fog Computing for Zero-touch Networks. The paper describes a series of experiments focusing on Quality of Service parameters such as Network latency, Resources processed, Energy consumption and Network usage. The simulation results from these experiments depict superiority of the proposed architecture over traditional, existing architecture.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Chergui, Hatim, Adlen Ksentini, Luis Blanco, and Christos Verikoukis. "Toward Zero-Touch Management and Orchestration of Massive Deployment of Network Slices in 6G." IEEE Wireless Communications 29, no. 1 (February 2022): 86–93. http://dx.doi.org/10.1109/mwc.009.00366.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Correa, Sand L., Luis M. Contreras, Elton V. Dias, Leonardo R. Furtado, Kaíque M. R. Cunha, Rúben F. Xavier, Leandro A. Freitas, et al. "Supporting MANOaaS and Heterogenous MANOaaS Deployment Within the Zero-Touch Network and Service Management Framework." IEEE Communications Standards Magazine 8, no. 2 (June 2024): 4–11. http://dx.doi.org/10.1109/mcomstd.0001.2100088.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Benzaid, Chafika, and Tarik Taleb. "AI-Driven Zero Touch Network and Service Management in 5G and Beyond: Challenges and Research Directions." IEEE Network 34, no. 2 (March 2020): 186–94. http://dx.doi.org/10.1109/mnet.001.1900252.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Goto, Yoshinori. "Standardization of Automation Technology for Network Slice Management by ETSI Zero Touch Network and Service Management Industry Specification Group (ZSM ISG)." NTT Technical Review 16, no. 9 (September 2018): 39–43. http://dx.doi.org/10.53829/ntr201809gls.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Alberti, Enrico, Sergio Alvarez-Napagao, Victor Anaya, Marta Barroso, Cristian Barrué, Christian Beecks, Letizia Bergamasco, et al. "AI Lifecycle Zero-Touch Orchestration within the Edge-to-Cloud Continuum for Industry 5.0." Systems 12, no. 2 (February 2, 2024): 48. http://dx.doi.org/10.3390/systems12020048.

Повний текст джерела
Анотація:
The advancements in human-centered artificial intelligence (HCAI) systems for Industry 5.0 is a new phase of industrialization that places the worker at the center of the production process and uses new technologies to increase prosperity beyond jobs and growth. HCAI presents new objectives that were unreachable by either humans or machines alone, but this also comes with a new set of challenges. Our proposed method accomplishes this through the knowlEdge architecture, which enables human operators to implement AI solutions using a zero-touch framework. It relies on containerized AI model training and execution, supported by a robust data pipeline and rounded off with human feedback and evaluation interfaces. The result is a platform built from a number of components, spanning all major areas of the AI lifecycle. We outline both the architectural concepts and implementation guidelines and explain how they advance HCAI systems and Industry 5.0. In this article, we address the problems we encountered while implementing the ideas within the edge-to-cloud continuum. Further improvements to our approach may enhance the use of AI in Industry 5.0 and strengthen trust in AI systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Gupta, Samir, Courtney Price, Gina Agarwal, David Chan, Sanjeev Goel, Louis-Philippe Boulet, Alan G. Kaplan, Gerald Lebovic, Muhammad Mamdani, and Sharon E. Straus. "The Electronic Asthma Management System (eAMS) improves primary care asthma management." European Respiratory Journal 53, no. 4 (February 14, 2019): 1802241. http://dx.doi.org/10.1183/13993003.02241-2018.

Повний текст джерела
Анотація:
A high prevalence of suboptimal asthma control is attributable to known evidence–practice gaps. We developed a computerised clinical decision support system (the Electronic Asthma Management System (eAMS)) to address major care gaps and sought to measure its impact on care in adults with asthma.This was a 2-year interrupted time-series study of usual care (year 1)versuseAMS (year 2) at three Canadian primary care sites. We included asthma patients aged ≥16 years receiving an asthma medication within the last 12 months. The eAMS consisted of a touch tablet patient questionnaire completed in the waiting room, with real-time data processing producing electronic medical record-integrated clinician decision support.Action plan delivery (primary outcome) improved from zero out of 412 (0%) to 79 out of 443 (17.8%) eligible patients (absolute increase 0.18 (95% CI 0.14–0.22)). Time-series analysis indicated a 30.5% increase in physician visits with action plan delivery with the intervention (p<0.0001). Assessment of asthma control level increased from 173 out of 3497 (4.9%) to 849 out of 3062 (27.7%) eligible visits (adjusted OR 8.62 (95% CI 5.14–12.45)). Clinicians escalated controller therapy in 108 out of 3422 (3.2%) baseline visitsversus126 out of 3240 (3.9%) intervention visits (p=0.12). At baseline, a short-acting β-agonist alone was added in 62 visits and a controller added in 54 visits; with the intervention, this occurred in 33 and 229 visits, respectively (p<0.001).The eAMS improved asthma quality of care in real-world primary care settings. Strategies to further increase clinician uptake and a randomised controlled trial to assess impact on patient outcomes are now required.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Theodoropoulos, Theodoros, Antonios Makris, Abderrahmane Boudi, Tarik Taleb, Uwe Herzog, Luis Rosa, Luis Cordeiro, et al. "Cloud-based XR Services: A Survey on Relevant Challenges and Enabling Technologies." Journal of Networking and Network Applications 2, no. 1 (2022): 1–22. http://dx.doi.org/10.33969/j-nana.2022.020101.

Повний текст джерела
Анотація:
In recent years, the emergence of XR (eXtended Reality) applications, including Holography, Augmented, Virtual and Mixed Reality, has resulted in the creation of rather demanding requirements for Quality of Experience (QoE) and Quality of Service (QoS). In order to cope with requirements such as ultra-low latency and increased bandwidth, it is of paramount importance to leverage certain technological paradigms. The purpose of this paper is to identify these QoE and QoS requirements and then to provide an extensive survey on technologies that are able to facilitate the rather demanding requirements of Cloud-based XR Services. To that end, a wide range of enabling technologies are explored. These technologies include e.g. the ETSI (European Telecommunications Standards Institute) Multi-Access Edge Computing (MEC), Edge Storage, the ETSI Management and Orchestration (MANO), the ETSI Zero touch network & Service Management (ZSM), Deterministic Networking, the 3GPP (3rd Generation Partnership Project) Media Streaming, MPEG’s (Moving Picture Experts Group) Mixed and Augmented Reality standard, the Omnidirectional MediA Format (OMAF), ETSI’s Augmented Reality Framework etc.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Widyasari, R., H. Kurniawan, A. F. Hidayat, and D. N. A. Paramartha. "TEKNOLOGI TEPAT GUNA PADA INDUSTRI VIRGIN COCONUT OIL DENGAN PRINSIP ZERO WASTE." Buletin Udayana Mengabdi 20, no. 1 (February 1, 2021): 1. http://dx.doi.org/10.24843/bum.2021.v20.i01.p01.

Повний текст джерела
Анотація:
The coconut industry is one of the leading industries in North Lombok, in the form of raw materials, copra, as well as coconut oil and Virgin Coconut Oil (VCO). In producing VCO, the resulting waste is still economically valuable, but partners only sell it as animal feed. Even though with a touch of innovation, VCO waste can be a very high added value, namely as desiccated coconut or dry shredded coconut. The development of VCO by-product is implemented by partners using proper food processing according to SNI 7381-2008 - coconut oil and SNI 01-3715-1995 - the quality of dry grated coconut and plays a role in zero waste so that it can be marketed in quality. The method applied is to provide education on good food processing methods and conduct training on the application of appropriate technology in VCO processing and by-product processing, training on the application of packaging technology, labeling, and storage techniques, and training in business management and marketing strategies. The results felt by partners through this activity were the partners' understanding and skills regarding processing coconut dregs from VCO to desiccated coconut increased through the technology package offered. In the situation of the Covid-19 pandemic by implementing health protocols, this program can run smoothly thanks to excellent cooperation and contributions by partners.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Molina Zarca, Alejandro, Miloud Bagaa, Jorge Bernal Bernabe, Tarik Taleb, and Antonio F. Skarmeta. "Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems." Sensors 20, no. 13 (June 27, 2020): 3622. http://dx.doi.org/10.3390/s20133622.

Повний текст джерела
Анотація:
IoT systems can be leveraged by Network Function Virtualization (NFV) and Software-Defined Networking (SDN) technologies, thereby strengthening their overall flexibility, security and resilience. In this sense, adaptive and policy-based security frameworks for SDN/NFV-aware IoT systems can provide a remarkable added value for self-protection and self-healing, by orchestrating and enforcing dynamically security policies and associated Virtual Network Functions (VNF) or Virtual network Security Functions (VSF) according to the actual context. However, this security orchestration is subject to multiple possible inconsistencies between the policies to enforce, the already enforced management policies and the evolving status of the managed IoT system. In this regard, this paper presents a semantic-aware, zero-touch and policy-driven security orchestration framework for autonomic and conflict-less security orchestration in SDN/NFV-aware IoT scenarios while ensuring optimal allocation and Service Function Chaining (SFC) of VSF. The framework relies on Semantic technologies and considers the security policies and the evolving IoT system model to dynamically and formally detect any semantic conflict during the orchestration. In addition, our optimized SFC algorithm maximizes the QoS, security aspects and resources usage during VSF allocation. The orchestration security framework has been implemented and validated showing its feasibility and performance to detect the conflicts and optimally enforce the VSFs.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Shao, Qianqian, Haobo(Rex) Sun, Zhi Chen, Weiqi Gou, Yuyan He, and Aodi Wu. "Optimization of Takeaway Delivery Based on Large Neighborhood Search Algorithm." SAE International Journal of Sustainable Transportation, Energy, Environment, & Policy 4, no. 2 (November 9, 2023): 227–37. http://dx.doi.org/10.4271/13-04-02-0014.

Повний текст джерела
Анотація:
<div>The drone logistics distribution method, with its small size, quick delivery, and zero-touch, has progressively entered the mainstream of development due to the global epidemic and the rapidly developing global emerging logistics business. In our investigation, a drone and a delivery man worked together to complete the delivery order to a customer’s home as quickly as possible. We realize the combined delivery network between drones and delivery men and focus on the connection and scheduling between drones and delivery men using existing facilities such as ground airports, unmanned stations, delivery men, and drones. Based on the dynamic-vehicle routing problem model, the establishment of a delivery man and drone with a hybrid model, in order to solve the tarmac unmanned aerial vehicle for take-out delivery scheduling difficulties, linking to the delivery man and an adaptive large neighborhood search algorithm solves the model. The objective function is to reduce customer waiting time. The average delivery time for orders was subsequently shortened thanks to the optimization of the cooperative delivery solution for drones and delivery personnel.</div>
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Xevgenis, Michael, Dimitrios G. Kogias, Panagiotis A. Karkazis, and Helen C. Leligou. "Addressing ZSM Security Issues with Blockchain Technology." Future Internet 15, no. 4 (March 28, 2023): 129. http://dx.doi.org/10.3390/fi15040129.

Повний текст джерела
Анотація:
Undoubtedly, we are witnessing a new era of computer networks that aspire to support modern demanding applications by providing the highest Quality of Experience (QoE) to the end user. Next Generations Networks (NGNs) ensure that characteristics such as ultra-low latency, high availability and wide service coverage can be met across the network regardless of the network infrastructure ownership. To accomplish that, beyond the necessary improvements in the radio propagation field, changes have been made in the core network functions which are now characterized as programmable, and software defined. Software Defined Networks (SDNs) and Network Function Virtualization (NFV) are the keystones of the NGNs flexibility. The high expectations of NGNs’ performance and the continuous changes in the network conditions lead to the development of new network management frameworks that add elasticity and dynamicity and minimize human intervention. ETSI (the European Standards Organization) presents the Zero-touch Service Management (ZSM) framework that uses hyped technologies such as Artificial Intelligence (AI) and Machine Learning (ML) to achieve full end-to-end automation of the network services’ management across one or many different domains. Focusing on multi-domain network service management, there are several security issues identified by the standardization team which mostly derive from the lack of trust among network providers. In the present research, we explore the suitability of blockchain technology adoption for facing these security issues. Blockchain technology inherently addresses security in trustless environments such as the infrastructures defined by the ZSM team. Our contribution is three-fold: (a) we define the architecture of a multi-domain network infrastructure that adopts the ZSM approach and integrates blockchain functionality, (b) we explore the adoption of different blockchain and distributed ledger technologies (DLT) approaches to address ZSM security needs and (c) we provide guidelines to prospective solution designers/implementers on the detailed requirements that this solution has to meet to maximize the offered value.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Oztoprak, Kasim, Yusuf Kursat Tuncel, and Ismail Butun. "Technological Transformation of Telco Operators towards Seamless IoT Edge-Cloud Continuum." Sensors 23, no. 2 (January 15, 2023): 1004. http://dx.doi.org/10.3390/s23021004.

Повний текст джерела
Анотація:
This article investigates and discusses challenges in the telecommunication field from multiple perspectives, both academic and industry sides are catered for, surveying the main points of technological transformation toward edge-cloud continuum from the view of a telco operator to show the complete picture, including the evolution of cloud-native computing, Software-Defined Networking (SDN), and network automation platforms. The cultural shift in software development and management with DevOps enabled the development of significant technologies in the telecommunication world, including network equipment, application development, and system orchestration. The effect of the aforementioned cultural shift to the application area, especially from the IoT point of view, is investigated. The enormous change in service diversity and delivery capabilities to mass devices are also discussed. During the last two decades, desktop and server virtualization has played an active role in the Information Technology (IT) world. With the use of OpenFlow, SDN, and Network Functions Virtualization (NFV), the network revolution has got underway. The shift from monolithic application development and deployment to micro-services changed the whole picture. On the other hand, the data centers evolved in several generations where the control plane cannot cope with all the networks without an intelligent decision-making process, benefiting from the AI/ML techniques. AI also enables operators to forecast demand more accurately, anticipate network load, and adjust capacity and throughput automatically. Going one step further, zero-touch networking and service management (ZSM) is proposed to get high-level human intents to generate a low-level configuration for network elements with validated results, minimizing the ratio of faults caused by human intervention. Harmonizing all signs of progress in different communication technologies enabled the use of edge computing successfully. Low-powered (from both energy and processing perspectives) IoT networks have disrupted the customer and end-point demands within the sector, as such paved the path towards devising the edge computing concept, which finalized the whole picture of the edge-cloud continuum.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Karas, I. R., M. Ben Ahmed, A. A. Boudhir, and B. K. Ane. "THE SIXTH INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS: PREFACE." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 1–6. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-1-2021.

Повний текст джерела
Анотація:
Abstract. This Conference Proceedings volume contains the written versions of the contributions presented during the 6th International Conference on Smart City Applications.The event had been planned to organized in Safranbolu Campus of Karabuk University, Turkey. Then, it has been converted to the online conference because of the Covid-19 situation. It took place with the motto of “Virtual Safranbolu” by inspiring historical UNESCO Heritage city Safranbolu, on October 27–29, 2021. The conference provided a setting for discussing recent developments in a wide variety of topics including Geo-Smart Information Systems, Smart Cities, 3D City Modeling and Visualization, Smart Building and Home Automation, Smart Environment and Smart Agriculture, Location Based Services, GeoInformation for Mobile, Wearable Technologies and Wireless Sensor Networks, Building Information Modeling, Virtual and Augmented Reality, Big Data and Urban Data Analytics, Smart Healthcare, Smart Economy and Digital Business, Smart Education and Intelligent Learning System, and etc.The event has been a good opportunity for the more than 400 participants coming from 43 countries of the world to present and discuss topics in their respective research areas. In addition, five keynote speakers presented latest achievements on their fields; Domingos Santos “Smart Cities Strategies: Critical Sucess Factors”, Mohsen Kalantari Soltanieh “Smart buildings to Smart cities – The role of BIM and GIS integration”, Ksentini Adlen, “Zero Touch Management and Orchestration of Network Slices in 5G and Beyond Networks”, Bakr M.Aly Ahmed, “Smart Sustainable Urbanism”, Yusuf Arayıcı, “Design for Energy:Prosumer Buildings”.The 86 papers that were selected as a result of review process and presented during the conference were accepted for the final publication in the ISPRS Archives.We would like to thank all participants, organizing and scientific committee members, and session chairs for their contributions to the conference program and these Proceedings.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Okello, Fred Otieno, Vitalice Oduol, Ciira Maina, and Antonio Apiyo. "Improvement of 5G Core Network Performance using Network Slicing and Deep Reinforcement Learning." International Journal of Electrical and Electronics Research 12, no. 2 (May 30, 2024): 493–502. http://dx.doi.org/10.37391/ijeer.120222.

Повний текст джерела
Анотація:
Users have increasingly been having more use cases for the network while expecting the best Quality of Service (QoS) and Quality of Experience (QoE). The Fifth Generation of mobile telecommunications technology (5G) network had promised to satisfy most of the expectations and network slicing had been introduced in 5G to be able to satisfy various use cases. However, creating slices in a real-life environment with just the resources required while having optimized QoS has been a challenge. This has necessitated more intelligence to be required in the network and machine learning (ML) has been used recently to add the intelligence and ensure zero-touch automation. This research addresses the open question of creating slices to satisfy various use cases based on their QoS requirements, managing, and orchestrating them optimally with minimal resources while allowing the isolation of services by introducing a Deep reinforcement Machine Learning (DRL) algorithm. This research first evaluates the previous work done in improving QoS in the 5G core. 5G architecture is simulated by following the ETSI NFV MANO (European Telecommunications Standards Institute for Network Function Virtualization Management and Orchestration) framework and uses Open5G in 5G core, UERANISM for RAN, Openstack for Virtual Infrastructure Manager (VIM), and Tacker for Virtual Network Function Management and orchestration (VNFMO). The research simulates network slicing at the User Plane Function (UPF) level and evaluates how it has improved QoS. The network slicing function is automated by following ETSI Closed Loop Architecture and using Deep Reinforcement Learning (DRL) by modeling the problem as a Markov Decision Problem (MDP). Throughput is the Reward for the actions of the DRL agent. Comparison is done on the impact of slicing on throughput and compares models that have not been sliced, the ones that have been sliced and combined to work together, and models with slices that have been assigned more bandwidth. Sliced networks have better throughput than the ones not sliced. If more slices are load-balanced the throughput is increased. Deep Reinforcement Learning has managed to achieve the dynamic assigning of slices to compensate for declining throughput.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Handayani, Dwi Iryaning, and Tri Prihatiningsih. "MULTI KRITERIA TERHADAP PENILAIAN PENYEBAB KEJADIAN RISIKO KECELAKAAN KERJA UNTUK PROYEK KONTRUKSI DENGAN METODE ANALYTICAL NETWORK PROCESS." J@ti Undip : Jurnal Teknik Industri 13, no. 1 (March 27, 2018): 27. http://dx.doi.org/10.14710/jati.13.1.27-36.

Повний текст джерела
Анотація:
AbstrakPermasalahan K3 di Indonesia masih kurang diperhatikan, padahal sektor konstruksi merupakan sektor yang berisiko terhadap kecelakaan kerja disamping sektor lainnya. Banyak faktor yang dapat memicu penyebab terjadinya risiko kecelakaan kerja. Oleh karena itu penting untuk diketahui potensi penyebab terjadinya risiko kecelakaan kerja sehingga tujuan penelitian ini melakukan penilaian penyebab risiko kecelakaan kerja pada proyek kontruksi. Metode yang digunakan untuk melakukan penilaian tersebut dengan metode ANP menggunakan sofware Matlab. Penyebab terjadinya risiko K3 pada bidang kontruksi didominasi oleh kriteria struktur 44% dibandingkan dengan kriteria persiapan 17%, kriteria sub struktur 21% dan kriteria finishing 19%. Penyebab risiko kecelakaan kerja yang paling besar disebabkan oleh faktor manusia 77%, faktor ini disebabkan karena perilaku tidak aman meliputi kurang pengetahuan K3, pekerja kurang disiplin, pekerja tidak menggunakan APD, komitmen K3 kurang, tidak mengikuti pelatihan K3, kesalahan transformasi informasi, Metode kontruksi tidak benar, Pondasi scaffolding tidak padat pada tempat yang datar. Sedangkan penyebab kecelakaan kerja lainnya seperti scaffolding ambruk, kabel terkena air konsleting, kabel terkelupas, tersentuh aliran listrik, lokasi becek, lumpur, amblas. Upaya dalam pengendalian risiko kecelakaan kerja yaitu perbaikan manajemen K3 dan pelatihan K3 dalam meningkatkan komitmen K3 dengan adanya pengendalian risiko diharapkan dapat meminimalkan risiko (zero accident) pada pekerjaan kontruksi. Abstract[Multi Criteria On the Assessment of Accidents Causes in Occupational Risk in Construction Project By Analytical Network Process Method] Even though the construction sector is a sector with high risk of occupational accidents beside other sectors, the problem of occupational health and safety (OHS) in contruction sector is still gaining less attention in Indonesia. Many factors can trigger the cause of occupational accidents risk. Therefore, it is important to understand the potential causes of occupational accidents risk. This research is intended to assess the risk of occupational accidents on construction projects. We use analytical network process (ANP) method running on Matlab software to perform the assessment. It is found that the cause of risk in OHS for construction sector is dominated by structure criterion (44%), followed by preparation criterion (17%), sub-structure criterion (21%) and finishing criterion (19%). The biggest cause of occupational accidents is human factor by 77%, this factor is caused by unsafety behavior which include lack of knowledge in OHS, indisciplined workers, ignoring the use of personal protective equipment (PPE), lack of commitment in practicing OHS, no OHS training, missinformation, incorrect construction method, and scaffolding foundation is not solid on a flat area. While the cause of other occupational accidents includes collapsing scaffolding, wires exposed to water, peeled cable, unintentional touch of electrical current, muddy site, mud, and avalanche. Some efforts in controlling the risk of occupational accidents includes improving OHS management and OHS training to improve OHS commitment. It is expected that by controlling the risk, accidents in contruction work can be minimized (zero accident).Keywords: Assessment; Risk Causes; Work Accidents.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Babadagli, Tayfun. "Technology Focus: Heavy Oil (April 2021)." Journal of Petroleum Technology 73, no. 04 (April 1, 2021): 48. http://dx.doi.org/10.2118/0421-0048-jpt.

Повний текст джерела
Анотація:
After serving two terms for a total of 6 years, my time writing this column is coming to an end. This issue of JPT marks my last opportunity to share my thoughts, recap my observations, and make note of some final touch-ups to the research conducted over this 6-year period with regard to recent heavy oil practices. Here are some highlights to keep in our minds over the coming years. Despite all the recent negative and serious changes affecting the whole world and our industry, life goes on and we will increasingly be needing energy. One should recall that statistics predict oil will continue to be the main source of energy for the next 2 decades, with heavy oil constituting a great portion of that. That means that, while the oil industry is going through unprecedented and even unpredictable economic downturns, the status of heavy oil is still unquestionable. However, we have to face the fact that this energy should be tapped in a cheap, clean, and sustainable way. The best aspect of this effort is that heavy oil technologies have been established and tested over a long period of time, unlike other unconventional resources. Lowered steam consumption, down to zero if possible, has been under consideration to minimize the emission of greenhouse gases (GHGs) while simultaneously producing heavy oil. This green effort leads us to nonsteam techniques such as the use of water with chemicals (mainly polymer) and noncondensable gases and certain unconventional methods such as solvent injection and electromagnetic heating, the latter being unavoidable especially for extraheavy oil and bitumen. These areas have been critically considered by researchers and practitioners with a considerable number of applications existing at the field scale. At the same time, the oil industry must deal with mature steam projects in the near future. We have accumulated so much heat energy over the decades, yet a substantial amount of oil remains in these reservoirs. What can be done to reuse this energy? Can we recover different forms of energies using methods with no GHG emission? The current practices encountered in field-scale operations to improve the heavy oil recovery in mature steam applications use noncondensable gases; mainly, these techniques serve to pressurize steam-assisted gravity drainage wells, improve sweep and microscopic displacement by adding chemical additives to the steam (or hot water), and re-engineer well designs (flow control for efficient heating and sweep). My final example highlighting new practices is the increasing trend of offshore heavy oil practices. Of particular interest is polymer injection through vertical and horizontal wells and pilot steam applications, methods that are effective even if they occur at the pilot stage of the process. Recommended additional reading at OnePetro: www.onepetro.org. SPE 199947 - Enhanced Oil Recovery in Post-Cold Heavy Oil Production With Sand Heavy Oil Reservoirs of Alberta and Saskatchewan Part 2: Field Piloting of Cycling Solvent Injection by Gokhan Coskuner, Consultant, et al. SPE 199925 - Scalable Steam Additives for Enhancing In-Situ Bitumen Recovery in SAGD Process by Armin Hassanzadeh, Dow, et al. SPE 199927 - The Myth of Residual Oil Saturation in SAGD - Simulations Against Reality by Subodh Gupta, Cenovus Energy, et al.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Deng, He Lian, and You Gang Xiao. "Development of General Embedded Intelligent Monitoring System for Tower Crane." Applied Mechanics and Materials 103 (September 2011): 394–98. http://dx.doi.org/10.4028/www.scientific.net/amm.103.394.

Повний текст джерела
Анотація:
For improving the generality, expandability and accuracy, the general embedded intelligent monitoring system of tower crane is developed. The system can be applied to different kinds of tower cranes running at any lifting ratio, can be initialized using U disk with the information of tower crane, and fit the lifting torque curve automatically. In dangerous state, the system can sent out alarm signals with sounds and lights, and cut off power by sending signals to PLC through communication interface RS485. When electricity goes off suddenly, the system can record the real-time operating information automatically, and store them in a black box, which can be taken as the basis for confirming the accident responsibility.In recent years, tower cranes play a more and more important role in the construction of tall buildings, in other construction fields are also more widely used. For the safety of tower cranes, various monitors have been developed for monitoring the running information of crane tower [1-8]. These monitors can’t eliminate the errors caused by temperature variations automatically. The specific tower crane’s parameters such as geometric parameters, alarming parameters, lifting ratio, lifting torque should be embedded into the core program, so a monitor can only be applied to a specific type of tower crane, lack of generality and expansibility.For improving the defects of the existing monitors, a general intelligent monitoring modular system of tower crane with high precision is developed, which can initialize the system automatically, eliminate the temperature drift and creep effect of sensor, and store power-off data, which is the function of black box.Hardware design of the monitoring systemThe system uses modularized design mode. These modules include embedded motherboard module, sensor module, signal processing module, data acquisition module, power module, output control module, display and touch screen module. The hardware structure is shown in figure 1. Figure 1 Hardware structure of the monitoring systemEmbedded motherboard module is the core of the system. The motherboard uses the embedded microprocessor ARM 9 as MCU, onboard SDRAM and NAND Flash. Memory size can be chosen according to users’ needs. SDRAM is used for running procedure and cache data. NAND Flash is used to store embedded Linux operating system, applications and operating data of tower crane. Onboard clock with rechargeable batteries provides the information of year, month, day, hour, minute and second. This module provides time tag for real-time operating data. Most interfaces are taken out by the plugs on the embedded motherboard. They include I/O interface, RS232 interface, RS485 interface, USB interface, LCD interface, Audio interface, Touch Screen interface. Pull and plug structure is used between all interfaces and peripheral equipments, which not only makes the system to be aseismatic, but also makes its configuration flexible. Watch-dog circuit is designed on the embedded motherboard, which makes the system reset to normal state automatically after its crash because of interference, program fleet, or getting stuck in an infinite loop, so the system stability is improved greatly. In order to store operating data when power is down suddenly, the power-down protection circuit is designed. The saved data will be helpful to repeat the accident process later, confirm the accident responsibility, and provide the basis for structure optimization of tower crane.Sensor module is confirmed by the main parameters related to tower crane’s security, such as lifting weight, lifting torque, trolley luffing, lifting height, rotary angle and wind speed. Axle pin shear load cell is chosen to acquire lifting weight signals. Potentiometer accompanied with multi-stopper or incremental encoder is chosen to acquire trolley luffing and lifting height signals. Potentiometer accompanied with multi-stopper or absolute photoelectric encoder is chosen to acquire rotary angle signals. Photoelectric sensor is chosen to acquire wind speed signals. The output signals of these sensors can be 0~5V or 4~20mA analog signals, or digital signal from RS485 bus. The system can choose corresponding signal processing method according to the type of sensor signal, which increases the flexibility on the selection of sensors, and is helpful for the users to expand monitoring objects. If the acquired signal is analog signal, it will be processed with filtering, isolation, anti-interference processing by signal isolate module, and sent to A/D module for converting into digital signals, then transformed into RS485 signal by the communication protocol conversion device according to Modbus protocol. If the acquired signal is digital signal with RS485 interface, it can be linked to RS485 bus directly. All the acquired signals are sent to embedded motherboard for data processing through RS485 bus.The data acquisition module is linked to the data acquisition control module on embedded motherboard through RS485 interface. Under the control of program, the system inquires the sensors at regular intervals, and acquires the operating data of crane tower. Median filter technology is used to eliminate interferences from singularity signals. After analysis and processing, the data are stored in the database on ARM platform.Switch signal can be output to relay module or PLC from output control module through RS485 bus, then each actuator will be power on or power off according to demand, so the motion of tower crane will be under control.Video module is connected with motherboard through TFT interface. After being processed, real-time operating parameters are displayed on LCD. The working time, work cycle times, alarm, overweight and ultar-torque information will be stored into database automatically. For meeting the needs of different users, the video module is compatible with 5.7, 8.4 or 10.4 inches of color display.Touch screen is connected with embedded motherboard by touch screen interface, so human machine interaction is realized. Initialization, data download, alarm information inquire, parameter modification can be finished through touch screen.Speaker is linked with audio interface, thus alarm signals is human voice signal, not harsh buzz.USB interface can be linked to conventional U disk directly. Using U disk, users can upload basic parameters of tower crane, initialize system, download operating data, which provides the basis for the structural optimization and accident analysis. Software design of the monitoring systemAccording to the modular design principle, the system software is divided into grading encryption module, system update module, parameter settings module, calibration module, data acquisition and processor module, lifting parameters monitoring module, alarm query module, work statistics module.Alarm thresholds are guarantee for safety operation of the tower crane. Operating data of tower crane are the basis of service life prediction, structural optimization, accident analysis, accident responsibility confirmation. According to key field, the database is divided into different security levels for security requirements. Key fields are grade encryption with symmetrical encryption algorithm, and data keys are protected with elliptic curve encryption algorithm. The association is realized between the users’ permission and security grade of key fields, which will ensure authorized users with different grades to access the equivalent encrypted key fields. The user who meets the grade can access equivalent encrypted database and encrypted key field in the database, also can access low-grade encrypted key fields. This ensures the confidentiality and integrity of key data, and makes the system a real black box.The system is divided into operating mode and management mode in order to make the system toggle between the two states conveniently. The default state is operating mode. As long as the power is on, the monitoring system will be started by the system guide program, and monitor the operating state of the tower crane. The real-time operating data will be displayed on the display screen. At the dangerous state, warning signal will be sent to the driver through voice alarm and light alarm, and corresponding control signal will be output to execution unit to cut off relevant power for tower crane’s safety.By clicking at the mode switch button on the initial interface, the toggle can be finished between the management mode and the operating mode. Under the management mode, there are 4 grades encrypted modes, namely the system update, alarm query, parameter setting and data query. The driver only can browse relevant information. Ordinary administrator can download the alarm information for further analysis. Senior administrator can modify the alarm threshold. The highest administrator can reinitialize system to make it adapt to different types of tower crane. Only browse and download function are available in the key fields of alarm inquiry, anyone can't modify the data. The overload fields in alarm database are encrypted, only senior administrator can browse. The sensitive fields are prevented from being tampered to the great extent, which will provide the reliable basis for the structural optimization and accident analysis. The system can be initialized through the USB interface. Before initialization, type, structural parameters, alarm thresholds, control thresholds, lifting torque characteristics of tower crane should be made as Excel files and then converted to XML files by format conversion files developed specially, then the XML files are downloaded to U disk. The U disk is inserted into USB interface, then the highest administrator can initialize the system according to hints from system. After initialization, senior administrator can modify structural parameters, alarm thresholds, control thresholds by clicking on parameters setting menu. So long as users can make the corresponding excel form, the system initialization can be finished easily according to above steps and used for monitoring. This is very convenient for user.Tower crane belongs to mobile construction machinery. Over time, sensor signals may have some drift, so it is necessary to calibrate the system regularly for guaranteeing the monitoring accuracy. Considering the tower is a linear elastic structure, sensors are linear sensors,in calibration linear equation is used:y=kx+b (1)where x is sample value of sensor, y is actual value. k, b are calibration coefficients, and are calculated out by two-points method. At running mode, the relationship between x and y is:y=[(y1-y0)/(x1-x0)](x-x0)+y0 (2)After calibration, temperature drift and creep can be eliminated, so the monitoring accuracy is improved greatly.Lifting torque is the most important parameter of condition monitoring of tower crane. Comparing the real-time torque M(L) with rated torque Me(L), the movement of tower crane can be controlled under a safe status.M (L)= Q (L)×L (3)Where, Q(L)is actual lifting weight, L is trolley luffing. Me(L) = Qe(L)×L (4)Where, Q e(L) is rated lifting weight. The design values of rated lifting weight are discrete, while trolley luffing is continuous. Therefore there is a rated lifting weight in any position. According to the mechanical characteristics of tower crane, the rated lifting weight is calculated out at any point by 3 spline interpolation according to the rated lifting weight at design points.When lifting weight or lifting torque is beyond rated value, alarm signal and control signal will be sent out. The hoist motor with high, medium and low speed is controlled by the ratio of lifting weight Q and maximum lifting weight Qmax,so the hoisting speed can be controlled automatically by the lifting weight. The luffing motor with high and low speed is controlled by the ratio of lifting torque M and rated lifting torque Me. Thus the luffing speed can be controlled by the lifting torque automatically. The flow chart is shown in figure 2. Fig. 2 real-time control of lifting weight and lifting torqueWhen accidents take place, power will be off suddenly. It is vital for identifying accident liability to record the operating data at the time of power-off. If measures are not taken to save the operating data, the relevant departments is likely to shirk responsibility. In order to solve the problem, the power-off protection module is designed. The module can save the operating data within 120 seconds automatically before power is off suddenly. In this 120 seconds, data is recorded every 0.1 seconds, and stores in a 2D array with 6 rows 1200 columns in queue method. The elements of the first line are the recent time (year-month-day-hour-minute-second), the elements of the second line to sixth line are lifting weight, lifting torque, trolley luffing, lifting height and wind speed in turn. The initial values are zero, when a set of data are obtained, the elements in the first column are eliminated, the elements in the backward columns move frontwards, new elements are filled into the last column of the array, so the array always saves the operating data at the recent 120 seconds. In order to improve the real-time property of the response, and to extend the service life of the nonvolatile memory chip EEPROM-93C46, the array is cached in volatile flip SDRAM usually. So long as power-off signal produces, the array will be shift to EEPROM, at once.In order to achieve the task, the external interruption thread and the power-off monitoring thread of program is set up, the power-off monitoring thread of program is the highest priority. These two threads is idle during normal operation. When power is off, the power-off monitoring thread of program can be executed immediately. When power-off is monitored by power-off control circuit, the external interruption pins produces interrupt signal. The ARM microprocessor responds to external interrupt request, and wakes up the processing thread of external interruption, then sets synchronized events as informing state. After receiving the synchronized events, the data cached in SDRAM will be written to EEPROM in time.ConclusionThe general intelligence embedded monitoring system of tower crane, which can be applicable to various types of tower crane operating under any lifting rates, uses U disk with the information of the tower crane to finish the system initialization and fits the lifting torque curve automatically. In dangerous state, the system will give out the voice and light alarm, link with the relay or PLC by the RS485 communication interface, and cut off the power. When power is down suddenly, the instantaneous operating data can be recorded automatically, and stored in a black box, which can be taken as the proof for identifying accident responsibility. The system has been used to monitor the "JiangLu" series of tower cranes successfully, and achieved good social and economic benefits.AcknowledgementsThe authors wish to thank China Natural Science Foundation(50975289), China Postdoctoral Science Foundation(20100471229), Hunan science & technology plan, Jianglu Machinery & Electronics Co. Ltd for funding this work.Reference Leonard Bernold. Intelligent Technology for Crane Accident Prevention. Journal of Construction Engineering and Management. 1997, 9: 122~124.Gu Lichen,Lei Peng,Jia Yongfeng. Tower crane' monitor and control based on multi-sensor. Journal of Vibration, Measurement and Diagnosis. 2006, 26(SUPPL.): 174-178.Wang Ming,Zhang Guiqing,Yan Qiao,et, al. Development of a novel black box for tower crane based on an ARM-based embedded system. Proceedings of the IEEE International Conference on Automation and Logistics. 2007: 82-87.Wang Renqun, Yin Chenbo, Zhang Song, et, al. Tower Crane Safety Monitoring and Control System Based on CAN Bus. Instrument Techniques and Sensor. 2010(4): 48-51.Zheng Conghai,Li Yanming,Yang Shanhu,et, al. Intelligent Monitoring System for Tower Crane Based on BUS Architecture and Cut IEEE1451 Standard. Computer Measurement & Control. 2010, 18, (9): 1992-1995.Yang Yu,Zhenlian Zhao,Liang Chen. Research and Design of Tower Crane Condition Monitoring and Fault Diagnosis System. 2010 Proceedings of International Conference on Artificial Intelligence and Computational Intelligence. 2010: 405-408.Yu Yang, Chen Liang, Zhao Zhenlian. Research and design of tower crane condition monitoring and fault diagnosis system. International Conference on Artificial Intelligence and Computational Intelligence, 2010, 3: 405-408.Chen Baojiang, Zeng Xiaoyuan. Research on structural frame of the embedded monitoring and control system for tower crane. 2010 International Conference on Mechanic Automation and Control Engineering. 2010: 5374-5377.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Grasso, Christian, Raoul Raftopoulos, and Giovanni Schembra. "Smart Zero-Touch Management of UAV-Based Edge Network." IEEE Transactions on Network and Service Management, 2022, 1. http://dx.doi.org/10.1109/tnsm.2022.3160858.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Lira, Oscar G., Oscar M. Caicedo, and Nelson L. S. da Fonseca. "Large Language Models for Zero Touch Network Configuration Management." IEEE Communications Magazine, 2024, 1–8. http://dx.doi.org/10.1109/mcom.001.2400368.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Saraiva de Sousa, Nathan F., Danny Lachos Perez, Christian Esteve Rothenberg, and Pedro Henrique Gomes. "End-to-End Service Monitoring for Zero-Touch Networks." Journal of ICT Standardization, May 29, 2021. http://dx.doi.org/10.13052/jicts2245-800x.923.

Повний текст джерела
Анотація:
Autonomous management capability is the main pillar for paving Zero-touch Networks and efficiently deliver and operate use cases under the light of 5G requirements. To this end, Closed Control Loop (CCL), Intent-Based Networking (IBN), and Machine Learning (ML) are regarded as enablers to automatically executed all operational processes, ideally without human intervention. In this context, the ETSI Zero-touch network and Service Management (ZSM) framework specifies an end-to-end network and service management reference architecture for managing the full lifecycle of services. However, the whole process of service monitoring is not yet well-consolidated in ETSI ZSM. In this work, we propose the Monitoring Model Generator (MMG) component to automatically construct templates for service monitoring. MMG implements a novel methodology where service deployment models and standard information models are used as inputs to generate a high-level monitoring template, called Service Monitoring Model (SMM) and built upon an ontology-based schema based on the Resource Description Framework (RDF) vocabulary. We present a proof of concept implementation along with an experimental functional validation of the MMG and using RDF data in turtle syntax and format. The resulting monitoring models are then used to define actual monitoring KPIs and construct management policies in a control loop architecture.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Dutta, Biswadeb, Andreas Krichel, and Marie-Paule Odini. "The Challenge of Zero Touch and Explainable AI." Journal of ICT Standardization, June 8, 2021. http://dx.doi.org/10.13052/jicts2245-800x.925.

Повний текст джерела
Анотація:
With ever increasing complexity and dynamicity in digital service provider networks, especially with the emergence of 5G, operators seek more automation to reduce the cost of operations, time to service and revenue of new and innovative services, and increase the efficiency of resource utilization, Complex algorithms leveraging ML (machine learning) are introduced, often with the need for frequent training as the networks evolve. Inference is then applied either in the core directly, or in the management stack to trigger actions and configuration changes automatically. This is the essence of Zero Touch. The challenge that analysts are often faced with is to trace back from the inference or prediction to the original events or symptoms that led to the triggered action, which ML model version or pipeline was used. This paper describes the challenges faced by analysts and provides some solutions.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Gallego-Madrid, Jorge, Ramon Sanchez-Iborra, Pedro M. Ruiz, and Antonio F. Skarmeta. "Machine learning-based zero-touch network and service management: A survey." Digital Communications and Networks, September 2021. http://dx.doi.org/10.1016/j.dcan.2021.09.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Collet, Alan, Antonio Bazco-Nogueras, Albert Banchs, and Marco Fiore. "Explainable and Transferable Loss Meta-Learning for Zero-Touch Anticipatory Network Management." IEEE Transactions on Network and Service Management, 2024, 1. http://dx.doi.org/10.1109/tnsm.2024.3377442.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Xu, Yi-Han, Wen Zhou, Yang-Gang Zhang, and Gang Yu. "Stochastic game for resource management in cellular zero-touch deterministic industrial M2M networks." IEEE Wireless Communications Letters, 2022, 1. http://dx.doi.org/10.1109/lwc.2022.3212677.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Niboucha, Redouane, Sabra Ben Saad, Adlen Ksentini, and Yacine Challal. "Zero-touch security management for mMTC network slices: DDoS attack detection and mitigation." IEEE Internet of Things Journal, 2022, 1. http://dx.doi.org/10.1109/jiot.2022.3230875.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Barrachina‐Muñoz, Sergio, Rasoul Nikbakht, Jorge Baranda, Miquel Payaró, Josep Mangues‐Bafalluy, Panagiotis Kokkinos, Polyzois Soumplis, Aristotelis Kretsis, and Emmanouel Varvarigos. "Deploying cloud‐native experimental platforms for zero‐touch management 5G and beyond networks." IET Networks, July 8, 2023. http://dx.doi.org/10.1049/ntw2.12095.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Arulappan, Arunkumar, Gunasekaran Raja, Ali Kashif Bashir, Shahid Mumtaz, and Aniket Mahanti. "Ztmp: Vim Based Zero Touch Management Platform for On-Boarding of Cloud-Native Vnf." SSRN Electronic Journal, 2022. http://dx.doi.org/10.2139/ssrn.4041725.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Coronado, Estefania, Rasoul Behravesh, Tejas Subramanya, Adriana Fernandez-Fernandez, Shuaib Siddiqui, Xavier Costa-Perez, and Roberto Riggio. "Zero Touch Management: A Survey of Network Automation Solutions for 5G and 6G Networks." IEEE Communications Surveys & Tutorials, 2022, 1. http://dx.doi.org/10.1109/comst.2022.3212586.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Gomes, Pedro Henrique, Magnus Buhrgard, János Harmatos, Swarup Kumar Mohalik, Dinand Roeland, and Jörg Niemöller. "Intent-driven Closed Loops for Autonomous Networks." Journal of ICT Standardization, June 8, 2021. http://dx.doi.org/10.13052/jicts2245-800x.929.

Повний текст джерела
Анотація:
Closed loops are key enablers for automation that have been successfully used in many industries for long, and more recently for computing and networking applications. The Zero-touch network and service management (ZSM) framework introduced standardized components that allow the creation, execution, and governance of multiple closed loops, enabling zero-touch management of end-to-end services across different management domains. However, the coordinated and optimal instantiation and operation of multiple closed loops is an open question that is left for implementation by the ZSM specifications. In this paper, we propose a methodology that uses intents as a way of communicating requirements to be considered by autonomous management domains to coordinate hierarchies of closed loops. The intent-driven methodology facilitates hierarchical and peer interactions for delegation and escalation of intents. Furthermore, it extends the existing management capabilities of the ZSM framework and facilitates conflict-free integration of closed loops by setting optimal (and non-conflicting) goals that each closed loop in the hierarchy needs to account for. We show an example of the application of the proposed methodology in a network slicing assurance use case. The new capabilities introduced in this paper can be considered as an extension of the ZSM framework to be used in scenarios where multiple intent-driven closed loops exist.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Liyanage, Madhusanka, Quoc-Viet Pham, Kapal Dev, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, and Gokul Yenduri. "A survey on Zero touch network and Service (ZSM) Management for 5G and beyond networks." Journal of Network and Computer Applications, April 2022, 103362. http://dx.doi.org/10.1016/j.jnca.2022.103362.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Prathiba, Sahaya Beni, Kathiroli Raja, RV Saiabirami, and Gunashree Kannan. "An Energy-Aware Tailored Resource Management for Cellular-based Zero-Touch Deterministic Industrial M2M Networks." IEEE Access, 2024, 1. http://dx.doi.org/10.1109/access.2024.3372417.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Mekrache, Abdelkader, Mohamed Mekki, Adlen Ksentini, Bouziane Brik, and Christos Verikoukis. "On Combining XAI and LLMs for Trustworthy Zero-Touch Network and Service Management in 6G." IEEE Communications Magazine, 2024, 1–7. http://dx.doi.org/10.1109/mcom.002.2400276.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Arulappan, Arunkumar, Gunasekaran Raja, Ali Kashif Bashir, Aniket Mahanti, and Marwan Omar. "ZTMP: Zero Touch Management Provisioning Algorithm for the On-boarding of Cloud-native Virtual Network Functions." Mobile Networks and Applications, November 3, 2023. http://dx.doi.org/10.1007/s11036-023-02260-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

de Sousa, Nathan Franklin Saraiva, Md Tariqul Islam, Raza Ul Mustafa, Danny Alex Lachos Perez, Christian Esteve Rothenberg, and Pedro Henrique Gomes. "Machine Learning-Assisted Closed-Control Loops for Beyond 5G Multi-Domain Zero-Touch Networks." Journal of Network and Systems Management 30, no. 3 (April 22, 2022). http://dx.doi.org/10.1007/s10922-022-09651-x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Basheer, Hanaa, and May Itani. "Zero Touch in Fog, IoT, and MANET for Enhanced Smart City Applications: A Survey." Future Cities and Environment 9, no. 1 (2023). http://dx.doi.org/10.5334/fce.166.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Chowdhury, Mahfuzulhoq. "Accelerator: an intent-based intelligent resource-slicing scheme for SFC-based 6G application execution over SDN- and NFV-empowered zero-touch network." Frontiers in Communications and Networks 5 (July 4, 2024). http://dx.doi.org/10.3389/frcmn.2024.1385656.

Повний текст джерела
Анотація:
Zero-touch networks (ZTNs) can provide autonomous network solutions by integrating software-based solutions for various emerging 5G and 6G applications. The current literature does not provide any suitable end-to-end network management and resource-slicing solutions for service function chaining (SFC) and user intent–based (time and cost preference) 6G/non-6G application execution over ZTNs enabled by mobile edge computing, network function virtualization, and software-defined networking. To tackle these challenges, this work initiates an end-to-end network management and user intent–aware intelligent network resource–slicing scheme for SFC-based 6G/non-6G application execution over ZTNs, taking into account various virtual and physical resources, task workloads, service requirements, and task numbers. The results depicted that at least 25.27% average task implementation delay gain, 6.15% energy gain, and 11.52% service monetary gain are realized in the proposed scheme over the compared schemes.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

"Applying the Sustainable Development Goals (SDGs) in Zakah Management at Kelantan." Journal of Economic Research & Reviews 3, no. 4 (December 4, 2023): 349–54. http://dx.doi.org/10.33140/jerr.03.04.07.

Повний текст джерела
Анотація:
The Sustainable Development Goals (SDGs) as successor to Millennium Development Goals (MDGs) represent a broader intergovernmental agreement to foster action on broad-based development encompassing economic development, human development, and environmental sustainability. The Sustainable Development Goals (SDGs) is a program based on human rights that includes three dimensions, namely social, environmental and economic. All available resources need to be fully utilized to achieve the SDGs in 2030. In general, this goal asserts that "no one left behind" is in line with the 11th Malaysia Plan. The objective of this study is to identify the extent to which the Council of Islamic Religion and Malay Customs of Kelantan (MAIK) can adapt zakah management based on the goals of the SDGs. This paper uses the conceptual study method as a guide to applying the SDGs in zakah management at MAIK. This study chose a qualitative method by interviewing several people from the top management in this organization. The results of the study found that as many as seven goals can be adopted in zakah management, namely no poverty, zero hunger, health and well-being for all, quality education, career development, and economic development, making cities and asnaf settlements safe and resilient in addition to strengthening implementation methods by building a network with external agencies. The SDGs are aligned with MAIK's direction to become a leading world-class zakah management agency. This paper does not only touch on the issue of development to produce asnaf, but also refines the holistic issue resulting from the application of the SDGs. The contribution and implications of the study are discussed at the end of this paper
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Pastor, Antonio, Diego R. López, Jose Ordonez-Lucena, Sonia Fernández, and Jesús Folgueira. "Model-based Approach to Multi-domain Monitoring Data Aggregation." Journal of ICT Standardization, June 8, 2021. http://dx.doi.org/10.13052/jicts2245-800x.9210.

Повний текст джерела
Анотація:
The essential propellant for any closed-loop management mechanism is data related to the managed entity. While this is a general evidence, it becomes even more true when dealing with advanced closed-loop systems like the ones supported by Artificial Intelligence (AI), as they require a trustworthy, up-to-date and steady flow of state data to be applicable. Modern network infrastructures provide a vast amount of disparate data sources, especially in the multi-domain scenarios considered by the ETSI Industry Specification Group (ISG) Zero Touch Network and Service Management (ZSM) framework, and proper mechanisms for data aggregation, pre-processing and normalization are required to make possible AI-enabled closed-loop management. So far, solutions proposed for these data aggregation tasks have been specific to concrete data sources and consumers, following ad-hoc approaches unsuitable to address the vast heterogeneity of data sources and potential data consumers. This paper presents a model-based approach to a data aggregator framework, relying on standardized data models and telemetry protocols, and integrated with an open-source network orchestration stack to support their incorporation within network service lifecycles.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Nastic, Stefan. "Self-Provisioning Infrastructures for the Next Generation Serverless Computing." SN Computer Science 5, no. 6 (June 26, 2024). http://dx.doi.org/10.1007/s42979-024-03022-w.

Повний текст джерела
Анотація:
AbstractServerless computing has ushered in a transformative paradigm, with a promise to alleviate developers from the intricacies of infrastructure management. However, current serverless platforms predominantly offer only serverless compute capabilities. As a consequence, the application developers are once again tasked to explicitly provision and manage the backend services (BaaS), such as object stores or API gateways, the infrastructure, and the configuration models. This violates the main promise of serverless computing and erases much of the practical benefits of the serverless paradigm. It also introduces the challenges of managing the application execution environment, which includes maintaining provisioning and deployment scripts, configuring and managing access permissions, and scaling the services during runtime. To address these challenges, in this paper we introduce a novel paradigm for the next generation of serverless computing, called self-provisioning infrastructure. The self-provisioning infrastructure is an infrastructure that is capable to automatically and autonomously (with zero-configuration and zero-touch) provision serverless functions, their infrastructure, and their supporting BaaS services. To achieve this vision, we introduce novel design principles, models, and mechanisms that are formalized via novel programming, function, and system models. With this novel paradigm, we intend to fortify the core design principles of serverless computing but also extend them to the entire application execution environment. By doing so, we aim to enable the next-generation serverless computing in the Edge-Cloud continuum.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Trichias, Konstantinos, Panagiotis Demestichas, and Nikolaos Mitrou. "Inter-PLMN Mobility Management Challenges for Supporting Cross-Border Connected and Automated Mobility (CAM) Over 5G." Journal of ICT Standardization, June 8, 2021. http://dx.doi.org/10.13052/jicts2245-800x.924.

Повний текст джерела
Анотація:
As the first 5G networks are being deployed across the world, new services enabled by the superior performance of 5G in terms of throughput, latency and reliability are emerging. Connected and Automated Mobility (CAM) services are perhaps among the most demanding applications that 5G networks will have to support and their deployment, performance and potential for improvement has been well investigated over the past few years. However, CAM operation in multi-operator environments and the inevitable inter-PLMN handover caused by the inherent mobility of CAM services have not been studied in length. Moreover, the multiple domains, multi-vendor components and inherent high mobility of the cross-border vehicular environment, introduce multiple challenges in terms of network management and dynamic slicing, making Zero-touch network and Service Management (ZSM) solutions an attractive alternative for these environments. The work presented in this study attempts to analyse the requirements for cross-border CAM operation for the five main CAM use cases selected by 3GPP, based on input from key European stakeholders (Network Operators, vendors, Automotive Manufacturers etc.). A detailed analysis and categorization into four categories of the main challenges for cross-border CAM service provisioning is performed, namely Telecommunication, Application, Security/Privacy and Regulatory issues, while potential solutions based on existing and upcoming technological enablers are discussed for each of them. The role of standardization and relevant regulatory and administrative bodies is analysed, leading to insights regarding the most promising future research directions in the field of cross-border CAM services.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Jorquera Valero, José María, Pedro Miguel Sánchez Sánchez, Alexios Lekidis, Javier Fernandez Hidalgo, Manuel Gil Pérez, M. Shuaib Siddiqui, Alberto Huertas Celdrán, and Gregorio Martínez Pérez. "Design of a Security and Trust Framework for 5G Multi-domain Scenarios." Journal of Network and Systems Management 30, no. 1 (October 8, 2021). http://dx.doi.org/10.1007/s10922-021-09623-7.

Повний текст джерела
Анотація:
AbstractWith the expansion of 5G networks, new business models are arising where multi-tenancy and active infrastructure sharing will be key enablers for them. With these new opportunities, new security risks are appearing in the form of a complex and evolving threat landscape for 5G networks, being one of the main challenges for the 5G mass rollout. In 5G-enabled scenarios, adversaries can exploit vulnerabilities associated with resource sharing to perform lateral movements targeting other tenant resources, as well as to disturb the 5G services offered or even the infrastructure resources. Moreover, existing security and trust models are not adequate to react to the dynamicity of the 5G infrastructure threats nor to the multi-tenancy security risks. Hence, we propose in this work a new security and trust framework for 5G multi-domain scenarios. To motivate its application, we detail a threat model covering multi-tenant scenarios in an underlying 5G network infrastructure. We also propose different ways to mitigate these threats by increasing the security and trust levels using network security monitoring, threat investigation, and end-to-end trust establishments. The framework is applied in a realistic use case of the H2020 5GZORRO project, which envisions a multi-tenant environment where domain owners share resources at will. The proposed framework forms a secure environment with zero-touch automation capabilities, minimizing human intervention.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Holloway, Donell Joy, Lelia Green, and Kylie Stevenson. "Digitods: Toddlers, Touch Screens and Australian Family Life." M/C Journal 18, no. 5 (August 20, 2015). http://dx.doi.org/10.5204/mcj.1024.

Повний текст джерела
Анотація:
Introduction Children are beginning to use digital technologies at younger and younger ages. The emerging trend of very young children (babies, toddlers and pre-schoolers) using Internet connected devices, especially touch screen tablets and smartphones, has elicited polarising opinions from early childhood experts. At present there is little actual research about the risks or benefits of tablet and smartphone use by very young children. Current usage recommendations, based on research into passive television watching which claims that screen time is detrimental, is in conflict with advice from education experts and app developers who commend interactive screen time as engaging and educational. Guidelines from the health professions typically advise strict time limits on very young children’s screen-time. Based for the most part on policy developed by the American Academy of Paediatrics, it is usually recommended that children under two have no screen time at all (Brown), and children over this age have no more than two hours a day (Strasburger, et al.). On the other hand, early childhood education guidelines promote the development of digital literacy skills (Department of Education). Further, education-based research indicates that access to computers and the Internet in the preschool years is associated with overall educational achievement (Bittman et al.; Cavanaugh et al; Judge et al; Neumann). The US based National Association for Education of Young Children’s position statement on technology for zero to eight year-olds declares that “when used intentionally and appropriately, technology and interactive media are effective tools to support learning and development” (NAEYC). This article discusses the notion of Digitods—a name for those children born since the introduction of the iPhone in 2007 who have ready access to touchscreen technologies since birth. It reports on the limited availability of evidence-based research about these children’s ICT use concluding that current research and recommendations are not grounded in the everyday life of very young children and their families. The article then reports on the beginnings of a research project funded by the Australian Research Council entitled Toddlers and Tablets: exploring the risks and benefits 0-5s face online. This research project recognises that at this stage it is parents who “are the real experts in their toddlers’ use of screen technologies. Accordingly, the project’s methodological approach draws on parents, pre-schoolers and their families as communities of practice in the construction of social meaning around toddlers’ use of touch screen technology. Digitods In 2000 Bill Gates introduced the notion of Generation I to describe the first cohort of children raised with the Internet as a reality in their lives. They are those born after the 1990s and will, in most cases; have no memory of life without the Net. [...] Generation I will be able to conceive of the Internet’s possibilities far more profoundly than we can today. This new generation will become agents of change as the limits of the Internet expand to include educational, scientific, and business applications that we cannot even imagine. (Gates)Digitods, on the other hand, is a term that has been used in education literature (Leathers et al.) to describe those children born after the introduction of the iPhone in 2007. These children often begin their lives with ready access to the Internet via easily usable touch screen devices, which could have been designed with toddlers’ touch and swipe movements in mind. Not only are they the youngest group of children to actively engage with the Internet they are the first group to grow up with a range of mobile Internet devices (Leathers et al.). The difference between Digitods and Gates’s Generation I is that Digitods are the first pre-verbal, non-ambulant infants to have ready access to digital technologies. Somewhere around the age of 10 months to fourteen months a baby learns to point with his or her forefinger. At this stage the child is ready to swipe and tap a touch screen (Leathers et al.). This is in contrast to laptops and PCs given that very young children often need assistance to use a mouse or keyboard. The mobility of touch screen devices allows very young children to play at the kitchen table, in the bedroom or on a car trip. These mobile devices have, of course, a myriad of mobile apps to go with them. These apps create an immediacy of access for infants and pre-schoolers who do not need to open a web browser to find their favourite sites. In the lives of these children it seems that it has always been possible to touch and swipe their way into games, books and creative and communicative experiences (Holloway et al. 149). The interactivity of most pre-school apps, as opposed to more passive screen activities such as watching television shows or videos (both offline or online), requires toddlers and pre-schoolers to pay careful attention, think about things and act purposefully (Leathers et al.). It is this interactivity which is the main point of difference, one which holds the potential to engage and educate our youngest children. It should be noted within this discussion about Digitods that, while the trope Digital Natives tends to homogenise an entire generation, the authors do not assume that all children born today are Digitods by default. Many children do not have the same privileged opportunities as others, or the (parental) cultural capital, to enable access, ease of use and digital skill development. In addition to this it is not implied that Digitods will be more tech savvy than their older siblings. The term is used more to describe and distinguish those children who have digital access almost since birth—in order to differentiate or tease out everyday family practices around these children’s ICT use and the possible risks and benefits this access affords babies, toddlers and pre-schoolers. While the term Digital Native has also been criticised as being a white middle class phenomenon this is not necessarily the case with Digitods. In the Southeast Asia and the Pacific region developed countries like Japan, Korea, New Zealand and Singapore have extremely high rates of touchscreen use by very young children (Child Sciences; Jie; Goh; Unantenne). Other countries such as the Philippines and Indonesia have moved to a high smart phone usage by very young children while at the same time have only nascent ICT access and instruction within their education systems (Unantenne). The Digitod Parent Parents of Digitods are usually experienced Internet users themselves, and many are comfortable with their children using these child-friendly touch screen devices (Findahl). Digital technologies are integral to their everyday lives, often making daily life easier and improving communication with family and friends, even during the high pressure parenting years of raising toddlers and pre-schoolers. Even though many parents and caregivers are enabling very young children’s use of touch screen technologies, they are also concerned about the changes they are making. This is because very young children’s use of touch screen devices “has become another area where they fear possible criticism and in which their parental practices risk negative evaluation by others” (Holloway et al). The tensions between expert advice regarding young children’s screen-time and parents’ and caregivers’ own judgments are also being played out online. Parenting blogs, online magazines and discussion groups are all joining in the debate: On the one hand, parents want their children to swim expertly in the digital stream that they will have to navigate all their lives; on the other hand, they fear that too much digital media, too early, will sink them. Parents end up treating tablets like precision surgical instruments, gadgets that might perform miracles for their child’s IQ and help him win some nifty robotics competition—but only if they are used just so. (Rosin)Thus, with over 80 000 children’s apps marketed as educational in the Apple App Store alone, parents can find it difficult to choose apps that are worth purchasing (Yelland). Nonetheless, recent research regarding Australian children shows that three to five year olds who access touch screen devices will typically have five or more specific apps to choose from (5.23 on average) (Neumann). With little credible evidence or considered debate, parents have been left to make their own choices about the pros and cons of their young children’s access to touch screens. Nonetheless, one immediate benefit that comes to mind is toddlers and pre-schoolers video chatting with dispersed family member—due to increased globalisation, guest worker arrangements, FIFO (fly-in fly-out) workforces and family separation or divorce. Such clear benefits around sociability and youngsters’ connection with significant others make previous screen-related guidelines out of date and no longer contextually relevant. Little Research Attention Family ownership of tablet devices as well as touch screen phones has risen dramatically in the last five years. With very young children being loaned these technologies by mum or dad, and a tendency in Australia to rely on market-orientated research regarding ownership and usage, there is very little knowledge about touch screen usage rates for very young Australian children. UK and US usage figures indicate that over the last few years there has been a five-fold increase in tablet uptake by zero to eight year olds (Ofcom; Rideout). Although large scale, comparative Australian data is not available, previous research regarding older children indicates that Australia is similar to high use countries like some Scandinavian nations and the UK (Green et al.). In addition to this, two small research projects in Australia, with under 160 participant families each, indicate that two thirds of these children (0-5) use touchscreen devices (Neumann; Coenenna et. al.). Beyond usage figures, there is also very limited evidence-based research about very young children’s app use. Interactive technologies available via touch screen technologies have been available domestically for a very short time. Consequently, “valid scientific research has not been completed and replicated due to [the lack of] available time” (Leathers el al. 129) and longitudinal studies which rely on an intervention group (in this case exposure to children’s apps) and a control group (no exposure) are even fewer and more time-consuming. Interestingly, researchers have revisited the issue of passive screen viewing. A recent 2015 review of previous 2007 research, which linked babies watching videos with poor language development, has found that there was statistical and methodological issues with the 2007 study and that there are no strong inferences to be drawn between media exposure and language development (Ferguson and Donellan). Thus, there seems to be no conclusive evidence-based research on which to inform parents and educators about the possible downside or benefits of touch screen use. Nonetheless, early childhood experts have been quick to weigh in on the possible effects of screen usage, some providing restrictive guidelines and recommendations, with others advocating the use of interactive apps for very young children for their educational value. This knowledge-gap disguises what is actually happening in the lives of real Australian families. Due to the lack of local data, as well as worldwide research, it is essential that Australian researchers obtain a comprehensive understanding about actual behaviour around touch screen use in the lives of children aged between zero and five and their families. Beginning Research While research into very young children’s touch screen use is beginning to take place, few results have been published. When researching two to three year olds’ learning from interactive versus non-interactive videos Kirkorian, Choi and Pempek found that “toddlers may learn more from interactive media than from non-interactive video” (Kirkorian et al). This means that the use of interactive apps on touch screen devices may hold a greater potential for learning than passive video or television viewing for children in this age range. Another study considered the degree to which the young children could navigate to and use apps on touch screen devices by observing and analysing YouTube videos of infants and young children using touch screens (Hourcade et al.). It was found that between the ages of 12 months and 17 months the children filmed seemed to begin to “make meaningful use of the tablets [and] more than 90 per cent of children aged two [had] reached this level of ability” (1923). The kind of research mentioned above, usually the preserve of psychologists, paediatricians and some educators, does not, however, ground very young children’s use in their domestic context—in the spaces and with those people with whom most touch screen usage takes place. With funding from the Australian Research Council Australian, Irish and UK researchers are about to adopt a media studies (domestication) approach to comprehensively investigate digital media use in the everyday lives of very young children. This Australian-based research project positions very young children’s touch screen use within the family and will help provide an understanding of the everyday knowledge and strategies that this cohort of technology users (very young children and their parents) have already developed—in the knowledge vacuum left by the swift appropriation and incorporation of these new media technologies into the lives of families with very young children. Whilst using a conventional social constructionist perspective, the project will also adopt a co-creation of knowledge approach. The co-creation of knowledge approach (Fong) has links with the communities of practice literature (Wegner) and recognises that parents, care-givers and the children themselves are the current experts in this field in terms of the everyday uses of these technologies by very young children. Families’ everyday discourse and practices regarding their children’s touch screen use do not necessarily work through obvious power hierarchies (via expert opinions), but rather through a process of meaning making where they shape their own understandings and attitudes through experience and shared talk within their own everyday family communities of practice. This Toddlers and Tablets research is innovative in many ways. It seeks to capture the enthusiasm of young children’s digital interactions and to pioneer new ways of ‘beginnings’ researching with very young children, as well as with their parents. The researchers will work with parents and children in their broad domestic contexts (including in and out-of-home activities, and grandparental and wider-family involvement) to co-create knowledge about young children’s digital technologies and the social contexts in which these technologies are used. Aspects of these interactions, such as interviews and observations of everyday digital interactions will be recorded (audio and video respectively). In addition to this, data collected from media commentary, policy debates, research publications and learned articles from other disciplinary traditions will be interrogated to see if there are correlations, contrasts, trends or synergies between parents’ construction of meaning, public commentary and current research. Critical discourse tools and methods (Chouliaraki and Fairclough) will be used to analyse verbatim transcripts, video, and all written materials. Conclusion Very young children are uniquely dependent upon others for the basic necessities of life and for the tools they need, and will need to develop, to claim their place in the world. Given the ubiquitous role played by digital media in the lives of their parents and other caregivers it would be a distortion of everyday life for children to be excluded from the technologies that are routinely used to connect with other people and with information. In the same way that adults use digital media to renew and strengthen social and emotional bonds across distance, so young children delight in ‘Facetime’ and other technologies that connect them audio-visually with friends and family members who are not physically co-present. Similarly, a very short time spent in the company of toddlers using touch screens is sufficient to demonstrate the sheer delight that these young infants have in developing their sense of agency and autonomy (https://www.youtube.com/watch?v=aXV-yaFmQNk). Media, communications and cultural studies are beginning to claim a space for evidence based policy drawn from everyday activities in real life contexts. Research into the beginnings of digital life, with families who are beginning to find a way to introduce these technologies to the youngest generation, integrating them within social and emotional repertoires, may prove to be the start of new understandings into the communication skills of the preverbal and preliterate young people whose technology preferences will drive future development – with their parents likely trying to keep pace. Acknowledgment This research is supported under Australia Research Council’s Discovery Projects funding scheme (project number DP150104734). References Bittman, Michael, et al. "Digital Natives? New and Old Media and Children's Outcomes." Australian Journal of Education 55.2 (2011): 161-75. Brown, Ari. "Media Use by Children Younger than 2 Years." Pediatrics 128.5 (2011): 1040-45. Burr, Vivien. Social Constructionism. 2nd ed. London: Routledge, 2003. Cavanaugh, Cathy, et al. "The Effects of Distance Education on K–12 Student Outcomes: A Meta-Analysis." Naperville, Ill.: Learning Point Associates, 2004. 5 Mar. 2009 ‹http://www.ncrel.org/tech/distance/index.html›. Child Sciences and Parenting Research Office. Survey of Media Use by Children and Parents (Summary). Tokyo: Benesse Educational Research and Development Institute, 2014. Coenena, Pieter, Erin Howiea, Amity Campbella, and Leon Strakera. Mobile Touch Screen Device Use among Young Australian Children–First Results from a National Survey. Proceedings 19th Triennial Congress of the IEA. 2015. Chouliaraki, Lilie and Norman Fairclough. Discourse in Late Modernity: Rethinking Critical Discourse Analysis. Edinburgh: Edinburgh UP, 1999. Department of Education. "Belonging, Being and Becoming: The Early Years Learning Framework for Australia." Australian Government, 2009. Ferguson, Christopher J., and M. Brent Donnellan. "Is the Association between Children’s Baby Video Viewing and Poor Language Development Robust? A Reanalysis of Zimmerman, Christakis, and Meltzoff (2007)." Developmental Psychology 50.1 (2014): 129. Findahl, Olle. Swedes and the Internet 2013. Stockholm: The Internet Infrastructure Foundation, 2013. Fong, Patrick S.W. "Co-Creation of Knowledge by Multidisciplinary Project Teams." Management of Knowledge in Project Environments. Eds. E. Love, P. Fong, and Z. Irani. Burlington, MA: Elsevier, 2005. 41-56. Gates, Bill. "Enter 'Generation I': The Responsibility to Provide Access for All to the Most Incredible Learning Tool Ever Created." Instructor 109.6 (2000): 98. Goh, Wendy W.L., Susanna Bay, and Vivian Hsueh-Hua Chen. "Young School Children’s Use of Digital Devices and Parental Rules." Telematics and Informatics 32.4 (2015): 787-95. Green, Lelia, et al. "Risks and Safety for Australian Children on the Internet: Full Findings from the AU Kids Online Survey of 9-16 Year Olds and Their Parents." Cultural Science Journal 4.1 (2011): 1-73. Holloway, Donell, Lelia Green, and Carlie Love. "'It's All about the Apps': Parental Mediation of Pre-Schoolers' Digital Lives." Media International Australia 153 (2014): 148-56. Hourcade, Juan Pablo, Sarah Mascher, David Wu, and Luiza Pantoja. Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 2015. Jie S.H. "ICT Use Statistics of Households and Individuals in Korea." 10th World Telecommunication/ICT Indicators Meeting (WTIM-12). Korea Internet & Security Agency (KISA), 25-7 Sep. 2012.Judge, Sharon, Kathleen Puckett, and Sherry Mee Bell. "Closing the Digital Divide: Update from the Early Childhood Longitudinal Study." The Journal of Educational Research 100.1 (2006): 52-60. Kirkorian, H., K. Choi, and Pempek. "Toddlers' Word Learning from Contingent and Non-Contingent Video on Touchscreens." Child Development (in press). Leathers, Heather, Patti Summers, and Desollar. Toddlers on Technology: A Parents' Guide. Illinois: AuthorHouse, 2013. NAEYC. Technology and Interactive Media as Tools in Early Childhood Programs Serving Children from Birth through Age 8 [Position Statement]. Washington: National Association for the Education of Young Children, the Fred Rogers Center for Early Learning and Children’s Media at Saint Vincent College, 2012. Neumann, Michelle M. "An Examination of Touch Screen Tablets and Emergent Literacy in Australian Pre-School Children." Australian Journal of Education 58.2 (2014): 109-22. Ofcom. Children and Parents: Media Use and Attitudes Report. London, 2013. Rideout, Victoria. Zero to Eight: Children’s Media Use in America 2013. San Francisco: Common Sense Media, 2013. Rosin, Hanna. "The Touch-Screen Generation." The Atlantic, 20 Apr. 2013. Strasburger, Victor C., et al. "Children, Adolescents, and the Media." Pediatrics 132.5 (2013): 958-61. Unantenne, Nalika. Mobile Device Usage among Young Kids: A Southeast Asia Study. Singapore: The Asian Parent and Samsung Kids Time, 2014. Wenger, Etienne. Communities of Practice: Learning, Meaning, and Identity. New York: Cambridge University Press, 1998. Wenger, Etienne. "Communities of Practice and Social Learning Systems." Organization 7.2 (2000): 225-46. Yelland, Nicola. "Which Apps Are Educational and Why? It’s in the Eye of the Beholder." The Conversation 13 July 2015. 16 Aug. 2015 ‹http://theconversation.com/which-apps-are-educational-and-why-its-in-the-eye-of-the-beholder-37968›.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Tavares, Linda L. "Abstract P096: Effectiveness of a Comprehensive Care Delivery System on Readmission Rates and Self-Care in Older Adult Patients with Heart Failure." Circulation 131, suppl_1 (March 10, 2015). http://dx.doi.org/10.1161/circ.131.suppl_1.p096.

Повний текст джерела
Анотація:
Background: Telemedicine interventions to prevent readmissions in patients with heart failure (HF) have shown inconsistent results in their effectiveness on HF-related and all-cause rehospitalization. Team-based interventions geared toward patient-centric care delivery in concert with comprehensive care coordination that enhances patient self-care may help to prevent unplanned hospitalizations in patients with HF. Objective: To evaluate the outcomes of a comprehensive care delivery system using a team-based high-touch coaching and remote patient monitoring intervention designed for older adult patients with heart failure in a community hospital setting. Design: A descriptive cross-sectional observational design was used to measure readmission rates. A one-group pretest-posttest design using the Self-care of Heart Failure Index was used to measure self-care outcomes. Correlation analysis was performed to determine relationships between the coaching and outcomes. Patients: Participants were older adult patient hospitalized with heart failure and followed for 30-days. Patients were excluded if they were unwilling to participate, non- English speaking, had end-stage renal disease, a terminal illness, debilitating neuro-psychological disorder, or lived greater than 30 miles away. Results: The 30-patients were primarily Caucasian, female with a mean age of 77.5 years. The majority of patients had medically optimized NYHA class II or III HF with an ejection fraction ≤ 40%. HF readmission rate was zero, and 6% for all cause. Patient self-care scores improved (p < .0001). Team based coaching was correlated with improvement in self-care maintenance scores (p =.009). Conclusion: A comprehensive care delivery system leveraging remote patient monitoring and health coaching significantly reduced 30-day readmission and enhanced patient self-care management. Implications: Patient centric team based care models leveraging technology should continue to be developed and implemented to transform care delivery for older adults with HF. Table 1. Change in Mean Self-Care of Heart Failure Index Scores p < .0001 p < .0001 p < .0001
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Abidin, Crystal. "Micro­microcelebrity: Branding Babies on the Internet." M/C Journal 18, no. 5 (October 14, 2015). http://dx.doi.org/10.5204/mcj.1022.

Повний текст джерела
Анотація:
Babies and toddlers are amassing huge followings on social media, achieving microcelebrity status, and raking in five figure sums. In East Asia, many of these lucrative “micro­-microcelebrities” rise to fame by inheriting exposure and proximate microcelebrification from their social media Influencer mothers. Through self-branding techniques, Influencer mothers’ portrayals of their young’ children’s lives “as lived” are the canvas on which (baby) products and services are marketed to readers as “advertorials”. In turning to investigate this budding phenomenon, I draw on ethnographic case studies in Singapore to outline the career trajectory of these young children (under 4yo) including their social media presence, branding strategies, and engagement with their followers. The chapter closes with a brief discussion on some ethical considerations of such young children’s labour in the social media age.Influencer MothersTheresa Senft first coined the term “microcelebrity” in her work Camgirls as a burgeoning online trend, wherein people attempt to gain popularity by employing digital media technologies, such as videos, blogs, and social media. She describes microcelebrities as “non-actors as performers” whose narratives take place “without overt manipulation”, and who are “more ‘real’ than television personalities with ‘perfect hair, perfect friends and perfect lives’” (Senft 16), foregrounding their active response to their communities in the ways that maintain open channels of feedback on social media to engage with their following.Influencers – a vernacular industry term albeit inspired by Katz & Lazarsfeld’s notion of “personal influence” that predates Internet culture – are one type of microcelebrity; they are everyday, ordinary Internet users who accumulate a relatively large following on blogs and social media through the textual and visual narration of their personal lives and lifestyles, engage with their following in “digital” and “physical” spaces, and monetize their following by integrating “advertorials” into their blog or social media posts and making physical appearances at events. A pastiche of “advertisement” and “editorial”, advertorials in the Influencer industry are highly personalized, opinion-laden promotions of products/services that Influencers personally experience and endorse for a fee. Influencers in Singapore often brand themselves as having “relatability”, or the ability to persuade their followers to identify with them (Abidin). They do so by make consciously visible the backstage (Goffman) of the usually “inaccessible”, “personal”, and “private” aspects of mundane, everyday life to curate personae that feel “authentic” to fans (Marwick 114), and more accessible than traditional celebrity (Senft 16).Historically, the Influencer industry in Singapore can be traced back to the early beginnings of the “blogshop” industry from the mid-2000s and the “commercial blogging” industry. Influencers are predominantly young women, and market products and services from diverse industries, although the most popular have been fashion, beauty, F&B, travel, and electronics. Most prominent Influencers are contracted to management agencies who broker deals in exchange for commission and assist in the production of their vlogs. Since then, the industry has grown, matured, and expanded so rapidly that Influencers developed emergent models of advertorials, with the earliest cohorts moving into different life stages and monetizing several other aspects of their personal lives such as the “micro-microcelebrity” of their young children. What this paper provides is an important analysis of the genesis and normative practices of micro-microcelebrity commerce in Singapore from its earliest years, and future research trajectories in this field.Micro-Microcelebrity and Proximate MicrocelebrificationI define micro-microcelebrities as the children of Influencers who have themselves become proximate microcelebrities, having derived exposure and fame from their prominent Influencer mothers, usually through a more prolific, deliberate, and commercial form of what Blum-Ross defines as “sharenting”: the act of parents sharing images and stores about their children in digital spaces such as social networking sites and blogs. Marwick (116-117), drawing from Rojek’s work on types of celebrity – distinguishes between two types of microcelebrity: “ascribed microcelebrity” where the online personality is made recognizable through the “production of celebrity media” such as paparazzi shots and user-produced online memes, or “achieved microcelebrity” where users engage in “self-presentation strateg[ies]”, such as fostering the illusion of intimacy with fans, maintaining a persona, and selective disclosure about oneself.Micro-microcelebrities lie somewhere between the two: In a process I term “proximate microcelebrification”, micro-microcelebrities themselves inherit celebrity through the preemptive and continuous exposure from their Influencer mothers, many beginning even during the pre-birth pregnancy stages in the form of ultrasound scans, as a form of “achieved microcelebrity”. Influencer mothers whose “presentational strategies” (cf. Marshall, “Promotion” 45) are successful enough (as will be addressed later) gain traction among followers, who in turn further popularize the micro-microcelebrity by setting up fan accounts, tribute sites, and gossip forums through which fame is heightened in a feedback loop as a model of “ascribed microcelebrity”.Here, however, I refrain from conceptualizing these young stars as “micro-Influencers” for unlike Influencers, these children do not yet curate their self-presentation to command the attention of followers, but instead are used, framed, and appropriated by their mothers for advertorials. In other words, Influencer mothers “curate [micro-microcelebrities’] identities into being” (Leaver, “Birth”). Following this, many aspects of their micro-microcelebrities become rapidly commodified and commercialized, with advertisers clamoring to endorse anything from maternity hospital stays to nappy cream.Although children of mommybloggers have the prospect to become micro-microcelebrities, both groups are conceptually distinct. Friedman (200-201) argues that among mommybloggers arose a tension between those who adopt “the raw authenticity of nonmonetized blogging”, documenting the “unglamorous minutiae” of their daily lives and a “more authentic view of motherhood” and those who use mommyblogs “primarily as a source of extra income rather than as a site for memoir”, focusing on “parent-centered products” (cf. Mom Bloggers Club).In contrast, micro-microcelebrities and their digital presence are deliberately commercial, framed and staged by Influencer mothers in order to maximize their advertorial potential, and are often postured to market even non-baby/parenting products such as fast food and vehicles (see later). Because of the overt commerce, it is unclear if micro-microcelebrity displays constitute “intimate surveillance”, an “almost always well-intentioned surveillance of young people by parents” (Leaver, “Born” 4). Furthermore, children are generally peripheral to mommybloggers whose own parenting narratives take precedence as a way to connect with fellow mothers, while micro-microcelebrities are the primary feature whose everyday lives and digital presence enrapture followers.MethodologyThe analysis presented is informed by my original fieldwork with 125 Influencers and related actors among whom I conducted a mixture of physical and digital personal interviews, participant observation, web archaeology, and archival research between December 2011 and October 2014. However, the material presented here is based on my digital participant observation of publicly accessible and intentionally-public digital presence of the first four highly successful micro-microcelebrities in Singapore: “Baby Dash” (b.2013) is the son of Influencer xiaxue, “#HeYurou” (b.2011) is the niece of Influencer bongqiuqiu, “#BabyElroyE” (b.2014) is the son of Influencer ohsofickle, and “@MereGoRound” (b.2015) is the daughter of Influencer bongqiuqiu.The microcelebrity/social media handles of these children take different forms, following the platform on which their parent/aunt has exposed them on the most. Baby Dash appears in all of xiaxue’s digital platforms under a variety of over 30 indexical, ironic, or humourous hashtags (Leaver, “Birth”) including “#pointylipped”, #pineappledash”, and “#面包脸” (trans. “bread face”); “#HeYurou” appears on bongqiuqiu’s Instagram and Twitter; “#BabyElroyE” appears on ohsofickle’s Instagram and blog, and is the central figure of his mother’s new YouTube channel; and “@MereGoRound” appears on all of bongqiuqiu’s digital platforms but also has her own Instagram account and dedicated YouTube channel. The images reproduced here are screenshot from Influencer mothers’ highly public social media: xiaxue, bongqiuqiu, and ohsofickle boast 593k, 277k, and 124k followers on Instagram and 263k, 41k, and 17k followers on Twitter respectively at the time of writing.Anticipation and Digital EstatesIn an exclusive front-pager (Figure 1) on the day of his induced birth, it was announced that Baby Dash had already received up to SGD25,000 worth of endorsement deals brokered by his Influencer mother, xiaxue. As the first micro-microcelebrity in his cohort (his mother was among the pioneer Influencers), Baby Dash’s Caesarean section was even filmed and posted on xiaxue’s YouTube channel in three parts (Figure 2). xiaxue had announced her pregnancy on her blog while in her second trimester, following which she consistently posted mirror selfies of her baby bump.Figure 1 & 2, screenshot April 2013 from ‹instagram.com/xiaxue›In her successful attempt at generating anticipation, the “bump” itself seemed to garner its own following on Twitter and Instagram, with many followers discussing how the Influencer dressed “it”, and how “it” was evolving over the weeks. One follower even compiled a collage of xiaxue’s “bump” chronologically and gifted it to the Influencer as an art image via Twitter on the day she delivered Baby Dash (Figure 3 & 4). Followers also frequently speculated and bantered about how her baby would look, and mused about how much they were going to adore him. Figure 3 & 4, screenshot March 2013 from ‹twitter.com/xiaxue› While Lupton (42) has conceptualized the sharing of images that precede birth as a “rite of passage”, Influencer mothers who publish sonograms deliberately do so in order to claim digital estates for their to-be micro-microcelebrities in the form of “reserved” social media handles, blog URLs, and unique hashtags for self-branding. For instance, at the 3-month mark of her pregnancy, Influencer bongqiuqiu debuted her baby’s dedicated hashtag, “#MereGoRound” in a birth announcement on her on Instagram account. Shortly after, she started an Instagram account, “@MereGoRound”, for her baby, who amassed over 5.5k followers prior to her birth. Figure 5 & 6, screenshot March 2015 from instagram.com/meregoround and instagram.com/bongqiuqiuThe debut picture features a heavily pregnant belly shot of bongqiuqiu (Figure 5), creating much anticipation for the arrival of a new micro-microcelebrity: in the six months leading up to her birth, various family, friends, and fans shared Instagram images of their gifts and welcome party for @MereGoRound, and followers shared congratulations and fan art on the dedicated Instagram hashtag. During this time, bongqiuqiu also frequently updated followers on her pregnancy progress, not without advertising her (presumably sponsored) gynecologist and hospital stay in her pregnancy diaries (Figure 6) – like Baby Dash, even as a foetus @MereGoRound was accumulating advertorials. Presently at six months old, @MereGoRound boasts almost 40k followers on Instagram on which embedded in the narrative of her growth are sponsored products and services from various advertisers.Non-Baby-Related AdvertorialsPrior to her pregnancy, Influencer bongqiuqiu hopped onto the micro-microcelebrity bandwagon in the wake of Baby Dash’s birth, by using her niece “#HeYurou” in her advertorials. Many Influencers attempt to naturalize their advertorials by composing their post as if recounting a family event. With reference to a child, parent, or partner, they may muse or quip about a product being used or an experience being shared in a bid to mask the distinction between their personal and commercial material. bongqiuqiu frequently posted personal, non-sponsored images engaging in daily mundane activities under the dedicated hashtag “#HeYurou”.However, this was occasionally interspersed with pictures of her niece holding on to various products including storybooks (Figure 8) and shopping bags (Figure 9). At first glance, this might have seemed like any mundane daily update the Influencer often posts. However, a close inspection reveals the caption bearing sponsor hashtags, tags, and campaign information. For instance, one Instagram post shows #HeYurou casually holding on to and staring at a burger in KFC wrapping (Figure 7), but when read in tandem with bongqiuqiu’s other KFC-related posts published over a span of a few months, it becomes clear that #HeYurou was in fact advertising for KFC. Figure 7, 8, 9, screenshot December 2014 from ‹instagram.com/bongqiuqiu›Elsewhere, Baby Dash was incorporated into xiaxue’s car sponsorship with over 20 large decals of one of his viral photos – dubbed “pineapple Dash” among followers – plastered all over her vehicle (Figure 10). Followers who spot the car in public are encouraged to photograph and upload the image using its dedicated hashtag, “#xiaxuecar” as part of the Influencer’s car sponsorship – an engagement scarcely related to her young child. Since then, xiaxue has speculated producing offshoots of “pineapple Dash” products including smartphone casings. Figure 10, screenshot December 2014 from ‹instagram.com/xiaxue›Follower EngagementSponsors regularly organize fan meet-and-greets headlined by micro-microcelebrities in order to attract potential customers. Photo opportunities and the chance to see Baby Dash “in the flesh” frequently front press and promotional material of marketing campaigns. Elsewhere on social media, several Baby Dash fan and tribute accounts have also emerged on Instagram, reposting images and related media of the micro-microcelebrity with overt adoration, no doubt encouraged by xiaxue, who began crowdsourcing captions for Baby Dash’s photos.Influencer ohsofickle postures #BabyElroyE’s follower engagement in a more subtle way. In her YouTube channel that debut in the month of her baby’s birth, ohsofickle produces video diaries of being a young, single, mother who is raising a child (Figure 11). In each episode, #BabyElroyE is the main feature whose daily activities are documented, and while there is some advertising embedded, ohsofickle’s approach on YouTube is much less overt than others as it features much more non-monetized personal content (Figure 12). Her blog serves as a backchannel to her vlogs, in which she recounts her struggles with motherhood and explicitly solicits the advice of mothers. However, owing to her young age (she became an Influencer at 17 and gave birth at 24), many of her followers are teenagers and young women who respond to her solicitations by gushing over #BabyElroyE’s images on Instagram. Figure 11 & 12, screenshot September 2015 from ‹instagram.com/ohsofickle›PrivacyAs noted by Holloway et al. (23), children like micro-microcelebrities will be among the first cohorts to inherit “digital profiles” of their “whole lifetime” as a “work in progress”, from parents who habitually underestimate or discount the privacy and long term effects of publicizing information about their children at the time of posting. This matters in a climate where social media platforms can amend privacy policies without user consent (23), and is even more pressing for micro-microcelebrities whose followers store, republish, and recirculate information in fan networks, resulting in digital footprints with persistence, replicability, scalability, searchability (boyd), and extended longevity in public circulation which can be attributed back to the children indefinitely (Leaver, “Ends”).Despite minimum age restrictions and recent concerns with “digital kidnapping” where users steal images of other young children to be re-posted as their own (Whigham), some social media platforms rarely police the proliferation of accounts set up by parents on behalf of their underage children prominently displaying their legal names and life histories, citing differing jurisdictions in various countries (Facebook; Instagram), while others claim to disable accounts if users report an “incorrect birth date” (cf. Google for YouTube). In Singapore, the Media Development Authority (MDA) which governs all print and digital media has no firm regulations for this but suggests that the age of consent is 16 judging by their recommendation to parents with children aged below 16 to subscribe to Internet filtering services (Media Development Authority, “Regulatory” 1). Moreover, current initiatives have been focused on how parents can impart digital literacy to their children (Media Development Authority, “Empowered”; Media Literacy Council) as opposed to educating parents about the digital footprints they may be unwittingly leaving about their children.The digital lives of micro-microcelebrities pose new layers of concern given their publicness and deliberate publicity, specifically hinged on making visible the usually inaccessible, private aspects of everyday life (Marshall, “Persona” 5).Scholars note that celebrities are individuals for whom speculation of their private lives takes precedence over their actual public role or career (Geraghty 100-101; Turner 8). However, the personae of Influencers and their young children are shaped by ambiguously blurring the boundaries of privacy and publicness in order to bait followers’ attention, such that privacy and publicness are defined by being broadcast, circulated, and publicized (Warner 414). In other words, the publicness of micro-microcelebrities is premised on the extent of the intentional publicity rather than simply being in the public domain (Marwick 223-231, emphasis mine).Among Influencers privacy concerns have aroused awareness but not action – Baby Dash’s Influencer mother admitted in a national radio interview that he has received a death threat via Instagram but feels that her child is unlikely to be actually attacked (Channel News Asia) – because privacy is a commodity that is manipulated and performed to advance their micro-microcelebrities’ careers. As pioneer micro-microcelebrities are all under 2-years-old at present, future research warrants investigating “child-centred definitions” (Third et al.) of the transition in which they come of age, grow an awareness of their digital presence, respond to their Influencer mothers’ actions, and potentially take over their accounts.Young LabourThe Ministry of Manpower (MOM) in Singapore, which regulates the employment of children and young persons, states that children under the age of 13 may not legally work in non-industrial or industrial settings (Ministry of Manpower). However, the same document later ambiguously states underaged children who do work can only do so under strict work limits (Ministry of Manpower). Elsewhere (Chan), it is noted that national labour statistics have thus far only focused on those above the age of 15, thus neglecting a true reflection of underaged labour in Singapore. This is despite the prominence of micro-microcelebrities who are put in front of (video) cameras to build social media content. Additionally, the work of micro-microcelebrities on digital platforms has not yet been formally recognized as labour, and is not regulated by any authority including Influencer management firms, clients, the MDA, and the MOM. Brief snippets from my ethnographic fieldwork with Influencer management agencies in Singapore similarly reveal that micro-microcelebrities’ labour engagements and control of their earnings are entirely at their parents’ discretion.As models and actors, micro-microcelebrities are one form of entertainment workers who if between the ages of 15 days and 18 years in the state of California are required to obtain an Entertainment Work Permit to be gainfully employed, adhering to strict work, schooling, and rest hour quotas (Department of Industrial Relations). Furthermore, the Californian Coogan Law affirms that earnings by these minors are their own property and not their parents’, although they are not old enough to legally control their finances and rely on the state to govern their earnings with a legal guardian (Screen Actors Guild). However, this similarly excludes underaged children and micro-microcelebrities engaged in creative digital ecologies. Future research should look into safeguards and instruments among young child entertainers, especially for micro-micrcocelebrities’ among whom commercial work and personal documentation is not always distinct, and are in fact deliberately intertwined in order to better engage with followers for relatabilityGrowing Up BrandedIn the wake of moral panics over excessive surveillance technologies, children’s safety on the Internet, and data retention concerns, micro-microcelebrities and their Influencer mothers stand out for their deliberately personal and overtly commercial approach towards self-documenting, self-presenting, and self-publicizing from the moment of conception. As these debut micro-microcelebrities grow older and inherit digital publics, personae, and careers, future research should focus on the transition of their ownership, engagement, and reactions to a branded childhood in which babies were postured for an initimate public.ReferencesAbidin, Crystal. “Communicative Intimacies: Influencers and Perceived Interconnectedness.” Ada: A Journal of Gender, New Media, & Technology. Forthcoming, Nov 2015.Aiello, Marianne. “Mommy Blog Banner Ads Get Results.” Healthcare Marketing Advisor 17 Nov. 2010. HealthLeaders Media. 16 Aug. 2015 ‹http://healthleadersmedia.com/content/MAR-259215/Mommy-Blog-Banner-Ads-Get-Results›.Azzarone, Stephanie. “When Consumers Report: Mommy Blogging Your Way to Success.” Playthings 18 Feb. 2009. Upfront: Marketing. 16 Aug. 2015 ‹http://mamanista.com/media/Mamanista_playthings_full.pdf›.Blum-Ross, Alicia. “’Sharenting’: Parent Bloggers and Managing Children’s Digital Footprints.” Parenting for a Digital Future, 17 Jun. 2015. 16 Aug. 2015 ‹http://blogs.lse.ac.uk/parenting4digitalfuture/2015/06/17/managing-your-childs-digital-footprint-and-or-parent-bloggers-ahead-of-brit-mums-on-the-20th-of-june/›.boyd, danah. “Social Network Sites and Networked Publics: Affordances, Dymanics and Implications.” A Networked Self: Identity, Community, and Culture on Social Network Sites. Ed. Zizi Papacharissi. London: Routledge, 2010. 39–58.Business Wire. “Attention All Mommy Bloggers: TheBump.com Launches 2nd Annual The Bump Mommy Blog Awards.” Business Wire 2 Nov. 2010. 16 Aug. 2015 ‹http://www.businesswire.com/news/home/20101102007005/en/Attention-Mommy-Bloggers-TheBump.com-Launches-2nd-Annual#.VdDsXp2qqko›.Channel News Asia. “Blogger Xiaxue ‘On the Record’.” Channel News Asia 10 Jul. 2015. 16 Aug. 2015 ‹http://www.channelnewsasia.com/news/singapore/blogger-xiaxue-on-the/1975712.html›.Chan, Wing Cheong. “Protection of Underaged Workers in Singapore: Domestic and International Regulation.” Singapore Academy of Law Journal 17 (2005): 668-692. ‹http://www.sal.org.sg/digitallibrary/Lists/SAL%20Journal/Attachments/376/2005-17-SAcLJ-668-Chan.pdf›.Department of Industrial Relations. “California Child Labor Laws.” Department of Industrial Relations, 2013. 16 Aug. 2015 ‹http://www.dir.ca.gov/DLSE/ChildLaborLawPamphlet.pdf›.Facebook. “How Do I Report a Child under the Age of 13?” Facebook 2015. 16 Aug. 2015 ‹https://www.facebook.com/help/157793540954833›.Friedman, Mary. Mommyblogs and the Changing Face of Motherhood. Toronto, ON: University of Toronto Press, 2013.Geraghty, Christine. “Re-Examining Stardom: Questions of Texts, Bodies and Performance.” Stardom and Celebrity: A Reader. Eds. Sean Redmond & Su Holmes. Los Angeles: Sage, 2007. 98-110.Goffman, Erving. The Presentation of Self in Everyday Life. London: Penguin Books, 1956. Google. “Age Requirements on Google Accounts.” Google Support 2015. 16 Aug. 2015 ‹https://support.google.com/accounts/answer/1350409?hl=en›.Holloway, Donell, Lelia Green, and Sonia Livingstone. “Zero to Eight: Young Children and Their Internet Use.” EU Kids Online 2013. London: London School of Economics. 16. Aug 2015 ‹http://eprints.lse.ac.uk/52630/1/Zero_to_eight.pdf›.Howell, Whitney L.J. “Mom-to-Mom Blogs: Hospitals Invite Women to Share Experiences.” H&HN 84.10(2010): 18. ‹http://connection.ebscohost.com/c/articles/54858655/mom-to-mom-blogs-hospitals-invite-women-share-experiences-mommy-blogs-are-catching-as-way-let-parents-interact-compare-notes›.Instagram. “Tips for Parents.” Instagram Help 2015. 16 Aug. 2015 ‹https://help.instagram.com/154475974694511/›.Katz, Elihu, and Paul F. Lazarsfeld. Personal Influence: The Part Played by People in the Flow of Mass Communications. New Brunswick: Transaction Publishers, 2009. Leaver, Tama. “The Ends of Online Identity”. Paper presented at Internet Research 12, Seattle, 2011.Leaver, Tama. “Birth and Death on Social Media: Dr Tama Leaver.” Lecture presented at Curtin University, 20 Jul. 2015.. 16 Aug. 2015 ‹https://www.youtube.com/watch?v=rQ6eW6qxGx8›.Leaver, Tama. “Born Digital? Presence, Privacy, and Intimate Surveillance.” Re-Orientation: Translingual Transcultural Transmedia: Studies in Narrative, Language, Identity, and Knowledge. Eds. John Hartley & Weiguo Qu. Fudan University Press, forthcoming.Lupton, Deborah. The Social Worlds of the Unborn. Basingstoke: Palgrave MacMillan, 2013.Marshall, P. David. "The Promotion and Presentation of the Self: Celebrity as Marker of Presentational Media." Celebrity Studies 1.1 (2010): 35-48. Marshall, P. David. “Persona Studies: Mapping the Proliferation of the Public Self.” Journalism 15.2 (2013): 153-170. Marwick, Alice E. Status Update: Celebrity, Publicity, & Branding in the Social Media Age. New Haven, CT: Yale University Press, 2013.Media Development Authority. “The Regulatory Options to Facilitate the Adoption of Internet Parental Controls.” Regulations and Licensing 2015. 16 Aug. 2015 ‹http://www.mda.gov.sg/RegulationsAndLicensing/Consultation/Documents/Consultation%20Papers/Public%20consultation%20paper%20for%20Internet%20parental%20controls_21%20Apr_final.pdf›.Media Development Authority. “Be Empowered! Protecting Your Kids in the Digital Age.” Documents 2015. 16 Aug. 2015 ‹http://www.mda.gov.sg/Documents/Newsletter/Issue08/Pages/02.aspx.html›.Media Literacy Council. “Clique Click: Bringing Up Children in the Digital Age.” Resources 2014. 16 Aug. 2015 ‹http://www.medialiteracycouncil.sg/Lists/Resources/Attachments/176/Clique%20Click.pdf›.Ministry of Manpower. “Employing Young Persons and Children.” Employment 26 May 2014. 16 Aug. 2015 ‹http://www.mom.gov.sg/employment-practices/young-persons-and-children›.Mom Bloggers Club. “Eight Proven Ways to Monetize Your Mom Blog.” Mom Bloggers Club 19 Nov. 2009. 15 Aug. 2015 ‹http://www.mombloggersclub.com/page/eight-proven-ways-to-monetize?id=988554%3APage%3A345278&page=3#comments›.Morrison, Aimee. “‘Suffused by Feeling and Affect:’ The Intimate Public of Personal Mommy Blogging.” Biography 34.1 (2011): 37-55.Nash, Meredith. “Shapes of Motherhood: Exploring Postnatal Body Image through Photographs.” Journal of Gender Studies (2013): 1-20. ‹http://www.tandfonline.com/doi/abs/10.1080/09589236.2013.797340#.VdDsvZ2qqko›.Rojek, Chris. Celebrity. London: Reaktion Books, 2001. Screen Actors Guild. “Coogan Law.” SAGAFTRA 2015. 16 Aug. 2015 ‹http://www.sagaftra.org/content/coogan-law›.Senft, Theresa. M. Camgirls: Celebrity & Community in the Age of Social Networks. New York, NY: Peter Lang, 2008.Stevenson, Seth. “Popularity Counts.” Wired 20.5 (2012): 120.Tatum, Christine. “Mommy Blogs Mull and Prove Market Might.” Denver Post 23 Oct 2007. 16 Aug. 2015 ‹http://www.denverpost.com/search/ci_7250753›.Third, Amanda, Delphine Bellerose, Urszula Dawkins, Emma Keltie, and Kari Pihl. “Children’s Rights in the Digital Age.” Young and Well Cooperative Research Centre 2014. 16 Aug. 2015 ‹http://www.youngandwellcrc.org.au/wp-content/uploads/2014/10/Childrens-Rights-in-the-Digital-Age_Report_single_FINAL_.pdf >.Thompson, Stephanie. “Mommy Blogs: A Marketer’s Dream; Growing Number of Well-Produced Sites Put Advertisers in Touch with an Affluent, Loyal Demo.” AD AGE 26 Feb. 2007. 16 Aug. 2015 ‹http://adage.com/article/digital/mommy-blogs-a-marketer-s-dream/115194/›.Turner, Graeme. Understanding Celebrity. Los Angeles: Sage, 2004.Warner, Michael. “Publics and Counter Publics.” Quarterly Journal of Speech 88.4 (2002): 413-425. Whigham, Nick. “Digital Kidnapping Will Make You Think Twice about What You Post to Social Media.” News.com.au 15 July 2015. 16 Aug. 2015 ‹http://www.news.com.au/lifestyle/real-life/digital-kidnapping-will-make-you-think-twice-about-what-you-post-to-social-media/story-fnq2oad4-1227449635495›.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії